Objective
Type Questions:
1. What
are the typical Cloud Management Use Cases?
A. Single-Click
deployment of complex multi-tier applications in the cloud (Development, QA,
Production)
B. Auto-scaling:
handle demand bursts/variations by automatically adding/removing resources
C. Run-time
management of application infrastructure in the cloud
D. All of above
2. ACM stands for ………………………………………………………………………………………………………………………………………….
3. DMTF stands for…………………………………………………………………………………………………………………………………………
4. NIST stands
for………………………………………………………………………………………………………………………………………….
5. OCC stands for…………………………………………………………………………………………………………………………………………..
6. OGF stands
for………………………………………………………………………………………………………………………………………….
7. SNIA stands
for…………………………………………………………………………………………………………………………………………
8. CSA stands for………………………………………………………………………………………………………………………………………….
9. ODCA stands
for……………………………………………………………………………………………………………………………………….
10. ILM stands
for………………………………………………………………………………………………………………………………………..
11. Which is not the cloud security controls?
A. Deterrent B. Protective C.
Preventive D. Detective
12. Which step is/are correct to establish identity?
A. Established identity be authenticated
B. Authentication be portable
C. Authentication provide access to cloud
resources
D. All of the above
13. What are the incident response issues to secure the
cloud?
A. Audit B.
Downtime C.
Punishment D.
All of these
14. What are the data lifecycle management issues to secure
the cloud?
A. Testing B.
History C.
Audit D.
All of these
15. What are the vulnerability management issues to secure
the cloud?
A. Metrics B.
Secrecy C.
Security D.
All of these
Short
answer type:
1. Explain how to establish identity in secured cloud.
2. How to secure cloud in cloud computing environment?
3. Describe cloud security controls.
4. What are the typical cloud management use cases?
5. List the highlights of cloud computing technology with
diagram.
Long
answer type:
1. List and explain emerging cloud management standards.
2. Explain cloud security and privacy issues.
3. List the key feature of cloud management.
4. Explain controls of cloud security with diagram.
5. Write short notes on below topics related to securing the
cloud:
A. Incident Response B.
Data Lifecycle Management C.
Vulnerability Management
No comments:
Post a Comment
Open Researcher and Contributor ID (ORCID)