Module 10 : Cloud and Virtualization Security
Which of the following virtualizes parts of a physical network? a. SDN b. SDV c. SDX d. SDA
a. SDN
Alicja is working on a project to deploy automated guided vehicles on the industrial shop floor of the manufacturing plant in which she works. What location of computing would be best for this project? a. Fog b. Edge c. Off-premises d. Remote
a. Fog
Which cloud model requires the highest level of IT responsibilities? a. IaaS b. SaaS c. PaaS d. Hybrid cloud
a. Iaas
Which of the following is true about secrets management? a. It provides a central repository. b. It can only be used on-prem for security but has a connection to the cloud. c. It requires AES-512. d. It cannot be audited for security purposes.
a. It provides a central repository
The CEO is frustrated by the high costs associated with security at the organization and wants to look at a third party assuming part of their cybersecurity defenses. Nikola has been asked to look into acquiring requests for proposal (RFPs) from different third parties. What are these third-party organizations called? a. MSSPs b. MPSs c. MSecs d. MHerrs
a. MSSPs
Which type of hypervisor runs directly on the computer's hardware? a. Type I b. Type II c. Type III d. Type IV
a. Type I
Which of these is NOT created and managed by a microservices API? a. User experience (UX) b. Database c. Logs d. Authentication
a. User experience (UX)
Zuzana is creating a report for her supervisor about the cost savings associated with cloud computing. Which of the following would she NOT include on her report on the cost savings? a. Reduction in broadband costs b. Resiliency c. Scalability d. Pay-per-use
a. reduction in broadband costs
Which of the following is NOT a feature of a next generation SWG? a. DLP b. Send alerts to virtual firewalls c. Analyze traffic encrypted by SSL d. Can be placed on endpoints, at the edge, or in the cloud
b. Send alerts to virtual firewalls
What does the term "serverless" mean in cloud computing? a. The cloud network configuration does not require any servers. b. Server resources of the cloud are inconspicuous to the end user. c. Servers are run as VMs. d. All appliances are virtual and do not interact with physical servers.
b. Server resources of the cloud are inconspicuous to the end user
Which of the following is NOT correct about containers? a. Containers start more quickly. b. Containers reduce the necessary hard drive storage space to function. c. Containers require a full OS whenever APIs cannot be used. d. Containers include components like binary files and libraries.
c. Containers require a full OS whenever APIs cannot be used
Nadia has been asked to perform dynamic resource allocation on specific cloud computing resources. What action is Nadia taking? a. Creating security groups to segment computing resources into logical groupings that form network perimeters b. Decreasing the network bandwidth to the cloud c. Deprovisioning resources that are no longer necessary d. Expanding the visibility of intrusion prevention devices
c. Deprovisioning resources that are no longer necessary
Which of the following is NOT a cloud computing security issue? a. System vulnerabilities b. Insecure APIs c. Compliance regulations d. Bandwidth utilization
d. Bandwidth utilization
Which of the following will NOT protect containers? a. Using a hardened OS b. Using reduced-visibility images to limit the risk of a compromise c. Only using containers in a protected cloud environment d. Eliminating APIs
d. Eliminating APIs
Oliwia has been given a project to manage the development of a new company app. She wants to use a cloud model to facilitate the development and deployment. Which cloud model will she choose? a. SaaS b. XaaS c. IaaS d. PaaS
d. PaaS
Which of the following provides the highest level of security? a. FTP b. XFTP c. FTPS d. SFTP
d. SFTP
Wiktoria is frustrated that her company is using so many different cloud services that span multiple cloud provider accounts and even different cloud providers. She wants to implement a technology to give full control and visibility over all the cloud resources, including network routing and security. What product does Wiktoria need? a. Thin virtual visibility appliance (TVVA) b. SWG c. CASB d. Transit gateway
d. Transit gateway
Aleksandra, the company HR manager, is completing a requisition form for the IT staff to create a type of cloud that would only be accessible to other HR managers like Aleksandra who are employed at manufacturing plants. The form asks for the type of cloud that is needed. Which type of cloud would best fit Aleksandra's need? a. Public cloud b. Group cloud c. Hybrid cloud d. Community cloud
d. community cloud
Which of the following is NOT correct about high availability across zones? a. In a cloud computing environment, reliability and resiliency are achieved through duplicating processes across one or more geographical areas. b. An Availability Zone (AZ) is one or more data centers within a Region, each with redundant power, networking, and connectivity. c. They are more highly available, fault tolerant, and scalable than would be possible with a single data center. d. They require that specific security appliances be located on-prem so that the local data center can be considered as a qualified Zone.
d. they require that specific security appliances be located on-prem so that the local data center can be considered as a qualified Zone
Which of the following is NOT a characteristic of cloud computing? a. metered services b. immediate elasticity c. universal client support d. visible resource pooling
d. visible resource pooling