Cloud Security Basics (CloudNetX CNX-001) Flashcards
CompTIA CloudNetX CNX-001 Flashcards

| Front | Back |
| How do secure APIs contribute to cloud security | By ensuring data exchange between systems is encrypted and authenticated to prevent breaches |
| How does a virtual private cloud (VPC) enhance security | By isolating cloud resources in a private, logically defined network |
| How does an intrusion detection system (IDS) work in a cloud environment | It monitors cloud traffic to identify potential threats or malicious activity |
| How does automation improve cloud security | By responding to threats more quickly and reducing human error in managing security settings |
| How does cloud data loss prevention (DLP) work | It detects and prevents sensitive information from being lost, misused, or accessed unintentionally |
| How does encryption key management work in the cloud | Involves generating, storing, and protecting cryptographic keys for encryption and decryption |
| How does identity and access management (IAM) enhance cloud security | By controlling and managing user access to cloud resources |
| How does network segmentation enhance cloud security | By isolating different parts of the cloud network to limit the impact of a potential breach |
| How does penetration testing enhance cloud security | By identifying vulnerabilities through controlled simulated attacks |
| How does role-based access control (RBAC) improve cloud security | By limiting access to cloud resources based on a user's specific role within an organization |
| How is threat intelligence used in cloud security | By collecting and analyzing data about potential threats to proactively protect cloud environments |
| What is a cloud security posture management (CSPM) tool | It continuously monitors cloud environments for compliance risks and misconfigurations |
| What is a distributed denial-of-service (DDoS) attack | An attempt to overwhelm a cloud service by flooding it with excessive requests |
| What is a security misconfiguration in the cloud | Errors or gaps in the security settings of cloud resources that create vulnerabilities |
| What is a shared responsibility model | The division of security responsibilities between the cloud provider and the cloud customer |
| What is an API gateway's role in cloud security | Managing and securing API requests and traffic |
| What is cloud application security | Measures and tools to protect applications running in cloud environments from threats |
| What is cloud encryption | The process of converting data into a secure format before storing or transmitting in the cloud |
| What is cloud governance | The set of policies and procedures used to manage data, security, and compliance in the cloud |
| What is cloud incident response | The process of managing and mitigating security incidents in cloud environments |
| What is cloud risk assessment | Evaluating potential security risks associated with a cloud environment and implementing measures to mitigate them |
| What is container security in the cloud | Protecting the integrity of containers and the applications they run in cloud environments |
| What is data residency in cloud computing | Stipulating the physical locations where data must be stored to meet legal requirements |
| What is encryption in transit in cloud security | Securing data as it moves between user devices and cloud servers to prevent interception |
| What is infrastructure as a service (IaaS) security | Protecting virtual machines, network interfaces, and storage in IaaS environments |
| What is shadow IT in cloud computing | The unauthorized use of cloud services or applications without approval from the organization's IT department |
| What is the concept of data sovereignty in cloud security | The requirement for data to comply with the laws and regulations of its country of origin |
| What is the function of cloud monitoring tools | Tracking, assessing, and responding to potential security threats in real-time |
| What is the importance of a cloud security policy | It establishes guidelines and best practices for secure use and management of cloud resources |
| What is the importance of logging and auditing in cloud security | Tracking and documenting activities to identify vulnerabilities and hold users accountable |
| What is the importance of regular patch management in cloud security | Keeping systems updated to fix vulnerabilities and reduce attack surfaces |
| What is the principle of least privilege in cloud security | Granting users the minimum access needed to perform their tasks |
| What is the purpose of a cloud security framework | Providing a structured approach to implementing, managing, and improving cloud security |
| What is the purpose of cloud access security brokers (CASBs) | They provide visibility and control over data and threats in cloud services |
| What is the purpose of endpoint security in cloud environments | Protecting devices that access cloud resources from breaches and malware |
| What is the role of encryption in cloud backups | Ensures that backup data is protected from unauthorized access |
| What is the role of immutability in cloud security | Ensuring that deployed resources cannot be changed, reducing the risk of tampering or unauthorized modifications |
| What is zero trust architecture | An approach where no device or user is trusted by default, even inside the network perimeter |
| Why is compliance critical in cloud environments | It ensures that cloud systems meet regulatory and legal requirements |
| Why is multi-factor authentication important for cloud security | It adds an additional layer of security by requiring multiple forms of verification |
Related Study Materials
About the Flashcards
Flashcards for the CompTIA CloudNetX exam reinforce essential cloud security concepts tested on the certification. Each card distills topics such as encryption methods, multi-factor authentication, least privilege, and the shared responsibility model into quick question-and-answer pairs that help you retain definitions and best practices.
The deck also covers compliance requirements, threat detection tools, incident response, and emerging architectures like zero trust, container security, and cloud security posture management. Reviewing these terms will sharpen your understanding of how to secure IaaS resources, protect data in transit and at rest, and maintain a strong security posture across diverse cloud environments.
Topics covered in this flashcard deck:
- Encryption & key management
- Identity and access controls
- Compliance and cloud governance
- Threat detection and response
- IaaS, containers, network security