Which of the following cloud computing service models does not allow cloud penetration testing (CPEN) to Jerry?

Jerry Mulligan is employed by an IT company as a cloud security engineer. In 2014, his organization migrated all applications and data from on-premises to a cloud environment. Jerry would like to perform penetration testing to evaluate the security across virtual machines, installed apps, and OSes in the cloud environment,...

May 5, 2025 No Comments READ MORE +

Based on the given information, which law order does Daffod adhere to?

Daffod is an American cloud service provider that provides cloud-based services to customers worldwide. Several customers are adopting the cloud services provided by Daffod because they are secure and cost-effective. Daffod complies with the cloud computing law enacted in the US to realize the importance of information security in the...

May 3, 2025 No Comments READ MORE +

Which of the following command should Simon run in the EC2 instance to disable user account passwords?

Simon recently joined a multinational company as a cloud security engineer. Due to robust security services and products provided by AWS, his organization has been using AWS cloud-based services. Simon has launched an Amazon EC2 Linux instance to deploy an application. He would like to secure Linux AMI. Which of...

May 3, 2025 No Comments READ MORE +

Which cloud service model should it consider?

A BPO company would like to expand its business and provide 24 x 7 customer service. Therefore, the organization wants to migrate to a fully functional cloud environment that provides all features with minimum maintenance and administration. Which cloud service model should it consider?A . laaSB . PaaSC . RaaSD...

April 27, 2025 No Comments READ MORE +

Which Azure service can help her in detecting the severity and creating alerts?

Georgia Lyman is a cloud security engineer; she wants to detect unusual activities in her organizational Azure account. For this, she wants to create alerts for unauthorized activities with their severity level to prioritize the alert that should be investigated first. Which Azure service can help her in detecting the...

April 25, 2025 No Comments READ MORE +

How can Georgia eliminate the data transfer capacity thresholds imposed on a virtual server by its virtualized environment?

Georgia Lyman works as a cloud security engineer in a multinational company. Her organization uses cloud-based services. Its virtualized networks and associated virtualized resources encountered certain capacity limitations that affected the data transfer performance and virtual server communication. How can Georgia eliminate the data transfer capacity thresholds imposed on a...

April 24, 2025 No Comments READ MORE +

Which of the following commands should William try to create a new user access key ID and secret key for a user?

William O'Neil works as a cloud security engineer in an IT company located in Tampa, Florida. To create an access key with normal user accounts, he would like to test whether it is possible to escalate privileges to obtain AWS administrator account access. Which of the following commands should William...

April 23, 2025 No Comments READ MORE +

If Ray turns off the VM, what will happen?

Ray Nicholson works as a senior cloud security engineer in TerraCloud Sec Pvt. Ltd. His organization deployed all applications in a cloud environment in various virtual machines. Using IDS, Ray identified that an attacker compromised a particular VM. He would like to limit the scope of the incident and protect...

April 22, 2025 No Comments READ MORE +

Which of the following would have prevented this security breach and exploitation?

SevocSoft Private Ltd. is an IT company that develops software and applications for the banking sector. The security team of the organization found a security incident caused by misconfiguration in Infrastructure-as-Code (laC) templates. Upon further investigation, the security team found that the server configuration was built using a misconfigured laC...

April 20, 2025 No Comments READ MORE +

Which of the following AWS service allows secure hosted queue server-side encryption (SSE), or uses custom SSE keys managed in AWS Key Management Service (AWS KMS)?

A web server passes the reservation information to an application server and then the application server queries an Airline service. Which of the following AWS service allows secure hosted queue server-side encryption (SSE), or uses custom SSE keys managed in AWS Key Management Service (AWS KMS)?A . Amazon Simple WorkflowB...

April 20, 2025 No Comments READ MORE +