What type of solutions enable enterprises or individuals to store data and computer files
on the Internet using a storage service provider rather than keeping the data locally on a
physical disk such as a hard drive or tape backup?
A.
Online backups
B.
Cloud backup solutions
C.
Removable ha...
What type of solutions enable enterprises or individuals to store data and computer files
on the Internet using a storage service provider rather than keeping the data locally on a
physical disk such as a hard drive or tape backup?
A.
Online backups
B.
Cloud backup solutions
C.
Removable hard drives
D.
Masking Correct answer- B
When using an infrastructure as a service (IaaS) solution, which of the following is not
an essential benefit for the customer?
A.
Removing the need to maintain a license library
B.
Metered service
C.
Energy and cooling efficiencies
D.
Transfer of ownership cost Correct answer- A
______________focuses on security and encryption to prevent unauthorized copying
and limitations on distribution to only those who pay.
A.
Information rights management (IRM)
B.
Masking
C.
Bit splitting
D.
Degaussing Correct answer- A
,Which of the following represents the correct set of four cloud deployment models?
A.
Public, private, joint and community
B.
Public, private, hybrid, and community
C.
Public, Internet, hybrid, and community
D.
External, private, hybrid, and community Correct answer- B
A special mathematical code that allows encryption hardware/software to encrypt and
then decipher a message.
A.
PKI
B.
Key
C.
Public-private
D.
Masking Correct answer- B
Which of the following lists the correct six components of the STRIDE threat model?
A.
Spoofing, tampering, repudiation, information disclosure, denial of service, and
elevation of privilege
B.
Spoofing, tampering, refutation, information disclosure, denial of service, and social
engineering elasticity
C.
Spoofing, tampering, repudiation, information disclosure, distributed denial of service,
and elevation of privilege
D.
Spoofing, tampering, nonrepudiation, information disclosure, denial of service, and
elevation of privilege Correct answer- A
What is the term that describes the assurance that a specific author actually created
and sent a specific item to a specific recipient, and that the message was successfully
received?
A.
PKI
B.
DLP
C.
Nonrepudiation
,D.
Bit splitting Correct answer- C
What is the correct term for the process of deliberately destroying the encryption keys
used to encrypt data?
A.
Poor key management
B.
PKI
C.
Obfuscation
D.
Crypto-shredding Correct answer- D
In a federated environment, who is the relying party, and what do they do?
A.
The relying party is the service provider, and they consume the tokens generated by the
identity provider.
B.
The relying party is the service provider, and they consume the tokens generated by the
customer.
C.
The relying party is the customer, and they consume the tokens generated by the
identity provider.
D.
The relying party is the identity provider, and they consume the tokens generated by the
service provider. Correct answer- A
What is the process of replacing sensitive data with unique identification
symbols/addresses?
A.
Randomization
B.
Elasticity
C.
Obfuscation
D.
Tokenization Correct answer- D
Which of the following data storage types are associated or used with platform as a
service (PaaS)?
A.
Databases and big data
B.
SaaS application
C.
, Tabular
D.
Raw and block Correct answer- A
What is the term used for software technology that abstracts application software from
the underlying operating system on which it is executed?
A.
Partition
B.
Application virtualization
C.
Distributed
D.
SaaS Correct answer- B
Which of the following represents the US legislation enacted to protect shareholders
and the public from enterprise accounting errors and fraudulent practices?
A.
PCI
B.
Gramm-Leach-Bliley Act (GLBA)
C.
Sarbanes-Oxley Act (SOX)
D.
HIPAA Correct answer- C
Which of the following is a device that can safely store and manage encryption keys and
is used in servers, data transmission, and log files?
A.
Private key
B.
Hardware security module (HSM)
C.
Public key
D.
Trusted operating system module (TOS) Correct answer- B
What is a type of cloud infrastructure that is provisioned for open use by the general
public and is owned, managed, and operated by a cloud provider?
A.
Private cloud
B.
Public cloud
C.
Hybrid cloud
D.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper EvaTee. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €12,29. Je zit daarna nergens aan vast.