1.
Cloud Security refers to
Correct Answer
D. All of the above
Explanation
Cloud Security refers to a comprehensive approach that encompasses a broad set of policies, technologies, and deployment controls. It involves implementing various security measures to protect data, applications, and infrastructure in cloud environments. Policies define rules and guidelines for accessing and using cloud resources securely. Technologies include encryption, authentication, and access controls that safeguard data and prevent unauthorized access. Deployment controls involve configuring and managing cloud infrastructure to ensure security. Therefore, the correct answer is "All of the above" as cloud security encompasses all these aspects to provide a robust security framework for cloud environments.
2.
Cloud Security protects
Correct Answer
D. All of the above
Explanation
Cloud security is a comprehensive approach that aims to protect various aspects of cloud computing, including data, applications, and infrastructure. By implementing security measures, such as encryption, access controls, and monitoring, cloud providers ensure the confidentiality, integrity, and availability of their clients' data and applications. Additionally, they safeguard the underlying infrastructure from potential threats and vulnerabilities. Therefore, the correct answer is "All of the above" as cloud security covers all these aspects to provide a secure environment for cloud-based operations.
3.
Dimensions of Cloud Computing include
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." This means that all of the options listed - security and privacy, compliance, legal or contractual issues - are dimensions of cloud computing. Cloud computing involves considerations and challenges in these areas, such as ensuring the security and privacy of data stored in the cloud, complying with relevant regulations and standards, and addressing legal or contractual issues related to cloud services.
4.
_______ are responsible for keeping their applications up to date – and must therefore ensure they have a patch strategy (to ensure that their applications are screened from malware and hackers scanning for vulnerabilities that allow unauthorized access to their data within the cloud to be gained).
Correct Answer
A. Customers
Explanation
Customers are responsible for keeping their applications up to date. This means they need to ensure they have a patch strategy in place to protect their applications from malware and hackers. By regularly updating their applications, customers can ensure that any vulnerabilities that could allow unauthorized access to their data within the cloud are addressed and mitigated. Providers may offer support and tools for patching, but the ultimate responsibility lies with the customers.
5.
Cloud providers ensure that _________via the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code.
Correct Answer
C. Applications available as a service
Explanation
Cloud providers ensure that applications available as a service via the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code. This means that they have processes in place to ensure that the applications they offer to their customers are thoroughly tested and meet security standards. This helps to protect the data and information that is stored and processed within these applications, providing a secure environment for users.
6.
Cloud providers have _________ and __________plans in place to ensure that service can be maintained in case of a disaster or an emergency and that any data lost will be recovered.
Correct Answer
B. Business continuity and data recovery
Explanation
Cloud providers have business continuity and data recovery plans in place to ensure that service can be maintained in case of a disaster or an emergency and that any data lost will be recovered. These plans involve strategies and procedures to minimize downtime and ensure the availability of services. Business continuity focuses on maintaining operations and minimizing disruptions, while data recovery focuses on recovering lost or corrupted data. By having both of these plans in place, cloud providers can effectively manage and mitigate risks, ensuring the continuity and reliability of their services.
7.
Cloud providers must enable their customers to comply appropriately with these regulations.
Correct Answer
D. All of the above
Explanation
Cloud providers must enable their customers to comply appropriately with regulations such as the Payment Card Industry Data Security Standard (PCI), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley Act (SOA). This means that the cloud providers must have the necessary security measures and controls in place to ensure the protection of sensitive data and compliance with these regulations. By offering compliant services, cloud providers can help their customers meet the requirements of these regulations and avoid potential penalties or legal issues. Therefore, the correct answer is "All of the above."
8.
The major security concerns of Cloud Computing are
Correct Answer
E. All of the above.
Explanation
The correct answer is "All of the above" because the passage mentions multiple security concerns of Cloud Computing. IT leaders struggle to trust new cloud providers, IT professionals question the infrastructure security of cloud providers, providers need to have mechanisms to manage industry regulations, and IT managers cannot guarantee response times due to data traveling through the Internet. Therefore, all of these concerns are valid and contribute to the major security concerns of Cloud Computing.
9.
Do not put confidential information, including personally identifiable information (PII), into the Cloud.
Correct Answer
B. FALSE
Explanation
Whether to put confidential information, including personally identifiable information (PII), into the cloud depends on various factors, including the security measures provided by the cloud service provider and the organization's specific needs and policies. Many organizations use cloud services for the storage and processing of sensitive data, but it's crucial to assess the security practices of the chosen cloud provider and implement additional measures such as encryption to protect the data.
10.
Arrange the following in order to be a Cloud Service Provider
a. Identify the threat profile and then decide on a cloud service model 1
b. Select suitable applications and develop a risk score 2
c. Build a customized cloud service provider security assessment. 5
d. Model attack paths to enhance situational awareness 4
e. Understand the survivability and resiliency of applications 3
Correct Answer
C. A, b, e, d, c
Explanation
The correct order to become a Cloud Service Provider is to first identify the threat profile and then decide on a cloud service model (a), select suitable applications and develop a risk score (b), understand the survivability and resiliency of applications (e), model attack paths to enhance situational awareness (d), and finally build a customized cloud service provider security assessment (c). This sequence ensures that the provider assesses the threats and risks, selects appropriate applications, understands the application's resilience, enhances situational awareness, and finally builds a customized security assessment.