Chapter 10: Cloud and Virtualization Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Wanda is responsible for a series of seismic sensors placed at remote locations. These sensors have low-bandwidth connections and she would like to place computing power on the sensors to allow them to preprocess data before it is sent back to the cloud. What term best describes this approach? Edge computing Client-server computing Fog computing Thin client computing

Edge computing

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service? PaaS SaaS FaaS IaaS

SaaS

Fran's organization uses a Type I hypervisor to implement an IaaS offering that it sells to customers. Which one of the following security controls is least applicable to this environment? - Customers must maintain security patches on guest operating systems. - The provider must maintain security patches on the hypervisor. - The provider must maintain security patches on the host operating system. - Customers must manage security groups to mediate network access to guest operating systems.

- The provider must maintain security patches on the host operating system.

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs? Inline CASB Outsider CASB Comprehensive CASB API-based CASB

API-based CASB

Howard is assessing the legal risks to his organization based upon its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment? Japanese law European Union law U.S. law All should have equal weight

All should have equal weight

Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs? Security group Resource policy CASB SWG

CASB

Which one of the following would not commonly be available as an IaaS service offering? CRM Storage Networking Computing

CRM

Greg would like to find a reference document that describes how to map cloud security controls to different regulatory standards. What document would best assist with this task? CSA CCM NIST SP 500-292 ISO 27001 PCI DSS

CSA CCM

Which one of the following statements about cloud computing is incorrect? - Cloud computing offers ubiquitous, convenient access. - Cloud computing customers store data on hardware that is shared with other customers. - Cloud computing customers provision resources through the service provider's sales team. - Cloud computing resources are accessed over a network.

Cloud computing customers provision resources through the service provider's sales team.

Which cloud computing deployment model requires the use of a unifying technology platform to tie together components from different providers? Public cloud Private cloud Community cloud Hybrid cloud

Hybrid cloud

What component of a virtualization platform is primarily responsible for preventing VM escape attacks? Administrator Guest operating system Host operating system Hypervisor

Hypervisor

In which of the following cloud categories are customers typically charged based on the number of virtual server instances dedicated to their use? IaaS only SaaS only IaaS and PaaS IaaS, SaaS, and PaaS

IaaS and PaaS

Brenda's company provides a managed incident response service to its customers. What term best describes this type of service offering? MSP PaaS SaaS MSSP

MSSP

Tony purchases virtual machines from Microsoft Azure and uses them exclusively for use by his organization. What model of cloud computing is this? Public cloud Private cloud Hybrid cloud Community cloud

Public cloud

Brian would like to limit the ability of users inside his organization to provision expensive cloud server instances without permission. What type of control would best help him achieve this goal? Resource policy Security group Multifactor authentication Secure web gateway

Resource policy

In what cloud security model does the cloud service provider bear the most responsibility for implementing security controls? IaaS FaaS PaaS SaaS

SaaS

Ryan is selecting a new security control to meet his organization's objectives. He would like to use it in their multicloud environment and would like to minimize the administrative work required from his fellow technologists. What approach would best meet his needs? Third-party control Internally developed control Cloud-native control Any of the above

Third-party control

Ursula would like to link the networks in her on-premises datacenter with cloud VPCs in a secure manner. What technology would help her best achieve this goal? Transit gateway HSM VPC endpoint SWG

Transit gateway

Which one of the following is not an example of infrastructure as code? - Defining infrastructure in JSON - Writing code to interact with a cloud provider's API - Using a cloud provider's web interface to provision resources - Defining infrastructure in YAML

Using a cloud provider's web interface to provision resources

Kevin discovered that his web server was being overwhelmed by traffic, causing a CPU bottleneck. Using the interface offered by his cloud service provider, he added another CPU to the server. What term best describes Kevin's action? Elasticity Horizontal scaling Vertical scaling High availability

Vertical scaling


Conjuntos de estudio relacionados

Java Part 2: Questions on Operators and Control Statements

View Set

CompTIA A+ Certification Practice Test 8 (Exam 220-902)

View Set

US History 10 Chapter 3 (England & Its Colonies)

View Set

CH 2 Operating-System Structures

View Set

Kidney Stones & Benign Prostatic Hyperplasia

View Set

CIS Lesson 02 Quiz 1 e-Commerce Business Models

View Set

Chapter 14- Energy generation in mitochondria and chloroplasts

View Set