Lesson 15: Implementing Secure Cloud Solutions Flashcards

1
Q

Analyze and select the accurate statements about threats associated with virtualization. (Select all that apply.)

A. Virtualizing switches and routers with hypervisors make virtualization more secure.

B. VM escaping occurs as a result of malware jumping from one guest OS to another.

C. A timing attack occurs by sending multiple usernames to an authentication server to measure the server response times.

D. VMs providing front-end, middleware, and back-end servers should remain together to reduce security implications of a VM escaping attack on a host located in the DMZ.

A

B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When provisioning application services in network architecture, an engineer uses a microservices approach as a solution. Which principle best fits the engineer’s implementation?

A. Components working together to perform a workflow
B. Being closely mapped to business workflows
C. The performing of a sequence of automated tasks
D. Each program or tool should do one thing well

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company has recently started using a Platform as a Service (PaaS). Compare cloud service types to determine what is being deployed.

A. The company has leased servers and a Storage Area Network (SAN).

B. The company has leased a suite of applications that were outside of the budget to purchase outright.

C. The company has outsourced the responsibility for information assurance.

D. The company has leased an instance that runs Microsoft Azure SQL Database.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A developer considers using an API for service integration and automation. If choosing Representational State Transfer (REST) as the API, which features can the developer expect? (Select all that apply.)

A. The ability to submit a request as an HTTP operation/verb

B. It is a looser architectural framework

C. It uses XML format messaging

D. It has built-in error handling

A

A,B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems administrator deploys a cloud access security broker (CASB) solution for user access to cloud services. Evaluate the options and determine which solution may be configured at the network edge and without modifying a user’s system.

A. Single sign-on

B. Application programming interface

C. Forward proxy

D. Reverse proxy

A

D

A reverse proxy (positioned at the cloud network edge) directs traffic to cloud services if the contents of that traffic comply with policy. This does not require configuration of users’ devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization plans a move of systems to the cloud. In order to identify and assign areas of risk, which solution does the organization establish to contractually specify cloud service provider responsibilities?

A. Service level agreement

B. Trust relationship

C. Responsibilities matrix

D. High availability

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An engineer uses an abstract model that represents network functionality. Using infrastructure as code to deploy and manage a network, how does the engineer make control decisions?

A. By managing compatible physical appliances

B. By prioritizing and securing traffic

C. By monitoring traffic conditions

D. By using security access controls

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security team suspects the unauthorized use of an application programming interface (API) to a private web-based service. Which metrics do the team analyze and compare to a baseline for response times and usage rates, while investigating suspected DDoS attacks? (Select all that apply.)

A. Number of requests

B. Error rates

C. Latency

D. Endpoint connections

A

A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A startup designs a new online service and uses a serverless approach for some business functions. With this approach, how does the startup perform these functions? (Select all that apply.)

A. Virtual machines

B. Containers

C. Single service

D. Orchestration

A

B,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A large sales organization uses a cloud solution to store large amounts of data. One afternoon, the data becomes inaccessible due to an outage at a data center. Which replication service level is currently in use?

A. Regional

B. Local

C. Geo-redundant

D. Zone

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A systems administrator configures several subnets within a virtual private cloud (VPC). The VPC has an Internet gateway attached to it, however, the subnets remain private. What does the administrator do to make the subnets accessible by the public?

A. Configure any VPC endpoints.

B. Create a VPN between VPCs.

C. Configure a default route for each subnet.

D. Create a VPC for each subnet.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security professional is looking to harden systems at an industrial facility. In particular, the security specialist needs to secure an HVAC system that is part of an IoT network. Which areas does the specialist look to secure from data exfiltration exploits? (Select all that apply.)

A. Edge devices

B. Data center

C. Fog node

D. Edge gateway

A

C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company conducts file sharing via a hosted private cloud deployment model. Which scenario accurately depicts this type of file sharing?

A. A cloud hosted by a third party for the exclusive use of the organization.

B. A cloud hosted by a third party and shared with other subscribers.

C. A cloud that is completely private to and owned by the company that utilizes it.

D. A cloud where several organizations share the costs of a cloud in order to pool resources for a common concern.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What actions are typically recommended when securing virtualized and cloud-based resources? (Select all that apply.)

A. Ensure virtual machines are logging all events for auditing.

B. Enforce the principle of most privilege for access to VMs.

C. Ensure software and hosts are patched regularly.

D. Configure devices to support isolated communications.

A

C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has many employees that work from home. The employees obtain data and post data to a shared file they access through a link on the Internet. Consider the types of virtualization and conclude which the company is most likely utilizing.

A. Rapid elasticity

B. Measured service

C. Cloud computing

D. Resource pooling

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly