Ch. 18: Cloud Computing (Quiz)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Type II hypervisors run directly on the system hardware. True or False?

False

Zones can be used for replication and provide load balancing as well as high availability. True or False?

True

Which cloud computing service model involves the offering of software to end users from within the cloud? a. Platform as a Service (PaaS) b. Software as a Service (SaaS) c. Infrastructure as a Service (IaaS) d. Security as a Service (SaaS)

b. Software as a Service (SaaS)

Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT (Internet of Things) devices? a. implicit b. edge c. recovery d. hybrid

b. edge

Which cloud computing service model describes cloud-based systems that are delivered as a virtual solution for computing that allows firms to contract for utility computing as needed rather than build data centers? a. Platform as a Service (PaaS) b. Software as a Service (SaaS) c. Infrastructure as a Service (IaaS) d. Security as a Service (SaaS)

c. Infrastructure as a Service (IaaS)

Clouds can be created by many entities, but must be internal to an organization. True or False?

False

Cloud-based data storage was one of the first uses of cloud computing. True or False?

True

Which marketing term is used to describe the offering of a computing platform combining multiple sets of software in the cloud? a. Platform as a Service (PaaS) b. Software as a Service (SaaS) c. Infrastructure as a Service (IaaS) d. Security as a Service (SaaS)

a. Platform as a Service (PaaS)

Which term denotes the policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data? a. buffer overflow b. secrets management c. cross-site scripting d. discretionary access

b. secrets management

Which cloud system is defined as one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor? a. private b. hybrid c. community d. public

c. community

A(n) _______________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer. a. cipher b. hypervisor c. subnet d. escrow

b. hypervisor

If your organization is highly sensitive to sharing resources, you might want to consider the use of a public cloud to reduce exposure and increase your control over security, processing, and handling of data. True or False?

False

Private cloud services will separate users with security restrictions, but the depth and level of these restrictions will be significantly greater than in a public cloud. True or False?

False

Encryption is a failsafe—even if security configurations fail and the data falls into the hands of an unauthorized party, the data can't be read or used without the keys. True or False?

True

One of the characteristics of cloud computing is transparency to the end user. True or False?

True

Platform as a Service (PaaS) offerings generally focus on security and scalability. True or False?

True

When an infrastructure is established "on premises," the unit of computing power is a server. True or False?

True

_______________ are a form of operating system virtualization; they are a packaged-up combination of code and dependencies that help applications run quickly in different computing environments. a. Containers b. Rootkits c. Scripts d. Zones

a. Containers

Which computing service model is used for the outsourcing of security functions to a vendor that has advantages in scale, costs, or speed? a. Security as a Service b. Platform as a Service c. Infrastructure as a Service d. Software as a Service

a. Security as a Service

Which process involves implementing security tools and policies to ensure your container is running as intended? a. container security b. log aggregation c. secrets management d. edge computing

a. container security

The term "_______________ cloud" refers to a cloud service rendered over a system that is open for public use. a. public b. integrated c. community d. hybrid

a. public

Which term describes the hosting of a desktop environment on a central server? a. virtual desktop infrastructure b. Infrastructure as a Service c. virtualization d. Open Container Initiative

a. virtual desktop infrastructure

Which term is used for an integrated suite of tools or services offered as Security as a Service, or a third-party managed security service provider (MSSP), focused on cloud security? a. computer emergency response team (CERT) b. Certificate Authority (CA) c. application service provider (ASP) d. cloud access security brokers (CASB)

d. cloud access security brokers (CASB)

Which capability must be enabled on firewalls, secure web gateways, and cloud access security brokers to determine if the next system in a communication chain is legitimate or not? a. discretionary access b. escalation auditing c. key archiving d. instance awareness

d. instance awareness

Which term refers to a network connection used to interconnect virtual private clouds and on-premises networks? a. certificate repository b. digital sandbox c. captive portal d. transit gateway

d. transit gateway


Set pelajaran terkait

8 The individual life insurance contract

View Set

PrepU #1.1 - Anatomy and Physiology of Reproductive System

View Set

MD Accident, Health & Life Producer Exam A

View Set

Study Stack Muscle Groups 4 Head and Neck

View Set

Psychology 2301-03: Chapter 11 Review

View Set