ehehe

ehehe

10th Grade

21 Qs

quiz-placeholder

Similar activities

Funnymike untimate loyalty test

Funnymike untimate loyalty test

KG - Professional Development

17 Qs

Information Technology Glossary

Information Technology Glossary

10th Grade

20 Qs

Gymnastics

Gymnastics

2nd Grade - University

18 Qs

WHSS Economics: Section 1 Prep

WHSS Economics: Section 1 Prep

10th Grade

16 Qs

Titanium X

Titanium X

1st - 12th Grade

20 Qs

BASIC WESM QUIZ

BASIC WESM QUIZ

9th - 12th Grade

20 Qs

Punishing K-Pop

Punishing K-Pop

5th - 12th Grade

26 Qs

Getting a Job

Getting a Job

9th - 12th Grade

22 Qs

ehehe

ehehe

Assessment

Quiz

Fun

10th Grade

Medium

Created by

Joshua Tiagan

Used 1+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

filters out electrical surges and spikes involves the creation and dissemination of content through social networks using the Internet.

Social Media

Peer-to-Peer (P2P)

Instant Messaging (IM)

Data Leakage

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

siphoning out or leaking information by dumping computer files or stealing computer reports and tapes

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

refers to devices that are transported or moved during normal usage

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cloud Computing- is a distributed architecture where tasks or workloads are shared between peers

P2P -model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

f,f

t,t

f,t

none

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Request the CSP’s list of infrastructure locations and verify that regulation in those locations is aligned with the enterprise’s requirements, include terms in the contract to restrict the moving of enterprise assets to only those areas known to be compliant with the enterprise’s own regulation and prevent disclosure, encrypt any asset prior to migration to the CSP and ensure proper key management is in place.

Physical security

Data disposal

Application disposal

Legal transborder requirements

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Request the CSP’s technical details for approval and require additional controls to ensure data privacy, when necessary, a contractual agreement is necessary to officially clarify who is allowed to access the enterprise’s information, naming specific roles for CSP employees and external partners. All controls protecting the enterprise’s information assets must be clearly documented in the contract agreement or service level agreement (SLA) and use a private cloud deployment model (no multi-tenancy).

Lack of control of the release management process

Identity and access management (IAM)

Multi-tenancy and isolation failure

Exit strategy

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Require that the purchase of cloud services follow the established procedures. Ensure executive management support for this.

Ease to contract SaaS

Collateral damage

Service Orientated Architecture (SOA)– related vulnerabilities

Identity and access management (IAM)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?