Securing Virtualized, Distributed, and Shared Computing Flashcards
When working with VLANs, you may need to pass traffic from multiple VLANs through one switch port. In such situations, security is imperative. Which of the following technologies allows you to accomplish this? A. VTPM
B. Sandboxing
C. Trunking
D. Proxies
C. A trunking port is one that is designed to share traffic from multiple VLANs.
Which of the following is not a benefit of cloud computing? A. Greater mobility B. Reduced expenditures C. Increased productivity D. Increased data privacy
D. Although cloud computing offers many benefits, privacy is not one of them.
Which of the following is not an example of an information security framework? A. SABSA B. IAEFE C. SOMF D. RFC
D. A request for comment (RFC) is a memorandum published by the Internet Engineering Task Force (IETF).
Which of the following cloud-based solutions allows the user to rent physical infrastructure? A. MaaS B. IaaS C. SaaS D. PaaS
B. IaaS describes a cloud solution where you are buying infrastructure. You purchase virtual power to execute your software as needed.
Which type of cloud attack results in the service becoming so busy responding to illegitimate requests that it can prevent authorized users from having access? A. Man-in-the-middle attack B. Authentication attack C. DoS D. Data extraction
C. A denial-of-service attack seeks to disrupt service. When your cloud service becomes so busy responding to illegitimate requests, it can prevent authorized users from having access.
Which of the following is a centralized desktop solution that uses servers to serve up a desktop operating system to a host system? A. OND B. VDI C. LUN D. iSCSI
B. Virtual desktop infrastructure (VDI) is a centralized desktop solution that uses servers to serve up a desktop operating system to a host system.
A hypervisor is also known as which of the following? A. OND B. VDI C. VMM D. LUN
C. The hypervisor is also known as a virtual machine monitor (VMM).
\_\_\_\_\_\_\_\_\_\_\_\_\_ provides the ability to have trust in the data and that it is right and correct. A. Authentication B. Identification C. Confidentiality D. Integrity
D. Integrity is considered one of the basic principles of security.
Which cloud-based service would handle all phases of the SDLC process? A. MaaS B. IaaS C. SaaS D. PaaS
D. PaaS provides a platform for your use. Services provided by this model include all phases of the system development life cycle (SDLC) and can use application programming interfaces (APIs), website portals, or gateway software.
Which of the following describes the sentence, “We reserve the right to review all books and records of the cloud provider as they may relate to the performance of this Agreement at any time”? A. SLA B. Right to audit C. DR D. BCP
B. The right-to-audit provisions of a cloud service contract include the right to have full access to records of the cloud provider relating to the cloud provider’s operations for items such as data protection and disaster recovery.
What type of virtualization technique is used to coordinate instructions to the CPU? A. Type 1 B. Type 2 C. Type 3 D. Type 4
A. A type 1 hypervisor is used to coordinate instructions to the CPU.
Spanning Tree Protocol (STP) is used for what? A. To suppress multicast traffic B. To bridge SAN traffic C. To implement the 802.1q standard D. To prevent network loops
D. STP is used to prevent network loops and build active paths, and to provide for backup paths should an active path or link fail.
\_\_\_\_\_\_\_\_\_\_\_\_\_ has an advantage over FCoE because it can run on existing IP networks. A. iSCSI B. HBA C. vSAN D. HBA
A. iSCSI is a SAN standard used for connecting data storage facilities and allowing remote SCSI devices to communicate. Many see it as a replacement for Fibre Channel, because it does not require any special infrastructure and can run over existing IP LAN, MAN, or WAN networks.
Which of the following storage techniques uses a masking process used to provide availability to some hosts and restrict availability to other hosts? A. HBA B. vSAN C. LUN D. NAS
C. LUN masking is an authorization process that makes a LUN available to some hosts and unavailable to other hosts.
Which storage technology makes use of protocols such as NFS, SMB, or CIFS? A. NAS B. DAS C. SAN D. iSCSI
A. NAS provides connectivity via network file sharing protocols such as NFS, SMB, or CIFS.