Search Header Logo

ehehe

Authored by Joshua Tiagan

Fun

10th Grade

Used 1+ times

ehehe
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

filters out electrical surges and spikes involves the creation and dissemination of content through social networks using the Internet.

Social Media

Peer-to-Peer (P2P)

Instant Messaging (IM)

Data Leakage

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

siphoning out or leaking information by dumping computer files or stealing computer reports and tapes

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

refers to devices that are transported or moved during normal usage

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cloud Computing- is a distributed architecture where tasks or workloads are shared between peers

P2P -model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

f,f

t,t

f,t

none

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Request the CSP’s list of infrastructure locations and verify that regulation in those locations is aligned with the enterprise’s requirements, include terms in the contract to restrict the moving of enterprise assets to only those areas known to be compliant with the enterprise’s own regulation and prevent disclosure, encrypt any asset prior to migration to the CSP and ensure proper key management is in place.

Physical security

Data disposal

Application disposal

Legal transborder requirements

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Request the CSP’s technical details for approval and require additional controls to ensure data privacy, when necessary, a contractual agreement is necessary to officially clarify who is allowed to access the enterprise’s information, naming specific roles for CSP employees and external partners. All controls protecting the enterprise’s information assets must be clearly documented in the contract agreement or service level agreement (SLA) and use a private cloud deployment model (no multi-tenancy).

Lack of control of the release management process

Identity and access management (IAM)

Multi-tenancy and isolation failure

Exit strategy

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Require that the purchase of cloud services follow the established procedures. Ensure executive management support for this.

Ease to contract SaaS

Collateral damage

Service Orientated Architecture (SOA)– related vulnerabilities

Identity and access management (IAM)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?