You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

18 lines
5.8 KiB

id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
cloud-L3.001&esa&0&&Those who use a cloud service provider to host their data should understand the security _____.&risks&&Those who use a cloud service provider to host their data should understand the security [risks].&&&&undefined.0&&&&&1&&&N.
cloud-L3.002&esa&0&&Security __________ differs whether that data is personal data, or if it is corporate data that must be managed
;according to regulations and laws.
;&policy&&Security [policy] differs whether that data is personal data, or if it is corporate data that must be managed
;according to regulations and laws.<br>&&&&undefined.0&&&&&1&&&N.
cloud-L3.003&esa&0&&Services like Google Drive and Microsoft Onedrive are commonly used options for saving __________ data in the
;cloud.&personal&&Services like Google Drive and Microsoft Onedrive are commonly used options for saving [personal] data in the
;cloud.&&&&undefined.0&&&&&1&&&N.
cloud-L3.004&esa&0&&Amazon S3 (Simple __________ Service) is a popular option for business. &storage&&Amazon S3 (Simple [Storage] Service) is a popular option for business. &&&&undefined.0&&&&&1&&&N.
cloud-L3.005&esa&0&&Market-share leaders in the cloud space are Amazon, Google, IBM, and __________.&Microsoft&&Market-share leaders in the cloud space are Amazon, Google, IBM, and [Microsoft].&&&&undefined.0&&&&&1&&&N.
cloud-L3.006&esa&0&&Cloud service providers typically offer a ______ security model where they protect their computing centers
;and let the customer handle the rest. &shared&&Cloud service providers typically offer a [shared] security model where they protect their computing
;centers and let the customer handle the rest. &&&&undefined.0&&&&&1&&&N.
cloud-L3.007&esa&0&&AWS makes a distinction of ________ security, meaning their buildings where servers reside, as being “on
;the cloud.”&physical&&AWS makes a distinction of [physical] security, meaning their buildings where servers reside, as being “on
;the cloud.”&&&&undefined.0&&&&&1&&&N.
cloud-L3.008&esa&0&&Many businesses choose not to host certain types of ____ “in the cloud.” &data&&Many businesses choose not to host certain types of [data] “in the cloud.” &&&&undefined.0&&&&&1&&&N. cloud-L3.009&esa&0&&Companies whose very business is defined by their data sometimes choose the ______ cloud approach and keep ;their data hosted at their own facilities, e.g. “on premise.” &hybrid&&Companies whose very business is defined by their data sometimes choose the [hybrid] cloud approach and ;keep their data hosted at their own facilities, e.g. “on premise.” &&&&undefined.0&&&&&1&&&N. cloud-L3.010&esa&0&&Though most data hosting services are relatively secure, data __________ is one option for adding a layer ;of security to any data you choose to store and make accessible through the cloud.&encryption&&Though most data hosting services are relatively secure, data [encryption] is one option for adding a layer ;of security to any data you choose to store and make accessible through the cloud.&&&&undefined.0&&&&&1&&&N. cloud-L3.011&esa&0&&It is still possible that encrypted data could be compromised, but that would either require the files to ;be _________, or intercepted before they are encrypted.&decrypted&&It is still possible that encrypted data could be compromised, but that would either require the files to ;be [decrypted], or intercepted before they are encrypted.&&&&undefined.0&&&&&1&&&N. cloud-L3.012&esa&0&&Authentication deals with identity and ______ management (IAM). &access&&Authentication deals with identity and [access] management (IAM). &&&&undefined.0&&&&&1&&&N. cloud-L3.013&esa&0&&For many years userids and passwords were the primary _______ mechanisms used to protect access, but in ;recent years additional means have been added.&security&&For many years userids and passwords were the primary [security] mechanisms used to protect access, but in ;recent years additional means have been added.&&&&undefined.0&&&&&1&&&N. cloud-L3.014&esa&0&&It's common for an online service to require two factor authentication (TFA) at login, which is an added ;_____ of security that requires both a userid and password combination in addition to a second "factor" ;before access is granted. &layer&&It's common for an online service to require two factor authentication (TFA) at login, which is an added ;[layer] of security that requires both a userid and password combination in addition to a second "factor" ;before access is granted. &&&&undefined.0&&&&&1&&&N. cloud-L3.015&esa&0&&The second factor in TFA is typically something as simple as a pin number, a number sequence from a ;physical security token, or an ______ code that is sent to a smartphone.&access&&The second factor in TFA is typically something as simple as a pin number, a number sequence from a ;physical security token, or an [access] code that is sent to a smartphone.&&&&undefined.0&&&&&1&&&N. cloud-L3.016&esa&0&&Backups need to be provided for any important data hosted using cloud services. These backup services need ;to be configured based on how _______ the data needs to be, and verified that the backups are good and ;usable.&current&&Backups need to be provided for any important data hosted using cloud services. These backup services need ;to be configured based on how [current] the data needs to be, and verified that the backups are good and ;usable.&&&&undefined.0&&&&&1&&&N. cloud-L3.017&esa&0&&Any hosted data will, of course, become unavailable (i.e. the data can’t be accessed) if a business has any ;_______ connectivity issues to the cloud server where the data resides.&network&&Any hosted data will, of course, become unavailable (i.e. the data can’t be accessed) if a business has any ;[network] connectivity issues to the cloud server where the data resides.&&&&undefined.0&&&&&1&&&N.