Deck 4: Cloud Computing and Technology: Security

Full screen (f)
exit full mode
Question
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?

A)amazon elastic compute cloud
B)amazon associates web services
C)alexa web information service
D)all of the mentioned
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a billing and account management service?

A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
Question
Which of the following is not the feature of Network management systems?

A)accounting
B)security
C)performance
D)none of the mentioned
Question
Which of the following service provider provides the least amount of built in security?

A)saas
B)paas
C)iaas
D)all of the mentioned
Question
Point out the correct statement.

A)different types of cloud computing service models provide different levels of security services
B)adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Question
Which of the following services that need to be negotiated in Service Level Agreements?

A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Question
The following flowchart is intended to evaluate ___________    in any cloud.

A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Question
Point out the wrong statement.

A)you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)any distributed application has a much greater attack surface than an application that is closely held on a local area network
C)cloud computing doesn't have vulnerabilities associated with internet applications
D)all of the mentioned
Question
Which of the following area of cloud computing is uniquely troublesome?

A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Question
Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Question
Which of the following is considered an essential element in cloud computing by CSA?

A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Question
Which of the following is used for Web performance management and load testing?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Question
Which of the following service provider provides the highest level of service?

A)saas
B)paas
C)iaas
D)all of the mentioned
Question
Point out the correct statement.

A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
Question
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)cas
B)csa
C)sac
D)all of the mentioned
Question
For the ___________  model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)saas
B)paas
C)iaas
D)all of the mentioned
Question
Which of the following model allows vendor to provide security as part of the Service Level Agreement?

A)saas
B)paas
C)iaas
D)all of the mentioned
Question
Which of the following cloud does not require mapping?

A)public
B)private
C)hybrid
D)none of the mentioned
Question
Which of the following service model is owned in terms of infrastructure by both vendor and customer?

A)public
B)private
C)hybrid
D)none of the mentioned
Question
Which of the following model type is not trusted in terms of security?

A)public
B)private
C)hybrid
D)none of the mentioned
Question
Which of the following has infrastructure security managed and owned by the vendor?

A)hybrid
B)private/community
C)public
D)none of the mentioned
Question
Point out the wrong statement.

A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
Question
__________is an application for collecting messages sent in RSS and Atom format from information providers.

A)google reader
B)yahoo mail
C)emailrackspace
D)all of the mentioned
Question
Which of the following application is a newsreader?

A)google reader
B)bloglines
C)newsgator online
D)all of the mentioned
Question
Which of the following was developed an alternative to XML syndication by IETF?

A)atom publishing protocol
B)atom subscribing protocol
C)atom subscribe protocol
D)none of the mentioned
Question
Even with two-factor authentication, users may still be vulnerable to attacks.

A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
Question
Process of identifying any individual

A)auditing
B)authorisation
C)authentication
D)accounting
Question
Process that prevents someone from denying that she accessed resource

A)accounting
B)non-repudiation
C)sniffing
D)authorisation
Question
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A)making infrastructure vulnerable to malware
B)potential for noncompliance
C)data loss
D)all of the above
Question
Which of the following is not a correct way to secure communication layer

A)cloud initiated communication
B)tls/ssl
C)ips(intrusion prevention system)
D)firewalls
Question
Which of the following is not the component of IoT Endpoint

A)sensor
B)gateway
C)communication module
D)mcu
Question
Which of the following makes sure that data is not changed when it not supposed to be?

A)integrity
B)availability
C)confidentiality
D)accounting
Question
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)availability
B)accounting
C)integrity
D)confidentiality
Question
What is the full form of SCADA?

A)supervisory control and document acquisition
B)supervisory control and data acquisition
C)supervisory column and data assessment
D)supervisory column and data assessment.
Question
DCS is a ___________

A)distributed control system
B)data control system
C)data column system
D)distributed column system
Question
What is SCADA?

A)software
B)process
C)system
D)hardware
Question
The control in SCADA is

A)online control
B)direct control
C)supervisory control
D)automatic control
Question
When did the SCADA start?

A)1980s
B)1990s
C)1970s
D)1960s
Question
Which of the following is not the component of a SCADA system?

A)database server
B)i/o system
C)plc controller
D)sparger controller
Question
Which of the following is the heart of a SCADA system?

A)plc
B)hmi
C)alarm task
D)i/o task
Question
RFID stands for?

A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
Question
Which of the following is not involved in working of IoT?

A)rfid
B)sensor
C)nano tech
D)server
Question
M2M is a term introduced by

A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
Question
Which of these statements regarding sensors is TRUE?

A)sensors are input devices.
B)sensors can be analog as well as digital
C)sensors respond to some external stimuli.
D)all of these
Question
Smart Dust can be used to measure the

A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
Question
In threat modeling, what methodology used to perform risk analysis

A)dread
B)owasp
C)stride
D)dar
Question
Out of the following which is not element of threat modelling

A)asset
B)vulnerability
C)threat
D)time
Question
Request field is present in which message format?

A)request message
B)response message
C)both request and response
D)neither request nor response
Question
CoAP is specialized for

A)internet applications
B)device applications
C)wireless applications
D)wired applications
Question
Which layer is CoAP?

A)control layer
B)transport layer
C)service layer
D)application layer
Question
An application that needed_________     storage alone might not benefit from a cloud deployment at all.

A)online
B)offline
C)virtual
D)all of the mentioned
Question
The ___________    property states that the system must have a mechanism to recover from committed transactions should that be necessary.

A)atomicity
B)consistency
C)isolation
D)durability
Question
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?

A)atomicity
B)consistency
C)isolation
D)durability
Question
Which of the following is a core management feature offered by most cloud management service products?

A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
Question
Point out the correct statement.

A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
Question
Which of the following is an industry organization that develops industry system management standards for platform interoperability?

A)dmtf
B)dms
C)ebs
D)all of the mentioned
Question
Which of the following is used to extend CIM to virtual computer system management?

A)ovf
B)vman
C)ocsi
D)none of the mentioned
Question
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?

A)cce
B)occi
C)smi
D)all of the mentioned
Question
Which of the following is open and both hypervisor and processor-architecture- agnostic?

A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
Question
Which of the following is a workflow control and policy based automation service by CA?

A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
Question
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?

A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
Question
Which of the following service provider provides the least amount of built in security?

A)saas
B)paas
C)iaas
D)all of the mentioned
Question
Point out the correct statement.

A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Question
Which of the following services that need to be negotiated in Service Level Agreements?

A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Question
The following flowchart is intended to evaluate ___________    in any cloud.

A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Question
Which of the following area of cloud computing is uniquely troublesome?

A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Question
Which of the following is the operational domain of CSA?

A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Question
Which of the following is considered an essential element in cloud computing by CSA?

A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Question
Which of the following is used for Web performance management and load testing?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Question
Which of the following is application and infrastructure management software for hybrid multi-clouds?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Question
Which of the following is a compliance standard?

A)pci-dss
B)hippa
C)glba
D)all of the mentioned
Question
Which of the following is a key mechanism for protecting data?

A)access control
B)auditing
C)authentication
D)all of the mentioned
Question
How many security accounts per client is provided by Microsoft?

A)1
B)3
C)5
D)7
Question
Point out the wrong statement.

A)securing data sent to, received from, and stored in the cloud is the single largest security concern
B)the problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider's system
C)one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
D)all of the mentioned
Question
Which of the following are a common means for losing encrypted data?

A)lose the keys
B)lose the encryption standard
C)lose the account
D)all of the mentioned
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Cloud Computing and Technology: Security
1
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?

A)amazon elastic compute cloud
B)amazon associates web services
C)alexa web information service
D)all of the mentioned
amazon associates web services
2
Which of the following is a billing and account management service?

A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
amazon devpay
3
Which of the following is not the feature of Network management systems?

A)accounting
B)security
C)performance
D)none of the mentioned
none of the mentioned
4
Which of the following service provider provides the least amount of built in security?

A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Point out the correct statement.

A)different types of cloud computing service models provide different levels of security services
B)adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following services that need to be negotiated in Service Level Agreements?

A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
The following flowchart is intended to evaluate ___________    in any cloud.

A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Point out the wrong statement.

A)you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)any distributed application has a much greater attack surface than an application that is closely held on a local area network
C)cloud computing doesn't have vulnerabilities associated with internet applications
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following area of cloud computing is uniquely troublesome?

A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is considered an essential element in cloud computing by CSA?

A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is used for Web performance management and load testing?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following service provider provides the highest level of service?

A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Point out the correct statement.

A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)cas
B)csa
C)sac
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
For the ___________  model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following model allows vendor to provide security as part of the Service Level Agreement?

A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following cloud does not require mapping?

A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following service model is owned in terms of infrastructure by both vendor and customer?

A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following model type is not trusted in terms of security?

A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following has infrastructure security managed and owned by the vendor?

A)hybrid
B)private/community
C)public
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
Point out the wrong statement.

A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
__________is an application for collecting messages sent in RSS and Atom format from information providers.

A)google reader
B)yahoo mail
C)emailrackspace
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following application is a newsreader?

A)google reader
B)bloglines
C)newsgator online
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following was developed an alternative to XML syndication by IETF?

A)atom publishing protocol
B)atom subscribing protocol
C)atom subscribe protocol
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Even with two-factor authentication, users may still be vulnerable to attacks.

A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Process of identifying any individual

A)auditing
B)authorisation
C)authentication
D)accounting
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Process that prevents someone from denying that she accessed resource

A)accounting
B)non-repudiation
C)sniffing
D)authorisation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A)making infrastructure vulnerable to malware
B)potential for noncompliance
C)data loss
D)all of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not a correct way to secure communication layer

A)cloud initiated communication
B)tls/ssl
C)ips(intrusion prevention system)
D)firewalls
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not the component of IoT Endpoint

A)sensor
B)gateway
C)communication module
D)mcu
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following makes sure that data is not changed when it not supposed to be?

A)integrity
B)availability
C)confidentiality
D)accounting
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)availability
B)accounting
C)integrity
D)confidentiality
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
What is the full form of SCADA?

A)supervisory control and document acquisition
B)supervisory control and data acquisition
C)supervisory column and data assessment
D)supervisory column and data assessment.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
DCS is a ___________

A)distributed control system
B)data control system
C)data column system
D)distributed column system
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
What is SCADA?

A)software
B)process
C)system
D)hardware
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
The control in SCADA is

A)online control
B)direct control
C)supervisory control
D)automatic control
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
When did the SCADA start?

A)1980s
B)1990s
C)1970s
D)1960s
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is not the component of a SCADA system?

A)database server
B)i/o system
C)plc controller
D)sparger controller
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is the heart of a SCADA system?

A)plc
B)hmi
C)alarm task
D)i/o task
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
RFID stands for?

A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is not involved in working of IoT?

A)rfid
B)sensor
C)nano tech
D)server
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
M2M is a term introduced by

A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Which of these statements regarding sensors is TRUE?

A)sensors are input devices.
B)sensors can be analog as well as digital
C)sensors respond to some external stimuli.
D)all of these
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Smart Dust can be used to measure the

A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
In threat modeling, what methodology used to perform risk analysis

A)dread
B)owasp
C)stride
D)dar
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Out of the following which is not element of threat modelling

A)asset
B)vulnerability
C)threat
D)time
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Request field is present in which message format?

A)request message
B)response message
C)both request and response
D)neither request nor response
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
CoAP is specialized for

A)internet applications
B)device applications
C)wireless applications
D)wired applications
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Which layer is CoAP?

A)control layer
B)transport layer
C)service layer
D)application layer
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
An application that needed_________     storage alone might not benefit from a cloud deployment at all.

A)online
B)offline
C)virtual
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
The ___________    property states that the system must have a mechanism to recover from committed transactions should that be necessary.

A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?

A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a core management feature offered by most cloud management service products?

A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Point out the correct statement.

A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is an industry organization that develops industry system management standards for platform interoperability?

A)dmtf
B)dms
C)ebs
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is used to extend CIM to virtual computer system management?

A)ovf
B)vman
C)ocsi
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?

A)cce
B)occi
C)smi
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is open and both hypervisor and processor-architecture- agnostic?

A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a workflow control and policy based automation service by CA?

A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?

A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following service provider provides the least amount of built in security?

A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Point out the correct statement.

A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following services that need to be negotiated in Service Level Agreements?

A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
The following flowchart is intended to evaluate ___________    in any cloud.

A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following area of cloud computing is uniquely troublesome?

A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is the operational domain of CSA?

A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is considered an essential element in cloud computing by CSA?

A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is used for Web performance management and load testing?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is application and infrastructure management software for hybrid multi-clouds?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is a compliance standard?

A)pci-dss
B)hippa
C)glba
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is a key mechanism for protecting data?

A)access control
B)auditing
C)authentication
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
How many security accounts per client is provided by Microsoft?

A)1
B)3
C)5
D)7
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Point out the wrong statement.

A)securing data sent to, received from, and stored in the cloud is the single largest security concern
B)the problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider's system
C)one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following are a common means for losing encrypted data?

A)lose the keys
B)lose the encryption standard
C)lose the account
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.