Science Computer Science Computer Security and Reliability
How would you rate this set?
Cloud Computing Final Study Guide
Ireri_Nancy Teacher
Save
Stan is walking past a row of cubicles when he notice's
someone's password written down on a sticky note
attached to a monitor. The password is
passwordpassword3. Besides the obvious problem of
the word password repeated followed by a single
number, which of the following policies isn't in place
Complexity
that should be?
a. Re-use
b. Expiration
c. Length
d. Complexity
Blake has been examining the logs on one of the
servers that he is responsible for that is hosted on a
CSP. He finds an instance where one of the
employees has managed to give himself unauthorized
administrative access on the server. Which of the
Privilege escalation following has occurred?
a. Federation
b. SSO
c. Internal role change
d. Privilege escalation
Submit
, Fictional Corp has assigned each user within their
Active Directory implementation a username. This
How would youusername
rate isthis
a formset?
of:
Identity
a. Accounting
b. Authorization
c. Authentication
d. Identity
Fred is trying to access the company's cloud-based
CRM system while traveling abroad in Europe. He
receives a message that access to this application is
not allowed from the country he is currently in and
lists the IP address detected by his connection. Which
of the following factors of authentication is the CRM
Somewhere you are
system using?
a. Something you have
b. Something you do
c. Something you know
d. Somewhere you are
Steven has been tasked with planning the move from
an infrastructure where administrators and users add
permissions to resources individually to one where
users are assigned to groups based upon the
department they work in and what they do in the
department and then assigning the groups to the
RBAC resources. Which of the following has he been tasked
with planning?
a. JAC
b. DAC
c. MAC
d. RBAC
, Caroline is trying to access one of her company's
custom cloud-based web applications. She sees a
How would youbright
rate red this set?that there is a security
screen advising
problem with the site and that she should not trust its
contents. Which of the following most likely occurred
The site's digital certificate that an administrator should probably check first?
has expired
a. The site has been hacked
b. A disgruntled employee has taken the site down
c. The site's digital certificate has expired
d. The certificate authority has revoked the certificate
due to suspected fraud
Fictional Corp. is trying out a new experimental
technology that analyzes how users type as part of a
multifactor authentication implementation. Which of
the following categories of authentication factors
would this fall into?
Something you do
a. Something you are
b. Something you do
c. Something you know
d. Something you have
Sarah has deployed a private cloud infrastructure that
requires users to insert a smart card into their
computer or into their card reader in order to
authenticate them to use the applications. The smart
card is associated with a certificate for each user,
which is verified against a certificate authority. Which
PKI
of the following has she deployed?
a. PKI
b. PII
c. PCI DSS
d. PSK
How would you rate this set?
Cloud Computing Final Study Guide
Ireri_Nancy Teacher
Save
Stan is walking past a row of cubicles when he notice's
someone's password written down on a sticky note
attached to a monitor. The password is
passwordpassword3. Besides the obvious problem of
the word password repeated followed by a single
number, which of the following policies isn't in place
Complexity
that should be?
a. Re-use
b. Expiration
c. Length
d. Complexity
Blake has been examining the logs on one of the
servers that he is responsible for that is hosted on a
CSP. He finds an instance where one of the
employees has managed to give himself unauthorized
administrative access on the server. Which of the
Privilege escalation following has occurred?
a. Federation
b. SSO
c. Internal role change
d. Privilege escalation
Submit
, Fictional Corp has assigned each user within their
Active Directory implementation a username. This
How would youusername
rate isthis
a formset?
of:
Identity
a. Accounting
b. Authorization
c. Authentication
d. Identity
Fred is trying to access the company's cloud-based
CRM system while traveling abroad in Europe. He
receives a message that access to this application is
not allowed from the country he is currently in and
lists the IP address detected by his connection. Which
of the following factors of authentication is the CRM
Somewhere you are
system using?
a. Something you have
b. Something you do
c. Something you know
d. Somewhere you are
Steven has been tasked with planning the move from
an infrastructure where administrators and users add
permissions to resources individually to one where
users are assigned to groups based upon the
department they work in and what they do in the
department and then assigning the groups to the
RBAC resources. Which of the following has he been tasked
with planning?
a. JAC
b. DAC
c. MAC
d. RBAC
, Caroline is trying to access one of her company's
custom cloud-based web applications. She sees a
How would youbright
rate red this set?that there is a security
screen advising
problem with the site and that she should not trust its
contents. Which of the following most likely occurred
The site's digital certificate that an administrator should probably check first?
has expired
a. The site has been hacked
b. A disgruntled employee has taken the site down
c. The site's digital certificate has expired
d. The certificate authority has revoked the certificate
due to suspected fraud
Fictional Corp. is trying out a new experimental
technology that analyzes how users type as part of a
multifactor authentication implementation. Which of
the following categories of authentication factors
would this fall into?
Something you do
a. Something you are
b. Something you do
c. Something you know
d. Something you have
Sarah has deployed a private cloud infrastructure that
requires users to insert a smart card into their
computer or into their card reader in order to
authenticate them to use the applications. The smart
card is associated with a certificate for each user,
which is verified against a certificate authority. Which
PKI
of the following has she deployed?
a. PKI
b. PII
c. PCI DSS
d. PSK