A basic philosophy of security is to have layers of defense, a concept known as
__________
a) security defense
b) layers defence
c) defense in securityd) defense in depth

1 Answer

Answer :

defense in depth

Related questions

Description : _______ is the essential concept related to cloud? a) Reliability b) Abstraction c) Productivity d) None of the above

Last Answer : Abstraction

Description : The _______ Security Services Technical Committee is in charge of defining, enhancing, and maintaining the SAML specifications. a) OASIS b) HTTP c) SOAP d) OSAMIL

Last Answer : OASIS

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : __________ is an in-built back end component of cloud computing. A. Service B. Application C. Storage D. Security

Last Answer : Security

Description : Which of the following is correct? a) Layers are not strongly coupled to the layers above them b) Each layer is strongly coupled only to the layer immediately below it c) Overall Layered-style architectures are loosely coupled d) All of the mentioned

Last Answer : All of the mentioned

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned

Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : What is Relaxed Layered Style? a) Each layer can be constrained to use only the layer directly below it b) Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it c) All of the mentioned d) None of the mentioned

Last Answer : Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

Description : Which of the following is correct? a) The dynamic structure of the Layered style is to partition software units into modular layers b) The static structure of the Layered style is nothing more than ... interactions between layers c) All of the mentioned CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : Which of the following cloud concept is related to pooling and sharing of resources? a) Polymorphism b) Abstraction c) Virtualization d) None of the mentioned

Last Answer : Virtualization

Description : Which of the following is essential concept related to Cloud? a) Reliability b) Productivityc) Abstraction d) All of the mentioned

Last Answer : Abstraction

Description : Managed IT services are based on the concept of? A. Virtualization B. SOA C. Grid Computing D. Utility Computing

Last Answer : Utility Computing

Description : Which of the following cloud concept is related to pooling and sharing of resources? a) Polymorphism b) Abstraction c) Virtualization d) None of the mentioned

Last Answer : Virtualization

Description : Mekong Ganga Co-operation Project is (a) an irrigation project involving India and Myanmar (b) a joint tourism initiative of some Asian countries (c) a hydroelectric power project involving India, Bangladesh and Myanmar (d) a defence and security agreement of India with its eastern neighbours

Last Answer : Ans: (b)

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working. B. Cloud Security Alliance. C. Cloud Security WatchDog. D. Security in the Cloud Alliance.

Last Answer : Cloud Security Alliance.

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above

Last Answer : All of the above

Description : Which type of PaaS includes on-demand scaling and application security? A. Stand-alone development environments B. Application delivery-only environments C. Open platform as a service D. Add-on development facilities

Last Answer : Application delivery-only environments

Description : IaaS offers an isolated environment to individual customers through? A. hypervisor B. virtual machine sprawl C. security vulnerabilities D. renting

Last Answer : hypervisor

Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service

Last Answer : . Quality of service

Description : Which of the following model type is not trusted in terms of security? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Private/Community

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : How many security accounts per client is provided by Microsoft? a) 1 b) 3 c) 5 d) 7

Last Answer : 5

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying