The attack occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker gaining access to IT resources that are normally protected. Select the correct answer.
A. denial of service
B. malicious intermediary
C. insufficient authorization
D. virtualization
White box testing is commonly used with which of the following cloud delivery models? SELECT ALL THAT APPLY
A. Infrastructure-as-a-Service (IaaS)
B. Platform-as-a-Service (PaaS)
C. Software-as-a-Service (SaaS)
D. Replicated Software-as-a-Service (SaaS)
A human working for a cloud consumer can access a virtual server to set up or maintain a cloud service that belongs to the cloud consumer. Select the correct answer.
A. True
B. False
REST services share a uniform contract and therefore cannot be deployed in cloud environments without a multi-device broker mechanism. Select the correct answer.
A. True
B. False
A cloud service consumer can access a cloud-based relational database via a cloud service. Select the correct answer.
A. True
B. False
Two redundantly deployed cloud services need to be configured so that they are kept in sync with each other. Which of the following roles would be most suitable for this task? Select the correct answer.
A. cloud service consumer
B. cloud service owner
C. cloud resource administrator
D. None of the above.
A successful attack on a virtual server within a public cloud will negatively impact multiple cloud consumers, as long as none of the cloud consumers share the same trust boundary that encompasses the underlying physical server. Select the correct answer.
A. True
B. False
Which of the following characteristics of cloud-based IT resources can be measured with Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) implementations? SELECT ALL THAT APPLY
A. availability
B. confidentiality
C. reliability
D. performance