Chap 18

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which term describes the hosting of a desktop environment on a central server?

virtual desktop infrastructure

Type II hypervisors run directly on the system hardware.

False

Which cloud computing service model involves the offering of software to end users from within the cloud?

Software as a Service (SaaS)

Which term refers to a network connection used to interconnect virtual private clouds and on-premises networks?

transit gateway

Which cloud computing service model describes cloud-based systems that are delivered as a virtual solution for computing that allows firms to contract for utility computing as needed rather than build data centers?

Infrastructure as a Service (IaaS)

Cloud-based data storage was one of the first uses of cloud computing.

True

Encryption is a failsafe—even if security configurations fail and the data falls into the hands of an unauthorized party, the data can't be read or used without the keys.

True

Which process involves implementing security tools and policies to ensure your container is running as intended?

container security

A(n) _______________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer.

hypervisor

Which capability must be enabled on firewalls, secure web gateways, and cloud access security brokers to determine if the next system in a communication chain is legitimate or not?

instance awareness

Which term denotes the policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data?

secrets management

One of the characteristics of cloud computing is transparency to the end user.

True

Which cloud system is defined as one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor?

community

Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT devices?

edge

_______________ are a form of operating system virtualization; they are a packaged-up combination of code and dependencies that help applications run quickly in different computing environments.

Containers

Clouds can be created by many entities, but must be internal to an organization.

False

If your organization is highly sensitive to sharing resources, you might want to consider the use of a public cloud to reduce exposure and increase your control over security, processing, and handling of data.

False

Private cloud services will separate users with security restrictions, but the depth and level of these restrictions will be significantly greater than in a public cloud.

False

Which computing service model is used for the outsourcing of security functions to a vendor that has advantages in scale, costs, or speed?

Security as a Service

Platform as a Service (PaaS) offerings generally focus on security and scalability.

True

When an infrastructure is established "on premises," the unit of computing power is a server.

True

Zones can be used for replication and provide load balancing as well as high availability.

True

Which term is used for an integrated suite of tools or services offered as Security as a Service, or a third-party managed security service provider (MSSP), focused on cloud security?

cloud access security brokers (CASB)

Which marketing term is used to describe the offering of a computing platform combining multiple sets of software in the cloud?

Platform as a Service (PaaS)


Ensembles d'études connexes

NCLEX-RN Renal, Urinary, & Reproductive systems.

View Set

AP Human Geography Chapter 2 Review Sheet Population Bramlett Rubinstein

View Set

International Relations Comprehensive

View Set