Deck 22: Cloud Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
Play
Full screen (f)
Deck 22: Cloud Security
1
A hybrid cloud infrastructure offers tighter controls over the
geographic location of data storage and other aspects of security.
geographic location of data storage and other aspects of security.
False
2
there is an increasingly prominent trend in many organizations to
move a substantial portion or even all It operations to an Internet-connected infrastructure known as an enterprise community cloud.
.
move a substantial portion or even all It operations to an Internet-connected infrastructure known as an enterprise community cloud.
.
False
3
A community cloud shares characteristics of private and public
clouds.
clouds.
True
4
A public cloud infrastructure is made available to the general
public or a large industry group and is owned by an organization
selling cloud services.
public or a large industry group and is owned by an organization
selling cloud services.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
the major advantage of the public cloud is __________ .
A)availability
B)security
C)convenience
D)cost
A)availability
B)security
C)convenience
D)cost
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
Non-repudiation threats are associated with users who deny
performing an action without other parties having any way to prove otherwise.
performing an action without other parties having any way to prove otherwise.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
A cloud broker can evaluate the services provided by a CP in
terms of security controls, privacy impact, and performance.
terms of security controls, privacy impact, and performance.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
the principal concern of the public cloud is _________ .
A)accessibility
B)cost
C)security
D)availability
A)accessibility
B)cost
C)security
D)availability
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
Data must be secured while at rest, in transit, and in use, and
access to the data must be controlled.
access to the data must be controlled.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
A key motivation for opting for a private cloud is cost.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
the cloud computing model promotes availability and is composed
of three essential characteristics, four service models, and three
deployment models.
of three essential characteristics, four service models, and three
deployment models.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
the intention of an advanced persistent threat is to steal data
rather than to cause damage to the network or organization.
rather than to cause damage to the network or organization.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
NISt defines SecaaS as the provision of security applications and
services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
System vulnerabilities can be exploited by hackers and malicious
software across a shared cloud environment.
software across a shared cloud environment.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.
A)CaaS
B)IaaS
C)PaaS
D)SaaS
A)CaaS
B)IaaS
C)PaaS
D)SaaS
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
IaaS enables customers to combine basic computing services, such
as number crunching and data storage, to build highly adaptable computer systems.
as number crunching and data storage, to build highly adaptable computer systems.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
On-demand self-service is an essential characteristic of cloud
computing.
computing.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
In effect, PaaS is an operating system in the cloud.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
__________ provides virtual machines and other virtualized hardware and operating systems.
A)IaaS
B)PaaS
C)CaaS
D)SaaS
A)IaaS
B)PaaS
C)CaaS
D)SaaS
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
the use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.
A)IaaS
B)SaaS
C)AaaS
D)CaaS
A)IaaS
B)SaaS
C)AaaS
D)CaaS
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
NISt defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and __________ .
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
A _________ is an incident in which sensitive, protected, or confidential information is released, viewed, stolen, or used by an individual who is not authorized to do so.
A)DoS attack
B)data breach
C)repudiation
D)tampering with data
A)DoS attack
B)data breach
C)repudiation
D)tampering with data
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ is an intermediary that provides connectivity and transport of cloud services from CPs to cloud consumers.
A)cloud provider
B)cloud carrier
C)cloud broker
D)CSP
A)cloud provider
B)cloud carrier
C)cloud broker
D)CSP
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
three areas of support can be offered by a cloud broker: service intermediation, service aggregation, and __________ .
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
the __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
A)hybrid B.public
C)private
D)community
A)hybrid B.public
C)private
D)community
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
the security module for __________ is Keystone.
A)OpenStack
B)LDAP
C)Swift
D)Glance
A)OpenStack
B)LDAP
C)Swift
D)Glance
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
An example of __________ is illegally accessing and then using another user's authentication information, such as username and password.
A)identity spoofing
B)elevation of privilege
C)repudiation
D)tampering with data
A)identity spoofing
B)elevation of privilege
C)repudiation
D)tampering with data
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
A __________ is a person, organization, or entity responsible for making a service available to interested parties.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
__________ enables the customer to deploy onto the cloud infrastructure customer-created or acquired applications.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
__________ offers the customer processing, storage, networks, and other fundamental computing resources so that the customer is able to deploy and run arbitrary software, which can include operating systems and applications.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions.
A)Intrusion management
B)Business continuity and disaster recovery
C)Security information and event management
D)Data loss prevention
A)Intrusion management
B)Business continuity and disaster recovery
C)Security information and event management
D)Data loss prevention
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.
A)CSP
B)cloud auditor
C)cloud broker
D)CSC
A)CSP
B)cloud auditor
C)cloud broker
D)CSC
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
__________ enables the customer to use the cloud provider's applications running on the provider's cloud infrastructure.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
the two most significant developments in computing in recent years are cloud computing and the __________ .
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CPs and cloud consumers.
A)cloud carrier
B)cloud auditor
C)cloud broker
D)cloud provider
A)cloud carrier
B)cloud auditor
C)cloud broker
D)cloud provider
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
With a __________ cloud solution, sensitive information can be placed in a private area of the cloud, and less sensitive data can take advantage of the benefits of the public cloud.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.
A)SIEM
B)Web security
C)Web security
D)Data loss prevention
A)SIEM
B)Web security
C)Web security
D)Data loss prevention
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
__________ clouds are a way to leverage existing infrastructure and deliver and chargeback for bundled or complete services from the privacy of the organization's network.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
__________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
__________ consists of security services that allocate access, distribute, monitor, and protect the underlying resource services.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
__________ is a threat classification system developed by Microsoft that is a useful way of categorizing attacks that arise from deliberate actions.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
An __________ is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck