Central Washington University Week 6 Science Cloud Provider Practice Quiz

User Generated

Gpnzel

Science

Central Washington University

Description

Unformatted Attachment Preview

1) With ______, all hardware, software, and other supporting infrastructure are owned and managed by the cloud provider. A. Private Cloud B. Hybrid cloud C. Public cloud D. Community cloud 2) This is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure allowing the organization to extend the reach of the security policies beyond their own infrastructure. A. Cloud Access Security Broker (CASB) B. Web application Firewall (WAF) C. DNS Server D. Intrusion Detection System (IDS) 3) This defines the process of granting permission to a user or object to perform or obtain something? A. Authentication B. Access Control Restrictions C. Auditing D. Authorization 4) This access control model permits the user to decide how to protects the information level of sharing. A. Role-based Access Control B. Discretionary Access Control C. Mandatory Access Control D. Attribute-based Access Control 5) This defines the process used by a system to verify the identity of a user, process, or service before granting access. A. Authentication B. Naone of the listed choices are correct C. Authorization D. Auditing 6) What is the most difficult aspect of security in a virtualized environment? A. VM sprawl B. Securing the hardware C. Data confidentiality D. Lack of visibility into the virtual network 7) ______ is an integrity control. A. None of the listed choices are correct B. Hashing C. Public Key infrastructure D. Encryption 8) A ______ typically establishes a barrier between a trusted, secure Internal network and another outside network, such as the internet, that is assumed not to be secure or trusted. A. Firewall B. Edge Router C. Virtual private Network (VPN) D. Network Intrusion Detection system 9) What is the most important data security measure you can take for mobile devices? A. Use of a VPN B. Full hard drive encryption C. Data backup D. Two factor authentications 10) This is a mechanism to verify that a message came from the sender, providing nonrepudiation. A. Digital Signatures and Certificates B. Authentication C. Role-based Access Control D. Attribute-based Access Control 11) Which access control model provides access control based on the position or responsibility an individual fills within an organization? A. Role-based Access Control B. Attribute-based Access control C. Mandatory Access Control D. Discretionary Access Control 12) A cryptosystem is a suite of cryptographic algorithms needed to implement a security service, most commonly for achieving confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for decryption, one for encryption and one for: A. Nonrepudiation B. General ciphertext C. Digital Signatures and Certificates D. Key generation 13) Which access control model is the least restrictive model, popular in situations where resources owners need to allow access ad privileges OnDemand? A. Role-based Access Control B. Attribute-based Access Control C. Mandatory Access Control D. Discretionary Access Control 14) Which access control model is the most restrictive model typically used in defense or military organizations where data classification and confidentiality are of prime importance? A. Role-based Access control B. Discretionary Access control C. Mandatory Access control D. Attribute-based Access Control 15) Which of the following security controls is used to extend the network perimeter with the use of encapsulation and encryption? A. Web proxy B. Network Intrusion detection systems (NIDS) C. Virtual Private Network (VPN) D. Network Address translation (NAT) 16) VPNs operate at which layer of the OSI Model? A. Layer 3: Network Layer B. Layer 4: Translation Layer C. Layer 2: Data-like layer D. Layer 5: Session layer 17) Of the following, which is least important for a CISO to be knowledgeable in? A. Digital forensics B. Network Security Controls C. Security Standards D. Networking Protocols 18) You are analyzing a packet and see that it was being routed using a media access control (MAC) address. AT which layer of the OSI model was the packet captured? A. Network layer B. Trasport layer C. Data-link layer D. Session layer
Purchase answer to see full attachment
Explanation & Answer:
18 Questions Answers
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Thanks fam 😘🥰.

1) With ______, all hardware, software, and other supporting infrastructure are owned and managed by
the cloud provider.
A. Private Cloud
B. Hybrid cloud
C. Public cloud
D. Community cloud
2) This is a software tool or service that sits between an organization’s on-premises infrastructure and a
cloud provider’s infrastructure allowing the organization to extend the reach of the security policies
beyond their own infrastructure.
A. Cloud Access Security Broker (CASB)
B. Web application Firewall (WAF)
C. DNS Server
D. Intrusion Detection System (IDS)
3) This defines the process of granting permission to a user or object to perform or obtain something?
A. Authentication
B. Access Control Restrictions
C. Auditing
D. Authorization
4) This access control model permits the user to decide how to protects the informatio...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags