Users Online

· Guests Online: 101

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

Security Service Boundry

1. Which of the following service provider provides the highest level of service ?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

 

Answer()

 

2. Point out the correct statement:
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control structures
c) SaaS is an operating environment with applications, management, and the user interface
d) All of the mentioned

 

Answer()

 

3. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model ?
a) CAS
b) CSA
c) SAC
d) All of the mentioned

 

Answer()

 

4. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

 

Answer()

 

5. Point out the wrong statement:
a) Each different type of cloud service delivery model creates a security boundary
b) Any security mechanism below the security boundary must be built into the system
c) Any security mechanism above the security boundary must be maintained by the customer
d) All of the mentioned
Answer()

 

6. Which of the following model allows vendor to provide security as part of the Service Level Agreement ?
a) SaaS
b) PaaS
c) IaaS

 

Answer()

 

7. Which of the following cloud does not require mapping ?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

 

Answer()

 

8. Which of the following service model is owned in terms of infrastructure by both vendor and customer ?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

 

Answer()

 

9. Which of the following model type is not trusted in terms of security ?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

 

Answer()

 

10. Which of the following has infrastructure security managed and owned by vendor ?
a) Hybrid
b) Private/Community
c) Public
d) None of the mentioned

 

Answer()

 

 

 

ANSWERS

 

 

1. a
Explanation:As you move upward in the stack, each service model inherits the capabilities of the model beneath it, as well as all the inherent security concerns and risk factors.

 

2.  c
Explanation:IaaS has the least levels of integrated functionality and the lowest levels of integrated security, and SaaS has the most.

 

 

3. b
Explanation:Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud.

 

 

4. b
Explanation:In the PaaS model, the customer would be responsible for the security of the application and UI at the top of the stack.

 

 

5. d
Explanation:As you move up the stack, it becomes more important to make sure that the type and level of security is part of your Service Level Agreement.

 

6. a
Explanation:Compliance, governance, and liability levels are stipulated under the contract for the entire stack.

 

 

7.  a
Explanation:Private cloud may be internal or external to an organization.

 

 

8.  c
Explanation:Infrastructure location is both on- and off-premises.

 

 

9.  a
Explanation:It is owned by vendor.

 

 

10.  b
Explanation:Cloud computing has a tendency to blur the location of the defined security perimeter in such a way that the previous notions of network firewalls and edge defenses often no longer app

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.78 seconds
10,261,167 unique visits