This is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure allowing the organization to extend the reach of the security policies beyond their own infrastructure.
With ______, all hardware, software, and other supporting infrastructure are owned and managed by the cloud provider.
Private Cloud
Hybrid cloud
Public cloud
Community cloud
2) This is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure allowing the organization to extend the reach of the security policies beyond their own infrastructure.
Cloud Access Security Broker (CASB)
Web application Firewall (WAF)
DNS Server
Intrusion Detection System (IDS)
3) This defines the process of granting permission to a user or object to perform or obtain something?
Authentication
Access Control Restrictions
Auditing
Authorization
4) This access control model permits the user to decide how to protects the information level of sharing.
Role-based Access Control
Discretionary Access Control
Mandatory Access Control
Attribute-based Access Control
5) This defines the process used by a system to verify the identity of a user, process, or service before granting access.
Authentication
Naone of the listed choices are correct
Authorization
Auditing
6) What is the most difficult aspect of security in a virtualized environment?
VM sprawl
Securing the hardware
Data confidentiality
Lack of visibility into the virtual network
7) ______ is an integrity control.
None of the listed choices are correct
Hashing
Public Key infrastructure
Encryption
8) A ______ typically establishes a barrier between a trusted, secure Internal network and another outside network, such as the internet, that is assumed not to be secure or trusted.
Firewall
Edge Router
Virtual private Network (VPN)
Network Intrusion Detection system
9) What is the most important data security measure you can take for mobile devices?
Use of a VPN
Full hard drive encryption
Data backup
Two factor authentications
10) This is a mechanism to verify that a message came from the sender, providing nonrepudiation.
Digital Signatures and Certificates
Authentication
Role-based Access Control
Attribute-based Access Control
11) Which access control model provides access control based on the position or responsibility an individual fills within an organization?
Role-based Access Control
Attribute-based Access control
Mandatory Access Control
Discretionary Access Control
12) A cryptosystem is a suite of cryptographic algorithms needed to implement a security service, most commonly for achieving confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for decryption, one for encryption and one for:
Nonrepudiation
General ciphertext
Digital Signatures and Certificates
Key generation
13) Which access control model is the least restrictive model, popular in situations where resources owners need to allow access ad privileges OnDemand?
Role-based Access Control
Attribute-based Access Control
Mandatory Access Control
Discretionary Access Control
14) Which access control model is the most restrictive model typically used in defense or military organizations where data classification and confidentiality are of prime importance?
Role-based Access control
Discretionary Access control
Mandatory Access control
Attribute-based Access Control
15) Which of the following security controls is used to extend the network perimeter with the use of encapsulation and encryption?
Web proxy
Network Intrusion detection systems (NIDS)
Virtual Private Network (VPN)
Network Address translation (NAT)
16) VPNs operate at which layer of the OSI Model?
Layer 3: Network Layer
Layer 4: Translation Layer
Layer 2: Data-like layer
Layer 5: Session layer
17) Of the following, which is least important for a CISO to be knowledgeable in?
Digital forensics
Network Security Controls
Security Standards
Networking Protocols
18) You are analyzing a packet and see that it was being routed using a media access control (MAC) address. AT which layer of the OSI model was the packet captured?
Network layer
Trasport layer
Data-link layer
Session layer
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
