Cloud Security Flashcards

1
Q

Used to validate the identity and to control access and permissions for cloud resources

A

IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Concerned with protections around storing and transferring data, which generally includes cryptography

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Involves protection of network traffic from the VM level all the way to the network permitter of the CSP

A

network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Involves the protection of hypervisors, vms and operating systems

A

compute based security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

provides protections for various types of app implementations and includes microservices, serverless and apis

A

app security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

policy sets the standards for monitoring auditing and incident response

A

Security monitoring and policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the components of IAM

A

identity, authentication, multi factor authentication, authorization, privileged identity management PIM, access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the components of data security

A

data at rest
data in transit/motion
cryptography and key management
remote backups
data and media sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the components of network security

A

VPC virtual private cloud
network perimeter (like load balancer)
virtual switches
virtual firewalls
network security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Components of compute based security

A

compute resources
hypervisors
virtual machines
operating system
middleware and runtime
inventory management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Components of app security

A

standard apps
microservices
containers
serverless
APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly