Bash, the Crucial Exams Chat Bot
AI Bot

Cloud Security Basics (CloudNetX CNX-001)  Flashcards

CompTIA CloudNetX CNX-001 Flashcards

FrontBack
How do secure APIs contribute to cloud securityBy ensuring data exchange between systems is encrypted and authenticated to prevent breaches
How does a virtual private cloud (VPC) enhance securityBy isolating cloud resources in a private, logically defined network
How does an intrusion detection system (IDS) work in a cloud environmentIt monitors cloud traffic to identify potential threats or malicious activity
How does automation improve cloud securityBy responding to threats more quickly and reducing human error in managing security settings
How does cloud data loss prevention (DLP) workIt detects and prevents sensitive information from being lost, misused, or accessed unintentionally
How does encryption key management work in the cloudInvolves generating, storing, and protecting cryptographic keys for encryption and decryption
How does identity and access management (IAM) enhance cloud securityBy controlling and managing user access to cloud resources
How does network segmentation enhance cloud securityBy isolating different parts of the cloud network to limit the impact of a potential breach
How does penetration testing enhance cloud securityBy identifying vulnerabilities through controlled simulated attacks
How does role-based access control (RBAC) improve cloud securityBy limiting access to cloud resources based on a user's specific role within an organization
How is threat intelligence used in cloud securityBy collecting and analyzing data about potential threats to proactively protect cloud environments
What is a cloud security posture management (CSPM) toolIt continuously monitors cloud environments for compliance risks and misconfigurations
What is a distributed denial-of-service (DDoS) attackAn attempt to overwhelm a cloud service by flooding it with excessive requests
What is a security misconfiguration in the cloudErrors or gaps in the security settings of cloud resources that create vulnerabilities
What is a shared responsibility modelThe division of security responsibilities between the cloud provider and the cloud customer
What is an API gateway's role in cloud securityManaging and securing API requests and traffic
What is cloud application securityMeasures and tools to protect applications running in cloud environments from threats
What is cloud encryptionThe process of converting data into a secure format before storing or transmitting in the cloud
What is cloud governanceThe set of policies and procedures used to manage data, security, and compliance in the cloud
What is cloud incident responseThe process of managing and mitigating security incidents in cloud environments
What is cloud risk assessmentEvaluating potential security risks associated with a cloud environment and implementing measures to mitigate them
What is container security in the cloudProtecting the integrity of containers and the applications they run in cloud environments
What is data residency in cloud computingStipulating the physical locations where data must be stored to meet legal requirements
What is encryption in transit in cloud securitySecuring data as it moves between user devices and cloud servers to prevent interception
What is infrastructure as a service (IaaS) securityProtecting virtual machines, network interfaces, and storage in IaaS environments
What is shadow IT in cloud computingThe unauthorized use of cloud services or applications without approval from the organization's IT department
What is the concept of data sovereignty in cloud securityThe requirement for data to comply with the laws and regulations of its country of origin
What is the function of cloud monitoring toolsTracking, assessing, and responding to potential security threats in real-time
What is the importance of a cloud security policyIt establishes guidelines and best practices for secure use and management of cloud resources
What is the importance of logging and auditing in cloud securityTracking and documenting activities to identify vulnerabilities and hold users accountable
What is the importance of regular patch management in cloud securityKeeping systems updated to fix vulnerabilities and reduce attack surfaces
What is the principle of least privilege in cloud securityGranting users the minimum access needed to perform their tasks
What is the purpose of a cloud security frameworkProviding a structured approach to implementing, managing, and improving cloud security
What is the purpose of cloud access security brokers (CASBs)They provide visibility and control over data and threats in cloud services
What is the purpose of endpoint security in cloud environmentsProtecting devices that access cloud resources from breaches and malware
What is the role of encryption in cloud backupsEnsures that backup data is protected from unauthorized access
What is the role of immutability in cloud securityEnsuring that deployed resources cannot be changed, reducing the risk of tampering or unauthorized modifications
What is zero trust architectureAn approach where no device or user is trusted by default, even inside the network perimeter
Why is compliance critical in cloud environmentsIt ensures that cloud systems meet regulatory and legal requirements
Why is multi-factor authentication important for cloud securityIt adds an additional layer of security by requiring multiple forms of verification
This deck explores essential security principles for cloud environments, including encryption, compliance, access control, and risk management.
Share on...
Follow us on...