chapter 11 Flashcards
In 2009, international investment into cloud computing services amounted to approximately: A. $10 million B. $100 million C. $5 billion D. $17 billion
D. $17 billion
According to the ENISA (European Network and Information Security Agency), 2013 investment in cloud computing will amount to approximately: A. $4 billion B. $10 billion C. $40 billion D. over $40 billion
D. over $40 billion
Which of the following statements about cloud technology is NOT true?
A. Scale and flexibility are not necessarily harmful or beneficial factors, from a security point of view.
B. Cloud computing is a relatively new technology for sharing computer resources.
C. Cloud computing may be used for purposes as diverse as data processing and email handling.
D. Investment in cloud computing has been increasing in recent years.
B. Cloud computing is a relatively new technology for sharing computer resources.
According to the 2009 ENISA report, the new economic model has driven change in terms of: A. security B. scale C. architecture D. both B and C
D. both B and C
Many SMEs (small and medium enterprises) are switching to the cloud for which of the following purposes: A. reduced cost and increased security B. resource sharing C. flexibility and reduced cost D. management and aggregation
C. flexibility and reduced cost
Major concerns for SMEs (small and medium enterprises) migrating to the cloud are: A. liability for incidents B. confidentiality of information C. incraesed costs D. both A and B
D. both A and B
Cloud computing can refer to how many different service types? A. two B. three C. four D. five or more
B. three
All of the following are recognized cloud service types, EXCEPT: A. application as a service B. functions as a service C. platform as a service D. infrastructure as a service
B. functions as a service
Which of the following elements should be included in a security checklist for cloud service customers?
A. legal issues
B. physical security
C. technical issues
D. all of the above
D. all of the above
A security checklist for cloud customers should serve all of the following purposes except:
A. schedule an independent audit of the cloud service provider
B. compare different cloud provider offerings
C. obtain assurance from cloud service providers
D. reduce assurance burden on cloud providers
A. schedule an independent audit of the cloud service provider
Most legal issues in cloud computing are resolved through:
A. regulatory authorities’ investigations
B. private right of action
C. contract evaluation and/or negotiations
D. both A and C
C. contract evaluation and/or negotiations
According to ENISA (European Network and Information Security Agency), the European Commission should study/clarify:
A. the Data Protection Directive
B. Article 29 Data Protection Working Party
C. E-Commerce Directive
D. all of the above
D. all of the above
The issue of incident handling (monitoring and traceability) belongs under which of the following categories of research?
A. data protection in large-scale systems
B. building trust in the cloud
C. large scale computer systems engineering
D. both A and C
A. data protection in large-scale systems
The issue of virtual private clouds belongs under which of the following categories of research?
A. data protection in large-scale systems
B. building trust in the cloud
C. large scale computer systems engineering
D. all of the above
B. building trust in the cloud
The issue of resilience in cloud computing belongs under which of the following categories of research?
A. data protection in large-scale systems
B. building trust in the cloud
C. large scale computer systems engineering
D. both B and C
C. large scale computer systems engineering