Section 13 Cloud Security Flashcards

1
Q

A way of offering on demand services that extend the traditional capabilities.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allows a cloud provider to offer a full desktop operating.

A

Virtual Desktop Infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A service provider makes resources available to the end users over the internet.

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company creates its own cloud environment that only it can utilize as an internal enterprise resource.

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A mixed computing, storage, and services, environment made up on premises infrastructure, private cloud services, and public cloud services.

A

Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Resources and costs are shared among several different organizations who have common service needs.

A

Community Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides all the hardware, operating system, software, and applications needed for a complete service to be delivered.

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides all hardware, operating system, and backened software needed in order to develop your own software or service.

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides your organization with the hardware and software needed for a specific service to operate.

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provides your organization with various types of security services without the need to maintain a cybersecurity staff.

A

Secuirty as a Service (SECaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Utilizes separate virtual networks to allow security professionals to test suspicious or malicious files.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Servers are used to store, transfer, migrate, synchronize, and archive files for your organization.

A

File Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A specialized type of file server that is used to host files for distribution across the web.

A

FTP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A server that acts as a central repository of all the user accounts and their associated passwords for the network.

A

Domain Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A private network segment made available to a single cloud consumer within a public cloud.

A

Virtual Private Cloud (VPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise management software designed to mediate access to cloud services by users across all types of devices.

A

Cloud Access Security Broker (CASB)

17
Q

A security appliance or host positioned at the client network edge that forwards user traffic to the cloud network if the contents of that traffic comply with policy.

A

Forward Proxy

18
Q

An appliance positioned at the cloud network edge and directs traffics to cloud services if the contents of that traffic comply with policy.

A

Reverse Proxy

19
Q

A method that uses the broker’s connections between the cloud service and the cloud consumer.

A

Application Programming Interface (API)

20
Q

A tool to transfer data from or to a server, using, one of the supported protocols (HTTP, HTTPS, FTP, FTPS, SCP, SFTP, TFTP, DICT, TELNET, LDAP, FILE)

A

Curl

21
Q

A cloud service model that supports serverless software architecture by provisioning runtime containers in which code is executed in an particular programming language.

A

Function as a Service (FaaS)

22
Q

A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.

A

Serverless

23
Q
  1. Insecure API
  2. Improper Key Management
  3. Logging and Monitoring
  4. Unprotected Storage
A

Key Cloud Threats

24
Q

A content delivery network policy that instructs the browser to treat requests from nominated domains as safe.

A

Cross Origin Resource Sharing (CORS) Policy