Managing Cloud Security D320 Book Assessment Test & Answers
1. What type of solutions enable enterprises or individuals to store data and
h h h h h h h h h h h
computer files on the Internet using a storage service provider rather than
h h h h h h h h h h h h
keeping the data locally on a physical disk such as a hard drive or tape
h h h h h h h h h h h h h h h
backup?
h
A. Online backups h
B. Cloud backup solutions h h
C. Removable hard drives h h
D. Masking:B.Cloud backup solutions h h h h
2. When using an infrastructure as a service (IaaS) solution,which of the
h h h h h h h h h h h
following is not an essential benefit for the customer?
h h h h h h h h h
A. Removing the need to maintain a license library h h h h h h h
B. Metered service h
C. Energy and cooling efficiencies h h h
D. Transfer of ownership cost:A.Removing the need to maintain a license library
h h h h h h h h h h h h
3. focusesonsecurityandencryptiontopreventunau- h h h h h h h
thorized copying and limitations on distribution to only those who pay.
h h h h h h h h h h h
A. Information rights management (IRM) h h h
B. Masking
C. Bit splitting
h
D. Degaussing: A.Information rights management (IRM) h h h h h
4. Which of the following represents the correct set of four cloud deployment
h h h h h h h h h h h
models?
h
A. Public, private, joint,and community h h h h
B. Public, private,hybrid, and community h h h h
C. Public,Internet,hybrid, and community h h h h
D. External,private,hybrid,and community:B.Public, private, hybrid, and com-
h h h h h h h h h h
munity
h
5. What is a special mathematical code that allows encryption hardware/soft-
h h h h h h h h h
ware to encrypt and then decipher a message?
h h h h h h h h
A. PKI
B. Key
C. Public-private
D. Masking:B.Key h h
6. WhichofthefollowingliststhecorrectsixcomponentsoftheSTRIDE threat
h h h h h h h h h h h h
model?
h
A. Spoofing,tampering,repudiation,informationdisclosure,denialofservice,
h h h h h h h
and elevation of privilege
h h h h
, B. Spoofing,tampering,refutation,information disclosure,denial of service,
h h h h h h h
and social engineering elasticity
h h h h
1. What type of solutions enable enterprises or individuals to store data and
h h h h h h h h h h h
computer files on the Internet using a storage service provider rather than
h h h h h h h h h h h h
keeping the data locally on a physical disk such as a hard drive or tape
h h h h h h h h h h h h h h h
backup?
h
A. Online backups h
B. Cloud backup solutions h h
C. Removable hard drives h h
D. Masking:B.Cloud backup solutions h h h h
2. When using an infrastructure as a service (IaaS) solution,which of the
h h h h h h h h h h h
following is not an essential benefit for the customer?
h h h h h h h h h
A. Removing the need to maintain a license library h h h h h h h
B. Metered service h
C. Energy and cooling efficiencies h h h
D. Transfer of ownership cost:A.Removing the need to maintain a license library
h h h h h h h h h h h h
3. focusesonsecurityandencryptiontopreventunau- h h h h h h h
thorized copying and limitations on distribution to only those who pay.
h h h h h h h h h h h
A. Information rights management (IRM) h h h
B. Masking
C. Bit splitting
h
D. Degaussing: A.Information rights management (IRM) h h h h h
4. Which of the following represents the correct set of four cloud deployment
h h h h h h h h h h h
models?
h
A. Public, private, joint,and community h h h h
B. Public, private,hybrid, and community h h h h
C. Public,Internet,hybrid, and community h h h h
D. External,private,hybrid,and community:B.Public, private, hybrid, and com-
h h h h h h h h h h
munity
h
5. What is a special mathematical code that allows encryption hardware/soft-
h h h h h h h h h
ware to encrypt and then decipher a message?
h h h h h h h h
A. PKI
B. Key
C. Public-private
D. Masking:B.Key h h
6. WhichofthefollowingliststhecorrectsixcomponentsoftheSTRIDE threat
h h h h h h h h h h h h
model?
h
A. Spoofing,tampering,repudiation,informationdisclosure,denialofservice,
h h h h h h h
and elevation of privilege
h h h h
, B. Spoofing,tampering,refutation,information disclosure,denial of service,
h h h h h h h
and social engineering elasticity
h h h h