Formative 7 Flashcards
Which method of virtualization requires an application on the host machine to create multiple VMs?
Hardware virtualization
Hosted virtualization
Software virtualization
Server virtualization
Hosted Virtualization
Which option is required to support a virtual desktop infrastructure?
High availability network access
Solid state drives (SSDs) to store applications and data locally
Powerful computers with multiple CPUs and 16 GB RAM or more
Big high-resolution monitors to display all applications
High Availability
What situation describes VM sprawl?
It occurs when compromised VM servers are used to create additional nefarious VM instances.
It occurs when VM serrvers use fewer resources and space than allocated.
It occurs when the virtual machine breaks out and interacts with the host operating system.
It occurs when too many underutilized VM servers use up more resources and space than needed.
It occurs when too many underutilized VM servers use up more resources and space than needed.
Which cloud computing service model reduces infrastructure costs but provides an organization less control over its data?
Hybrid Cloud
Community Cloud
Private Cloud
Public Cloud
Public Cloud
Which type of application can improve productivity but also create secuity gaps ad blind spots?
Management Apps
Un-Sanctioned Apps
Santioned Apps
Productivity Apps
Un-Sanctioned Apps
Traditional infrastructure security measures rely on control of physical communication paths and the insertion of security appliances. Why does this not work in cloud computing?
lack of direct access to phyiscal network infrastructure.
lack of layered network infrastructure
lack of virtual security appliance
lack of subnet option when assigning network resources to a VM instance
lack of direct access to physical network infrastructure.
Which cloud model gives the cloud client the exclusive control of identity management?
SaaS
IaaS
Paas
IaaS
Which security measure should be implemented when establishing links between a public cloud and on-premises data centers?
site-to-site VPN
access with SSH protocol
access with HTTP enabled
remote access VPN
site-to-site VPN
Measures data consistency by taking a snapshot at an instant in time to ensure it remains unchanged -
Stores data securely for future requests while you are browsing a website -
Checks that data falls within predefined parameters to ensure the completeness, accuracy and consistency of data -
Digitally validates that software code has not changed and is authentic -
Piece them together
Code Signing
Secure Cookies
Integrity Checks
Validation Rules
Measures data consistency by taking a snapshot at an instant in time to ensure it remains unchanged
(Integrity Checks)
Stores data securely for future requests while you are browsing a website
(Secure Cookies)
Checks that data falls within predefined parameters to ensure the completeness, accuracy and consistency of data
(Validation Rules)
Digitally validates that software code has not changed and is authentic
(Code Signing)
What are two has algorithms?
MD5
ECC
SHA
RC4
RSA
MD5 and SHA
What are two asymmetric encryption algorithms? (Choose two.)
ECC
AES
SHA
RSA
ECC and RSA
Which state of data refers to data during initial input, modification, computation, or output.
Data at transit
Data at progress
Data at process
Data at rest
Data at process
Which algorithm is used in symmetric encryption operation?
RSA
Diffie-Hellman
AES
SHA
AES
What are two classes of encryption algorithms? (Choose two.)
symmetric
open
advanced
asymmetric
classic
symmetric
asymmetric
What term is used to describe the phenomenon of more VMs than can be managed effectively?
VM Scaling
VM Exhaustion
VM Escape
VM Sprawl
VM Sprawl
Which cloud security domain covers the challenges of delivering, measuring, and communicating compliances when organizations migrate from traditional data centers to the cloud?
Infrastructure Security
Management Plane and Business
Continuity
Information
Governance
Compliance and Audit Management
Compliance and Audit Management
A company is deploying a product ordering system on a public cloud. The company IT specialist is working on security measures to protect the cloud resources. What are two possible negative impacts that should be considered when deploying a virtual firewall and an IPS appliance? (Choose two.)
Compatibility with VM operating systems
Routing issues associated withh virtual security appliances.
Traffic Bottleneck
Possible VM escape attacks
Processor Overloading
Traffic Bottleneck
Processor Overloading
What should be deployed to protect traffic confidentiality between a public cloud and a private cloud?
Proxy Device
IPS
VPN
Firewall
VPN
In which type of environment would a developer run software to verify that required security settings are met prior to production deployment?
Sanbox Environment
Development Environment
Production Environment
Staging Environment
Staging Environment
Which state of data refers to data moving between the CPU and the hard drive of a server?
Data in Storage
Data in Porcess
Data in Transit
Data at Reset
Data in Transit
Which technology is used to verify the integrity of files to ensure they were not modified in transit?
asymmetric encrpytion
checksum
secure cookies
normalization
checksum
Which threat type describes the case when cloud computing resources are set up incorrectly?
inside threat
cloud misconfiguration
data breaches
poor cloud security architecture strategy
cloud misconfiguration
What term is used to refer to readable data in the context of the data encryption process?
ciphertext
cleantext
opentext
plaintext
plaintext
Which key component of virtualization allows for running multiple independent operating systems on one physical computing system?
VDI
hypervisor
VM container
hypervisor