Ucertify Chapter 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of credential is commonly used to restrict access to an application programming interface (API)?

API keys

Question 10 :Brian works as a cloud security analyst. He selects a CASB solution for his organization to interact with a cloud provider directly. Which CASB solution is most appropriate for Brian's needs in the given scenario?

API-based CASB

Which one of the following services is not an example of FaaS computing?

AWS DeepLens

Which one of the following would not commonly be available as an IaaS service offering?

CRM packages

Which of the following statements is not true about cloud computing?

Cloud computing customers provision resources through a sales representative.

A coalition of universities banded together and created a cloud computing environment that is open to all member institutions. The cloud computing environment provided is a basic IaaS component. Which of the following best describes the cloud model narrated in the given scenario?

Community

In the shared responsibility model, under IaaS, SaaS, and PaaS cloud service models, which component always remains the responsibility of a customer?

Data security

Kevin works as a developer in an organization. He is using a service where a cloud provider offers a platform that executes his code in response to discrete events. His bill is prepared based on the actual resources consumed during each code execution event. Which of the following services is being referred to in the given scenario?

Function as a service

Which cloud computing deployment model requires the use of a unifying technology platform to tie components together from different providers?

Hybrid cloud

Which of the following is a characteristic of DevOps approaches to software development and technology?

Increasing the frequency of application releases

Under the shared responsibility model, in which cloud computing environment is a customer responsible for securing an operating system?

Infrastructure as a service

In which of the following cloud computing service models does a customer share responsibility with a cloud provider for datacenter security?

None of these

Gina, an attacker, gained access to a client's AWS account during a penetration test. She would like to determine which level of access she has to the account. Which of the following tools would help Gina to determine the level in the given scenario?

Pacu

Tony works as a security analyst in an organization. He purchases virtual machines from Microsoft Azure and uses them exclusively for services such as analytics, virtual computing, storage, networking, and much more. Which of the following model of cloud computing is referred to in the given scenario?

Public cloud

Amanda works as a cloud security analyst in an organization. She would like to run a security configuration scan of the organization's Microsoft Azure cloud environment. Which of the following tools would be most appropriate for the scan in the given scenario?

ScoutSuite

Which of the following conditions is not likely to trigger an alert during an automated cloud security assessment?

Sharing of API keys among different developers

Helen is a cloud service provider. She designed a new payroll system that she offers to her customers. She hosts the payroll system in Amazon Web Services (AWS) and her customers access it through the web. Which tier of cloud computing best describes Helen's service in the given scenario?

Software as a service

Which of the following offerings endeavor to hide implementation details from a customer?

Software as a service

Which one of the following statements is not true about inline CASB solutions?

These can monitor activity but cannot actively enforce requirements policy.

Which of the following is not an example of infrastructure as code (IaC)?

Using a cloud provider's web interface to provision resources


Ensembles d'études connexes

Fahrenheit 451 Part 3 Study Guide

View Set

MKTG 351: Test 3 Review - Chapter 15

View Set

Human Resource MGM Chapter: 11 Managing Labor Relations

View Set