Review 14 Flashcards

(15 cards)

1
Q

Which cloud security tool offers end to end security and continuous assessment?

Question options:

Qualys Cloud Perform

BlazeMeter

LoadStorm

Nexpose

A

Qualys Cloud Perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During which cloud computing attack does the hacker trick a user with an active computer session into visiting a malicious website?

Question options:

Service hijacking through network sniffing

Wrapping attack

Session hijacking through session riding

Domain snipping

A

Session hijacking through session riding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During which cloud computing attack is the attacker’s intent to discover and then use sensitive data such as passwords, session cookies, and other security configurations such as UDDI, SOAP, and WSDL?

Question options:

Session hijacking through session riding

Wrapping attack

Service hijacking through network sniffing

Domain snipping

A

Service hijacking through network sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cloud security control layer involves all administrative tasks to promote continued, uninterrupted, and effective services?

Question options:

Management

Information

Trusted Computing

Application

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which cloud security control layer involves putting in place policies that comply with industry standards such as Open Worldwide Application Security Project (OWASP)?

Question options:

Trusted Computing

Management

Information

Application

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT a way that cloud computing service providers reduce the risk of security breaches?

Question options:

Provide a way to reliably authenticate all users who access the service and allow users to access only the applications and data that they need.

Verify, test, and apply updates to the infrastructure.

Probe for security holes with a third-party service provider.

Disseminate each organization’s centrally stored data.

A

Disseminate each organization’s centrally stored data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following cloud security controls makes the system more difficult to attack and, therefore, decreases attacks?

Question options:

Corrective

Preventive

Detective

Deterrent

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which cloud service model features non-multi-tenancy?

Question options:

Hybrid

Private

Public

Community

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is NOT an advantage of Cloud Computing?

Question options:

Self-service provisioning of resources

Conformity

Metering of services

Ease of use

A

Conformity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which cloud service allows for easier onboarding, offboarding?

Question options:

Desktop as a Service (DaaS)

Infrastructure as a Service (IaaS)

Software as a Service (SaaS)

Platform as a Service (PaaS)

A

Desktop as a Service (DaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which cloud service is by far the most used model?

Question options:

Infrastructure as a Service (IaaS)

Desktop as a Service (DaaS)

Software as a Service (SaaS)

Platform as a Service (PaaS)

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

During which cloud computing attack does the hacker trick a user with an active computer session into visiting a malicious website?

Question options:

Domain snipping

Service hijacking through network sniffing

Session hijacking through session riding

Wrapping attack

A

Session hijacking through session riding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The internet of things is a natural extension of __________.

Question options:

Cloud computing

Real-time networks

Trusted computing

SCADA

A

SCADA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which cloud service is an integral part of cloud DevOps?

Question options:

Desktop as a Service (DaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

Infrastructure as a Service (IaaS)

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which cloud service is similar to hardware on premises?

Question options:

Software as a Service (SaaS)

Platform as a Service (PaaS)

Desktop as a Service (DaaS)

Infrastructure as a Service (IaaS)

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly