Basic Cloud Security MCQ

1. When using ssl, the public key is found in a _______.

Answer

Correct Answer: Digital certificate

Note: This Question is unanswered, help us to find answer for this one

2. Compared to in-house hosting, cloud-based hosting ________.

Answer

Correct Answer: Minimizes the risk of investing in technology that will soon become obsolete

Note: This Question is unanswered, help us to find answer for this one

3. One downside to cloud storage is that ________ is needed to access your files.

Answer

Correct Answer: Internet access

Note: This Question is unanswered, help us to find answer for this one

4. A ________ is a cloud that is owned and operated by an organization for its own benefit.

Answer

Correct Answer: Private cloud

Note: This Question is unanswered, help us to find answer for this one

5. Which component of the Symantec Control Compliance Suite (CCS) simplifies the evaluation of procedural controls by enabling an organization to automate, publish, and analyze results from web-based surveys?

Answer

Correct Answer: CCS Standards Manager

Note: This Question is unanswered, help us to find answer for this one

6. A company is hosting its email infrastructure in the cloud. The company is unable to enjoy the benefit of cloud deployment because its email servers process excessive spam emails. The company needs a solution that can block spam and malware contained in email messages before it reaches the email servers. Which solution resolves this issue?

Answer

Correct Answer: Symantec Messaging Gateway

Note: This Question is unanswered, help us to find answer for this one

7. How does Symantec Endpoint Protection (SEP) maximize VM density and performance without impacting security?

Answer

Correct Answer: SEP reduces the spread of malware by hardening VMware vCenter.

Note: This Question is unanswered, help us to find answer for this one

8. An enterprise is in the process of moving application servers to a cloud-based IaaS platform. Which technology should an IT professional use to assess the risk of the IT assets in a business context?

Answer

Correct Answer: Symantec Control Compliance Suite

Note: This Question is unanswered, help us to find answer for this one

9. What can a hosted Symantec Data Loss Prevention solution do to protect confidential data in an outgoing email?

Answer

Correct Answer: Add a header to an email to route to an encryption gateway

Note: This Question is unanswered, help us to find answer for this one

10. An IT security professional at a large US-based manufacturing company has decided to deploy and manage a host intrusion detection solution to assist with their migration to a cloud environment. Which cloud environment will benefit from this solution?

Answer

Correct Answer: Multi-tenant IaaS

Note: This Question is unanswered, help us to find answer for this one

11. A cloud service provider administrator has discovered that someone is attempting to determine which servers and operating systems are running on a tenant's network by using network mapping. How is this risk categorized?

Answer

Correct Answer: Technical

Note: This Question is unanswered, help us to find answer for this one

12. Which action addresses a risk inherent to the public cloud model?

Answer

Correct Answer: Harden applications sufficiently for multi-tenant environments

Note: This Question is unanswered, help us to find answer for this one

13. An individual has been able to obtain "Virtual Machine User" level access on a VMware host.Which possible issue could this cause?

Answer

Correct Answer: Virtual machines being shut down

Note: This Question is unanswered, help us to find answer for this one

14. What is the correct order used by Symantec Messaging Gateway for scanning email messages?

Answer

Correct Answer: Message is scanned for spam > message is scanned for viruses > message is scanned for content violations and data loss

Note: This Question is unanswered, help us to find answer for this one

15. A CSO is concerned to learn that data is being intercepted while moving data between the cloud and corporate users. What should an IT professional do to mitigate this issue?

Answer

Correct Answer: Implement data encryption

Note: This Question is unanswered, help us to find answer for this one

16. A company is planning a migration of an application to public IaaS. What is a valid objection related to data security in this scenario?

Answer

Correct Answer: Security risks introduced by a multi-tenant cloud

Note: This Question is unanswered, help us to find answer for this one

17. Which scenario identifies assets eligible for PaaS cloud migration?

Answer

Correct Answer: Database servers that are being used by the QA team to test load handling

Note: This Question is unanswered, help us to find answer for this one

18. A company has decided to implement "cloud bursting" to allow their production environment to scale to any size by utilizing on-demand connections to a public cloud IaaS infrastructure. Which solution allows the IT department to minimize security risks by treating the IaaS environment as a logical extension of their internal network?

Answer

Correct Answer: Virtual DLP connection between the datacenter and the IaaS provider

Note: This Question is unanswered, help us to find answer for this one

19. Which security requirement is difficult for a SaaS provider to meet?

Answer

Correct Answer: Ensuring trusted SSL communications

Note: This Question is unanswered, help us to find answer for this one

search
Cloud Security Subjects
Related MCQs