CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
How does running applications on distinct virtual networks and only connecting networks as needed help?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
When designing an encryption system, you should start with a threat model.
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
Which statement best describes why it is important to know how data is being accessed?