1. _____ creates a copy of the data and stores it in a second location. ...
Question:
1. _____ creates a copy of the data and stores it in a second location.
A. Data replication
B. High availability of data
C. Permissions on data
D. Data encryption
2. What is used to identify who can and who cannot access data in the cloud?
A. High availability
B. Permissions
C. Encryption
D. Replication
3. On-premise computing hardware includes servers, desktops, laptops, and mobile devices. What is the equivalent of these devices on a CSP (Cloud Security Provider)?
A. Dynamic resource allocation
B. Instance awareness
C. Security groups
D. Virtual private cloud (VPC) endpoint
4. What refers to passwords and encryption keys that protect cloud resources?
A. High availability across zones
B. Resource policies
C. Integration and auditing
D. Secrets management
5. What cloud technology is equivalent to a combination of a proxy server and a stateless firewall?
A. Next-generation Secure Web Gateway (SWG)
B. Virtual private cloud (VPC) endpoint
C. Dynamic resource allocation
D. API inspection and integration
6. What is used to keep cloud data confidential?
A. High availability
B. Encryption
C. Replication
D. Permissions
7. What is the cloud-based version of Role-based Access Control (RBAC)?
A. Dynamic resource allocation
B. Instance awareness
C. Virtual private cloud (VPC) endpoint
D. Security groups
8. On-premise networks typically have VLANs (virtual local networks), while CSPs (Cloud Service Providers) typically have _____.
A. public and private subnets
B. Virtual Private Networks (VPNs)
C. virtual private clouds (VPCs)
D. air gaps
9. What is an advantage of using a CSP (Cloud Security Provider), rather than using on-premises computing technology?
A. The use of public subnets
B. High availability across zones
C. The use of private subnets
D. Can have Role-based Access Control (role-BAC)
10. What will determine the costs of using a CSP (Cloud Security Provider)?
A. Secrets management
B. High availability across zones
C. Resource policies
D. Integration and auditing
Concepts of Database Management
ISBN: 978-1285427102
8th edition
Authors: Philip J. Pratt, Mary Z. Last