Exam 4: Cloud Computing and Technology: Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following service provider provides the least amount of built in security?

(Multiple Choice)
4.9/5
(36)

Which of the following area of cloud computing is uniquely troublesome?

(Multiple Choice)
4.9/5
(40)

Which of the following services that need to be negotiated in Service Level Agreements?

(Multiple Choice)
4.9/5
(27)

How many security accounts per client is provided by Microsoft?

(Multiple Choice)
4.8/5
(38)

For the ___________  model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

(Multiple Choice)
4.8/5
(37)

Which of the following service model is owned in terms of infrastructure by both vendor and customer?

(Multiple Choice)
4.9/5
(28)

Which of the following is not a correct way to secure communication layer

(Multiple Choice)
5.0/5
(30)

When did the SCADA start?

(Multiple Choice)
4.8/5
(33)

Which of these statements regarding sensors is TRUE?

(Multiple Choice)
4.7/5
(30)

Which of the following is the operational domain of CSA(Cloud Security Alliance)?

(Multiple Choice)
4.9/5
(29)

Process of identifying any individual

(Multiple Choice)
4.9/5
(36)

Which of the following model type is not trusted in terms of security?

(Multiple Choice)
4.8/5
(39)

Which of the following is used for Web performance management and load testing?

(Multiple Choice)
4.8/5
(34)

The following flowchart is intended to evaluate ___________    in any cloud.

(Multiple Choice)
4.8/5
(26)

Point out the wrong statement.

(Multiple Choice)
4.8/5
(30)

Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?

(Multiple Choice)
4.8/5
(38)

Which of the following is not the component of a SCADA system?

(Multiple Choice)
4.9/5
(38)

Which of the following is a key mechanism for protecting data?

(Multiple Choice)
4.8/5
(35)

Which of the following is the heart of a SCADA system?

(Multiple Choice)
4.8/5
(37)

Even with two-factor authentication, users may still be vulnerable to attacks.

(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)