Quiz 12 Flashcards

1
Q

Which of the following are examples of cloud computing service models?

Business as a Service

Software as a Service

Utility as a Service

Infrastructure as a Service

A

Software as a Service

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A service model which makes it possible for customers to rent virtual machines in the cloud is known as:

Software as a service

Utility as a service

Platform as a service

Infrastructure as a service

A

Infrastructure as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some of the resources that can be provisioned on demand for customers in the cloud environment includes

Network

Memory

Storage

Laptop

A

Network

Memory

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A load balancing technique where servers are selected one by one without any consideration to serve incoming requests is known as

Low latency

Least connections

Weighted round robin

Round robin

A

Round robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual machines can be migrated from one host to another in a cloud environment

False

True

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following cryptographic schemes can protect against spoofing

Hashing

Asymmetric encryption

Digital signature

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alice would like to digitally sign a message to be sent to Bob. What key should she use?

Alice’s private key

Alice’s public key

Bob’s public key

Bob’s private key

A

Alice’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bob received a digitally signed message from Alice. What key should he use to verify the message?

Bob’s public key

Alice’s private key

Bob’s private key

Alice’s public key

A

Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bob would like to encrypt a message to be sent to Alice. What key should he use?

Bob’s public key

Alice’s public key

Alice’s private key

Bob’s private key

A

Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Man-in-the-middle attack can be alleviated by using:

Hashing

Public key

Certificate

Digital signature

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly