Cloud Security and Privacy Questions and Answers

Multiple Choice Questions and Answers

Question 1 : Potential defense mechanism to repudiation include all of the following except

(a) Digital signatures
(b) Time stamps
(c) Audit trails
(d) Filtering

Answer : (d) Filtering

Question 2 : Authentication, authorization, throttling, and filtering are potential defense mechanisms for 

(a) Data tampering
(b) Repudiation
(c) Information Disclosure
(d) Denial of Service

Answer : (d) Denial of Service

Question 3 : The user layer of the cloud security architecture consists of the following except

(a) Authentication
(b) Security-as-a-Service
(c) Infrastructure
(d) Browser Security

Answer : (c) Infrastructure

Question 4 : Origin in browser security means

(a) Different browser
(b) Same application
(c) Source browser
(d) Origin application

Answer : (b) Same application

Question 5 : Cloud monitoring requirements are all of the following except

(a) Migration
(b) Scalability
(c) Portability
(d) Autonomy

Answer : (c) Portability

Question 6 : Which of the following is related to RESTful Web Services?

(a) CMS
(b) PCMONS
(c) RMCM
(d) CloudWatch

Answer : (a) CMS

Question 7 : When an authorized intruder access, copies or transmits private, confidential or sensitive data belonging to a person or organization, this phenomenon is known as 

(a) Data loss
(b) Data access
(c) Data breach
(d) Data hack

Answer : (c) Data breach

Question 8 : A cloud service level agreement is composed of all the following except 

(a) Service guarantee
(b) Service guarantee time period
(c) Service guarantee granularity
(d) Service guarantee inclusions

Answer : (d) Service guarantee inclusions

Question 9 : BladeSystem matrix servers are products of which cloud vendor?

(a) IBM
(b) HP
(c) Salesforce
(d) RackSpace

Answer : (b) HP

Question 10 : Customer relationship management is associated with one of the following cloud vendors.

(a) IBM
(b) HP
(c) Salesforce
(d) RackSpace

Answer : (c) Salesforce

Question 11 : HP Cloud Services Enablement for Infrastructure-as-a-Service is made up of all of the following except

(a) HP Cloud Service Automation
(b) HP Cloud Autumn Matrix server
(c) HP Aggregation Platform for SaaS
(d) HP BladeSystem Matrix server

Answer : (b) HP Cloud Autumn Matrix server

Question 12 : One of the following can be used to enhance the deployment of a successful private cloud architecture.

(a) HP Cloud Service Automation
(b) HP Cloud Autumn Matrix server
(c) HP Aggregation Platform for SaaS
(d) HP BladeSystem Matrix server

Answer : (a) HP Cloud Service Automation

Question 13 : Packet loss frequency is associated with which of the cloud QoS measures ?

(a) Computation
(b) Communication
(c) Memory
(d) Transport

Answer : (b) Communication

Question 14 : Maturity is associated with which of the cloud QoS measures ?

(a) Adaptability
(b) Usability
(c) Reliability
(d) Efficiency

Answer : (c) Reliability

Question 15 : Power usage efficiency is associated with which of the cloud QoS measures ?

(a) Sustainability
(b) Modifiability
(c) Reliability
(d) Reusability

Answer : (a) Sustainability

Question 16 : Cosine similarity is associated with none of the following trust management except

(a) Reputation-based
(b) Prediction-based
(c) Recommendation-based
(d) Policy-based

Answer : (b) Prediction-based

Question 17 : Amazon and eBay are examples of which trust management?

(a) Reputation-based
(b) Prediction-based
(c) Recommendation-based
(d) Policy-based

Answer : (a) Reputation-based

Question 18 : Which of the following cloud-enabled migration is also known as Cloudify?

(a) Type I
(b) Type II
(c) Type III
(d) Type IV

Answer : (d) Type IV

Question 19 : The techniques for provisioning quality of service to the cloud applications include all of the following except:

(a) Admission control
(b) Scheduling
(c) Handoff
(d) Dynamic resource provisioning

Answer : (c) Handoff

Question 20 : ‘Mean Time to Change’ is associated with

(a) Modifiability
(b) Usability
(c) Reusability
(d) Sustainability

Answer : (a) Modifiability

Fill in the Blanks

Question 1 : …………….. refers to the ability to share sensitive data between number of users without violating the privileges granted by the data owner to each of the targeted user.

Answer : Data confidentiality

Question 2 : When a browser is incapable of generating cryptographically-valid XML tokens, such an attack is known as …………. .

Answer : attacks on browser-based cloud authentication

Question 3 : ………………….. involves the scripting of web pages for access and usage rights.

Answer : The legacy same origin policy

Question 4 : ………………. uses IF-MAP standard to authorize users in real-time communication between the cloud provider and the consumer.

Answer : Trusted Platform Module (TPM)

Question 5 : …………. is a typical attack aimed at injecting a malicious service performance module into a legitimate instance of a virtual machine.

Answer : Cloud Malware Injection Attack

Question 6 : …………………….. is a component of the virtual machine that enables host isolation and resource sharing.

Answer : Hypervisor

Question 7 : ……………….. is the economics of cloud computing and a multi-tenancy architecture used in SaaS.

Answer : Data-at-rest

Question 8 : ……………….. can be referred to as a statistical concept associated with uncertain outcomes of business activities in the future. 

Answer : Risk

Question 9 : ………………….. is the degree of quality of a cloud service provided to a cloud service consumer by a cloud service provider.

Answer : Credibility

Question 10 : The resource scale on which a provider defines a service guarantee is known as ………………. .

Answer : Service guarantee granularity

Question 11 : ……………….. allows credentials to be issued following standards like Security Assertion Markup Language (SAML) and Simple Public Key Infrastructure (SPKI).

Answer : credential-based threshold

Question 12 : …………………… occurs when a cloud service consumer directly recommends a particular cloud service to their established trusted contacts.

Answer : Explicit recommendation

Question 13 : ………………. is an official document that clearly specifies technical and functional descriptions to be complied by the cloud service provider.

Answer : Service level agreement

Question 14 : ………………. is derived from the analysis of cloud service rating feedback supplied by trading partners after a transaction is completed successfully.

Answer : The trust level

Question 15 : ………….. reflects redundant provisioning of data storage and processing facilities to manage a potential single point of failure events.

Answer : Adaptability

Question 16 : ………….. is the assurance component for establishing and maintaining successful relational exchanges among all stakeholders in a cloud environment.

Answer : Trust management

Question 17 : ……………. involves the selection, deployment and run-time management of software and hardware resources for ensuring guaranteed satisfaction of cloud service performance to the end-users.

Answer : Dynamic Resource Provisioning

Question 18 : The speed of response to adjusted workload is known as ………………. .

Answer : cloud elasticity OR rapid elasticity (any one is correct)

Question 19 : ……………….. is a document that contains the records of all service level management problems related to a group of certain users.

Answer : Customer Level SLA

Question 20 : …………………. measures the quality of the efficiency of the connection and data transfer between internal service instances, different cloud services, or between external consumer and the cloud.

Answer : Communication

Cloud Computing Questions and Answers