Ch. 18: Cloud Computing (Quiz)
Type II hypervisors run directly on the system hardware. True or False?
False
Zones can be used for replication and provide load balancing as well as high availability. True or False?
True
Which cloud computing service model involves the offering of software to end users from within the cloud? a. Platform as a Service (PaaS) b. Software as a Service (SaaS) c. Infrastructure as a Service (IaaS) d. Security as a Service (SaaS)
b. Software as a Service (SaaS)
Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT (Internet of Things) devices? a. implicit b. edge c. recovery d. hybrid
b. edge
Which cloud computing service model describes cloud-based systems that are delivered as a virtual solution for computing that allows firms to contract for utility computing as needed rather than build data centers? a. Platform as a Service (PaaS) b. Software as a Service (SaaS) c. Infrastructure as a Service (IaaS) d. Security as a Service (SaaS)
c. Infrastructure as a Service (IaaS)
Clouds can be created by many entities, but must be internal to an organization. True or False?
False
Cloud-based data storage was one of the first uses of cloud computing. True or False?
True
Which marketing term is used to describe the offering of a computing platform combining multiple sets of software in the cloud? a. Platform as a Service (PaaS) b. Software as a Service (SaaS) c. Infrastructure as a Service (IaaS) d. Security as a Service (SaaS)
a. Platform as a Service (PaaS)
Which term denotes the policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data? a. buffer overflow b. secrets management c. cross-site scripting d. discretionary access
b. secrets management
Which cloud system is defined as one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor? a. private b. hybrid c. community d. public
c. community
A(n) _______________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer. a. cipher b. hypervisor c. subnet d. escrow
b. hypervisor
If your organization is highly sensitive to sharing resources, you might want to consider the use of a public cloud to reduce exposure and increase your control over security, processing, and handling of data. True or False?
False
Private cloud services will separate users with security restrictions, but the depth and level of these restrictions will be significantly greater than in a public cloud. True or False?
False
Encryption is a failsafe—even if security configurations fail and the data falls into the hands of an unauthorized party, the data can't be read or used without the keys. True or False?
True
One of the characteristics of cloud computing is transparency to the end user. True or False?
True
Platform as a Service (PaaS) offerings generally focus on security and scalability. True or False?
True
When an infrastructure is established "on premises," the unit of computing power is a server. True or False?
True
_______________ are a form of operating system virtualization; they are a packaged-up combination of code and dependencies that help applications run quickly in different computing environments. a. Containers b. Rootkits c. Scripts d. Zones
a. Containers
Which computing service model is used for the outsourcing of security functions to a vendor that has advantages in scale, costs, or speed? a. Security as a Service b. Platform as a Service c. Infrastructure as a Service d. Software as a Service
a. Security as a Service
Which process involves implementing security tools and policies to ensure your container is running as intended? a. container security b. log aggregation c. secrets management d. edge computing
a. container security
The term "_______________ cloud" refers to a cloud service rendered over a system that is open for public use. a. public b. integrated c. community d. hybrid
a. public
Which term describes the hosting of a desktop environment on a central server? a. virtual desktop infrastructure b. Infrastructure as a Service c. virtualization d. Open Container Initiative
a. virtual desktop infrastructure
Which term is used for an integrated suite of tools or services offered as Security as a Service, or a third-party managed security service provider (MSSP), focused on cloud security? a. computer emergency response team (CERT) b. Certificate Authority (CA) c. application service provider (ASP) d. cloud access security brokers (CASB)
d. cloud access security brokers (CASB)
Which capability must be enabled on firewalls, secure web gateways, and cloud access security brokers to determine if the next system in a communication chain is legitimate or not? a. discretionary access b. escalation auditing c. key archiving d. instance awareness
d. instance awareness
Which term refers to a network connection used to interconnect virtual private clouds and on-premises networks? a. certificate repository b. digital sandbox c. captive portal d. transit gateway
d. transit gateway
