Deck 4: Cloud Computing and Technology: Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 4: Cloud Computing and Technology: Security
1
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?
A)amazon elastic compute cloud
B)amazon associates web services
C)alexa web information service
D)all of the mentioned
A)amazon elastic compute cloud
B)amazon associates web services
C)alexa web information service
D)all of the mentioned
amazon associates web services
2
Which of the following is a billing and account management service?
A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
amazon devpay
3
Which of the following is not the feature of Network management systems?
A)accounting
B)security
C)performance
D)none of the mentioned
A)accounting
B)security
C)performance
D)none of the mentioned
none of the mentioned
4
Which of the following service provider provides the least amount of built in security?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Point out the correct statement.
A)different types of cloud computing service models provide different levels of security services
B)adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
A)different types of cloud computing service models provide different levels of security services
B)adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following services that need to be negotiated in Service Level Agreements?
A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
The following flowchart is intended to evaluate ___________ in any cloud.
A)risk
B)errors
C)inconsistencies
D)none of the mentioned
A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Point out the wrong statement.
A)you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)any distributed application has a much greater attack surface than an application that is closely held on a local area network
C)cloud computing doesn't have vulnerabilities associated with internet applications
D)all of the mentioned
A)you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)any distributed application has a much greater attack surface than an application that is closely held on a local area network
C)cloud computing doesn't have vulnerabilities associated with internet applications
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following area of cloud computing is uniquely troublesome?
A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is the operational domain of CSA(Cloud Security Alliance)?
A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is considered an essential element in cloud computing by CSA?
A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is used for Web performance management and load testing?
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following service provider provides the highest level of service?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Point out the correct statement.
A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
A)cas
B)csa
C)sac
D)all of the mentioned
A)cas
B)csa
C)sac
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
For the ___________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following model allows vendor to provide security as part of the Service Level Agreement?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following cloud does not require mapping?
A)public
B)private
C)hybrid
D)none of the mentioned
A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following service model is owned in terms of infrastructure by both vendor and customer?
A)public
B)private
C)hybrid
D)none of the mentioned
A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following model type is not trusted in terms of security?
A)public
B)private
C)hybrid
D)none of the mentioned
A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following has infrastructure security managed and owned by the vendor?
A)hybrid
B)private/community
C)public
D)none of the mentioned
A)hybrid
B)private/community
C)public
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
Point out the wrong statement.
A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
__________is an application for collecting messages sent in RSS and Atom format from information providers.
A)google reader
B)yahoo mail
C)emailrackspace
D)all of the mentioned
A)google reader
B)yahoo mail
C)emailrackspace
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following application is a newsreader?
A)google reader
B)bloglines
C)newsgator online
D)all of the mentioned
A)google reader
B)bloglines
C)newsgator online
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following was developed an alternative to XML syndication by IETF?
A)atom publishing protocol
B)atom subscribing protocol
C)atom subscribe protocol
D)none of the mentioned
A)atom publishing protocol
B)atom subscribing protocol
C)atom subscribe protocol
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Even with two-factor authentication, users may still be vulnerable to attacks.
A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Process of identifying any individual
A)auditing
B)authorisation
C)authentication
D)accounting
A)auditing
B)authorisation
C)authentication
D)accounting
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Process that prevents someone from denying that she accessed resource
A)accounting
B)non-repudiation
C)sniffing
D)authorisation
A)accounting
B)non-repudiation
C)sniffing
D)authorisation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
A)making infrastructure vulnerable to malware
B)potential for noncompliance
C)data loss
D)all of the above
A)making infrastructure vulnerable to malware
B)potential for noncompliance
C)data loss
D)all of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not a correct way to secure communication layer
A)cloud initiated communication
B)tls/ssl
C)ips(intrusion prevention system)
D)firewalls
A)cloud initiated communication
B)tls/ssl
C)ips(intrusion prevention system)
D)firewalls
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not the component of IoT Endpoint
A)sensor
B)gateway
C)communication module
D)mcu
A)sensor
B)gateway
C)communication module
D)mcu
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following makes sure that data is not changed when it not supposed to be?
A)integrity
B)availability
C)confidentiality
D)accounting
A)integrity
B)availability
C)confidentiality
D)accounting
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following terms indicates that information is to be read only by those people for whom it is intended?
A)availability
B)accounting
C)integrity
D)confidentiality
A)availability
B)accounting
C)integrity
D)confidentiality
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
What is the full form of SCADA?
A)supervisory control and document acquisition
B)supervisory control and data acquisition
C)supervisory column and data assessment
D)supervisory column and data assessment.
A)supervisory control and document acquisition
B)supervisory control and data acquisition
C)supervisory column and data assessment
D)supervisory column and data assessment.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
DCS is a ___________
A)distributed control system
B)data control system
C)data column system
D)distributed column system
A)distributed control system
B)data control system
C)data column system
D)distributed column system
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
What is SCADA?
A)software
B)process
C)system
D)hardware
A)software
B)process
C)system
D)hardware
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
The control in SCADA is
A)online control
B)direct control
C)supervisory control
D)automatic control
A)online control
B)direct control
C)supervisory control
D)automatic control
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
When did the SCADA start?
A)1980s
B)1990s
C)1970s
D)1960s
A)1980s
B)1990s
C)1970s
D)1960s
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is not the component of a SCADA system?
A)database server
B)i/o system
C)plc controller
D)sparger controller
A)database server
B)i/o system
C)plc controller
D)sparger controller
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is the heart of a SCADA system?
A)plc
B)hmi
C)alarm task
D)i/o task
A)plc
B)hmi
C)alarm task
D)i/o task
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
RFID stands for?
A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is not involved in working of IoT?
A)rfid
B)sensor
C)nano tech
D)server
A)rfid
B)sensor
C)nano tech
D)server
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
M2M is a term introduced by
A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Which of these statements regarding sensors is TRUE?
A)sensors are input devices.
B)sensors can be analog as well as digital
C)sensors respond to some external stimuli.
D)all of these
A)sensors are input devices.
B)sensors can be analog as well as digital
C)sensors respond to some external stimuli.
D)all of these
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Smart Dust can be used to measure the
A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
In threat modeling, what methodology used to perform risk analysis
A)dread
B)owasp
C)stride
D)dar
A)dread
B)owasp
C)stride
D)dar
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Out of the following which is not element of threat modelling
A)asset
B)vulnerability
C)threat
D)time
A)asset
B)vulnerability
C)threat
D)time
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Request field is present in which message format?
A)request message
B)response message
C)both request and response
D)neither request nor response
A)request message
B)response message
C)both request and response
D)neither request nor response
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
CoAP is specialized for
A)internet applications
B)device applications
C)wireless applications
D)wired applications
A)internet applications
B)device applications
C)wireless applications
D)wired applications
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Which layer is CoAP?
A)control layer
B)transport layer
C)service layer
D)application layer
A)control layer
B)transport layer
C)service layer
D)application layer
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
An application that needed_________ storage alone might not benefit from a cloud deployment at all.
A)online
B)offline
C)virtual
D)all of the mentioned
A)online
B)offline
C)virtual
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
The ___________ property states that the system must have a mechanism to recover from committed transactions should that be necessary.
A)atomicity
B)consistency
C)isolation
D)durability
A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?
A)atomicity
B)consistency
C)isolation
D)durability
A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a core management feature offered by most cloud management service products?
A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Point out the correct statement.
A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is an industry organization that develops industry system management standards for platform interoperability?
A)dmtf
B)dms
C)ebs
D)all of the mentioned
A)dmtf
B)dms
C)ebs
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is used to extend CIM to virtual computer system management?
A)ovf
B)vman
C)ocsi
D)none of the mentioned
A)ovf
B)vman
C)ocsi
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
A)cce
B)occi
C)smi
D)all of the mentioned
A)cce
B)occi
C)smi
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is open and both hypervisor and processor-architecture- agnostic?
A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a workflow control and policy based automation service by CA?
A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following service provider provides the least amount of built in security?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Point out the correct statement.
A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following services that need to be negotiated in Service Level Agreements?
A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
The following flowchart is intended to evaluate ___________ in any cloud.
A)risk
B)errors
C)inconsistencies
D)none of the mentioned
A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following area of cloud computing is uniquely troublesome?
A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is the operational domain of CSA?
A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is considered an essential element in cloud computing by CSA?
A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is used for Web performance management and load testing?
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following is application and infrastructure management software for hybrid multi-clouds?
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is a compliance standard?
A)pci-dss
B)hippa
C)glba
D)all of the mentioned
A)pci-dss
B)hippa
C)glba
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is a key mechanism for protecting data?
A)access control
B)auditing
C)authentication
D)all of the mentioned
A)access control
B)auditing
C)authentication
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
How many security accounts per client is provided by Microsoft?
A)1
B)3
C)5
D)7
A)1
B)3
C)5
D)7
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Point out the wrong statement.
A)securing data sent to, received from, and stored in the cloud is the single largest security concern
B)the problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider's system
C)one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
D)all of the mentioned
A)securing data sent to, received from, and stored in the cloud is the single largest security concern
B)the problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider's system
C)one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following are a common means for losing encrypted data?
A)lose the keys
B)lose the encryption standard
C)lose the account
D)all of the mentioned
A)lose the keys
B)lose the encryption standard
C)lose the account
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck