ehehe

ehehe

10th Grade

21 Qs

quiz-placeholder

Similar activities

Nfl football

Nfl football

KG - Professional Development

16 Qs

Funneh

Funneh

KG - 12th Grade

17 Qs

General knowledge

General knowledge

3rd Grade - University

20 Qs

TRIVIA MARVEL

TRIVIA MARVEL

7th - 11th Grade

17 Qs

tv shows/ movies

tv shows/ movies

KG - 12th Grade

19 Qs

Hazbin Hotel And Helluva Boss English Quiz

Hazbin Hotel And Helluva Boss English Quiz

6th Grade - Professional Development

16 Qs

SESSION 1 (RFWT)

SESSION 1 (RFWT)

9th - 12th Grade

16 Qs

Overwatch

Overwatch

KG - University

20 Qs

ehehe

ehehe

Assessment

Quiz

Fun

10th Grade

Practice Problem

Medium

Created by

Joshua Tiagan

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

filters out electrical surges and spikes involves the creation and dissemination of content through social networks using the Internet.

Social Media

Peer-to-Peer (P2P)

Instant Messaging (IM)

Data Leakage

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

siphoning out or leaking information by dumping computer files or stealing computer reports and tapes

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

refers to devices that are transported or moved during normal usage

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cloud Computing- is a distributed architecture where tasks or workloads are shared between peers

P2P -model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

f,f

t,t

f,t

none

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Request the CSP’s list of infrastructure locations and verify that regulation in those locations is aligned with the enterprise’s requirements, include terms in the contract to restrict the moving of enterprise assets to only those areas known to be compliant with the enterprise’s own regulation and prevent disclosure, encrypt any asset prior to migration to the CSP and ensure proper key management is in place.

Physical security

Data disposal

Application disposal

Legal transborder requirements

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Request the CSP’s technical details for approval and require additional controls to ensure data privacy, when necessary, a contractual agreement is necessary to officially clarify who is allowed to access the enterprise’s information, naming specific roles for CSP employees and external partners. All controls protecting the enterprise’s information assets must be clearly documented in the contract agreement or service level agreement (SLA) and use a private cloud deployment model (no multi-tenancy).

Lack of control of the release management process

Identity and access management (IAM)

Multi-tenancy and isolation failure

Exit strategy

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Require that the purchase of cloud services follow the established procedures. Ensure executive management support for this.

Ease to contract SaaS

Collateral damage

Service Orientated Architecture (SOA)– related vulnerabilities

Identity and access management (IAM)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?