A. Infrastructures as a Service
B. A Hybrid Cloud
C. A Community Cloud
D. A Private Cloud
E. Jericho Cloud Cube Model
A. The majority is covered by the consumer
B. The cloud provider
C. It depends on the agreement
D. The cloud consumer
E. The responsibility is split equally
A. They represent the logging of different networking solutions, and DNS Logs are more suitable for a ZTA implementation
B. They play identical functions and can be used interchangeably
C. DNS Logs record domain name resolution requests and responses, while Flow Logs record info on source, destination, protocol
D. DNS Logs record all the information about the network behavior, including source, destination, and protocol, while Flow Logs record users' applications behavior
A. Giving a third party vendor permission to work on your cloud solution
B. Enforcing the rules by which access is granted to the resources
C. Establishing/asserting the identity to the application
D. Checking data storage to make sure it meets compliance requirements
E. The process of specifying and maintaining access policies
A. Use of immutable containers
B. Employing Role-Based Access Control (RBAC) for container access
C. Implementing dynamic network segmentation policies
D. Regular vulnerability scanning of deployed containers
A. Unlimited bandwidth
B. Hybrid clouds
C. Measured service
D. Multi-tenancy
E. Nation-state boundaries
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS)
D. Database as a Service (DBaaS)
A. Metastructure
B. Applistructure
C. Hypervisor
D. Orchestration
E. Virtualization
A. True
B. False
A. Preparation
B. Detection and Analysis
C. Containment, Eradication, and Recovery
D. Post-Incident Activity