-
Security advantages of cloud providers include which of the following? (Select all that apply.)
- Faster deployment of security patches
- Increased HR hiring and staffing capabilities
- Hardware redundancy
- Faster incidence response
-
Security disadvantages of cloud providers include which of the following? (Select all that apply.)
- Potential legal and political issues due to a foreign country hosting the data center
- Multitenant risks
- Vendor lock in
- Risk of the cloud-based provider failing
-
__________ is the process of overwriting the disk-storage locations of a deleted file.
- Disk flashing
- Delete continuity
- Disk wiping
- None of these
-
A ______ attack occurs when a hacker consumes computing resources in a way that prevents their consumption by others.
- phishing
- ransomware
- virus
- denial of service
-
______ is the process of reading Internet content as it travels from one location to another.
- Packet loading
- Denial of service
- Packet sniffing
- Coupling
-
In a _________ attack, a hacker inserts himself between the two computers, interacting with one of the computers on behalf of the other.
- ransomware
- snoop
- packet-sniffing
- man-in-the-middle
-
True or False: A common security threat occurs when an individual simply observes the computer screen of another by looking over the user’s shoulder.
-
True or False: A difficult security threat to mitigate is a malicious employee.
-
The virtualization software that sits between the underlying computer and the operating system is called the __________.
- load balancer
- hypervisor
- micro kernel
- cloud burster
-
A _______ attack occurs when a hacker is able to hack one virtualized operating system on a server and from there, hack into another.
- hypervisor
- micro kernel
- guest hopping
- virtual kernel
-
The process of a hacker appending commands into a web-based form is known as ________.
- command swapping
- SQL injection
- form corruption
- guest hopping
-
By using _____________ hardware and software, cloud-solution providers reduce many threats to IT resources.
- colocated
- cloud secure
- robust
- scalable
-
True or False: Cloud-service providers generally have greater physical security than a traditional on-premise data center.
-
True or False: Many cloud-based SaaS solutions are multitenant applications within which different customers share underlying resources, such as a database.
-
True or False: A cloud-provider’s data center is still at risk from natural disasters such as floods, fire, and earthquakes.
-
_______ is key to reducing the threat of packet-sniffing attacks.
- Colocation
- Encryption
- Disk wiping
- Wi-Fi
-
A _____ attack uses multiple computers across the cloud to attack a server.
- worm
- ransomware
- DDoS
- cloud burst
-
_________ is key to reducing man-in-the-middle attacks.
- Colocation
- Encryption
- Disk wiping
- Wi-Fi
-
True or False: Because they share costs across many users, cloud-service providers often have financial resources that allow them to hire higher-quality administrators and a greater number of specialized administrators.
-
True or False: Cloud customers do not need to be concerned with the country within which a cloud-service provider’s data center resides.