CH 15 - Cloud Computing & IoT Flashcards

1
Q

Which of these is not an example of an IoT device?

A. Chromebook
B. iDevices light switch
C. Nest thermostat
D. Amazon Echo

A

A.
Chromebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is REST a common approach to web application design?

A. HTML is stateless.
B. HTTP is stateless.
C. HTML is stateful.
D. HTTP is stateful.

A

B.
HTTP is stateless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these cloud offerings relies on the customer having the most responsibility?

A. Software as a service
B. Platform as a service
C. Storage as a service
D. Infrastructure as a service

A

D.
Infrastructure as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of these is less likely to be a common element of cloud‐native design?

A. Microservice architecture
B. Automation
C. Virtual machines
D. Containers

A

C.
Virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is not an advantage of using automation in a cloud environment?

A. Consistency
B. Fault tolerance
C. Repeatability
D. Testability

A

B.
Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What common element of a general‐purpose computing platform does an IoT not typically have?

A. Memory
B. Processor
C. External keyboards
D. Programs

A

C.
External keyboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you wanted to share documents with someone using a cloud provider, which service would you be most likely to use?

A. Software as a service
B. Platform as a service
C. Storage as a service
D. Infrastructure as a service

A

C.
Storage as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tool could you use to identify IoT devices on a network?

A. Cloudscan
B. nmap
C. Samba
D. Postman

A

B.
nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What might you be most likely to use to develop a web application that used a mobile application for the user interface?

A. NoSQL database
B. Data bus
C. Microservices
D. RESTful API

A

D.
RESTful API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these might be a concern with moving services to a cloud provider, away from on‐premise services?

A. Multiple accounts per user
B. Lack of transport layer encryption
C. Inability to implement security controls
D. Lack of access to necessary operating systems and hardware

A

C.
Inability to implement security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What modern capability does fog computing support?

A. Cloud‐native design
B. IoT
C. Access management
D. Grid computing

A

B.
IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is an example of grid computing?

A. SETI@home
B. OWASP Top 10
C. Shodan.io
D. Thingful.net

A

A.
SETI@home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a botnet an example of?

A. Cloud‐native design
B. RESTful processing
C. Grid computing
D. Fog computing

A

C.
Grid computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these would be least likely as a vulnerability to serverless web applications?

A. Insecure third‐party components
B. Misconfiguration
C. Access control
D. Command injection

A

D.
Command injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

No matter what cloud‐based service model is being used, which of these is the customer always responsible for?

A. Patching
B. Operating system installation
C. Application management
D. Data

A

D.
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What devices would you find at the lowest layer of the Purdue model and, as a result, should be the best protected?

A. Sensors and actuators
B. Programmable logic controllers
C. Remote terminal units
D. Human–computer interfaces

A

A.
Sensors and actuators

17
Q

What aspect of the Purdue model is considered essential from a security perspective?

A. Human–computer interfaces
B. Segmentation
C. IT and OT interfaces
D. Layered model matches OSI

A

B.
Segmentation

18
Q

What is a good mitigation against credential compromise in cloud‐based services?

A. Long passwords
B. Using only software as a service
C. Requiring MFA
D. Using serverless functions

A

C.
Requiring MFA

19
Q

Which of these might be a common problem with a cloud‐based service leading to data exposure?

A. Public buckets
B. Insider threat
C. Selecting the wrong provider
D. Only using software as a service

A

A.
Public buckets

20
Q

Which of these would not be used to automate deployment of systems into a cloud environment?

A. Templates
B. Ansible
C. PowerShell
D. Containers

A

D.
Containers