The management model that facilitates effective and efficient security
management and operations in the cloud environment so that an enterprise’s
business targets are achieved is
a) Cloud security
b) Trust model
c) Security model
d) Cloud security governance

1 Answer

Answer :

Cloud security governance

Related questions

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : “Enterprises should mandate that security investments, services, and projects in the cloud are executed to achieve established business goals” is a key objective of _____________ a) Strategic Alignment b) Value Delivery c) Risk Mitigation d) Sustained Performance

Last Answer : Strategic Alignment

Description : Which is the model have to develop in order to protect e-commerce and online shopping provided by e-logistic vendors a) Cloud model b) API model c) Security model d) Trust model

Last Answer : Trust model

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : Which vendor recently launched a cloud-based test and development service for enterprises? A. HP B. Cisco C. IBM D. Oracle

Last Answer : IBM

Description : Which vendor recently launched a cloud-based test and development service for enterprises? A. HP B. Cisco C. IBM D. Oracle

Last Answer : IBM

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : A cloud provider offers an environment for building applications that will run from the customer's environment. Which cloud computing delivery model are they using? A. Platform as a Service B. Software as a Service C. Development as a Service D. Infrastructure as a Service

Last Answer : Platform as a Service

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : Which of the following does not belong to type of competency area in cloud business analytics? A. Business intelligence and performance management. B. Analytics and optimization. C. Content management system . D. Information Hierarchy.

Last Answer : Information Hierarchy.

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... , the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Which statement is true about the maintenance of a cloud computing environment? A. In a Software as a Service (SaaS) environment, patches are not automatically installed on the clients. B ... an IaaS environment, customers do not need to worry about installing patches in the virtual instances.

Last Answer : In a SaaS environment, customers do not need to worry about installing patches in the virtual

Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.

Last Answer : Lower total cost of ownership and improved asset utilization.

Description : What is one benefit of cloud computing? A. Computer resources can be quickly provisioned. B. A workload can quickly move to a cloud computing environment. C. There is no operational cost for a cloud computing environment. D. The resources can quickly move from one cloud environment to another.

Last Answer : . Computer resources can be quickly provisioned.

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working. B. Cloud Security Alliance. C. Cloud Security WatchDog. D. Security in the Cloud Alliance.

Last Answer : Cloud Security Alliance.

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : __________ is an in-built back end component of cloud computing. A. Service B. Application C. Storage D. Security

Last Answer : Security

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : The four levels of Cloud Federation include a) Conceptual level, Logical level, Operational level, Infrastructural level b) Conceptual level, Service level, Operational level, Infrastructural ... level, Infrastructural level d) Security level, Logical level, Operational level, Infrastructural leve

Last Answer : Conceptual level, Logical level, Operational level, Infrastructural level

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure