7.3.4 Check Your Understanding: Cloud Computing Security Measures

1. Which type of application can improve productivity but also create security gaps ad blind spots?

  • Sanctioned apps
  • productivity apps
  • un-Sanctioned apps
  • management apps

Explanation: Un-sanctioned apps can be used to improve employee productivity but can also create security gaps and blind spots.

2. Traditional infrastructure security measures rely on control of physical communication paths and the insertion of security appliances. Why does this not work in cloud computing?

  • lack of virtual security appliances
  • lack of subnet option when assigning network resources to a VM instance
  • lack of layered network infrastructure
  • lack of direct access to physical network infrastructure

Explanation: Traditional infrastructure security measures based on the control of physical communication paths and insertion of security appliances does not work in cloud computing because cloud customers do not have direct access to the physical network infrastructure.

3. Which cloud model gives the cloud client the exclusive control of identity management?

  • laaS
  • PaaS
  • SaaS

Explanation: In the IaaS model, the cloud client is fully responsible for identity management in accessing cloud services.

4. Which security measure should be implemented when establishing links between a public cloud and on-premises data centers?

  • acess with HTTP enabled
  • acess with SSH protocol
  • remote acess VPN
  • site-to-site VPN

Explanation: Site-to-site VPN connections should be used in multi-cloud scenarios, or connections between a cloud and on-premises data centers.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments