AWS
AZURE
CLI
GCP
CCSE Vendor Neutral
100

3 Different Shared responsibility model Container Services?

Elastic Beanstalk 

Relational Database 

& Elastic Map Reduce

100

What is Azure Sentinel?

SOAR & SIEM Tools

100

Command to utilize AZ CLI to create a snapshot of image?

AZ shapshot create

100

3 Basic G-Roles

Viewer Editor Owner

100

What is Geofencing?

Geofencing is a location-based technology service in which a mobile, desktop, or cloud-based app or other software utilizes GPS, RFID, Wi-Fi, or cellular data to activate a pre-programmed action when a mobile device or RFID tag enters or departs a virtual border, that is set up around a geographical area.

200

What is AWS Cloud Watch?

monitoring service for AWS resources and applications.

200

What is an account storage key

When you create a storage account, Azure generates two 512-bit storage account access keys for that account. These keys can be used to authorize access to data in your storage account via Shared Key authorization, or via Shared Key authorization, or via SAS tokens that are signed with the shared key.

200

Which GCP command provides the current configuration the PROJECT_ID?

export PROJECT_ID=$(gcloudconfig get-value project)

200

What is a Google VPC?

It provides networking for Compute Engine VM, GKE containers, and the App Engine environment inside Googles production network.

200

4 Ways to Manage Risk?

 Acceptance  Transferrence Avoidance  Mitigation

300

What is AWS Cloud Trail?

Monitoring Tool /web service that records API activity in your AWS account.

300

You can integrate Azure Security Center Alerts into SIEM using what Tool?

Microsoft Sentinel is built on the Azure platform

300

What GCP Command Utilizes Kubernetes clusters for the particular user in the provided container path

kubectl create deployment hello-eccuser --image=$CONTAINER_PATH?

300

What GCP command will install a Cloud Monitoring Agent ?

sudo apt-get install stack-driver agent

300

When is a  Cloud considered an object?

The cloud is considered the object when the target of the crime is the cloud service provider and is directly affected by the act, such as with Distributed Denial of Service (DDOS) attacks that target sections of the cloud or the cloud itself as a whole.

400

What is Amazon Machine Image? (AMI)

A supported and maintained instance & the information needed to launch that instance

400

What is an Azure Veeam backup?

Veeam Backup for Microsoft Azure integrates with the Veeam Backup & Replication platform. This solution provides a unified backup and recovery solution for both on-premises and cloud-based workloads.

400

Which command can you utilize to deploy cloud app?

gcloud app deploy

400

Steps to create IAM Roles in GCP?

1. In the Google Cloud console, go to the IAM page. Go to IAM. 2. Select a project, folder, or organization. 3. Select a principal to grant a role to: ... 4. Select a role to grant from the drop-down list. ... 5. Optional: Add a condition to the role. 6. Click Save.

400

What is Security Orchestration and Automation and Response?

SEIM that responds to incidents automatically (based on pre-chosen playbooks)

500

How can you copy the objects from one S3 bucket to another?

3 Bucket Rules

500

What does Azure Backup do?

backs up the data, machine state, and workloads running on on-premises machines and Azure virtual machine (VM) instances

500

What does the command lsblk  do?

lists information about all available or the specified block devices. The lsblk command reads the sysfs filesystem and udev db to gather information.

500

What Tool helps run SQL queries on Google Logs?

In BigQuery, you can run two types of queries:

500

You want to allow all inbound traffic to the device what IP range can be utilized?

0.0.0.0.0/0

600

Are AMI are pre-configured images for EC2 instance?

YES An AMI is a pre-configured virtual machine image that contains the operating system (OS) and preinstalled software to deploy EC2 instances.

600

What is Azure Governance and Features?

framework that helps an organization define how it conducts business activities from objectives to responsibilities.

600

How can you create a profile using AWS CLI?

import an AWS Identity and Access Manager (IAM) user into AWS OpsWorks by calling create-user-profile to create a user profile

600

Where can you review the logs in Google Cloud Environment?

Google Log explorer  

600

Secure code review is static application testing or dynamic?

STATIC  Static code analysis, done in a code-review context

DYNAMIC - Running the code after the STATIC code review


700

What does EC2 stand for ?

EC2 = elastic compute cloud

700

Can you connect Azure Single Sign-on and AWS Single Sign on ?

In the Azure portal, on the AWS Single-Account Access application integration page, find the Manage section and select single sign-on.  SAML Configuration to edit the settings. On the Select a single sign-on method page, select SAML. On the Set up single sign-on with SAML page, click the pencil icon for Basic SAML Configuration to edit the settings

700

what Az cli command creates a snapshot of image?

AZ Snapshot create

700

Step by step How to create IAM role in GCP?

1. In the Google Cloud console, go to the IAM page. ... 2. Select your new project. 3. Click person_add Grant access. 4. Enter the email address of a principal. 5. From the Select a role drop-down menu, search for Logs Viewer, then click Logs Viewer. 6. Click Save.

700

 What are the two application security broker types ?

CASP Cloud Application Security Platforms (CASP). CASP is the future of this market because they leverage APIs and do not get in the way of user experience. CASPs focus on detection, remediation and user education instead of in-line inspection of cloud application traffic CASB is an on-premises or cloud-based security policy enforcement point that is placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as cloud-based resources are accessed. Think of the CASB as the sheriff that enforces the laws set by the cloud service administrators.

800

In AWS , you can review and verify which devices are compliant and which ones are not?

AWS Artifact – AWS Artifact is your go-to, central resource for compliance

800

How does Azure provides four levels of management: what are these levels called?

Management groups provide a governance scope above subscriptions

800

How to delete events and deployment? GCP

kubectl delete deployment --all

800

How can you perform an Uptime check on your instance in Google Cloud Platform?

800

What is SIEM?

Security information and event management  

900

What is Amazon Macie? (only found in S3)

Amazon Macie is a data security service that discovers sensitive data using machine learning and pattern matching, provides visibility into data security risks

900

What is an AZ subscription ?

Subscriptipon = A subscription is nothing more than a billing unit.

900

Provide the command for listing google cloud projects?

gcloud project list details  Additionally, you can utilize the --filter flag to narrow down the list based on specific criteria. https://cloud.google.com/sdk/gcloud/reference/projects/list

900

What is VPN network peering?

 GCP is a mechanism to add multiple networks together.

900

What is OCCI Open Computer Computing Interface?

REST protocol and API for all kinda of management tasks

1000

What is Amazon GuardDuty used for

Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect all the part of your cloud

1000

What is resource group in AZ?

resource groups  is a logical container in which Azure resources such as web applications, databases, and storage accounts may be deployed and managed. resources Resources are instances of services that you build, such as virtual machines, storage, and SQL databases

1000

There is a mechanism to create alerts for Virtual machine telemetry in Google Cloud Platform?

1000

Where can you view logs in GCP?

Log Explorer

1000

What is Business Impact Analysis?

A business impact analysis (BIA) predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Potential loss scenarios should be identified during a risk assessment.

1100

Win S3 What are the different mode in which object lock can be applied?

These retention modes are Governance Mode and Compliance Mode.

1100

What service is used by Microsoft Azure to build and deploy the repeatable collection of Azure resources by ensuring the same standards, security, and requirements

Azure Blueprints

1100

What does kubectl get pods do?

Verify all pods are running 


1100

What is Binary Key Authorization in Google Cloud Platform?

Binary Authorization is a deploy-time security control that ensures only trusted container images are deployed on Google Kubernetes Engine (GKE) or Cloud Run.

1100

What are not three different sites for Business Continuity ?

HOT, WARM. COLD, COLLABORATIVE

1200

What is AWS Simple Storage Service (S3)?

an object storage service that stores data as objects within buckets provides scalability, availablity, security & performance 

1200

Azure Cost Management

It provides information about your overall costs and utilization across all Azure services and Azure Marketplace products.

1200

There is a mechanism to create alerts for Virtual machine telemetry in Google Cloud Platform?

Yes using the Cloud Monitoring service

1200

How to view cloud audit logs in GCP

Activity>>Cloud Security  

OR use cloud Composer

1200

List the different type of cloud computing challenges for governance?

Topology

 Organizational change  

Compliance  

Governance  

Contract Management

1300

What is AWS Cloud Trail?

CloudTrail logs, continuously monitors, and retains account activity related to actions across your AWS infrastructure, giving you control over storage, analysis, and remediation actions.

1300

Azure Resource Group

a container that holds related resources for an Azure solution.

1300

(GCP ) What is gsutil?

Command Line interface to access storage

1300

What is Soft delete of containers? 

And what is the Retention Period?

It allows you to mark some records as deleted without actual erasure from the database 

Retention period is 1 to 365 days

1300

What is Recovery Time Objective?

the maximum acceptable time that an application, computer, network, or system can be down after an unexpected disaster, failure, or comparable event takes place.

1400

What is an AWS instance ?

Instances are useful for running memory-intensive workloads such as real-time data ingestion, distributed in-memory caches, big data analytics, memory-intensive enterprise applications, and high-performance databases.

1400

Azure Policy

Built in definitions, a rule about specific security conditions that you want controlled.

1400

How can you block particular protocols in the VPC for the Google Cloud Platform?

creating firewall rules that explicitly deny traffic for those protocols,

1400

what are the 3 types of cloud storage?

object storage

 file storage

 block storage

1400

What is a cloud object storage?

Cloud object storage is a format for storing unstructured data in the cloud.

Object storage is considered a good fit for the cloud because it is elastic, flexible and it can more easily scale into multiple petabytes to support unlimited data growth.

1500

What actions can you do with an EC2 instance in AWS?

Terminate instance  

Format Instance  

Start Instance  

Reboot instance  

Stop Instance

1500

Azure Management Group

support Azure role-based access control (Azure RBAC) for all resource accesses and role definitions Any Azure role can be assigned to a management group that will inherit down the hierarchy to the resources.

1500

What is Locally Redundant Storage in Microsoft Azure Environment?

    Locally redundant storage (LRS) replicates three copies of your data within the same data center you have your data in. Ordering from the least to the most expensive, Azure Storage redundancy offerings include LRS, ZRS, GRS, RA-GRS, GZRS, and RA-GZRS.

1500

Five disciplines of cloud governance?

Cost Management  

Security Baseline Discipline 

Resource Consistency Discipline 

Identity Baseline Discipline 

Deployment Acceleration Discipline

1500

How can you allow and deny API in AWS cloud?

Use a WAF

M
e
n
u