Chapter 4 Implementing Cloud Security Flashcards
The process of organizing information into different tiers or categories is referred to as ___ ___ ?
Data Classification
Dividing your cloud fleet of servers into smaller discrete areas for the purpose of applying a granular security policy is known as ___ ?
Segmentation
Data that is obfuscated on a RAID 5 storage is ___ ___ encryption.
At rest
Multifactor authentication includes something you ___ and something you ___.
know, have
Hands-off programmatically driven cloud configuration change is commonly referred to as ___.
Automation
___ allow for a defined machine-to-machine software interaction to enable automation.
API (application programming interface)
The ___ ___ ___ is a user-friendly front end interface to a service’s APIs.
Graphical User Interface
Network-based ___ ___ ___ take active security breach counter-measures.
Intrusion Prevention System
Cloud-based security places a load on a virtual machine’s ___?
CPU
Security ___ can allow code to replace many processes that had to be performed manually in the past
Automation
Robert has been asked to create a security implementation that segments his employer's e-commerce design to allow for policy enforcement. What are some of the the areas that he is investigating? (Choose three). A. Network B. Automation C. Storage D. Compute E. APIs F. JSON/XML
Network, Storage, Compute
Cloud segmentation is the process of dividing up your cloud deployment into sections that allow for granular security. Common segments include compute, network, and storage.
APIs, JSON, and XML are software constructs to enable automation.
MFA tokens can be obtained where? (Choose two) A. Python app B. Smartphone app C. Automation systems D. Keyfob E. Cloud vendor management dashboard
Smartphone app, Keyfob
One-time numerical tokens are generated on keyfob hardware devices and smartphone soft-token applications.
Hank just completed running some security automation scripts on his new fleet of application virtual machines. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his management dashboard? A. DMA B. BIOS C. CPU D. IPSec E. I/O
CPU
Applying security applications on a virtual server will cause an increase in CPU usage.
What technology was instrumental in the growth of cloud services? A. XML B. Python C. Automation D. Authentication E. Scripting F. workflow services G. Encryption
Automation
Automation of cloud deployments was instrumental in the growth of cloud-based services.
Carl is planning his cloud migration and must meet HIPPA requirements for confidential storage of cloud data at rest and in use in the cloud. What services must be addressed by Carl? (Choose two.) A. Virtual private network B. Storage C. Client-side D. Database
Storage, Database
Storage systems and database applications are both examples of data at rest or being processed in the cloud. While VPNs and client encryption are valid security systems, they are not associated with your internal cloud security posture.