Beacon - Fundamentals of Cloud Security Assessment (08/25/20)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of hypervisor is hosted and runs within an operating system environment? A. Type 1 B. Type 2 C. Type 3 D. Type 4

B

Which type of algorithm does Prisma SaaS use to sort sensitive documents into top-level categories for document classification and categorization?

supervised machine learning

Which software development concept that also has been applied more generally to IT says that additional future costs for rework are anticipated due to an earlier decision or course of action that was necessary for agility but was not necessarily the most optimal or appropriate decision or course of action?

technical debt

Which sanctioned SaaS use control prevents known and unknown malware from residing in sanctioned SaaS applications, regardless of source?

threat prevention

In which cloud service model are customers responsible for securing their virtual machines and the virtual machine operating systems, and for operating system runtime environments, application software, and application data? A. platform as a service (PaaS) B. identity as a service (IaaS) C. software as a service (SaaS) D. infrastructure as a service (IaaS)

D

Which DevOps CI/CD pipeline feature requires developers to integrate code into a repository several times per day for automated testing? A. continuous delivery B. continuous deployment C. continuous identity D. continuous integration

D

Which cloud security compliance requirement uses granular policy definitions to govern access to SaaS applications and resources in the public cloud and to apply network segmentation?

access governance

Which cloud native security platform function remediates vulnerabilities and misconfigurations consistently across the entire build-deploy-run lifecycle?

automation

Which SASE security-as-a-service layer capability provides visibility into SaaS application use, understands where sensitive data resides, enforces company policies for user access, and protects data from hackers?

cloud access security broker (CASB)

Which Prisma SaaS feature connects directly to the applications themselves and provides continuous silent monitoring of the risks within sanctioned SaaS applications, with detailed luminosity that is not possible with traditional security solutions?

data exposure visibility

Which security consideration is associated with inadvertently missed anti-malware and security patch updates to virtual machines?

dormant VMs

Which phased approach of hybrid cloud security requires networking and security solutions that not only can be virtualized but also are virtualization-aware and can dynamically adjust as necessary to address communication and protection requirements, respectively?

dynamic computing fabric

Which value can be achieved by the ability to pool resources in cloud computing?

economies of scale and agility

Which cloud solution is hosted in-house and usually is supported by a third party?

on-premises

Which security technology is designed to help organizations embrace the concepts of cloud and mobility by providing network and network security services from a common cloud-delivered architecture?

secure access service edge (SASE)

Which cloud security best practice is deployed to ensure that every person who views or works with your data has access only to what is absolutely necessary?

set appropriate privileges


Ensembles d'études connexes

NSG med surg final exam hesi study guide

View Set

Chapter 6- Strengthening a company's competitive position (Mangt. 595)

View Set

ARCH 2340- Vienna Circa 1900, New Materials/ Urban Models, Myths of Modernity & New Conceptions of Space, Arch + Industry, Le Corbusier (1920s), Modernism in Germany/ Bauhaus + Mies, Urban Growth & New Residential Patterns, Codification, and Before WWII

View Set

AH1 HESI review questions - Perioperative Care

View Set

Key Terms Chapter 3: Family Influences on Child Health Promotion

View Set