What is a standardized set of roles, policies, and procedures used to create, manage, distribute, use, store, and revoke digital certificates and manage public/private key encryption?
A _______ is a special security zone that contains servers that need to be accessed by the outside world via the Internet and also internally; it is a special network security zone that exposes cloud computers to the Internet.
Answer: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Answer: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Answer: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Answer: The web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Answer: The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
Answer: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
What is OS Command Injection and how can it be mitigated?
Answer: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Answer: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
The identity management process of allowing users in different security domains to share services without having identities in each domain is called what?
A. Single-sign on
B. Federated
C. Authentication
D. Authorization
Which of the following actions would not lead to risks related to records retention in the cloud?
A. Secure destruction of records on schedule
B. Restrictions on archived storage
C. Difficulties associating metadata with archived records
D. Unauthorized access
True or false? Government agencies must always notify a data owner when they compel disclosure of information from a cloud service provider as part of lawful access.
An organization can address regulatory compliance risks in the cloud in all the following ways except which one?
A. Its own security policies
B. Periodic audits
C. Service-level agreements with cloud providers
D. Delegation of full responsibility for compliance to the cloud service provider
Answer: Delegation of full responsibility for compliance to the cloud service provider
Which countries could claim jurisdiction over data in the cloud?
A. The country in which physical servers storing data reside
B. The countries that data passes through between the provider's servers
C. The country in which the data owner resides
D. All of the above
Since there is a finite supply of server resources and there are many virtual machines that can consume these resources, it becomes very important that what TWO things be assigned to prevent a few VMs from monopolizing all the available resources?
Cloud _______ or _______ applications have highly tuned algorithms to dynamically monitor and add resources as needed to prevent resource starvation or VM performance issues.
A _______ is based on a pool of resources available for use by the virtual machines and defines the ceiling or the upper limit of what the cloud provider will deliver.
Various classes or tiers of service—such as basic, advanced, and premium services based on quotas and levels of compute services offered per tier by the cloud provider—are called _______.
The vendor of the managed device will publish a _______ that is loaded onto the network management system and defines what objects can be accessed on the monitored equipment and where they are located on the device.
What is it called when two devices are interconnected in an active/standby or active/active configuration that allows for very fast recovery from a failure?
A. Load balancing
B. Mirroring
C. High availability
D. Clustering
What is it called when you disperse the cloud deployment to multiple dispersed cloud hosting datacenters so that if one facility experiences a disruption your cloud services will remain accessible in other locations?
A. High availability
B. Archiving
C. RTO
D. Geographical diversity
E. Site mirroring
The cloud operations can be deployed in a ______ model where two fully redundant cloud data centers are active at the same time. Each cloud datacenter will back up the other in the event of a failure.
With ______, the data is first written to the primary storage system in the primary storage facility or cloud location. After the data is stored, it is then copied to remote replicas on a scheduled basis or at near real time.
Using ______ designs, two devices can be interconnected in an active/standby or active/active configuration that allows for very fast recovery from a failure.
A backup cloud facility that hosts an operational database server that is in sync with the database server at the primary datacenter with the rest of the infrastructure not online is referred to as a ___
What type of application design is preferable for a cloud-based application?
A. A design that uses stateful objects
B. A design that uses stateless objects
C. A design that uses in-memory state management
D. A design that uses client-based state management
The concept of creating a group of storage, memory, processing, and I/O for other types of resources and sharing them in a virtualized cloud is called ___.
When migrating from your local datacenter to a cloud network, it is sometimes necessary to copy an image of the server and send it to the cloud provider in a physical media for installation. This is known as a(n) ___ migration.
The process of converting a server running on bare-metal server hardware in a corporate datacenter to a hypervisor in the cloud is referred to as what?
What is the name for a piece of software running in a hypervisor that acts as a network interconnection for the virtual machines to the outside network?
A. VSAN
B. VLAN
C. Virtual switch
D. Type 1 hypervisor
What is the name given to the type of software that enables a server to be logically abstracted and appear to the operating system running on it as if it is running directly on the server hardware itself?
A. Virtualization
B. Abstraction
C. Hypervisor
D. Volumes