Exam CCSK All QuestionsBrowse all questions from this exam
Question 152

ENISA: A key area of controls for cloud provider network architecture is

    Correct Answer: D

    One of the key areas of controls for cloud provider network architecture, according to ENISA, is the mitigation of Distributed Denial of Service (DDoS) attacks. This involves implementing defenses such as deep packet analysis, traffic throttling, and packet black holing to protect against both internal and external attacks. These measures are critical in maintaining network availability and security in cloud environments.

Discussion
byfenerOption: D

Correction: according to ENISA Cloud Computing Security Risk Assessment page 73: NETWORK ARCHITECTURE CONTROLS  Define the controls used to mitigate DDoS (distributed denial–of-service) attacks. - Defence in depth (deep packet analysis, traffic throttling, packet black holing, etc) - Do you have defences against ‘internal’ (originating from the cloud providers networks) attacks as well as external (originating from the Internet or customer networks) attacks?

byfenerOption: C

C. Hardening of virtual machines according to industry standard guidelines ENISA (European Union Agency for Cybersecurity) recognizes the importance of hardening virtual machines in cloud provider network architecture as a key area of controls. Hardening involves implementing security best practices and configurations to reduce the attack surface and enhance the security posture of virtual machines within the cloud environment. The other options (A, B, D, E) might be relevant to security but are not specifically highlighted by ENISA as key areas of controls for cloud provider network architecture in the context of the given options.

KneebeeOption: C

The correct answer is C: ENISA emphasizes the hardening of virtual machines according to industry standard guidelines.

ChewyBananasOption: D

C makes sense but the ENISA page 73 the answer is D. NETWORK ARCHITECTURE CONTROLS  Define the controls used to mitigate DDoS (distributed denial–of-service) attacks.