Exam 5: Network Access Control and Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ defines how the TLS protocol can be encapsulated in EAP messages.

Free
(Short Answer)
4.7/5
(38)
Correct Answer:
Verified

EAP-TLS

_________ is the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

The __________ determines what access should be granted

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

A network access server does not include its own authentication services.

(True/False)
4.7/5
(33)

A _________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers

(Multiple Choice)
4.9/5
(32)

The NIST cloud computing reference architecture focuses on the requirements of "what" cloud services provide, not a "how to" design solution and implementation.

(True/False)
4.8/5
(34)

The ___________ functions as an access control point for users in remote locations connecting to an enterprise's internal network.

(Short Answer)
4.9/5
(40)

A _________ in an intermediary that provides connectivity and transport of cloud services from CP's to cloud consumers.

(Short Answer)
5.0/5
(36)

The __________ is an Internet protocol that enables dynamic allocation of IP addresses to hosts

(Multiple Choice)
4.7/5
(40)

Data must be secured while at rest, in transit, and in use, and access to the data must be controlled.

(True/False)
4.9/5
(43)

__________ methods are the actions that are applied to ARs to regulate access to the enterprise network.

(Short Answer)
5.0/5
(32)

__________ are third party audits of cloud services.

(Short Answer)
4.9/5
(32)

The cloud provider in a private cloud infrastructure is responsible for both the infrastructure and the control.

(True/False)
4.8/5
(37)

For many clients, the most devastating impact from a security breach is the loss or leakage of data.

(True/False)
4.8/5
(39)

In using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues that may affect security.

(True/False)
4.7/5
(40)

With a _________ infrastructure, the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns

(Multiple Choice)
4.8/5
(30)

A ________ is a party that can conduct independent assessment of cloud service, information sytem operations, performance, and security of the cloud implementation

(Multiple Choice)
4.9/5
(39)

___________ is an umbrella term for managing access to a network

(Multiple Choice)
4.9/5
(33)

With a _________ infrastructure, the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services

(Multiple Choice)
4.7/5
(24)

In effect, ________ is an operating system in the cloud

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)