Bash, the Crucial Exams Chat Bot
AI Bot
Cloud Security Basics (CloudNetX CNX-001) Flashcards
CompTIA CloudNetX CNX-001 Flashcards
| Front | Back |
| How do secure APIs contribute to cloud security | By ensuring data exchange between systems is encrypted and authenticated to prevent breaches |
| How does a virtual private cloud (VPC) enhance security | By isolating cloud resources in a private, logically defined network |
| How does an intrusion detection system (IDS) work in a cloud environment | It monitors cloud traffic to identify potential threats or malicious activity |
| How does automation improve cloud security | By responding to threats more quickly and reducing human error in managing security settings |
| How does cloud data loss prevention (DLP) work | It detects and prevents sensitive information from being lost, misused, or accessed unintentionally |
| How does encryption key management work in the cloud | Involves generating, storing, and protecting cryptographic keys for encryption and decryption |
| How does identity and access management (IAM) enhance cloud security | By controlling and managing user access to cloud resources |
| How does network segmentation enhance cloud security | By isolating different parts of the cloud network to limit the impact of a potential breach |
| How does penetration testing enhance cloud security | By identifying vulnerabilities through controlled simulated attacks |
| How does role-based access control (RBAC) improve cloud security | By limiting access to cloud resources based on a user's specific role within an organization |
| How is threat intelligence used in cloud security | By collecting and analyzing data about potential threats to proactively protect cloud environments |
| What is a cloud security posture management (CSPM) tool | It continuously monitors cloud environments for compliance risks and misconfigurations |
| What is a distributed denial-of-service (DDoS) attack | An attempt to overwhelm a cloud service by flooding it with excessive requests |
| What is a security misconfiguration in the cloud | Errors or gaps in the security settings of cloud resources that create vulnerabilities |
| What is a shared responsibility model | The division of security responsibilities between the cloud provider and the cloud customer |
| What is an API gateway's role in cloud security | Managing and securing API requests and traffic |
| What is cloud application security | Measures and tools to protect applications running in cloud environments from threats |
| What is cloud encryption | The process of converting data into a secure format before storing or transmitting in the cloud |
| What is cloud governance | The set of policies and procedures used to manage data, security, and compliance in the cloud |
| What is cloud incident response | The process of managing and mitigating security incidents in cloud environments |
| What is cloud risk assessment | Evaluating potential security risks associated with a cloud environment and implementing measures to mitigate them |
| What is container security in the cloud | Protecting the integrity of containers and the applications they run in cloud environments |
| What is data residency in cloud computing | Stipulating the physical locations where data must be stored to meet legal requirements |
| What is encryption in transit in cloud security | Securing data as it moves between user devices and cloud servers to prevent interception |
| What is infrastructure as a service (IaaS) security | Protecting virtual machines, network interfaces, and storage in IaaS environments |
| What is shadow IT in cloud computing | The unauthorized use of cloud services or applications without approval from the organization's IT department |
| What is the concept of data sovereignty in cloud security | The requirement for data to comply with the laws and regulations of its country of origin |
| What is the function of cloud monitoring tools | Tracking, assessing, and responding to potential security threats in real-time |
| What is the importance of a cloud security policy | It establishes guidelines and best practices for secure use and management of cloud resources |
| What is the importance of logging and auditing in cloud security | Tracking and documenting activities to identify vulnerabilities and hold users accountable |
| What is the importance of regular patch management in cloud security | Keeping systems updated to fix vulnerabilities and reduce attack surfaces |
| What is the principle of least privilege in cloud security | Granting users the minimum access needed to perform their tasks |
| What is the purpose of a cloud security framework | Providing a structured approach to implementing, managing, and improving cloud security |
| What is the purpose of cloud access security brokers (CASBs) | They provide visibility and control over data and threats in cloud services |
| What is the purpose of endpoint security in cloud environments | Protecting devices that access cloud resources from breaches and malware |
| What is the role of encryption in cloud backups | Ensures that backup data is protected from unauthorized access |
| What is the role of immutability in cloud security | Ensuring that deployed resources cannot be changed, reducing the risk of tampering or unauthorized modifications |
| What is zero trust architecture | An approach where no device or user is trusted by default, even inside the network perimeter |
| Why is compliance critical in cloud environments | It ensures that cloud systems meet regulatory and legal requirements |
| Why is multi-factor authentication important for cloud security | It adds an additional layer of security by requiring multiple forms of verification |
This deck explores essential security principles for cloud environments, including encryption, compliance, access control, and risk management.