Based on the aforementioned cloud security shared responsibilities, which of the following cloud computing service models is enforced in Tom's organization?

Tom Holland works as a cloud security engineer in an IT company located in Lansing, Michigan. His organization has adopted cloud-based services wherein user access, application, and data security are the responsibilities of the organization, and the OS, hypervisor, physical, infrastructure, and network security are the responsibilities of the cloud...

August 4, 2024No CommentsREAD MORE +

Which of the following AWS services can provide DNS failover capabilities and health checks to ensure the availability of the organization's website?

Securelnfo Pvt. Ltd. has deployed all applications and data in the AWS cloud. The security team of this organization would like to examine the health of the organization's website regularly and switch (or failover) to a backup site if the primary website becomes unresponsive. Which of the following AWS services...

August 4, 2024No CommentsREAD MORE +

How can Sam organize resources to determine this information immediately?

Sam, a cloud admin, works for a technology company that uses Azure resources. Because Azure contains the resources of numerous organizations and several alerts are received timely, it is difficult for the technology company to identify risky resources, determine their owner, know whether they are needed, and know who pays...

August 4, 2024No CommentsREAD MORE +

What can the organization do initially to avoid the legal implications of moving data between two AWS regions for analysis?

A security incident has occurred within an organization's AWS environment. A cloud forensic investigation procedure is initiated for the acquisition of forensic evidence from the compromised EC2 instances. However, it is essential to abide by the data privacy laws while provisioning any forensic instance and sending it for analysis. What...

August 4, 2024No CommentsREAD MORE +

Based on the given information, which of the following disaster recovery approach is implemented by Trevor?

Trevor Noah works as a cloud security engineer in an IT company located in Seattle, Washington. Trevor has implemented a disaster recovery approach that runs a scaled-down version of a fully functional environment in the cloud. This method is most suitable for his organization's core business-critical functions and solutions that...

August 4, 2024No CommentsREAD MORE +

Which of the following command should Simon run in the EC2 instance to disable user account passwords?

Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI. Which of...

August 4, 2024No CommentsREAD MORE +

Which Azure AD feature can enable users to access Azure resources?

An Azure organization wants to enforce its on-premises AD security and password policies to filter brute-force attacks. Instead of using legacy authentication, the users should sign in to on-premises and cloud-based applications using the same passwords in Azure AD. Which Azure AD feature can enable users to access Azure resources?A...

August 4, 2024No CommentsREAD MORE +

Based on this information, which of the following disaster recovery sites is provided by the DRaaS company to Rachel's organization?

Rachel McAdams works as a cloud security engineer in an MNC. A DRaaS company has provided a disaster recovery site to her organization. The disaster recovery sites have partially redundant equipment with daily or weekly data synchronization provision; failover occurs within hours or days with minimum data loss. Based on...

August 4, 2024No CommentsREAD MORE +

What is vendor lock-in in cloud computing?

Global InfoSec Solution Pvt. Ltd. is an IT company that develops mobile-based software and applications. For smooth, secure, and cost-effective facilitation of business, the organization uses public cloud services. Now, Global InfoSec Solution Pvt. Ltd. is encountering a vendor lock-in issue. What is vendor lock-in in cloud computing?A . It...

August 4, 2024No CommentsREAD MORE +

Which of the following AWS services can be used to accomplish this?

A new public web application is deployed on AWS that will run behind an Application Load Balancer (ALB). An AWS security expert needs to encrypt the newly deployed application at the edge with an SSL/TLS certificate issued by an external certificate authority. In addition, he needs to ensure the rotation...

August 3, 2024No CommentsREAD MORE +