100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

MANAGING CLOUD SECURITY PRACTICE EXAM QUESTIONS AND ANSWERS GRADED A+

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
05-01-2026
Written in
2025/2026

MANAGING CLOUD SECURITY PRACTICE EXAM QUESTIONS AND ANSWERS GRADED A+

Institution
Managing Cloud Security
Course
Managing Cloud Security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Managing Cloud Security
Course
Managing Cloud Security

Document information

Uploaded on
January 5, 2026
Number of pages
24
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MANAGING CLOUD SECURITY PRACTICE EXAM QUESTIONS
AND ANSWERS GRADED A+
✔✔A broad and developing concept addressing the management of the various network
components. The objective is to provide a control plane to manage network traffic on a
more abstract level than through direct management of network components. -
✔✔Software-Defined Networking (SDN)

✔✔Includes day-to-day basis laws such as speed limits, state tax laws, the criminal
code, and so on, which are enacted by a state legislature as opposed to those enacted
at the national or federal level. - ✔✔State law

✔✔SAST testing is useful in finding such security problems as cross-site scripting
(XSS) errors, SQL injection vulnerabilities, buffer overflows, unhandled error conditions,
and backdoors. This type of test usually delivers more results and more accuracy than
its counterpart dynamic application security testing (DAST). - ✔✔Static Application
Security Testing (SAST)

✔✔The collection of multiple distributed and connected resources responsible for
storing and managing data online in the cloud. - ✔✔Storage Cloud

✔✔Derived from an acronym for the following six threat categories: spoofing identity,
tampering with data, repudiation, information disclosure, denial of service (DoS), and
elevation of privilege. - ✔✔STRIDE Threat Model

✔✔Reduces the likelihood of unauthorized users gaining access and restricts
authorized users to permitted activities. - ✔✔Strong authentication

✔✔Describes how the participants would perform their tasks in a given BC/DR scenario.
- ✔✔Tabletop testing

✔✔A methodology and a set of tools that enable security architects, enterprise
architects, and risk management professionals to leverage a common set of solutions
that fulfill their common needs to be able to assess where their internal IT and their
cloud providers are in terms of security capabilities. Allows them to plan a roadmap to
meet the security needs of their business. - ✔✔TCI Reference Architecture

✔✔A cloud provider who manages the administration of a user's system and who is not
under the user's control. - ✔✔Third-party admin

✔✔The process of replacing sensitive data with unique identification symbols that retain
all the essential information about the data without compromising its security. -
✔✔Tokenization

,✔✔Refers to the body of rights, obligations, and remedies that set out reliefs for
persons who have been harmed by others. - ✔✔Tort law

✔✔Protects the esteem and goodwill that an organization has built among the
marketplace, especially in public perception. - ✔✔Trademark

✔✔A risk management strategy that involves the contractual shifting of a risk from one
organization to another. - ✔✔Transference

✔✔Ensures the privacy of communication between applications. - ✔✔Transport Layer
Security (TLS)

✔✔Highlights where a customer may be unable to leave, migrate, or transfer to an
alternate provider due to technical or nontechnical constraints.

Occurs in a situation where a customer may be unable to leave, migrate, or transfer to
an alternate provider due to technical or non-technical constraints. - ✔✔Vendor Lock-In

✔✔The optimization of cloud computing and cloud services for a particular vertical
(such as a specific industry) or specific-use application. - ✔✔Vertical Cloud Computing

✔✔A VMI helps to mitigate risk and ensure that a virtual machine's (VM's) security
baseline is not modified over time. It provides an agentless method to examine all
aspects of a VM from its physical location and its network settings to the installed
operating systems (OSs), patches, applications, and services being used. - ✔✔Virtual
Machine Introspection (VMI)

✔✔Creates a secure tunnel across untrusted networks that can aid in obviating man-in-
the-middle attacks such as eavesdropping. - ✔✔Virtual private network

✔✔A process of creating a virtual version of something, including virtual computer
hardware platforms, operating systems, storage devices, and computer network
resources. - ✔✔Virtualization

✔✔Enable cloud computing to become a real and scalable service offering due to the
savings, sharing, and allocation of resources across multiple tenants and environments.
- ✔✔Virtualization Technologies

✔✔Encrypts only a part of a hard drive instead of the entire disk. - ✔✔Volume
encryption

, ✔✔Allocates a storage space within the cloud and this storage space is represented as
an attached drive to the user's virtual machine. - ✔✔Volume storage

✔✔An appliance, server plug-in, or filter that applies a set of rules to a hypertext
transfer protocol (HTTP) conversation. Generally, these rules cover common attacks
such as cross-site scripting (XSS) and SQL injections. - ✔✔Web Application Firewall
(WAF)

✔✔Which of the following standards sets out terms and definitions, principles, a
framework, and a process for managing risk?

A ISO 31000:2009
B ISO 28000:2007
C ISO 27001:2013
D ISO/IEC 27037:2012 - ✔✔A

✔✔Which of the following are the virtualization risks?

Each correct answer represents a complete solution. Choose three.

1) Guest breakout
2) Resource exhaustion
3) Sprawl
4) Isolation control failure
5) Snapshot and image security

A 2,4,5
B 1,3,5 - ✔✔B

✔✔Which category does Rapid Provisioning and Scalability fall into?

A PaaS
B IaaS
C SaaS
D XaaS - ✔✔A

✔✔Kim works as a project manager in ABC Inc. His organization requires an application
to launch its products. For this, Kim performs the following activities:

-Discusses business requirements in terms of confidentiality, integrity, and availability
-Determines, creates, and identifies information to transmit or store
-Determines privacy requirements

Which of the following phases of SDLC includes the activities performed by Kim?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BOARDWALK Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
182
Member since
1 year
Number of followers
7
Documents
24136
Last sold
5 days ago
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.7

33 reviews

5
14
4
6
3
7
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions