Securing Virtualized, Distributed, and Shared Computing Flashcards

1
Q

When working with VLANs, you may need to pass traffic from multiple VLANs through one switch port. In such situations, security is imperative. Which of the following technologies allows you to accomplish this? A. VTPM
B. Sandboxing
C. Trunking
D. Proxies

A

C. A trunking port is one that is designed to share traffic from multiple VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is not a benefit of cloud computing? 
A. Greater mobility 
B. Reduced expenditures 
C. Increased productivity 
D. Increased data privacy
A

D. Although cloud computing offers many benefits, privacy is not one of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is not an example of an information security framework? 
A. SABSA 
B. IAEFE 
C. SOMF 
D. RFC
A

D. A request for comment (RFC) is a memorandum published by the Internet Engineering Task Force (IETF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following cloud-based solutions allows the user to rent physical infrastructure? 
A. MaaS 
B. IaaS 
C. SaaS 
D. PaaS
A

B. IaaS describes a cloud solution where you are buying infrastructure. You purchase virtual power to execute your software as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which type of cloud attack results in the service becoming so busy responding to illegitimate requests that it can prevent authorized users from having access? 
A. Man-in-the-middle attack 
B. Authentication attack 
C. DoS 
D. Data extraction
A

C. A denial-of-service attack seeks to disrupt service. When your cloud service becomes so busy responding to illegitimate requests, it can prevent authorized users from having access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is a centralized desktop solution that uses servers to serve up a desktop operating system to a host system? 
A. OND 
B. VDI 
C. LUN 
D. iSCSI
A

B. Virtual desktop infrastructure (VDI) is a centralized desktop solution that uses servers to serve up a desktop operating system to a host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A hypervisor is also known as which of the following? 
A. OND 
B. VDI 
C. VMM 
D. LUN
A

C. The hypervisor is also known as a virtual machine monitor (VMM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ provides the ability to have trust in the data and that it is right and correct. 
A. Authentication 
B. Identification 
C. Confidentiality 
D. Integrity
A

D. Integrity is considered one of the basic principles of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which cloud-based service would handle all phases of the SDLC process? 
A. MaaS 
B. IaaS 
C. SaaS 
D. PaaS
A

D. PaaS provides a platform for your use. Services provided by this model include all phases of the system development life cycle (SDLC) and can use application programming interfaces (APIs), website portals, or gateway software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following describes the sentence, “We reserve the right to review all books and records of the cloud provider as they may relate to the performance of this Agreement at any time”? 
A. SLA 
B. Right to audit 
C. DR 
D. BCP
A

B. The right-to-audit provisions of a cloud service contract include the right to have full access to records of the cloud provider relating to the cloud provider’s operations for items such as data protection and disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What type of virtualization technique is used to coordinate instructions to the CPU? 
A. Type 1 
B. Type 2 
C. Type 3 
D. Type 4
A

A. A type 1 hypervisor is used to coordinate instructions to the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Spanning Tree Protocol (STP) is used for what? 
A. To suppress multicast traffic 
B. To bridge SAN traffic 
C. To implement the 802.1q standard 
D. To prevent network loops
A

D. STP is used to prevent network loops and build active paths, and to provide for backup paths should an active path or link fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ has an advantage over FCoE because it can run on existing IP networks. 
A. iSCSI 
B. HBA 
C. vSAN 
D. HBA
A

A. iSCSI is a SAN standard used for connecting data storage facilities and allowing remote SCSI devices to communicate. Many see it as a replacement for Fibre Channel, because it does not require any special infrastructure and can run over existing IP LAN, MAN, or WAN networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following storage techniques uses a masking process used to provide availability to some hosts and restrict availability to other hosts? 
A. HBA 
B. vSAN 
C. LUN 
D. NAS
A

C. LUN masking is an authorization process that makes a LUN available to some hosts and unavailable to other hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which storage technology makes use of protocols such as NFS, SMB, or CIFS? 
A. NAS 
B. DAS 
C. SAN 
D. iSCSI
A

A. NAS provides connectivity via network file sharing protocols such as NFS, SMB, or CIFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which storage technology appears to the client OS as a local disk or volume that is available to be formatted and used locally as needed? 
A. NAS 
B. WAN 
C. SAN 
D. DAS
A

C. A SAN appears to the client OS as a local disk or volume that is available to be formatted and used locally as needed.

17
Q
When discussing VLAN tagging, 802.1q is an example of a \_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. Virtual server protocol 
B. Wireless protocol 
C. Trunking protocol 
D. SAN protocol
A

C. A well-known example of the trunking protocols is the 802.1q standard.

18
Q
The architecture for virtualization that does not include an underlying host operating system is called \_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. Type 1 
B. VMM 
C. Type 2 
D. Hypervisor
A

A. Type 1 hypervisor systems do not need an underlying OS.

19
Q

Which cloud-based solution is designed for watching over networks, servers, and applications? A. MaaS
B. IaaS
C. SaaS
D. PaaS

A

A. MaaS offers a cloud-based solution to monitoring. This includes monitoring for networks, servers, applications, and remote systems management.

20
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ means that the information or service is accessible and that other unauthorized subjects should not have access. 
A. Availability 
B. Identification 
C. Confidentiality 
D. Integrity
A

A. Availability means that the information or service is available to those with access and that other unauthorized subjects should not be able to make those items unavailable.

21
Q
eFuse was created by \_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. NASA 
B. Microsoft 
C. Novell 
D. IBM
A

D. Created by IBM, eFuse is the technology that allows for etched computer logic to be reprogrammed in real-time.

22
Q
API stands for \_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. Application Performance Index 
B. Automated Peripherals Interconnect 
C. Application Programming Interface 
D. Archival Peripheral Imaging
A

C. API stands for application programming interface.