Cloud Computing Flashcards

1
Q

Types of cloud computing services

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Characteristics of cloud computing

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Separation of responsibilities include

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud deployment models

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST space cloud deployment reference architecture

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtualisation

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List important cloud computing threats

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing insufficient due diligence

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud computing share technology issues

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud computing unknown risk profile

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Doubt computing and synchronised system clocks

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How computing in adequate infrastructure design and planning

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud computing conflicts between client hardening procedures and cloud environment

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Loss of operational and security locks

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious insiders

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud computing threats list them

17
Q

I am 10 cloud computing attacks

18
Q

Service hijacking using social engineering attacks

19
Q

Service hijacking using network sniffing

20
Q

Mission hijacking using XSS attack

21
Q

Fashion hijacking using session riding

22
Q

DNS attacks

23
Q

Side channel or cross guest VM breaches

24
Q

Well ingestion attacks

25
Q

Cryptanalysis attacks

26
Q

Wrapping attack

27
Q

Denial of service and distributed denial of service attacks

28
Q

Man in the cloud attack

29
Q

Cloud security control layers

30
Q

Cloud security is the responsibility of both cloud provider and consumer

31
Q

Placement of security controls in cloud

32
Q

It’s practises for securing cloud

33
Q

Important: NIST recommendations for cloud security

34
Q

Cloud security tools

35
Q

Cloud security pen testing