Deck 13: Cloud and Iot Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 13: Cloud and Iot Security
1
The use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.
A) SaaS
B) MaaS
C) PaaS
D) IaaS
A) SaaS
B) MaaS
C) PaaS
D) IaaS
A
2
An IPS is a set of automated tools designed to detect unauthorizedaccess to a host system.
False
3
A key element in providing security in an IoT deployment is thegateway.
True
4
The three areas of support that a cloud broker can offer are serviceintermediation, service aggregation and service arbitrage.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Examples of services delivered through the __________ include database on demand, e-mail on demand, and storage on demand.
A) hybrid cloud
B) public cloud
C) private cloud
D) community cloud
A) hybrid cloud
B) public cloud
C) private cloud
D) community cloud
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
In a public cloud model the provider is responsible both for the cloudinfrastructure and for the control of data and operations within thecloud.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The security module for OpenStack is Keystone.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Measured service and rapid elasticity are essential characteristics of _________.
A) resource pooling
B) cloud computing
C) broad network access
D) resource pooling
A) resource pooling
B) cloud computing
C) broad network access
D) resource pooling
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.
A) broad network access
A) platform as a service
B) infrastructure as a service
D) resource pooling
A) broad network access
A) platform as a service
B) infrastructure as a service
D) resource pooling
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
A __________ infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
A) community cloud
B) private cloud
C) hybrid cloud
D) public cloud
A) community cloud
B) private cloud
C) hybrid cloud
D) public cloud
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The term platform as a service has generally meant a package ofsecurity services offered by a service provider that offloads much ofthe security responsibility from an enterprise to the security serviceprovider.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
There is an increasingly prominent trend in many organizations tomove a substantial portion or even all IT operations to enterprise cloud computing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A CSC can provide one or more of the cloud services to meet IT andbusiness requirements of a CSP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Cloud computing gives you the ability to expand and reduce resourcesaccording to your specific service requirement.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
IaaS provides service to customers in the form of software, specificallyapplication software, running on and accessible in the cloud.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Data must be secured while in transit, but not while in use or at rest.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
NIST recommends selecting cloud providers that support strongencryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
The "smart" in a smart device is provided by a deeply embeddedactuator.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Security assessments are third-part audits of cloud services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The major advantage of the public cloud is cost.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
___________ is an open-source software project of the OpenStack Foundation that aims to produce an open-source cloud operating system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The four most prominent deployment models for cloud computing are public cloud, community cloud, hybrid cloud and _________ cloud.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The ?????_________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.
A) loud auditor
B) cloud service consumer
C) cloud broker
D) cloud carrier
A) loud auditor
B) cloud service consumer
C) cloud broker
D) cloud carrier
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A __________ is an entity that manages the use, performance and delivery of cloud services, and negotiates relationships between CSPs and cloud consumers.
A) cloud broker
B) cloud carrier
C) cloud auditor
D) cloud provider
A) cloud broker
B) cloud carrier
C) cloud auditor
D) cloud provider
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud.
A) Intrusion management
B) SIEM
C) security assessments
D) web security
A) Intrusion management
B) SIEM
C) security assessments
D) web security
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ is defined as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction".
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The _________ cloud deployment model is the most secure option.
A) public
B) private
C) community
D) hybrid
A) public
B) private
C) community
D) hybrid
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ includes people, processes and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on this assured identity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
NIST SP 800-145 defines three service models: software as a service, platform as a service, and __________ as a service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
__________ has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication.
A) Edge
B) Keystone
C) OpenSource
D) MiniSec
A) Edge
B) Keystone
C) OpenSource
D) MiniSec
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A cloud __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A cloud __________ is a networking facility that provides connectivity and transport of cloud services between cloud consumers and cloud service providers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The most vulnerable part of an IoT is the __________ .
A) smart objects/embedded systems
B) fog/edge network
C) core network
D) data center/cloud
A) smart objects/embedded systems
B) fog/edge network
C) core network
D) data center/cloud
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
__________ aggregates log and event data from virtual and real networks, applications, and systems. This information is then correlated and analyzed to provide real-time reporting and alerting on information/events that may require intervention or other type of response.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_________ is the management software module that controls VMs within the IaaS cloud computing platform.
A) Glance
B) Nova
C) Swift
D) Object
A) Glance
B) Nova
C) Swift
D) Object
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A __________ interconnects the IoT-enabled devices with the higher-level communication networks.
A) microcontroller
B) gateway
C) carrier
D) sensor
A) microcontroller
B) gateway
C) carrier
D) sensor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions.
A) Data loss prevention
B) Security information and event management
C) Network security
D) Business continuity and disaster recovery
A) Data loss prevention
B) Security information and event management
C) Network security
D) Business continuity and disaster recovery
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.
A) Web security
B) Security assessments
C) Intrusion management
D) Data loss prevention
A) Web security
B) Security assessments
C) Intrusion management
D) Data loss prevention
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
With reference to the end systems supported, the Internet has gone through roughly four generations of deployment culminating in the IoT: information technology, operational technology, _________, and sensor/actuator technology.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The core network, also referred to as a __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The key components of an IoT-enabled device are: sensor, actuator, _________, transceiver and radio-frequency identification.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
MiniSec is an open-source security module that is part of the __________ operating system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
MiniSec is designed to meet the following requirements: data authentication, __________, replay protection, freshness, low energy overhead and resilient to lost messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck