A) different types of cloud computing service models provide different levels of security services
B) adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C) data should be transferred and stored in an encrypted format for security purpose
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) request message
B) response message
C) both request and response
D) neither request nor response
Correct Answer
verified
Multiple Choice
A) support of different cloud types
B) creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C) performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) accounting
B) non-repudiation
C) sniffing
D) authorisation
Correct Answer
verified
Multiple Choice
A) dmtf
B) dms
C) ebs
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) integrity
B) availability
C) confidentiality
D) accounting
Correct Answer
verified
Multiple Choice
A) you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B) any distributed application has a much greater attack surface than an application that is closely held on a local area network
C) cloud computing doesn't have vulnerabilities associated with internet applications
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) cce
B) occi
C) smi
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) multi-tenancy
B) identity and access management
C) virtualization
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) google reader
B) yahoo mail
C) emailrackspace
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) google reader
B) bloglines
C) newsgator online
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) different types of cloud computing service models provide different levels of security services
B) adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C) data should be transferred and stored in an encrypted format for security purpose
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) atomicity
B) consistency
C) isolation
D) durability
Correct Answer
verified
Multiple Choice
A) online control
B) direct control
C) supervisory control
D) automatic control
Correct Answer
verified
Multiple Choice
A) pci-dss
B) hippa
C) glba
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) vmware hyperic
B) webmetrics
C) univa ud
D) tapinsystems
Correct Answer
verified
Multiple Choice
A) control layer
B) transport layer
C) service layer
D) application layer
Correct Answer
verified
Multiple Choice
A) auditing
B) data integrity
C) e-discovery for legal compliance
D) all of the mentioned
Correct Answer
verified
Multiple Choice
A) internet applications
B) device applications
C) wireless applications
D) wired applications
Correct Answer
verified
Multiple Choice
A) cas
B) csa
C) sac
D) all of the mentioned
Correct Answer
verified
Showing 1 - 20 of 75
Related Exams