Exam 13: Cloud and Iot Security
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.
(Multiple Choice)
4.9/5
(36)
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud.
(Multiple Choice)
4.8/5
(38)
The core network, also referred to as a __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
(Short Answer)
4.9/5
(29)
A cloud __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
(Short Answer)
4.8/5
(41)
A key element in providing security in an IoT deployment is thegateway.
(True/False)
4.7/5
(42)
Measured service and rapid elasticity are essential characteristics of _________.
(Multiple Choice)
4.8/5
(36)
An IPS is a set of automated tools designed to detect unauthorizedaccess to a host system.
(True/False)
4.8/5
(47)
The three areas of support that a cloud broker can offer are serviceintermediation, service aggregation and service arbitrage.
(True/False)
4.8/5
(36)
Examples of services delivered through the __________ include database on demand, e-mail on demand, and storage on demand.
(Multiple Choice)
4.9/5
(38)
In a public cloud model the provider is responsible both for the cloudinfrastructure and for the control of data and operations within thecloud.
(True/False)
4.9/5
(40)
__________ is defined as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction".
(Short Answer)
4.9/5
(36)
MiniSec is an open-source security module that is part of the __________ operating system.
(Short Answer)
4.8/5
(38)
A __________ interconnects the IoT-enabled devices with the higher-level communication networks.
(Multiple Choice)
4.8/5
(33)
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.
(Multiple Choice)
4.8/5
(38)
A __________ infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
(Multiple Choice)
4.7/5
(33)
NIST SP 800-145 defines three service models: software as a service, platform as a service, and __________ as a service.
(Short Answer)
4.8/5
(40)
A cloud __________ is a networking facility that provides connectivity and transport of cloud services between cloud consumers and cloud service providers.
(Short Answer)
5.0/5
(36)
The_________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
(Short Answer)
4.9/5
(46)
With reference to the end systems supported, the Internet has gone through roughly four generations of deployment culminating in the IoT: information technology, operational technology, _________, and sensor/actuator technology.
(Short Answer)
4.9/5
(40)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)