Security
Implement security measures, address vulnerabilities, and ensure compliance (19% of exam).
In the context of CompTIA Cloud+, security is a comprehensive discipline fundamentally anchored in the Shared Responsibility Model. This model delineates that while the Cloud Service Provider (CSP) is responsible for the security 'of' the cloud (physical infrastructure, hypervisors, and networking …
Concepts covered: Cloud vulnerability assessment, Vulnerability scanning tools, Patch management for security, Security threat remediation, Cloud IAM fundamentals, Role-based access control (RBAC), Least privilege principle, Multi-factor authentication (MFA), Single sign-on (SSO), Identity federation, Service accounts and API keys, Container security best practices, Container image scanning, Runtime container security, Kubernetes security, Container network policies, PCI DSS compliance, SOC 2 compliance, ISO 27001 compliance, GDPR and data privacy, Compliance auditing and reporting, Cloud security controls, Encryption at rest and in transit, Key management services, Network security groups, Web application firewalls (WAF), DDoS protection, Security information and event management (SIEM)
Cloud+ - Security Example Questions
Test your knowledge of Security
Question 1
A security administrator is configuring MFA for a cloud-based application. Users will authenticate using a password and a time-based one-time password (TOTP) generated by an authenticator app. Which authentication factor categories are being combined in this implementation?
Question 2
A cloud administrator is configuring network security for a web application that uses a load balancer to distribute traffic across multiple backend instances. The security team requires that only HTTPS traffic on port 443 be allowed to reach the load balancer from the internet, while backend instances should only accept traffic from the load balancer itself. Which security control configuration would MOST effectively implement this tiered traffic filtering approach?
Question 3
A security analyst discovers that an attacker has exploited a misconfigured network security group to gain access to internal cloud resources. The attacker has been performing reconnaissance activities and has mapped out the internal network topology over the past 12 hours. Traffic analysis shows the attacker is using encrypted tunnels to exfiltrate discovered information. Which remediation action should be prioritized to contain this network-based threat?