Exam 22: Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

three areas of support can be offered by a cloud broker: service intermediation, service aggregation, and __________ .

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

service arbitrage

System vulnerabilities can be exploited by hackers and malicious software across a shared cloud environment.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

NISt defines SecaaS as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.

Free
(True/False)
5.0/5
(32)
Correct Answer:
Verified

False

there is an increasingly prominent trend in many organizations to move a substantial portion or even all It operations to an Internet-connected infrastructure known as an enterprise community cloud. .

(True/False)
4.8/5
(28)

A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CPs and cloud consumers.

(Multiple Choice)
4.9/5
(20)

A hybrid cloud infrastructure offers tighter controls over the geographic location of data storage and other aspects of security.

(True/False)
4.7/5
(43)

In effect, PaaS is an operating system in the cloud.

(True/False)
4.7/5
(31)

NISt defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and __________ .

(Short Answer)
4.9/5
(30)

the use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.

(Multiple Choice)
4.8/5
(26)

A _________ is an incident in which sensitive, protected, or confidential information is released, viewed, stolen, or used by an individual who is not authorized to do so.

(Multiple Choice)
4.8/5
(37)

the cloud computing model promotes availability and is composed of three essential characteristics, four service models, and three deployment models.

(True/False)
4.9/5
(42)

__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.

(Multiple Choice)
4.9/5
(42)

On-demand self-service is an essential characteristic of cloud computing.

(True/False)
4.7/5
(38)

__________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.

(Short Answer)
4.8/5
(28)

the intention of an advanced persistent threat is to steal data rather than to cause damage to the network or organization.

(True/False)
4.8/5
(29)

A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

(Multiple Choice)
4.9/5
(37)

A cloud broker can evaluate the services provided by a CP in terms of security controls, privacy impact, and performance.

(True/False)
4.8/5
(25)

the __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

(Multiple Choice)
4.8/5
(32)

the two most significant developments in computing in recent years are cloud computing and the __________ .

(Short Answer)
4.8/5
(36)

A __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.

(Short Answer)
4.9/5
(30)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)