chapter4 Flashcards
Within a hybrid deployment model, infrastructure is located:
A. on-premise
B. off-premise
C. either on-premise OR off-premise
D. both on-premise AND off-premise
D. both on-premise AND off-premise
Within a community deployment model, infrastructure is located:
A. on-premise
B. off-premise
C. either on-premise OR off-premise
D. both on-premise AND off-premise
C. either on-premise OR off-premise
Within a private deployment model, infrastructure is located:
A. on-premise
B. off-premise
C. either on-premise OR off-premise
D. both on-premise AND off-premise
C. either on-premise OR off-premise
Within a public deployment model, infrastructure is located:
A. on-premise
B. off-premise
C. either on-premise OR off-premise
D. both on-premise AND off-premise
B. off-premise
Within a public deployment model, infrastructure is owned by:
A. a third party provider
B. the organization itself
C. either the organization OR a third party provider
D. both the organization AND the third party provider
A. a third party provider
Within a community deployment model, infrastructure that is managed by the organization. but located off-premise is owned by:
A. a third party provider
B. the organization itself
C. either the organization OR a third party provider
D. both the organization AND the third party provider
C. either the organization OR a third party provider
Within a private deployment model, infrastructure that is managed by a third party provider, but located on-premise is owned by:
A. a third party provider
B. the organization itself
C. either the organization OR a third party provider
D. both the organization AND the third party provider
C. either the organization OR a third party provider
Within a hybrid deployment model, infrastructure is owned by:
A. a third party provider
B. the organization itself
C. either the organization OR a third party provider
D. both the organization AND the third party provider
D. both the organization AND the third party provider
The Cloud Cube Model was developed by:
A. the Cloud Security Alliance
B. OpenCrowd Cloud Solutions
C. the Jericho Forum
D. GoGrid
C. the Jericho Forum
The Cloud Cube Model illustrates:
A. physical location of resources
B. deployment models
C. management and ownership
D. all of the above
D. all of the above
The Cloud Cube Model is useful for comparing:
A. two criteria/dimensions
B. three criteria/dimensions
C. four criteria/dimensions
D. five or more criteria/dimensions
C. four criteria/dimensions
When considering compliance with accepted frameworks and standards, one should consider (in order):
A. cloud service classification; security architecture; cloud architecture
B. cloud service classification; cloud architecture; security architecture.
C. compliance architecture; cloud architecture; cloud service classification
D. security architecture; compliance architecture; cloud architecture
B. cloud service classification; cloud architecture; security architecture
According to the CSA’s (Cloud Security Alliance’s) risk assessment framework, risks may be:
A. accepted
B. transferred
C. mitigated
D. all of the above
D. all of the above
With respect to an organization’s security posture, controls implemented in the facilities would be classified as:
A. physical security
B. network security
C. system security
D. application security
A. physical security
. With respect to an organization's security posture, controls implemented in the IT systems would be classified as: A. physical security B. network security C. system security D. application security
C. system security
16. Regarding Amazon's AWS EC2 service, the consumer is responsible for security controls relating to all of the following, EXCEPT: A. the operating system B. the data C. the virtualization security D. the applications
C. the virtualization security
Regarding Amazon's AWS EC2 service, the vendor is responsible for all of the following security controls, EXCEPT: A. data security controls B. virtualization security controls C. physical security controls D. environmental security controls
A. data security controls
Regarding salesforce.com’s CRM SaaS (software as a service) offering, the consumer is responsible for:
A. data security controls
B. physical security controls
C. environmental security controls
D. none of the above
D. none of the above
Which of the following statements is TRUE regarding service models and security?
A. At midpoint in the stack, the cloud service vendor and the consumer are equally responsible for security.
B. The lower down the stack the cloud provider stops, the more the vendor must be responsible for security.
C. The lower down the stack the cloud provider stops, the more the consumer must be responsible for security.
D. Both A and C are true.
C. The lower down the stack the cloud provider stops, the more the consumer must be responsible for security.
The Cloud Security Alliance (CSA) Guidance is divided into a number of domains for cloud computing concern. In total, there are:
A. five domains
B. six domains
C. ten domains
D. twelve domains
D. twelve domains
According to the Cloud Security Alliance (CSA) Guidance, the domains of concern are divided into two broad categories:
A. policy and practice
B. governance and oversight
C. operations and governance
D. oversight and compliance
C. operations and governance
According to the Cloud Security Alliance (CSA) Guidance, all of the following domains fall under the category of governance, EXCEPT: A. portability and interoperability B. compliance and audit C. legal and electronic discovery D. encryption and key management
D. encryption and key management
According to the Cloud Security Alliance (CSA) Guidance, the domain of virtualization would
fall under which of the following categories?
A. governance
B. policy
C. operations
D. oversight
C. operations
According to the Cloud Security Alliance (CSA) Guidance, all of the following domains fall under the category of operations, EXCEPT:
A. data center operations
B. identity and access management
C. enterprise risk management
D. incident response
C. enterprise risk management