Deck 13: Cloud and Iot Security

ملء الشاشة (f)
exit full mode
سؤال
The use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.

A) SaaS
B) MaaS
C) PaaS
D) IaaS
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An IPS is a set of automated tools designed to detect unauthorizedaccess to a host system.
سؤال
A key element in providing security in an IoT deployment is thegateway.
سؤال
The three areas of support that a cloud broker can offer are serviceintermediation, service aggregation and service arbitrage.
سؤال
Examples of services delivered through the __________ include database on demand, e-mail on demand, and storage on demand.

A) hybrid cloud
B) public cloud
C) private cloud
D) community cloud
سؤال
In a public cloud model the provider is responsible both for the cloudinfrastructure and for the control of data and operations within thecloud.
سؤال
The security module for OpenStack is Keystone.
سؤال
Measured service and rapid elasticity are essential characteristics of _________.

A) resource pooling
B) cloud computing
C) broad network access
D) resource pooling
سؤال
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.
A) broad network access

A) platform as a service
B) infrastructure as a service
D) resource pooling
سؤال
A __________ infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.

A) community cloud
B) private cloud
C) hybrid cloud
D) public cloud
سؤال
The term platform as a service has generally meant a package ofsecurity services offered by a service provider that offloads much ofthe security responsibility from an enterprise to the security serviceprovider.
سؤال
There is an increasingly prominent trend in many organizations tomove a substantial portion or even all IT operations to enterprise cloud computing.
سؤال
A CSC can provide one or more of the cloud services to meet IT andbusiness requirements of a CSP.
سؤال
Cloud computing gives you the ability to expand and reduce resourcesaccording to your specific service requirement.
سؤال
IaaS provides service to customers in the form of software, specificallyapplication software, running on and accessible in the cloud.
سؤال
Data must be secured while in transit, but not while in use or at rest.
سؤال
NIST recommends selecting cloud providers that support strongencryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.
سؤال
The "smart" in a smart device is provided by a deeply embeddedactuator.
سؤال
Security assessments are third-part audits of cloud services.
سؤال
The major advantage of the public cloud is cost.
سؤال
___________ is an open-source software project of the OpenStack Foundation that aims to produce an open-source cloud operating system.
سؤال
The four most prominent deployment models for cloud computing are public cloud, community cloud, hybrid cloud and _________ cloud.
سؤال
The ?????_________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
سؤال
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

A) loud auditor
B) cloud service consumer
C) cloud broker
D) cloud carrier
سؤال
A __________ is an entity that manages the use, performance and delivery of cloud services, and negotiates relationships between CSPs and cloud consumers.

A) cloud broker
B) cloud carrier
C) cloud auditor
D) cloud provider
سؤال
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud.

A) Intrusion management
B) SIEM
C) security assessments
D) web security
سؤال
__________ is defined as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction".
سؤال
The _________ cloud deployment model is the most secure option.

A) public
B) private
C) community
D) hybrid
سؤال
__________ includes people, processes and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on this assured identity.
سؤال
NIST SP 800-145 defines three service models: software as a service, platform as a service, and __________ as a service.
سؤال
__________ has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication.

A) Edge
B) Keystone
C) OpenSource
D) MiniSec
سؤال
A cloud __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
سؤال
A cloud __________ is a networking facility that provides connectivity and transport of cloud services between cloud consumers and cloud service providers.
سؤال
The most vulnerable part of an IoT is the __________ .

A) smart objects/embedded systems
B) fog/edge network
C) core network
D) data center/cloud
سؤال
__________ aggregates log and event data from virtual and real networks, applications, and systems. This information is then correlated and analyzed to provide real-time reporting and alerting on information/events that may require intervention or other type of response.
سؤال
_________ is the management software module that controls VMs within the IaaS cloud computing platform.

A) Glance
B) Nova
C) Swift
D) Object
سؤال
A __________ interconnects the IoT-enabled devices with the higher-level communication networks.

A) microcontroller
B) gateway
C) carrier
D) sensor
سؤال
The __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
سؤال
__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions.

A) Data loss prevention
B) Security information and event management
C) Network security
D) Business continuity and disaster recovery
سؤال
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.

A) Web security
B) Security assessments
C) Intrusion management
D) Data loss prevention
سؤال
With reference to the end systems supported, the Internet has gone through roughly four generations of deployment culminating in the IoT: information technology, operational technology, _________, and sensor/actuator technology.
سؤال
The core network, also referred to as a __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
سؤال
The key components of an IoT-enabled device are: sensor, actuator, _________, transceiver and radio-frequency identification.
سؤال
MiniSec is an open-source security module that is part of the __________ operating system.
سؤال
MiniSec is designed to meet the following requirements: data authentication, __________, replay protection, freshness, low energy overhead and resilient to lost messages.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Cloud and Iot Security
1
The use of __________ avoids the complexity of software installation, maintenance, upgrades, and patches.

A) SaaS
B) MaaS
C) PaaS
D) IaaS
A
2
An IPS is a set of automated tools designed to detect unauthorizedaccess to a host system.
False
3
A key element in providing security in an IoT deployment is thegateway.
True
4
The three areas of support that a cloud broker can offer are serviceintermediation, service aggregation and service arbitrage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
Examples of services delivered through the __________ include database on demand, e-mail on demand, and storage on demand.

A) hybrid cloud
B) public cloud
C) private cloud
D) community cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
In a public cloud model the provider is responsible both for the cloudinfrastructure and for the control of data and operations within thecloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
The security module for OpenStack is Keystone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Measured service and rapid elasticity are essential characteristics of _________.

A) resource pooling
B) cloud computing
C) broad network access
D) resource pooling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
A __________ cloud provides service to customers in the form of a platform on which the customer's applications can run.
A) broad network access

A) platform as a service
B) infrastructure as a service
D) resource pooling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
A __________ infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.

A) community cloud
B) private cloud
C) hybrid cloud
D) public cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
The term platform as a service has generally meant a package ofsecurity services offered by a service provider that offloads much ofthe security responsibility from an enterprise to the security serviceprovider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
There is an increasingly prominent trend in many organizations tomove a substantial portion or even all IT operations to enterprise cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
A CSC can provide one or more of the cloud services to meet IT andbusiness requirements of a CSP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cloud computing gives you the ability to expand and reduce resourcesaccording to your specific service requirement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
IaaS provides service to customers in the form of software, specificallyapplication software, running on and accessible in the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Data must be secured while in transit, but not while in use or at rest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
NIST recommends selecting cloud providers that support strongencryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
The "smart" in a smart device is provided by a deeply embeddedactuator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Security assessments are third-part audits of cloud services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
The major advantage of the public cloud is cost.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
___________ is an open-source software project of the OpenStack Foundation that aims to produce an open-source cloud operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
The four most prominent deployment models for cloud computing are public cloud, community cloud, hybrid cloud and _________ cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ?????_________ cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
A __________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

A) loud auditor
B) cloud service consumer
C) cloud broker
D) cloud carrier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
A __________ is an entity that manages the use, performance and delivery of cloud services, and negotiates relationships between CSPs and cloud consumers.

A) cloud broker
B) cloud carrier
C) cloud auditor
D) cloud provider
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to the cloud and on servers in the cloud.

A) Intrusion management
B) SIEM
C) security assessments
D) web security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
__________ is defined as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction".
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
The _________ cloud deployment model is the most secure option.

A) public
B) private
C) community
D) hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
__________ includes people, processes and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on this assured identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
NIST SP 800-145 defines three service models: software as a service, platform as a service, and __________ as a service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
__________ has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication.

A) Edge
B) Keystone
C) OpenSource
D) MiniSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
A cloud __________ is a party that can conduct independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
A cloud __________ is a networking facility that provides connectivity and transport of cloud services between cloud consumers and cloud service providers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
The most vulnerable part of an IoT is the __________ .

A) smart objects/embedded systems
B) fog/edge network
C) core network
D) data center/cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
__________ aggregates log and event data from virtual and real networks, applications, and systems. This information is then correlated and analyzed to provide real-time reporting and alerting on information/events that may require intervention or other type of response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
_________ is the management software module that controls VMs within the IaaS cloud computing platform.

A) Glance
B) Nova
C) Swift
D) Object
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A __________ interconnects the IoT-enabled devices with the higher-level communication networks.

A) microcontroller
B) gateway
C) carrier
D) sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
The __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
__________ comprise measures and mechanisms to ensure operational resiliency in the event of any service interruptions.

A) Data loss prevention
B) Security information and event management
C) Network security
D) Business continuity and disaster recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
__________ is the monitoring, protecting, and verifying the security of data at rest, in motion, and in use.

A) Web security
B) Security assessments
C) Intrusion management
D) Data loss prevention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
With reference to the end systems supported, the Internet has gone through roughly four generations of deployment culminating in the IoT: information technology, operational technology, _________, and sensor/actuator technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
The core network, also referred to as a __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The key components of an IoT-enabled device are: sensor, actuator, _________, transceiver and radio-frequency identification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
MiniSec is an open-source security module that is part of the __________ operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
MiniSec is designed to meet the following requirements: data authentication, __________, replay protection, freshness, low energy overhead and resilient to lost messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.