Changes to which of the following will MOST likely influence the expansion or reduction of controls required to remediate the risk arising from changes to an organization’s SaaS vendor?
Correct Answer:
B
🗳️
A CSP contracts for a penetration test to be conducted on its infrastructures. The auditor engages the target with no prior knowledge of its defenses, assets, or channels. The CSP’s security operation center is not notified in advance of the scope of the audit and the test vectors. Which mode is selected by the CSP?
Correct Answer:
D
🗳️
Due to cloud audit team resource constraints, an audit plan as initially approved cannot be completed. Assuming that the situation is communicated in the cloud audit report, which course of action is MOST relevant?
Correct Answer:
A
🗳️
In an organization, how are policy violations MOST likely to occur?
Correct Answer:
A
🗳️
Which of the following is the BEST tool to perform cloud security control audits?
Correct Answer:
D
🗳️
Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
Correct Answer:
A
🗳️
After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?
Correct Answer:
A
🗳️
Organizations maintain mappings between the different control frameworks they adopt to:
Correct Answer:
B
🗳️
SAST testing is performed by:
Correct Answer:
A
🗳️
When a client’s business process changes, the CSP SLA should:
Correct Answer:
D
🗳️