Formative 7 Flashcards

1
Q

Which method of virtualization requires an application on the host machine to create multiple VMs?

Hardware virtualization

Hosted virtualization

Software virtualization

Server virtualization

A

Hosted Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which option is required to support a virtual desktop infrastructure?

High availability network access

Solid state drives (SSDs) to store applications and data locally

Powerful computers with multiple CPUs and 16 GB RAM or more

Big high-resolution monitors to display all applications

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What situation describes VM sprawl?

It occurs when compromised VM servers are used to create additional nefarious VM instances.

It occurs when VM serrvers use fewer resources and space than allocated.

It occurs when the virtual machine breaks out and interacts with the host operating system.

It occurs when too many underutilized VM servers use up more resources and space than needed.

A

It occurs when too many underutilized VM servers use up more resources and space than needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cloud computing service model reduces infrastructure costs but provides an organization less control over its data?

Hybrid Cloud

Community Cloud

Private Cloud

Public Cloud

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of application can improve productivity but also create secuity gaps ad blind spots?

Management Apps

Un-Sanctioned Apps

Santioned Apps

Productivity Apps

A

Un-Sanctioned Apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Traditional infrastructure security measures rely on control of physical communication paths and the insertion of security appliances. Why does this not work in cloud computing?

lack of direct access to phyiscal network infrastructure.

lack of layered network infrastructure

lack of virtual security appliance

lack of subnet option when assigning network resources to a VM instance

A

lack of direct access to physical network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which cloud model gives the cloud client the exclusive control of identity management?

SaaS

IaaS

Paas

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which security measure should be implemented when establishing links between a public cloud and on-premises data centers?

site-to-site VPN

access with SSH protocol

access with HTTP enabled

remote access VPN

A

site-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Measures data consistency by taking a snapshot at an instant in time to ensure it remains unchanged -

Stores data securely for future requests while you are browsing a website -

Checks that data falls within predefined parameters to ensure the completeness, accuracy and consistency of data -

Digitally validates that software code has not changed and is authentic -

Piece them together

Code Signing

Secure Cookies

Integrity Checks

Validation Rules

A

Measures data consistency by taking a snapshot at an instant in time to ensure it remains unchanged
(Integrity Checks)

Stores data securely for future requests while you are browsing a website
(Secure Cookies)

Checks that data falls within predefined parameters to ensure the completeness, accuracy and consistency of data
(Validation Rules)

Digitally validates that software code has not changed and is authentic
(Code Signing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two has algorithms?

MD5

ECC

SHA

RC4

RSA

A

MD5 and SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two asymmetric encryption algorithms? (Choose two.)

ECC

AES

SHA

RSA

A

ECC and RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which state of data refers to data during initial input, modification, computation, or output.

Data at transit

Data at progress

Data at process

Data at rest

A

Data at process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which algorithm is used in symmetric encryption operation?

RSA

Diffie-Hellman

AES

SHA

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two classes of encryption algorithms? (Choose two.)

symmetric

open

advanced

asymmetric

classic

A

symmetric

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term is used to describe the phenomenon of more VMs than can be managed effectively?

VM Scaling

VM Exhaustion

VM Escape

VM Sprawl

A

VM Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cloud security domain covers the challenges of delivering, measuring, and communicating compliances when organizations migrate from traditional data centers to the cloud?

Infrastructure Security

Management Plane and Business
Continuity

Information
Governance

Compliance and Audit Management

A

Compliance and Audit Management

17
Q

A company is deploying a product ordering system on a public cloud. The company IT specialist is working on security measures to protect the cloud resources. What are two possible negative impacts that should be considered when deploying a virtual firewall and an IPS appliance? (Choose two.)

Compatibility with VM operating systems

Routing issues associated withh virtual security appliances.

Traffic Bottleneck

Possible VM escape attacks

Processor Overloading

A

Traffic Bottleneck

Processor Overloading

18
Q

What should be deployed to protect traffic confidentiality between a public cloud and a private cloud?

Proxy Device

IPS

VPN

Firewall

19
Q

In which type of environment would a developer run software to verify that required security settings are met prior to production deployment?

Sanbox Environment

Development Environment

Production Environment

Staging Environment

A

Staging Environment

20
Q

Which state of data refers to data moving between the CPU and the hard drive of a server?

Data in Storage

Data in Porcess

Data in Transit

Data at Reset

A

Data in Transit

21
Q

Which technology is used to verify the integrity of files to ensure they were not modified in transit?

asymmetric encrpytion

checksum

secure cookies

normalization

22
Q

Which threat type describes the case when cloud computing resources are set up incorrectly?

inside threat

cloud misconfiguration

data breaches

poor cloud security architecture strategy

A

cloud misconfiguration

23
Q

What term is used to refer to readable data in the context of the data encryption process?

ciphertext

cleantext

opentext

plaintext

24
Q

Which key component of virtualization allows for running multiple independent operating systems on one physical computing system?

VDI

hypervisor

VM container

A

hypervisor