Based on the incident impact level classification scales, select the severity of the incident encountered by Colin's organization?

Colin Farrell works as a senior cloud security engineer in a healthcare company. His organization has migrated all workloads and data in a private cloud environment. An attacker used the cloud environment as a point to disrupt the business of Colin's organization. Using intrusion detection prevention systems, antivirus software, and...

February 26, 2025 No Comments READ MORE +

Assume that network conditions remain unchanged and Thomas has hosted the application on Amazon EC2 instance; moreover, multiple instances of the application are deployed on different EC2 regions. When a user located in London visits Thomas's domain, to which location does Amazon Route 53 route the user request?

Thomas Gibson is a cloud security engineer working in a multinational company. Thomas has created a Route 53 record set from his domain to a system in Florida, and a similar record to machines in Paris and Singapore. Assume that network conditions remain unchanged and Thomas has hosted the application...

February 24, 2025 No Comments READ MORE +

In this scenario, which Azure service can enable the admin to share documents securely?

A document has an organization's classified information. The organization's Azure cloud administrator has to send it to different recipients. If the email is not protected, this can be opened and read by any user. So the document should be protected and it will only be opened by authorized users. In...

February 22, 2025 No Comments READ MORE +

How many unique firewall rules can SecureSoftWorld Pvt. Ltd define using App Engine Firewall?

SecureSoftWorld Pvt. Ltd. is an IT company that develops software solutions catering to the needs of the healthcare industry. Most of its services are hosted in Google cloud. In the cloud environment, to secure the applications and services, the organization uses Google App Engine Firewall that controls the access to...

February 20, 2025 No Comments READ MORE +

Based on the given information, which of the following data are being generated by Kurt's organization?

SecureSoft IT Pvt. Ltd. is an IT company located in Charlotte, North Carolina, that develops software for the healthcare industry. The organization generates a tremendous amount of unorganized data such as video and audio files. Kurt recently joined SecureSoft IT Pvt. Ltd. as a cloud security engineer. He manages the...

February 20, 2025 No Comments READ MORE +

How can Sam organize resources to determine this information immediately?

Sam, a cloud admin, works for a technology company that uses Azure resources. Because Azure contains the resources of numerous organizations and several alerts are received timely, it is difficult for the technology company to identify risky resources, determine their owner, know whether they are needed, and know who pays...

February 19, 2025 No Comments READ MORE +

Which of the following AWS services can be used to accomplish this?

A new public web application is deployed on AWS that will run behind an Application Load Balancer (ALB). An AWS security expert needs to encrypt the newly deployed application at the edge with an SSL/TLS certificate issued by an external certificate authority. In addition, he needs to ensure the rotation...

February 18, 2025 No Comments READ MORE +

Based on this information, which of the following disaster recovery sites is provided by the DRaaS company to Rachel's organization?

Rachel McAdams works as a cloud security engineer in an MNC. A DRaaS company has provided a disaster recovery site to her organization. The disaster recovery sites have partially redundant equipment with daily or weekly data synchronization provision; failover occurs within hours or days with minimum data loss. Based on...

February 17, 2025 No Comments READ MORE +

Which tool's high availability settings must be checked for this?

An organization with resources on Google Cloud regularly backs up its service capabilities to ensure high availability and reduce the downtime when a zone or instance becomes unavailable owing to zonal outage or memory shortage in an instance. However, as protocol, the organization must frequently test whether these regular backups...

February 14, 2025 No Comments READ MORE +

What is vendor lock-in in cloud computing?

Global InfoSec Solution Pvt. Ltd. is an IT company that develops mobile-based software and applications. For smooth, secure, and cost-effective facilitation of business, the organization uses public cloud services. Now, Global InfoSec Solution Pvt. Ltd. is encountering a vendor lock-in issue. What is vendor lock-in in cloud computing?A . It...

February 14, 2025 No Comments READ MORE +