Deck 22: Cloud Security

ملء الشاشة (f)
exit full mode
سؤال
A hybrid cloud infrastructure offers tighter controls over the
geographic location of data storage and other aspects of security.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
there is an increasingly prominent trend in many organizations to
move a substantial portion or even all It operations to an Internet-connected infrastructure known as an enterprise community cloud.
.
سؤال
A community cloud shares characteristics of private and public
clouds.
سؤال
A public cloud infrastructure is made available to the general
public or a large industry group and is owned by an organization
selling cloud services.
سؤال
the major advantage of the public cloud is __________ .

A)availability
B)security
C)convenience
D)cost
سؤال
Non-repudiation threats are associated with users who deny
performing an action without other parties having any way to prove otherwise.
سؤال
A cloud broker can evaluate the services provided by a CP in
terms of security controls, privacy impact, and performance.
سؤال
the principal concern of the public cloud is _________ .

A)accessibility
B)cost
C)security
D)availability
سؤال
Data must be secured while at rest, in transit, and in use, and
access to the data must be controlled.
سؤال
A key motivation for opting for a private cloud is cost.
سؤال
the cloud computing model promotes availability and is composed
of three essential characteristics, four service models, and three
deployment models.
سؤال
the intention of an advanced persistent threat is to steal data
rather than to cause damage to the network or organization.
سؤال
NISt defines SecaaS as the provision of security applications and
services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
سؤال
System vulnerabilities can be exploited by hackers and malicious
software across a shared cloud environment.
سؤال
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.

A)CaaS
B)IaaS
C)PaaS
D)SaaS
سؤال
IaaS enables customers to combine basic computing services, such
as number crunching and data storage, to build highly adaptable computer systems.
سؤال
On-demand self-service is an essential characteristic of cloud
computing.
سؤال
In effect, PaaS is an operating system in the cloud.
سؤال
__________ provides virtual machines and other virtualized hardware and operating systems.

A)IaaS
B)PaaS
C)CaaS
D)SaaS
سؤال
the use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.

A)IaaS
B)SaaS
C)AaaS
D)CaaS
سؤال
NISt defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and __________ .
سؤال
A _________ is an incident in which sensitive, protected, or confidential information is released, viewed, stolen, or used by an individual who is not authorized to do so.

A)DoS attack
B)data breach
C)repudiation
D)tampering with data
سؤال
A __________ is an intermediary that provides connectivity and transport of cloud services from CPs to cloud consumers.

A)cloud provider
B)cloud carrier
C)cloud broker
D)CSP
سؤال
three areas of support can be offered by a cloud broker: service intermediation, service aggregation, and __________ .
سؤال
the __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

A)hybrid B.public
C)private
D)community
سؤال
A __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
سؤال
the security module for __________ is Keystone.

A)OpenStack
B)LDAP
C)Swift
D)Glance
سؤال
An example of __________ is illegally accessing and then using another user's authentication information, such as username and password.

A)identity spoofing
B)elevation of privilege
C)repudiation
D)tampering with data
سؤال
A __________ is a person, organization, or entity responsible for making a service available to interested parties.
سؤال
__________ enables the customer to deploy onto the cloud infrastructure customer-created or acquired applications.
سؤال
__________ offers the customer processing, storage, networks, and other fundamental computing resources so that the customer is able to deploy and run arbitrary software, which can include operating systems and applications.
سؤال
__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions.

A)Intrusion management
B)Business continuity and disaster recovery
C)Security information and event management
D)Data loss prevention
سؤال
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

A)CSP
B)cloud auditor
C)cloud broker
D)CSC
سؤال
__________ enables the customer to use the cloud provider's applications running on the provider's cloud infrastructure.
سؤال
the two most significant developments in computing in recent years are cloud computing and the __________ .
سؤال
__________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
سؤال
A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CPs and cloud consumers.

A)cloud carrier
B)cloud auditor
C)cloud broker
D)cloud provider
سؤال
With a __________ cloud solution, sensitive information can be placed in a private area of the cloud, and less sensitive data can take advantage of the benefits of the public cloud.
سؤال
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.

A)SIEM
B)Web security
C)Web security
D)Data loss prevention
سؤال
__________ clouds are a way to leverage existing infrastructure and deliver and chargeback for bundled or complete services from the privacy of the organization's network.
سؤال
__________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.
سؤال
__________ consists of security services that allocate access, distribute, monitor, and protect the underlying resource services.
سؤال
__________ is a threat classification system developed by Microsoft that is a useful way of categorizing attacks that arise from deliberate actions.
سؤال
An __________ is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 22: Cloud Security
1
A hybrid cloud infrastructure offers tighter controls over the
geographic location of data storage and other aspects of security.
False
2
there is an increasingly prominent trend in many organizations to
move a substantial portion or even all It operations to an Internet-connected infrastructure known as an enterprise community cloud.
.
False
3
A community cloud shares characteristics of private and public
clouds.
True
4
A public cloud infrastructure is made available to the general
public or a large industry group and is owned by an organization
selling cloud services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
5
the major advantage of the public cloud is __________ .

A)availability
B)security
C)convenience
D)cost
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
6
Non-repudiation threats are associated with users who deny
performing an action without other parties having any way to prove otherwise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
7
A cloud broker can evaluate the services provided by a CP in
terms of security controls, privacy impact, and performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
8
the principal concern of the public cloud is _________ .

A)accessibility
B)cost
C)security
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
9
Data must be secured while at rest, in transit, and in use, and
access to the data must be controlled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
10
A key motivation for opting for a private cloud is cost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
11
the cloud computing model promotes availability and is composed
of three essential characteristics, four service models, and three
deployment models.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
12
the intention of an advanced persistent threat is to steal data
rather than to cause damage to the network or organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
13
NISt defines SecaaS as the provision of security applications and
services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
14
System vulnerabilities can be exploited by hackers and malicious
software across a shared cloud environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
15
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.

A)CaaS
B)IaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
16
IaaS enables customers to combine basic computing services, such
as number crunching and data storage, to build highly adaptable computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
17
On-demand self-service is an essential characteristic of cloud
computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
18
In effect, PaaS is an operating system in the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
19
__________ provides virtual machines and other virtualized hardware and operating systems.

A)IaaS
B)PaaS
C)CaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
20
the use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.

A)IaaS
B)SaaS
C)AaaS
D)CaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
21
NISt defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
22
A _________ is an incident in which sensitive, protected, or confidential information is released, viewed, stolen, or used by an individual who is not authorized to do so.

A)DoS attack
B)data breach
C)repudiation
D)tampering with data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
23
A __________ is an intermediary that provides connectivity and transport of cloud services from CPs to cloud consumers.

A)cloud provider
B)cloud carrier
C)cloud broker
D)CSP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
24
three areas of support can be offered by a cloud broker: service intermediation, service aggregation, and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
25
the __________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

A)hybrid B.public
C)private
D)community
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
26
A __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
27
the security module for __________ is Keystone.

A)OpenStack
B)LDAP
C)Swift
D)Glance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
28
An example of __________ is illegally accessing and then using another user's authentication information, such as username and password.

A)identity spoofing
B)elevation of privilege
C)repudiation
D)tampering with data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
29
A __________ is a person, organization, or entity responsible for making a service available to interested parties.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
30
__________ enables the customer to deploy onto the cloud infrastructure customer-created or acquired applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
31
__________ offers the customer processing, storage, networks, and other fundamental computing resources so that the customer is able to deploy and run arbitrary software, which can include operating systems and applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
32
__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions.

A)Intrusion management
B)Business continuity and disaster recovery
C)Security information and event management
D)Data loss prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
33
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

A)CSP
B)cloud auditor
C)cloud broker
D)CSC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
34
__________ enables the customer to use the cloud provider's applications running on the provider's cloud infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
35
the two most significant developments in computing in recent years are cloud computing and the __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
36
__________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
37
A __________ is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between CPs and cloud consumers.

A)cloud carrier
B)cloud auditor
C)cloud broker
D)cloud provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
38
With a __________ cloud solution, sensitive information can be placed in a private area of the cloud, and less sensitive data can take advantage of the benefits of the public cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
39
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.

A)SIEM
B)Web security
C)Web security
D)Data loss prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
40
__________ clouds are a way to leverage existing infrastructure and deliver and chargeback for bundled or complete services from the privacy of the organization's network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
41
__________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
42
__________ consists of security services that allocate access, distribute, monitor, and protect the underlying resource services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
43
__________ is a threat classification system developed by Microsoft that is a useful way of categorizing attacks that arise from deliberate actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
44
An __________ is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.