Module 34 - Cloud Security Flashcards
Which of the following can be outsourced to cloud service providers? (Choose two.) A. Sales B. Application platforms C. Training D. Software
B. D. Application platforms as well as software used within an organization can both be outsourced to cloud service providers.
Which of the following cloud services provides web application services for a business? A.Platform-as-a-Service B. Software-as-a-Service C. Infrastructure-as-a-Service D. Security-as-a-Service
A. Platform-as-a-Service is a cloud-based service that provides web application services for a business.
All of the following are usually provided under Software-as-a-Service, except. A. Desktop applications B. Line-of-business applications C. Group workflow applications D. Operating systems
D. Operating systems aren’t normally provided under Software-as-aService; they are usually provided as part of an Infrastructure-as-a-Service contract.
A server provisioned with an enterprise version of a Linux-based operating system would be an example of what kind of service? A. MDM-as-a-Service B. Software-as-a-Service C. Infrastructure-as-a-Service D. Platform-as-a-Service
C. A server provisioned with an enterprise version of a Linux-based operating system would be an example of Infrastructure-as-a-Service.
You are a security administrator in a company, and your boss wants you to set up a cloud exclusively for the use of the employees in the company. You intend to host this cloud infrastructure within the confines of the business premises. What type of cloud architecture model are you going to use? A. Private B. Community C. Hybrid D. Public
A. A private cloud is the most appropriate model for a cloud architecture designed exclusively for the use of the employees in the company, particularly one that is hosted within the confines of the business premises.
Which of the following would be a good example of a reason to use a community cloud model?
A. A military base needs to share information exclusively with other military agencies located in the same geographical location.
B. A university needs to share databases and applications with other similar educational institutions across the country.
C. A public awareness nonprofit needs to share information with everyone in the world regarding social issues.
D. A company needs to share only certain proprietary applications with another business partner, while keeping other data separate and confidential.
B. A university needing to share databases and applications with other similar educational institutions across the country could take advantage of a community cloud to share that information within the educational community.
Which of the following are advantages to using cloud services for a business? (Choose two.)
A. Control over data
B. Outsourcing responsibility and liability for services
C. Cost
D. Minimizing infrastructure
C, D. Cost and the opportunity to reduce or minimize infrastructure are two advantages to using cloud services.
Which of the following cannot be outsourced to a third-party cloud service provider? A. Methods for data protection B. Control over data storage C. Legal liability and responsibility D. Services the business provides
C. Although cloud providers have some legal obligations to the businesses they serve, ultimate legal liability and responsibility for data protection cannot be outsourced to a third-party cloud service provider.
All of the following are advantages to using virtualization technology within cloud computing, except.
A. Reduction of single points of failure in a redundant environment
B. Ease of backup and virtual machine replication to support availability
C. Elimination of the numbers of physical machines required to support
D. Increase in physical servers needed to support a business
D. Increasing the physical servers needed to support a business is not an advantage of using virtualization; in fact, the number of physical servers needed to support a business can be reduced by using virtualization.
Which of the following is the key difference in security controls used between cloud-based services and in-house services?
A. Contract agreements between the business and the provider
B. Encryption controls protecting data in transit
C. Data backups and redundant systems used to ensure availability
D. Strong authentication mechanisms used to ensure authorized access to data
A. Contract agreements between the business and the provider are the key difference between controls used in-house and those used with a third party cloud provider.