Files
survey-manager/survey-nginx/secure_html/data/tests/cloud-L3.testcentral
2024-07-19 10:05:36 +00:00

19 lines
5.8 KiB
Plaintext
Executable File
Raw Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
cloud-L3.001&esa&0&&Those who use a cloud service provider to host their data should understand the security _____.&risks&&Those who use a cloud service provider to host their data should understand the security [risks].&&&&undefined.0&&&&&1&&&N.
cloud-L3.002&esa&0&&Security __________ differs whether that data is personal data, or if it is corporate data that must be managed
;according to regulations and laws.
;&policy&&Security [policy] differs whether that data is personal data, or if it is corporate data that must be managed
;according to regulations and laws.<br>&&&&undefined.0&&&&&1&&&N.
cloud-L3.003&esa&0&&Services like Google Drive and Microsoft Onedrive are commonly used options for saving __________ data in the
;cloud.&personal&&Services like Google Drive and Microsoft Onedrive are commonly used options for saving [personal] data in the
;cloud.&&&&undefined.0&&&&&1&&&N.
cloud-L3.004&esa&0&&Amazon S3 (Simple __________ Service) is a popular option for business. &storage&&Amazon S3 (Simple [Storage] Service) is a popular option for business. &&&&undefined.0&&&&&1&&&N.
cloud-L3.005&esa&0&&Market-share leaders in the cloud space are Amazon, Google, IBM, and __________.&Microsoft&&Market-share leaders in the cloud space are Amazon, Google, IBM, and [Microsoft].&&&&undefined.0&&&&&1&&&N.
cloud-L3.006&esa&0&&Cloud service providers typically offer a ______ security model where they protect their computing centers
;and let the customer handle the rest. &shared&&Cloud service providers typically offer a [shared] security model where they protect their computing
;centers and let the customer handle the rest. &&&&undefined.0&&&&&1&&&N.
cloud-L3.007&esa&0&&AWS makes a distinction of ________ security, meaning their buildings where servers reside, as being “on
;the cloud.”&physical&&AWS makes a distinction of [physical] security, meaning their buildings where servers reside, as being “on
;the cloud.”&&&&undefined.0&&&&&1&&&N.
cloud-L3.008&esa&0&&Many businesses choose not to host certain types of ____ “in the cloud.” &data&&Many businesses choose not to host certain types of [data] “in the cloud.” &&&&undefined.0&&&&&1&&&N.
cloud-L3.009&esa&0&&Companies whose very business is defined by their data sometimes choose the ______ cloud approach and keep
;their data hosted at their own facilities, e.g. “on premise.” &hybrid&&Companies whose very business is defined by their data sometimes choose the [hybrid] cloud approach and
;keep their data hosted at their own facilities, e.g. “on premise.” &&&&undefined.0&&&&&1&&&N.
cloud-L3.010&esa&0&&Though most data hosting services are relatively secure, data __________ is one option for adding a layer
;of security to any data you choose to store and make accessible through the cloud.&encryption&&Though most data hosting services are relatively secure, data [encryption] is one option for adding a layer
;of security to any data you choose to store and make accessible through the cloud.&&&&undefined.0&&&&&1&&&N.
cloud-L3.011&esa&0&&It is still possible that encrypted data could be compromised, but that would either require the files to
;be _________, or intercepted before they are encrypted.&decrypted&&It is still possible that encrypted data could be compromised, but that would either require the files to
;be [decrypted], or intercepted before they are encrypted.&&&&undefined.0&&&&&1&&&N.
cloud-L3.012&esa&0&&Authentication deals with identity and ______ management (IAM). &access&&Authentication deals with identity and [access] management (IAM). &&&&undefined.0&&&&&1&&&N.
cloud-L3.013&esa&0&&For many years userids and passwords were the primary _______ mechanisms used to protect access, but in
;recent years additional means have been added.&security&&For many years userids and passwords were the primary [security] mechanisms used to protect access, but in
;recent years additional means have been added.&&&&undefined.0&&&&&1&&&N.
cloud-L3.014&esa&0&&It's common for an online service to require two factor authentication (TFA) at login, which is an added
;_____ of security that requires both a userid and password combination in addition to a second "factor"
;before access is granted. &layer&&It's common for an online service to require two factor authentication (TFA) at login, which is an added
;[layer] of security that requires both a userid and password combination in addition to a second "factor"
;before access is granted. &&&&undefined.0&&&&&1&&&N.
cloud-L3.015&esa&0&&The second factor in TFA is typically something as simple as a pin number, a number sequence from a
;physical security token, or an ______ code that is sent to a smartphone.&access&&The second factor in TFA is typically something as simple as a pin number, a number sequence from a
;physical security token, or an [access] code that is sent to a smartphone.&&&&undefined.0&&&&&1&&&N.
cloud-L3.016&esa&0&&Backups need to be provided for any important data hosted using cloud services. These backup services need
;to be configured based on how _______ the data needs to be, and verified that the backups are good and
;usable.&current&&Backups need to be provided for any important data hosted using cloud services. These backup services need
;to be configured based on how [current] the data needs to be, and verified that the backups are good and
;usable.&&&&undefined.0&&&&&1&&&N.
cloud-L3.017&esa&0&&Any hosted data will, of course, become unavailable (i.e. the data cant be accessed) if a business has any
;_______ connectivity issues to the cloud server where the data resides.&network&&Any hosted data will, of course, become unavailable (i.e. the data cant be accessed) if a business has any
;[network] connectivity issues to the cloud server where the data resides.&&&&undefined.0&&&&&1&&&N.