10.4.7 PQ NSF

¡Supera tus tareas y exámenes ahora con Quizwiz!

Match: 1. Public Cloud 2. Private Cloud 3. Community Cloud 4. Hybrid Cloud

1. Provides cloud services to just about anyone. 2. Provides cloud services to a single organization. 3. Allows cloud services to be shared by several organizations. 4. Integrates one cloud service with other cloud services.

Google Cloud, Amazon Web Services (AWS), and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt most companies to take advantage of cloud storage? (Select two.) -Growing demand for storage -Need for platform as a service (PaaS) for developing applications -Need for software as a service (SaaS) for managing enterprise applications -Need for a storage provider to manage access control -Need to bring costs down

Growing demand for storage Need to bring costs down

Which of the following cloud storage access services acts as a gatekeeper, extending an organization's security policies into the cloud storage infrastructure? -A cloud-access security broker -A co-located cloud computer service -A web service application programming interface -A cloud storage gateway

A cloud-access security broker

A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is MOST likely being implemented? -Hybrid -Private -Community -Public

Community

Cloud storage is a virtual service, so the infrastructure is the responsibility of the storage provider. Access control should be set as a local file system would be, with no need for the provider to have access to the stored data. You are implementing the following measures to secure your cloud storage: -Verify that security controls are the same as in a physical data center. -Use data classification policies. -Assign information into categories that determine storage, handling, and access requirements. -Assign information classification based on information sensitivity and criticality. Which of the following is another security measure you can implement?

Dispose of data when it is no longer needed by using specialized tools.

Which of the following are true concerning virtual desktop infrastructure (VDI)? (Select two.) -Roaming profiles must be configured to allow mobile users to keep their same desktop environment across systems. -User desktop environments are centrally hosted on servers instead of on individual desktop systems. -User desktop environments are provided by individual desktop systems instead of by remote servers. -In the event of a widespread malware infection, the administrator can reimage user desktops by pushing an image out to each user desktop system over the network. -In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers.

In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. User desktop environments are centrally hosted on servers instead of on individual desktop systems.

Which of the following BEST describes the platform as a service (PaaS) cloud computing service model? -PaaS delivers software applications to the client either over the internet or on a local area network (LAN). -PaaS delivers everything a developer needs to build an application on the cloud infrastructure. -PaaS stores and provides data from a centralized location without the need for local collection and storage. -PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments.

PaaS delivers everything a developer needs to build an application on the cloud infrastructure.

A company is considering moving its applications and data to the cloud. The company handles sensitive data and wants to maintain control over the security of its applications and data. It is considering using an infrastructure as a service (IaaS) model. Which of the following is a key responsibility the company will need to manage in an IaaS model? -Physical security of the cloud infrastructure -Protection of operating systems when deployed -Securing foundational elements of networking, such as DDoS protection -Cloud storage backup and recovery

Protection of operating systems when deployed

You are the security administrator for your organization. You have implemented a cloud service to provide features such as authentication, anti-malware, intrusion detection, and penetration testing. Which cloud service have you MOST likely implemented? -IaaS -SaaS -PaaS -SECaaS

SECaaS

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? -DaaS -IaaS -PaaS -SaaS

SaaS


Conjuntos de estudio relacionados

Pharm - Chapter 20 - Cholinergic Drugs

View Set

Macro Exam 3 Chapters 14,15, and 16

View Set

Missouri Property and Casualty State Laws

View Set

Microeconomics HW (ch 12, 13, 14)

View Set