Cloud Computing Flashcards

1
Q

Types of cloud computing services

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Characteristics of cloud computing

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Separation of responsibilities include

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud deployment models

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST space cloud deployment reference architecture

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtualisation

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List important cloud computing threats

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing insufficient due diligence

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud computing share technology issues

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud computing unknown risk profile

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Doubt computing and synchronised system clocks

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How computing in adequate infrastructure design and planning

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud computing conflicts between client hardening procedures and cloud environment

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Loss of operational and security locks

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious insiders

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud computing threats list them

A

A

17
Q

I am 10 cloud computing attacks

A

-

18
Q

Service hijacking using social engineering attacks

A

-

19
Q

Service hijacking using network sniffing

A

-

20
Q

Mission hijacking using XSS attack

A

-

21
Q

Fashion hijacking using session riding

A

-

22
Q

DNS attacks

A

-

23
Q

Side channel or cross guest VM breaches

A

-

24
Q

Well ingestion attacks

A

-

25
Q

Cryptanalysis attacks

A

-

26
Q

Wrapping attack

A

-

27
Q

Denial of service and distributed denial of service attacks

A

A

28
Q

Man in the cloud attack

A

-

29
Q

Cloud security control layers

A

-

30
Q

Cloud security is the responsibility of both cloud provider and consumer

A

-

31
Q

Placement of security controls in cloud

A

-

32
Q

It’s practises for securing cloud

A

-

33
Q

Important: NIST recommendations for cloud security

A

A

34
Q

Cloud security tools

A

A

35
Q

Cloud security pen testing

A

A