Ucertify Chapter 6
Which type of credential is commonly used to restrict access to an application programming interface (API)?
API keys
Question 10 :Brian works as a cloud security analyst. He selects a CASB solution for his organization to interact with a cloud provider directly. Which CASB solution is most appropriate for Brian's needs in the given scenario?
API-based CASB
Which one of the following services is not an example of FaaS computing?
AWS DeepLens
Which one of the following would not commonly be available as an IaaS service offering?
CRM packages
Which of the following statements is not true about cloud computing?
Cloud computing customers provision resources through a sales representative.
A coalition of universities banded together and created a cloud computing environment that is open to all member institutions. The cloud computing environment provided is a basic IaaS component. Which of the following best describes the cloud model narrated in the given scenario?
Community
In the shared responsibility model, under IaaS, SaaS, and PaaS cloud service models, which component always remains the responsibility of a customer?
Data security
Kevin works as a developer in an organization. He is using a service where a cloud provider offers a platform that executes his code in response to discrete events. His bill is prepared based on the actual resources consumed during each code execution event. Which of the following services is being referred to in the given scenario?
Function as a service
Which cloud computing deployment model requires the use of a unifying technology platform to tie components together from different providers?
Hybrid cloud
Which of the following is a characteristic of DevOps approaches to software development and technology?
Increasing the frequency of application releases
Under the shared responsibility model, in which cloud computing environment is a customer responsible for securing an operating system?
Infrastructure as a service
In which of the following cloud computing service models does a customer share responsibility with a cloud provider for datacenter security?
None of these
Gina, an attacker, gained access to a client's AWS account during a penetration test. She would like to determine which level of access she has to the account. Which of the following tools would help Gina to determine the level in the given scenario?
Pacu
Tony works as a security analyst in an organization. He purchases virtual machines from Microsoft Azure and uses them exclusively for services such as analytics, virtual computing, storage, networking, and much more. Which of the following model of cloud computing is referred to in the given scenario?
Public cloud
Amanda works as a cloud security analyst in an organization. She would like to run a security configuration scan of the organization's Microsoft Azure cloud environment. Which of the following tools would be most appropriate for the scan in the given scenario?
ScoutSuite
Which of the following conditions is not likely to trigger an alert during an automated cloud security assessment?
Sharing of API keys among different developers
Helen is a cloud service provider. She designed a new payroll system that she offers to her customers. She hosts the payroll system in Amazon Web Services (AWS) and her customers access it through the web. Which tier of cloud computing best describes Helen's service in the given scenario?
Software as a service
Which of the following offerings endeavor to hide implementation details from a customer?
Software as a service
Which one of the following statements is not true about inline CASB solutions?
These can monitor activity but cannot actively enforce requirements policy.
Which of the following is not an example of infrastructure as code (IaC)?
Using a cloud provider's web interface to provision resources