C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
_____ drive security decisions. - correct answers ✅business requirements
All of these are reasons because of which an organization may want to consider
cloud migration, except: - correct answers ✅Elimination of risks
The generally accepted definition of cloud computing includes all of the following
characteristics except: - correct answers ✅negating the need for backups
When a cloud customer uploads PII to a cloud provider, who becomes ultimately
responsible for the security of that PII? - correct answers ✅cloud customer
We use which of the following to determine the critical paths, processes, and
assets of an organization? - correct answers ✅BIA
If a service or solution does not meet all of the specified key characteristics listed
below, it is said to be not true cloud computing. Please select the valid cloud
computing characteristics out of the terms identified below.
,C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
Each correct answer represents a complete solution. Choose all that apply. -
correct answers ✅On-demand self-service
Broad network access
Resource pooling
measured service
All of these technologies have made cloud service viable except: - correct answers
✅smart hubs
The cloud deployment model that features organizational ownership of the
hardware and infrastructure, and usage only by members of that organization, is
known as: - correct answers ✅private
The cloud deployment model that features ownership by a cloud provider, with
services offered to anyone who wants to subscribe, is known as: - correct answers
✅Public
The cloud deployment model that features joint ownership of assets among an
affinity group is known as: - correct answers ✅Community
,C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
If a cloud customer wants a secure, isolated sandbox in order to conduct software
development and testing, which cloud service model would probably be best? -
correct answers ✅PaaS
If a cloud customer wants a fully-operational environment with very little
maintenance or administration necessary, which cloud service model would
probably be best? - correct answers ✅SaaS
If a cloud customer wants a bare-bones environment in which to replicate their
own enterprise for BC/DR purposes, which cloud service model would probably be
best? - correct answers ✅IaaS
Which of the following is not a common cloud service model? - correct answers
✅Programming as a Service
Cloud Access Security Brokers (CASBs) might offer all the following services
EXCEPT: - correct answers ✅BC / DR / COOP
, C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
If a cloud customer cannot get access to the cloud provider, this affects what
portion of the CIA triad? - correct answers ✅Availability
All of the following can result in vendor lock-in except: - correct answers
✅Statutory compliance
The risk that a cloud provider might go out of business and the cloud customer
might not be able to recover data is known as: - correct answers ✅vendor lock-
out
All of these are features of cloud computing except: - correct answers
✅Reversed charging configuration
Cloud vendors are held to contractual obligations with specified metrics by: -
correct answers ✅SLAs
Gathering business requirements can aid the organization in determining all of
this information about organizational assets, except: - correct answers
✅Usefulness
As LATEST UPDATE 2023 GRADED A+
_____ drive security decisions. - correct answers ✅business requirements
All of these are reasons because of which an organization may want to consider
cloud migration, except: - correct answers ✅Elimination of risks
The generally accepted definition of cloud computing includes all of the following
characteristics except: - correct answers ✅negating the need for backups
When a cloud customer uploads PII to a cloud provider, who becomes ultimately
responsible for the security of that PII? - correct answers ✅cloud customer
We use which of the following to determine the critical paths, processes, and
assets of an organization? - correct answers ✅BIA
If a service or solution does not meet all of the specified key characteristics listed
below, it is said to be not true cloud computing. Please select the valid cloud
computing characteristics out of the terms identified below.
,C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
Each correct answer represents a complete solution. Choose all that apply. -
correct answers ✅On-demand self-service
Broad network access
Resource pooling
measured service
All of these technologies have made cloud service viable except: - correct answers
✅smart hubs
The cloud deployment model that features organizational ownership of the
hardware and infrastructure, and usage only by members of that organization, is
known as: - correct answers ✅private
The cloud deployment model that features ownership by a cloud provider, with
services offered to anyone who wants to subscribe, is known as: - correct answers
✅Public
The cloud deployment model that features joint ownership of assets among an
affinity group is known as: - correct answers ✅Community
,C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
If a cloud customer wants a secure, isolated sandbox in order to conduct software
development and testing, which cloud service model would probably be best? -
correct answers ✅PaaS
If a cloud customer wants a fully-operational environment with very little
maintenance or administration necessary, which cloud service model would
probably be best? - correct answers ✅SaaS
If a cloud customer wants a bare-bones environment in which to replicate their
own enterprise for BC/DR purposes, which cloud service model would probably be
best? - correct answers ✅IaaS
Which of the following is not a common cloud service model? - correct answers
✅Programming as a Service
Cloud Access Security Brokers (CASBs) might offer all the following services
EXCEPT: - correct answers ✅BC / DR / COOP
, C838 - Managing Cloud Security Q&
As LATEST UPDATE 2023 GRADED A+
If a cloud customer cannot get access to the cloud provider, this affects what
portion of the CIA triad? - correct answers ✅Availability
All of the following can result in vendor lock-in except: - correct answers
✅Statutory compliance
The risk that a cloud provider might go out of business and the cloud customer
might not be able to recover data is known as: - correct answers ✅vendor lock-
out
All of these are features of cloud computing except: - correct answers
✅Reversed charging configuration
Cloud vendors are held to contractual obligations with specified metrics by: -
correct answers ✅SLAs
Gathering business requirements can aid the organization in determining all of
this information about organizational assets, except: - correct answers
✅Usefulness