chapter 11 Flashcards
In 2009, international investment into cloud computing services amounted to approximately: A. $10 million B. $100 million C. $5 billion D. $17 billion
D. $17 billion
According to the ENISA (European Network and Information Security Agency), 2013 investment in cloud computing will amount to approximately: A. $4 billion B. $10 billion C. $40 billion D. over $40 billion
D. over $40 billion
Which of the following statements about cloud technology is NOT true?
A. Scale and flexibility are not necessarily harmful or beneficial factors, from a security point of view.
B. Cloud computing is a relatively new technology for sharing computer resources.
C. Cloud computing may be used for purposes as diverse as data processing and email handling.
D. Investment in cloud computing has been increasing in recent years.
B. Cloud computing is a relatively new technology for sharing computer resources.
According to the 2009 ENISA report, the new economic model has driven change in terms of: A. security B. scale C. architecture D. both B and C
D. both B and C
Many SMEs (small and medium enterprises) are switching to the cloud for which of the following purposes: A. reduced cost and increased security B. resource sharing C. flexibility and reduced cost D. management and aggregation
C. flexibility and reduced cost
Major concerns for SMEs (small and medium enterprises) migrating to the cloud are: A. liability for incidents B. confidentiality of information C. incraesed costs D. both A and B
D. both A and B
Cloud computing can refer to how many different service types? A. two B. three C. four D. five or more
B. three
All of the following are recognized cloud service types, EXCEPT: A. application as a service B. functions as a service C. platform as a service D. infrastructure as a service
B. functions as a service
Which of the following elements should be included in a security checklist for cloud service customers?
A. legal issues
B. physical security
C. technical issues
D. all of the above
D. all of the above
A security checklist for cloud customers should serve all of the following purposes except:
A. schedule an independent audit of the cloud service provider
B. compare different cloud provider offerings
C. obtain assurance from cloud service providers
D. reduce assurance burden on cloud providers
A. schedule an independent audit of the cloud service provider
Most legal issues in cloud computing are resolved through:
A. regulatory authorities’ investigations
B. private right of action
C. contract evaluation and/or negotiations
D. both A and C
C. contract evaluation and/or negotiations
According to ENISA (European Network and Information Security Agency), the European Commission should study/clarify:
A. the Data Protection Directive
B. Article 29 Data Protection Working Party
C. E-Commerce Directive
D. all of the above
D. all of the above
The issue of incident handling (monitoring and traceability) belongs under which of the following categories of research?
A. data protection in large-scale systems
B. building trust in the cloud
C. large scale computer systems engineering
D. both A and C
A. data protection in large-scale systems
The issue of virtual private clouds belongs under which of the following categories of research?
A. data protection in large-scale systems
B. building trust in the cloud
C. large scale computer systems engineering
D. all of the above
B. building trust in the cloud
The issue of resilience in cloud computing belongs under which of the following categories of research?
A. data protection in large-scale systems
B. building trust in the cloud
C. large scale computer systems engineering
D. both B and C
C. large scale computer systems engineering
In general, security measures are: A. cheaper on a smaller scale. B. more expensive on a larger scale. C. cheaper on a larger scale. D. not dependent on the scale.
C. cheaper on a larger scale.
Benefits of scale include all of the following, EXCEPT: A. timeliness of response to incidents B. ease of implementation C. threat management D. multiple locations
B. ease of implementation
Which of the following statements is NOT true?
A. Security is a priority concern for many cloud customers.
B. Large cloud providers are able to offer a standardized, open interface.
C. Security of a service is an important market differentiator.
D. Most cloud customers make choices solely on the basis of the reputation of confidentiality of the services.
D. Most cloud customers make choices solely on the basis of the reputation of confidentiality of the services.
Which of the following statements is NOT true?
A. When using virtualization, forensic analysis may require more down-time.
B. Cloud computing can provide more economical storage for audit logs.
C. Cloud computing may allow for more comprehensive logging.
D. Cloud providers can relocate resources for filtering, authentication and encryption.
A. When using virtualization, forensic analysis may require more down-time.
In which of the following service models can customers take snapshots of virtual infrastructure on a regular basis, to compare with a baseline? A. software as a service B. platform as a service C. infrastructure as a service D. both A and C
C. infrastructure as a service
The 2009 ENISA (European Network and Information Security Agency) Report identifies:
A. three top security risks
B. five top security risks
C. eight top security risks
D. ten top security risks
C. eight top security risks
Which of the following is NOT a top security risk identified in the 2009 ENISA (European Network and Information Security Agency) Report? A. malicious insider B. lifecycle disruption C. loss of governance D. isolation failure
B. lifecycle disruption
. Which of the following is NOT a top security risk identified in the 2009 ENISA (European Network and Information Security Agency) Report? A. lock-in B. compliance risks C. management interface compromise D. patch failure
D. patch failure
Cloud computing architectures generally have all of the following characteristics, EXCEPT:
A. “service on demand” (i.e. pay-as-you-go system)
B. highly abstracted resources
C. delayed scalability and flexibility
D. programmatic management
C. delayed scalability and flexibility