Cloud Security Essentials

Description: Cloud security essentials Information TechnologyIT Certificate Programs
Number of Questions: 15
Created by:
Tags: Cloud security essentials Information Technology IT Certificate Programs
Attempted 0/15 Correct 0 Score 0

Which of the following security techniques applied on database provides guarantee that only those who are authorized to access the data?

  1. Force.com

  2. Access control

  3. Output reconciliation control

  4. Input validation control

  5. Transport level encryption


Correct Option: B
Explanation:

This security technique applied on database provides guarantee that only those who are authorized can access the data.

Which of the following security mechanisms is used to protect against outside attacks launched against the data centre?

  1. Virtual machine technology

  2. Input validation control

  3. Web application firewall

  4. Access control list

  5. Transport level encryption


Correct Option: C
Explanation:

This security mechanism is used to protect against outside attacks launched against the data centre.

Which of the following security mechanisms, when applied on data, is used to protect against known or unknown vulnerabilities in the operating system?

  1. Hardening of the server

  2. Access control list

  3. Transport level encryption

  4. Output reconciliation control

  5. Client server computing


Correct Option: A
Explanation:

This security mechanism applied on data is used to protect against known or unknown vulnerabilities in the operating system.

Which of the following security techniques applied on the database is used to make certain that data is operated accurately in structured files?

  1. File control

  2. Output reconciliation control

  3. Input validation control

  4. Transport level encryption

  5. Virtual machine technology


Correct Option: A
Explanation:

This security technique applied on the database is used to make certain that data is operated accurately in structured files.

Which of the following databases is high performance document-centric database released by 10 Gen?

  1. Corporate level SLA

  2. Sify my storage

  3. Wuala

  4. Mango DB v.1.8.0

  5. CouchDB


Correct Option: D
Explanation:

This database is high performance document-centric database released by 10 Gen.

Which of the following frameworks is a patented software framework introduced by Google to support distributed computing on large sets of data?

  1. Force.com

  2. LucidDB

  3. MapReduce

  4. Apache hadoop

  5. Wuala


Correct Option: C
Explanation:

This framework is a patented software framework introduced by Google to support distributed computing on large sets of data.

Which of the following security mechanisms applied on the data is used to protect against unauthorized access at the data center?

  1. Payroll

  2. Storage encryption

  3. Access control list

  4. Transport level security

  5. Encryption


Correct Option: B
Explanation:

This security mechanism applied on the data is used to protect against unauthorized access at the data center.

Which of the following storage as the service is online storage and its component is also one part of Microsoft latest venture into cloud computing?

  1. Peer-to-peer computing

  2. Sales force

  3. CouchDB

  4. Wuala

  5. Live mesh


Correct Option: E
Explanation:

This storage as a service is online storage and its component is only one part of Microsoft latest venture into cloud computing.

Which of the following storage services is a cloud-based file synchronization and storage device?

  1. Collaborative computing

  2. Sify my storage

  3. CouchDB

  4. Zumo

  5. Wuala


Correct Option: D
Explanation:

This storage as a service is a cloud-based file synchronization and storage service.

The most central and well-known of which of the following services is Amazon EC2 resizable compute capacity?

  1. Payroll

  2. Service based SLA

  3. Force.com

  4. Platform-as-a service

  5. Amazon web service


Correct Option: E
Explanation:

The most central and well-known of this service is Amazon EC2 for resizable compute capacity.

Which of the following security techniques applied on the database is used to ensure that data cannot be changed without proper agreement?

  1. Virtual machine technology

  2. Access control list

  3. Change management control

  4. Output reconciliation control

  5. Input validation control


Correct Option: C
Explanation:

This security technique is used to ensure that data cannot be changed without proper agreement.

Which of the following security mechanisms applied on the data is used to protect against illegal physical access to data?

  1. Sales force

  2. Physical security

  3. Transport level security

  4. Encryption

  5. Output reconciliation control


Correct Option: B
Explanation:

This security mechanism applied on the data is used to protect against illegal physical access to data.

Which of the following technologies is a general term for anything that involves delivering hosted serves over the internet?

  1. Cloud computing

  2. Peer-to-peer computing

  3. Collaborative computing

  4. Platform-as-a service

  5. Force.com


Correct Option: A
Explanation:

This technology is a general term for anything that involves delivering hosted serves over the internet.

Which of the following levels of SLA is an agreement with an individual customer group, covering all the services?

  1. Payroll

  2. Customer base SLA

  3. Serviced base SLA

  4. Corporate level SLA

  5. Platform-as-a service


Correct Option: B
Explanation:

This level is an agreement with an individual customer group, covering all the services.

Which of the following data stores is used to processing of moving data that is no longer actively used to a separate data storage device for long term retention?

  1. Data archival

  2. LucidDB

  3. CouchDB

  4. Sify my storage

  5. Client server computing


Correct Option: A
Explanation:

This data store is used to processing of moving data that is no longer actively used to a separate data storage device for long term retention.

- Hide questions