HOD401 Chapter 18

Ace your homework & exams now with Quizwiz!

12. Which of the following would be hosted as SaaS? A. Email B. Active Directory C. Applications D. Firewalls

A

13. A cloud-based firewall is used to separate which of the following? A. Networks B. Hosts C. Permissions D. ACL

A

20. What can be used instead of a URL to evade some firewalls used to protect a cloud based web application? A. IP address B. Encryption C. Stateful inspection D. NIDS

A

11. There are how many different types of cloud hosting environments? A. Two B. Three C. Four D. Five

B

3. SOAP is used to perform what function? A. Transport data B. Enable communication between applications C. Encrypt information D. Wrap data

B

8. What type of cloud service would provide email hosting and associated security services? A. PaaS B. SaaS C. IaaS D. SSaS

B

5. Altering a checksum of a packet can be used to do what? A. Send an RST B. Send a URG C. Reset a connection D. Evade an NIDS

D

7. A cloud environment can be in which of the following configurations except? A. IaaS B. PaaS C. SaaS D. LaaS

D

16. HTTPS is typically open on which port in a cloud based firewall? A. 25 B. 443 C. 80 D. 110

B

2. Which of the following can be used to protect data stored in the cloud? A. SSL B. Drive encryption C. Transport encryption D. Harvesting

B

1. SaaS is a cloud hosting environment that offers what? A. Development options B. Testing options C. Software hosting D. Improved security

C

10. Why wouldn't someone create a private cloud? A. To reduce costs B. To offload technical support C. To increase availability D. To maintain universal access

C

17. What system is used as a choke point for traffic and could be offered through IaaS? A. IDS B. DMZ C. Bastion host D. SNMP host

C

19. What type of firewall analyzes the status of traffic and would be part of a IaaS solution? A. Circuit level B. Packet filtering C. Stateful inspection D. NIDS

C

4. Which attack alters data in transit within the cloud? A. Packet sniffing B. Port scanning C. MitM D. Encryption

C

9. Who has legal responsibility for data hosted in the cloud? A. The Cloud Service Provider B. The IT department of the client C. The client D. The consumer

C

14. An application would be developed on what type of cloud service? A. BaaS B. SaaS C. IaaS D. PaaS

D

18. At which layer of the OSI model would you expect a cloud based solution to operate at? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4

CD

15. Which of the following issues would be a good reason for moving to a cloud based environment? A. Reduced costs B. Improved performance C. Easier forensics D. Increased redundancy

ABD

6. Cloud technologies are used to accomplish which of the following? A. Increase management options B. Offload operations onto a third party C. Transfer legal responsibility of data to a third party D. Cut costs

ABD


Related study sets

CLCV 205 Midterm 2: Important Events

View Set

AP Classroom Test Period 5: 1861-1865

View Set

Chapter 7; Social Stratification

View Set

Auditing Chapter 17, Chapter 17, ATG 457 CH 17, HW - Chapter 17, Chapter 17, Auditing Chapter 17

View Set

Kines 32: Chapter 2- Principle of Physical

View Set

The Chimney Sweeper (Songs of Innocence)

View Set

Physical Wellness Chapter 9 Body Composition

View Set