Virtualisation 4.2 - aspects of virtualisation Flashcards

1
Q

Which system of cloud security should you implement to ensure that only the appropriate users are allowed to perform actions on the stored data and access the applications?

A

Authorisation = is based on the user’s role, and the access provided is limited to specific cloud resources that are relevant to the user’s sphere of work. Authorization also extends to actual devices, such as servers, storage arrays, or applications, that are allowed access to databases.
ACL = access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication will/will not

A

Will = correctly validating the identity of the user or host requesting access (e.g. login, biometrics, etc)
Not = control users’ permission to access cloud resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Applying the latest software patches is essential to cover known …

A

security threats inside the operating system (OS) or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly