Showing posts with label incident response. Show all posts
Showing posts with label incident response. Show all posts

Friday, June 05, 2015

Cloud computing question bank



Objective Type Questions:
1. What are the typical Cloud Management Use Cases?
A. Single-Click deployment of complex multi-tier applications in the cloud (Development, QA, Production)
B. Auto-scaling: handle demand bursts/variations by automatically adding/removing resources
C. Run-time management of application infrastructure in the cloud
D. All of above

2. ACM stands for ………………………………………………………………………………………………………………………………………….
3. DMTF stands for…………………………………………………………………………………………………………………………………………

4. NIST stands for………………………………………………………………………………………………………………………………………….

5. OCC stands for…………………………………………………………………………………………………………………………………………..

6. OGF stands for………………………………………………………………………………………………………………………………………….

7. SNIA stands for…………………………………………………………………………………………………………………………………………

8. CSA stands for………………………………………………………………………………………………………………………………………….

9. ODCA stands for……………………………………………………………………………………………………………………………………….

10. ILM stands for………………………………………………………………………………………………………………………………………..

11. Which is not the cloud security controls?
A. Deterrent                                       B. Protective                                     C. Preventive                                    D. Detective

12. Which step is/are correct to establish identity?
A. Established identity be authenticated
B. Authentication be portable
C. Authentication provide access to cloud resources
D. All of the above

13. What are the incident response issues to secure the cloud?
A. Audit                                                B. Downtime                                     C. Punishment                                  D. All of these

14. What are the data lifecycle management issues to secure the cloud?
A. Testing                                            B. History                                           C. Audit                                                D. All of these

15. What are the vulnerability management issues to secure the cloud?
A. Metrics                                           B. Secrecy                                           C. Security                                          D. All of these

Short answer type:
1. Explain how to establish identity in secured cloud.
2. How to secure cloud in cloud computing environment?
3. Describe cloud security controls.
4. What are the typical cloud management use cases?
5. List the highlights of cloud computing technology with diagram.

Long answer type:
1. List and explain emerging cloud management standards.
2. Explain cloud security and privacy issues.
3. List the key feature of cloud management.
4. Explain controls of cloud security with diagram.
5. Write short notes on below topics related to securing the cloud:
A. Incident Response                                     B. Data Lifecycle Management                 C. Vulnerability Management

Search Aptipedia