Users Online
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Latest Articles
Articles Hierarchy
Security Service Boundry
1. Which of the following service provider provides the highest level of service ?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer()
2. Point out the correct statement:
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control structures
c) SaaS is an operating environment with applications, management, and the user interface
d) All of the mentioned
Answer()
3. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model ?
a) CAS
b) CSA
c) SAC
d) All of the mentioned
Answer()
4. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer()
5. Point out the wrong statement:
a) Each different type of cloud service delivery model creates a security boundary
b) Any security mechanism below the security boundary must be built into the system
c) Any security mechanism above the security boundary must be maintained by the customer
d) All of the mentioned
Answer()
6. Which of the following model allows vendor to provide security as part of the Service Level Agreement ?
a) SaaS
b) PaaS
c) IaaS
Answer()
7. Which of the following cloud does not require mapping ?
a) Public
b) Private
c) Hybrid
d) None of the mentioned
Answer()
8. Which of the following service model is owned in terms of infrastructure by both vendor and customer ?
a) Public
b) Private
c) Hybrid
d) None of the mentioned
Answer()
9. Which of the following model type is not trusted in terms of security ?
a) Public
b) Private
c) Hybrid
d) None of the mentioned
Answer()
10. Which of the following has infrastructure security managed and owned by vendor ?
a) Hybrid
b) Private/Community
c) Public
d) None of the mentioned
Answer()
ANSWERS
1. a
Explanation:As you move upward in the stack, each service model inherits the capabilities of the model beneath it, as well as all the inherent security concerns and risk factors.
2. c
Explanation:IaaS has the least levels of integrated functionality and the lowest levels of integrated security, and SaaS has the most.
3. b
Explanation:Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud.
4. b
Explanation:In the PaaS model, the customer would be responsible for the security of the application and UI at the top of the stack.
5. d
Explanation:As you move up the stack, it becomes more important to make sure that the type and level of security is part of your Service Level Agreement.
6. a
Explanation:Compliance, governance, and liability levels are stipulated under the contract for the entire stack.
7. a
Explanation:Private cloud may be internal or external to an organization.
8. c
Explanation:Infrastructure location is both on- and off-premises.
9. a
Explanation:It is owned by vendor.
10. b
Explanation:Cloud computing has a tendency to blur the location of the defined security perimeter in such a way that the previous notions of network firewalls and edge defenses often no longer app