Exam 13: Cloud and Iot Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

NIST recommends selecting cloud providers that support strongencryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.

Free
(True/False)
5.0/5
(35)
Correct Answer:
Verified

True

The __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

Internet of things (IoT)

The _________ cloud deployment model is the most secure option.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

B

_________ is the management software module that controls VMs within the IaaS cloud computing platform.

(Multiple Choice)
4.8/5
(32)

The major advantage of the public cloud is cost.

(True/False)
4.9/5
(37)

A CSC can provide one or more of the cloud services to meet IT andbusiness requirements of a CSP.

(True/False)
4.8/5
(34)

The key components of an IoT-enabled device are: sensor, actuator, _________, transceiver and radio-frequency identification.

(Short Answer)
4.7/5
(32)

The security module for OpenStack is Keystone.

(True/False)
4.7/5
(29)

__________ includes people, processes and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on this assured identity.

(Short Answer)
4.9/5
(31)

Data must be secured while in transit, but not while in use or at rest.

(True/False)
4.7/5
(42)

The four most prominent deployment models for cloud computing are public cloud, community cloud, hybrid cloud and _________ cloud.

(Short Answer)
4.8/5
(39)

The term platform as a service has generally meant a package ofsecurity services offered by a service provider that offloads much ofthe security responsibility from an enterprise to the security serviceprovider.

(True/False)
4.8/5
(33)

___________ is an open-source software project of the OpenStack Foundation that aims to produce an open-source cloud operating system.

(Short Answer)
4.8/5
(37)

Cloud computing gives you the ability to expand and reduce resourcesaccording to your specific service requirement.

(True/False)
4.9/5
(39)

__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.

(Multiple Choice)
4.9/5
(34)

A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.

(Multiple Choice)
4.9/5
(27)

__________ aggregates log and event data from virtual and real networks, applications, and systems. This information is then correlated and analyzed to provide real-time reporting and alerting on information/events that may require intervention or other type of response.

(Essay)
4.8/5
(39)

__________ has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication.

(Multiple Choice)
4.9/5
(33)

IaaS provides service to customers in the form of software, specificallyapplication software, running on and accessible in the cloud.

(True/False)
4.7/5
(34)

The "smart" in a smart device is provided by a deeply embeddedactuator.

(True/False)
4.9/5
(22)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)