Week 6 Science Cloud Provider Practice Quiz
Central Washington University Week 6 Science Cloud Provider Practice Quiz
1) With ______, all hardware, software, and other supporting infrastructure are owned and managed by the cloud provider.
- Private Cloud
- Hybrid cloud
- Public cloud
- Community cloud
2) This is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure allowing the organization to extend the reach of the security policies beyond their own infrastructure.
- Cloud Access Security Broker (CASB)
- Web application Firewall (WAF)
- DNS Server
- Intrusion Detection System (IDS)
3) This defines the process of granting permission to a user or object to perform or obtain something?
- Authentication
- Access Control Restrictions
- Auditing
- Authorization
4) This access control model permits the user to decide how to protects the information level of sharing.
- Role-based Access Control
- Discretionary Access Control
- Mandatory Access Control
- Attribute-based Access Control
5) This defines the process used by a system to verify the identity of a user, process, or service before granting access.
- Authentication
- Naone of the listed choices are correct
- Authorization
- Auditing
6) What is the most difficult aspect of security in a virtualized environment?
- VM sprawl
- Securing the hardware
- Data confidentiality
- Lack of visibility into the virtual network
7) ______ is an integrity control.
- None of the listed choices are correct
- Hashing
- Public Key infrastructure
- Encryption
8) A ______ typically establishes a barrier between a trusted, secure Internal network and another outside network, such as the internet, that is assumed not to be secure or trusted.
- Firewall
- Edge Router
- Virtual private Network (VPN)
- Network Intrusion Detection system
9) What is the most important data security measure you can take for mobile devices?
- Use of a VPN
- Full hard drive encryption
- Data backup
- Two factor authentications
10) This is a mechanism to verify that a message came from the sender, providing nonrepudiation.
- Digital Signatures and Certificates
- Authentication
- Role-based Access Control
- Attribute-based Access Control
11) Which access control model provides access control based on the position or responsibility an individual fills within an organization?
- Role-based Access Control
- Attribute-based Access control
- Mandatory Access Control
- Discretionary Access Control
12) A cryptosystem is a suite of cryptographic algorithms needed to implement a security service, most commonly for achieving confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for decryption, one for encryption and one for:
- Nonrepudiation
- General ciphertext
- Digital Signatures and Certificates
- Key generation
13) Which access control model is the least restrictive model, popular in situations where resources owners need to allow access ad privileges OnDemand?
- Role-based Access Control
- Attribute-based Access Control
- Mandatory Access Control
- Discretionary Access Control
14) Which access control model is the most restrictive model typically used in defense or military organizations where data classification and confidentiality are of prime importance?
- Role-based Access control
- Discretionary Access control
- Mandatory Access control
- Attribute-based Access Control
15) Which of the following security controls is used to extend the network perimeter with the use of encapsulation and encryption?
- Web proxy
- Network Intrusion detection systems (NIDS)
- Virtual Private Network (VPN)
- Network Address translation (NAT)
16) VPNs operate at which layer of the OSI Model?
- Layer 3: Network Layer
- Layer 4: Translation Layer
- Layer 2: Data-like layer
- Layer 5: Session layer
17) Of the following, which is least important for a CISO to be knowledgeable in?
- Digital forensics
- Network Security Controls
- Security Standards
- Networking Protocols
18) You are analyzing a packet and see that it was being routed using a media access control (MAC) address. AT which layer of the OSI model was the packet captured?
- Network layer
- Trasport layer
- Data-link layer
- Session layer

Having Trouble Meeting Your Deadline?
Get your assignment on Week 6 Science Cloud Provider Practice Quiz completed on time. avoid delay and – ORDER NOW