In the cloud provider and consumer relationship, which entity
manages the virtual or abstracted infrastructure?
Answer : C
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Answer : C
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
Answer : A
What type of information is contained in the Cloud Security Alliance's Cloud Control Matrix?
Answer : B
When designing an encryption system, you should start with a threat model.
Answer : B
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
Answer : C
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Answer : C