Cybersecurity Management II - Tactical - C795 SOBs (QUESTION WELL SOLVED TO PASS)
____________ subjects are granted only the privileges necessary to perform assigned work tasks and no more. Keep in mind that privilege in this context includes both permissions to data and rights to perform tasks on systems. The principle of least privilege states that ____________ ensures that no single person has total control over a critical function or system. This is necessary to ensure that no single person can compromise the system or its security. Separation of duties and responsibilities 00:02 01:23 ___________is similar in concept to separation of duties and responsibilities. A separation-of-privilege policy requires the use of granular rights and permissions. Separation of privilege ____________ is known as management of changes made to the system's hardware, software, or firmware throughout its operational life cycle. Configuration management ____________ ............ they run as guest operating systems on physical servers. The physical servers include extra processing power, memory, and disk storage to handle the VM requirements. 1. Virtual Machines (VMs): __________ is sometimes called a virtual desktop environment (VDE), hosts a user's desktop as a VM on a server. Users can connect to the server to access their desktop from almost any system, including from mobile devices. Persistent virtual desktops retain a custom desktop for the user. Nonpersistent virtual desktops are identical for all users. If a user makes changes, the desktop reverts to a known state after the user logs off. 1. Virtual Desktop Infrastructure (VDI): _____________.....they decouple the control plane from the data plane (or forwarding plane). The control plane uses protocols to decide where to send traffic, and the data plane includes rules that decide whether traffic will be forwarded. Instead of traditional networking equipment such as routers and switches, an SDN controller handles traffic routing using simpler network devices that accept instructions from the controller. This eliminates some of the complexity related to traditional networking protocols. 1. Software-Defined Networks (SDNs): _____________A SAN is a dedicated high-speed network that hosts multiple storage devices. They are often used with servers that need high-speed access to data. These have historically been expensive due to the complex hardware requirements of the SAN. VSANs bypass these complexities with virtualization. 1. Virtual Storage Area Networks (VSANs): ________________ models provide fully functional applications typically accessible via a web browser. For example, Google's Gmail is a SaaS application. The CSP (Google in this example) is responsible for all maintenance of the SaaS services. Consumers do not manage or control any of the cloud-based assets. 1. Software as a service (SaaS): Software as a service (SaaS) ________________ models provide consumers with a computing platform, including hardware, an operating system, and applications. In some cases, consumers install the applications from a list of choices provided by the CSP. Consumers manage their applications and possibly some configuration settings on the host. However, the CSP is responsible for maintenance of the host and the underlying cloud infrastructure. 1. Platform as a service (PaaS): Platform as a service (PaaS) ______________ models provide basic computing resources to consumers. This includes servers, storage, and in some cases, networking resources. Consumers install operating systems and applications and perform all required maintenance on the operating systems and applications. The CSP maintains the cloud-based infrastructure, ensuring that consumers have access to leased systems. The distinction between IaaS and PaaS models isn't always clear when evaluating public services. However, when leasing cloud-based services, the label the CSP uses isn't as important as clearly understanding who is responsible for performing different maintenance and security actions. 1. Infrastructure as a service (IaaS): Infrastructure as a service (IaaS)
Written for
- Institution
- WGU C795
- Course
- WGU C795
Document information
- Uploaded on
- September 13, 2022
- Number of pages
- 15
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cybersecurity management ii tactical c795 sobs question well solved to pass
Document also available in package deal