CH 15 - Cloud Computing & IoT Flashcards
Which of these is not an example of an IoT device?
A. Chromebook
B. iDevices light switch
C. Nest thermostat
D. Amazon Echo
A.
Chromebook
Why is REST a common approach to web application design?
A. HTML is stateless.
B. HTTP is stateless.
C. HTML is stateful.
D. HTTP is stateful.
B.
HTTP is stateless.
Which of these cloud offerings relies on the customer having the most responsibility?
A. Software as a service
B. Platform as a service
C. Storage as a service
D. Infrastructure as a service
D.
Infrastructure as a service
Which of these is less likely to be a common element of cloud‐native design?
A. Microservice architecture
B. Automation
C. Virtual machines
D. Containers
C.
Virtual machines
Which of these is not an advantage of using automation in a cloud environment?
A. Consistency
B. Fault tolerance
C. Repeatability
D. Testability
B.
Fault tolerance
What common element of a general‐purpose computing platform does an IoT not typically have?
A. Memory
B. Processor
C. External keyboards
D. Programs
C.
External keyboards
If you wanted to share documents with someone using a cloud provider, which service would you be most likely to use?
A. Software as a service
B. Platform as a service
C. Storage as a service
D. Infrastructure as a service
C.
Storage as a service
What tool could you use to identify IoT devices on a network?
A. Cloudscan
B. nmap
C. Samba
D. Postman
B.
nmap
What might you be most likely to use to develop a web application that used a mobile application for the user interface?
A. NoSQL database
B. Data bus
C. Microservices
D. RESTful API
D.
RESTful API
Which of these might be a concern with moving services to a cloud provider, away from on‐premise services?
A. Multiple accounts per user
B. Lack of transport layer encryption
C. Inability to implement security controls
D. Lack of access to necessary operating systems and hardware
C.
Inability to implement security controls
What modern capability does fog computing support?
A. Cloud‐native design
B. IoT
C. Access management
D. Grid computing
B.
IoT
Which of these is an example of grid computing?
A. SETI@home
B. OWASP Top 10
C. Shodan.io
D. Thingful.net
A.
SETI@home
What is a botnet an example of?
A. Cloud‐native design
B. RESTful processing
C. Grid computing
D. Fog computing
C.
Grid computing
Which of these would be least likely as a vulnerability to serverless web applications?
A. Insecure third‐party components
B. Misconfiguration
C. Access control
D. Command injection
D.
Command injection
No matter what cloud‐based service model is being used, which of these is the customer always responsible for?
A. Patching
B. Operating system installation
C. Application management
D. Data
D.
Data
What devices would you find at the lowest layer of the Purdue model and, as a result, should be the best protected?
A. Sensors and actuators
B. Programmable logic controllers
C. Remote terminal units
D. Human–computer interfaces
A.
Sensors and actuators
What aspect of the Purdue model is considered essential from a security perspective?
A. Human–computer interfaces
B. Segmentation
C. IT and OT interfaces
D. Layered model matches OSI
B.
Segmentation
What is a good mitigation against credential compromise in cloud‐based services?
A. Long passwords
B. Using only software as a service
C. Requiring MFA
D. Using serverless functions
C.
Requiring MFA
Which of these might be a common problem with a cloud‐based service leading to data exposure?
A. Public buckets
B. Insider threat
C. Selecting the wrong provider
D. Only using software as a service
A.
Public buckets
Which of these would not be used to automate deployment of systems into a cloud environment?
A. Templates
B. Ansible
C. PowerShell
D. Containers
D.
Containers