Podcast
Questions and Answers
Kevin discovered that his web server was being overwhelmed by traffic, causing a CPU bottleneck. Using the interface offered by his cloud service provider, he added another CPU to the server. What term best describes Kevin's action?
Kevin discovered that his web server was being overwhelmed by traffic, causing a CPU bottleneck. Using the interface offered by his cloud service provider, he added another CPU to the server. What term best describes Kevin's action?
- Elasticity
- Horizontal scaling
- Vertical scaling (correct)
- High availability
Fran's organization uses a Type I hypervisor to implement an IaaS offering that it sells to customers. Which one of the following security controls is least applicable to this environment?
Fran's organization uses a Type I hypervisor to implement an IaaS offering that it sells to customers. Which one of the following security controls is least applicable to this environment?
- Customers must maintain security patches on guest operating systems.
- The provider must maintain security patches on the hypervisor.
- The provider must maintain security patches on the host operating system. (correct)
- Customers must manage security groups to mediate network access to guest operating systems.
In what cloud security model does the cloud service provider bear the most responsibility for implementing security controls?
In what cloud security model does the cloud service provider bear the most responsibility for implementing security controls?
- IaaS
- FaaS
- PaaS
- SaaS (correct)
Greg would like to find a reference document that describes how to map cloud security controls to different regulatory standards. What document would best assist with this task?
Greg would like to find a reference document that describes how to map cloud security controls to different regulatory standards. What document would best assist with this task?
Wanda is responsible for a series of seismic sensors placed at remote locations. These sensors have low-bandwidth connections, and she would like to place computing power on the sensors to allow them to preprocess data before it is sent back to the cloud. What term best describes this approach?
Wanda is responsible for a series of seismic sensors placed at remote locations. These sensors have low-bandwidth connections, and she would like to place computing power on the sensors to allow them to preprocess data before it is sent back to the cloud. What term best describes this approach?
Which one of the following statements about cloud computing is incorrect?
Which one of the following statements about cloud computing is incorrect?
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service?
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service?
Which cloud computing deployment model requires the use of a unifying technology platform to tie together components from different providers?
Which cloud computing deployment model requires the use of a unifying technology platform to tie together components from different providers?
Which one of the following would not commonly be available as an IaaS service offering?
Which one of the following would not commonly be available as an IaaS service offering?
Which one of the following is not an example of infrastructure as code?
Which one of the following is not an example of infrastructure as code?
Brian is selecting a CASB for his organization, and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?
Brian is selecting a CASB for his organization, and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?
In which of the following cloud categories are customers typically charged based on the number of virtual server instances dedicated to their use?
In which of the following cloud categories are customers typically charged based on the number of virtual server instances dedicated to their use?
Brian would like to limit the ability of users inside his organization to provision expensive cloud server instances without permission. What type of control would best help him achieve this goal?
Brian would like to limit the ability of users inside his organization to provision expensive cloud server instances without permission. What type of control would best help him achieve this goal?
Ursula would like to link the networks in her on-premises datacenter with cloud VPCs in a secure manner. What technology would help her best achieve this goal?
Ursula would like to link the networks in her on-premises datacenter with cloud VPCs in a secure manner. What technology would help her best achieve this goal?
What component of a virtualization platform is primarily responsible for preventing VM escape attacks?
What component of a virtualization platform is primarily responsible for preventing VM escape attacks?
Ryan is selecting a new security control to meet his organization's objectives. He would like to use it in their multicloud environment and would like to minimize the administrative work required from his fellow technologists. What approach would best meet his needs?
Ryan is selecting a new security control to meet his organization's objectives. He would like to use it in their multicloud environment and would like to minimize the administrative work required from his fellow technologists. What approach would best meet his needs?
Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs?
Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs?
Howard is assessing the legal risks to his organization based on its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment?
Howard is assessing the legal risks to his organization based on its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment?
Brenda's company provides a managed incident response service to its customers. What term best describes this type of service offering?
Brenda's company provides a managed incident response service to its customers. What term best describes this type of service offering?
Tony purchases virtual machines from Microsoft Azure exclusively for use by his organization. What model of cloud computing is this?
Tony purchases virtual machines from Microsoft Azure exclusively for use by his organization. What model of cloud computing is this?
Flashcards
Vertical Scaling
Vertical Scaling
Adding more resources (like CPU) to an existing server.
Hypervisor (Type I)
Hypervisor (Type I)
Software that creates and runs virtual machines (VMs).
SaaS Security Responsibility
SaaS Security Responsibility
Provider handles the most security; you use the software.
CSA CCM
CSA CCM
Signup and view all the flashcards
Edge Computing
Edge Computing
Signup and view all the flashcards
Cloud Provisioning
Cloud Provisioning
Signup and view all the flashcards
SaaS
SaaS
Signup and view all the flashcards
Hybrid Cloud
Hybrid Cloud
Signup and view all the flashcards
Not an IaaS service
Not an IaaS service
Signup and view all the flashcards
Infrastructure as Code (IAC)
Infrastructure as Code (IAC)
Signup and view all the flashcards
Comprehensive CASB
Comprehensive CASB
Signup and view all the flashcards
Charged by Virtual Server Instances
Charged by Virtual Server Instances
Signup and view all the flashcards
Resource Policy
Resource Policy
Signup and view all the flashcards
Transit Gateway
Transit Gateway
Signup and view all the flashcards
Hypervisor
Hypervisor
Signup and view all the flashcards
Third-Party Control
Third-Party Control
Signup and view all the flashcards
CASB
CASB
Signup and view all the flashcards
Handling PII Internationally
Handling PII Internationally
Signup and view all the flashcards
MSSP
MSSP
Signup and view all the flashcards
Public Cloud
Public Cloud
Signup and view all the flashcards