Exam 22: Cloud Security
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
three areas of support can be offered by a cloud broker: service intermediation, service aggregation, and __________ .
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
service arbitrage
System vulnerabilities can be exploited by hackers and malicious
software across a shared cloud environment.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
NISt defines SecaaS as the provision of security applications and
services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
Free
(True/False)
5.0/5
(32)
Correct Answer:
False
there is an increasingly prominent trend in many organizations to
move a substantial portion or even all It operations to an Internet-connected infrastructure known as an enterprise community cloud.
.
(True/False)
4.8/5
(28)
A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CPs and cloud consumers.
(Multiple Choice)
4.9/5
(20)
A hybrid cloud infrastructure offers tighter controls over the
geographic location of data storage and other aspects of security.
(True/False)
4.7/5
(43)
NISt defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and __________ .
(Short Answer)
4.9/5
(30)
the use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.
(Multiple Choice)
4.8/5
(26)
A _________ is an incident in which sensitive, protected, or confidential information is released, viewed, stolen, or used by an individual who is not authorized to do so.
(Multiple Choice)
4.8/5
(37)
the cloud computing model promotes availability and is composed
of three essential characteristics, four service models, and three
deployment models.
(True/False)
4.9/5
(42)
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.
(Multiple Choice)
4.9/5
(42)
On-demand self-service is an essential characteristic of cloud
computing.
(True/False)
4.7/5
(38)
__________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.
(Short Answer)
4.8/5
(28)
the intention of an advanced persistent threat is to steal data
rather than to cause damage to the network or organization.
(True/False)
4.8/5
(29)
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.
(Multiple Choice)
4.9/5
(37)
A cloud broker can evaluate the services provided by a CP in
terms of security controls, privacy impact, and performance.
(True/False)
4.8/5
(25)
the __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
(Multiple Choice)
4.8/5
(32)
the two most significant developments in computing in recent years are cloud computing and the __________ .
(Short Answer)
4.8/5
(36)
A __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
(Short Answer)
4.9/5
(30)
Showing 1 - 20 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)