CCAK
cloud auditing knowledge
cloud auditing knowledge
Fichier Détails
Cartes-fiches | 45 |
---|---|
Langue | English |
Catégorie | Technique |
Niveau | Autres |
Crée / Actualisé | 29.11.2023 / 30.11.2023 |
Lien de web |
https://card2brain.ch/box/20231129_ccak
|
Intégrer |
<iframe src="https://card2brain.ch/box/20231129_ccak/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Créer ou copier des fichiers d'apprentissage
Avec un upgrade tu peux créer ou copier des fichiers d'apprentissage sans limite et utiliser de nombreuses fonctions supplémentaires.
Connecte-toi pour voir toutes les cartes.
What domain is AAC?
Audit, Assurance and Compliance
What Domain is BCR?
Business Continuity and Operational Resilience
Which Domain is CCC?
Change control and configuration management
Which Domain is DSI?
Data Security and Information Lifecycle Management
Which domain is DCS
Data Center Security
Which domain is EKM
Encryption and Key Management
HRS?
Human Resources Security
IAM
Identity and Access Management
IVS
Infrastructure and Virtualization
GRM?
Governance and Risk Management
IPY
Interoperability and Portability
MOS
Mobile Security
SEF
Security Incident Management, E-Disc and Cloud Forensics
STA
Supply Chain Management, Transparency and Accountability
TVM
Threat and Vulnerability Management
Some of the reasons to integrate security in the early stages of the systems development life cycle include (select all that apply):
What are example benefits of including dynamic application security testing (DAST) in software security testing? (Select all that apply.)
Which of the following is not a primary function of a version control repository? (Select the BEST answer.)
What technology should be considered and assessed to manage the extensive credentials typically embedded and used by CI/CD pipelines?
5. On what elements should the auditor rely for auditability and accountability in a DevSecOps approach? (Select all that apply.)
In continuous integration pipelines, pull requests refer to what type of operations?
Which of the following is not primarily a security-specific type of test?
Which of the following is a key concept for auditors regarding testing in a continuous integration/continuous deployment (CI/CD) pipeline?
Which of the following is true when assessing a function as a service (serverless) functions in a public cloud provider environment?
A technical control is one part of a broader set of mitigations. An organization should consider how a specific control mitigates the risk. Which of the following describes another consideration that will help determine whether a specific control is needed?
- Which of these elements are part of cloud policy?
- When evaluating a cloud provider’s maturity and ability to execute, the customer should consider which of the following?
- For cloud trust and transparency, what are some key considerations that the cloud customer needs to be aware of? (two)
- Considering that cloud security is based on the shared responsibility model, select the controls that are usually the responsibility of the cloud consumer:
In SaaS, which risk has shared responsibility by both the cloud customer and CSP?
-
- 1 / 45
-