Chap 18
Which term describes the hosting of a desktop environment on a central server?
virtual desktop infrastructure
Type II hypervisors run directly on the system hardware.
False
Which cloud computing service model involves the offering of software to end users from within the cloud?
Software as a Service (SaaS)
Which term refers to a network connection used to interconnect virtual private clouds and on-premises networks?
transit gateway
Which cloud computing service model describes cloud-based systems that are delivered as a virtual solution for computing that allows firms to contract for utility computing as needed rather than build data centers?
Infrastructure as a Service (IaaS)
Cloud-based data storage was one of the first uses of cloud computing.
True
Encryption is a failsafe—even if security configurations fail and the data falls into the hands of an unauthorized party, the data can't be read or used without the keys.
True
Which process involves implementing security tools and policies to ensure your container is running as intended?
container security
A(n) _______________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer.
hypervisor
Which capability must be enabled on firewalls, secure web gateways, and cloud access security brokers to determine if the next system in a communication chain is legitimate or not?
instance awareness
Which term denotes the policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data?
secrets management
One of the characteristics of cloud computing is transparency to the end user.
True
Which cloud system is defined as one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor?
community
Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT devices?
edge
_______________ are a form of operating system virtualization; they are a packaged-up combination of code and dependencies that help applications run quickly in different computing environments.
Containers
Clouds can be created by many entities, but must be internal to an organization.
False
If your organization is highly sensitive to sharing resources, you might want to consider the use of a public cloud to reduce exposure and increase your control over security, processing, and handling of data.
False
Private cloud services will separate users with security restrictions, but the depth and level of these restrictions will be significantly greater than in a public cloud.
False
Which computing service model is used for the outsourcing of security functions to a vendor that has advantages in scale, costs, or speed?
Security as a Service
Platform as a Service (PaaS) offerings generally focus on security and scalability.
True
When an infrastructure is established "on premises," the unit of computing power is a server.
True
Zones can be used for replication and provide load balancing as well as high availability.
True
Which term is used for an integrated suite of tools or services offered as Security as a Service, or a third-party managed security service provider (MSSP), focused on cloud security?
cloud access security brokers (CASB)
Which marketing term is used to describe the offering of a computing platform combining multiple sets of software in the cloud?
Platform as a Service (PaaS)
