chapter 9 Flashcards

1
Q
The "ability to run multiple operating systems on a single physical system and share the underlying hardware resources" is referred to as:
A. cloud computing
B. grid computing
C. agile computing
D. virtualization
E. all of the above
A

D. virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a characteristic of virtualization?
A. single OS image per machine
B. hardware-independence of operating system and applications
C. inflexible, costly infrastructure
D. software and hardware are tightly coupled
E. running multiple applications on the same machine often creates conflict

A

B. hardware-independence of operating system and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following layers can be virtualized?
A. hardware-level virutalization
B. operating system-level vituralization
C. high-level language virtual machines
D. both A and B only
E. all of the above
A

E. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are characteristics of a hosted architecture?
A. service console for agents and helper applications
B. installs and runs as an application
C. relies on host OS for device support and physical resource management
D. lean virtualization-centric kernet
E. both B and C

A

E. both B and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
The dynamic mapping of resources to a business/organization is referred to as:
A. aggregated resources
B. computer resources
C. virtual infrastructure
D. infrastructure
E. service infrastructure
A

C. virtual infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A “representation of a real machine using software that provides an operating environment which can
run/host a guest operating system” is known as a(n):
A. operating system
B. virtualized environment
C. virtual infrastructure
D. virtual machine
E. hypervisor

A

D. virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A "thin layer of software that provides virtual partitioning capabilities which runs directly on hardware
and underneath higher-level virtualization services" is
known as a(n):
A. hosted virtual machine
B. virtual machine
C. hosted infrastructure
D. para-virtual machine
E. hypervisor
A

E. hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
In enterprise data centers, servers can have utilization rates as low as:
A. less than 5%
B. between 5 to 15%
C. 20%
D. 25%
E. between 25 to 35%
A

B. between 5 to 15%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary threat to virtualized systems?
A. Loss of separation of duties for network and security controls.
B. Remote exploitation by malware.
C. Lack of visibility and controls.
D. Insufficient separation on the physical server.
E. Insecure virtualization layers compromise all hosted workloads.

A

B. Remote exploitation by malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following are limitations to a virtual-security-appliance solution?
A. only IDS/IPS protection from attacks
B. non-transparency
C. mobility
D. inter-VM traffic
E. B, C and D only
A

E. B, C and D only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to Trend Micro, an integrated approach to virtualization security involves ___ aspects.

A. three
B. four
C. five
D. six
E. ten
A

D. six

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
According to Trend Micro, an integrated approach to virtualization security involves all of the following
aspects, EXCEPT:
A. software licensing models
B. intrusion detection
C. multiple virtualization architectures
D. risk auditing
E. enterprise management
A

D. risk auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Host-based intrusion detection and prevention includes all of the following, EXCEPT:
A. network traffic analysis and filtering
B. log analysis
C. management scalability
D. network configuration and monitoring
E. code analysis

A

C. management scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The CSA (Cloud Security Alliance) concentrates on which form of virtualization?
A. operating system virtualization
B. hypervisored virtualization
C. presentation virtualization
D. application virutalization
E. virtual machine virtualization
A

A. operating system virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following are examples of operating system virtualization?
A. Virtual Iron
B. Citrix Presentation Server
C. Virtuozzo
D. VMware
E. Microsoft SoftGrid
A

C. Virtuozzo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two primary goals of virtualization?
A. abstraction and economic advantages
B. application isolation and hardware utilization
C. machine virtualization and hypervisor access
D. application integration and hardware elimination
E. user interaction and application hosting

A

B. application isolation and hardware utilization

17
Q
An identity management model that "distributes various individual components of  an identity operation amongst different actors" is known as:
A. assessment
B. authorization
C. federation
D. authentication
E. establishment
A

C. federation

18
Q
Which of the following is the primary underlying mechanism of federation?
A. security tokens
B. private keys
C. public keys
D. identity passes
E. policy boundaries
A

A. security tokens

19
Q

In an enterprise SSO (single sign-on) process, what happens after an employee is authenticated?
A. the employee is asked to create a password
B. the enterprise creates a security token that proves authentication
C. the employee defines the actions related to his/her job
D. the employee is issued an identity pass, which can be reused
E. both A and C

A

B. the enterprise creates a security token that proves authentication

20
Q
What is the default language with WS-Federation?
A. APML
B. CMRL
C. FicML
D. SAML
E. SCXML
A

D. SAML

21
Q
The acronym LDAP stands for:
A. Linked Domain Assessment Protocol
B. Locked Down Access Protocol
C. Leveraged Distinctions And Protocols
D. Layered Directions Assistance Protocol
E. Lightweight Directory Access Protocol
A

E. Lightweight Directory Access Protocol

22
Q
  1. In a cloud environment, federation of identity enables all of the following, EXCEPT:
    A. authentication of identity
    B. exchange of identity attributes between users
    C. provide single sign-on
    D. provide reduced sign-on
    E. both C and D
A

B. exchange of identity attributes between users

23
Q

“Provisioning” refers to:
A. the creation of identities
B. the updating of identities
C. the development of identities
D. the creation or updating of identitities
E. the creation, updating or development of identities

A

D. the creation or updating of identitities

24
Q
Provisioning can be referred to as:
A. user-provisioning
B. account-provisioning
C. service-provisioning
D. enterprise-provisioning
E. A, B and C
A

E. A, B and C

25
Q

What kind of provisioning is standardized in OASIS’ Service Provision Markup Language (SPML)?

A. Lateral provisioning
B. Transport provisioning
C. Push-style provisioning
D. Pull-style provisioning
E. Synchronized provisioning
A

C. Push-style provisioning