Exam 13: Cloud and Iot Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
NIST recommends selecting cloud providers that support strongencryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.
Free
(True/False)
5.0/5
(35)
Correct Answer:
True
The __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Internet of things (IoT)
The _________ cloud deployment model is the most secure option.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
B
_________ is the management software module that controls VMs within the IaaS cloud computing platform.
(Multiple Choice)
4.8/5
(32)
A CSC can provide one or more of the cloud services to meet IT andbusiness requirements of a CSP.
(True/False)
4.8/5
(34)
The key components of an IoT-enabled device are: sensor, actuator, _________, transceiver and radio-frequency identification.
(Short Answer)
4.7/5
(32)
__________ includes people, processes and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on this assured identity.
(Short Answer)
4.9/5
(31)
Data must be secured while in transit, but not while in use or at rest.
(True/False)
4.7/5
(42)
The four most prominent deployment models for cloud computing are public cloud, community cloud, hybrid cloud and _________ cloud.
(Short Answer)
4.8/5
(39)
The term platform as a service has generally meant a package ofsecurity services offered by a service provider that offloads much ofthe security responsibility from an enterprise to the security serviceprovider.
(True/False)
4.8/5
(33)
___________ is an open-source software project of the OpenStack Foundation that aims to produce an open-source cloud operating system.
(Short Answer)
4.8/5
(37)
Cloud computing gives you the ability to expand and reduce resourcesaccording to your specific service requirement.
(True/False)
4.9/5
(39)
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.
(Multiple Choice)
4.9/5
(34)
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.
(Multiple Choice)
4.9/5
(27)
__________ aggregates log and event data from virtual and real networks, applications, and systems. This information is then correlated and analyzed to provide real-time reporting and alerting on information/events that may require intervention or other type of response.
(Essay)
4.8/5
(39)
__________ has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication.
(Multiple Choice)
4.9/5
(33)
IaaS provides service to customers in the form of software, specificallyapplication software, running on and accessible in the cloud.
(True/False)
4.7/5
(34)
The "smart" in a smart device is provided by a deeply embeddedactuator.
(True/False)
4.9/5
(22)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)