Written Lab
Fill in the blanks for the questions provided in the written lab. You can find the answers to the written labs in Appendix B.
- The process of organizing information into different tiers or categories is referred to as ______ ______.
- Dividing your cloud fleet of servers into smaller discrete areas for the purpose of applying a granular security policy is known as ______.
- Data that is obfuscated on a RAID 5 storage array is ______ ______ encryption.
- Multifactor authentication includes something you ______ and something you ______.
- Hands-off programmatically driven cloud configuration change is commonly referred to as ______.
- ______ allow for a defined machine-to-machine software interaction to enable automation.
- The ______ ______ ______ is a user-friendly front end interface to a service’s APIs.
- Network-based ______ ______ ______ take active security breach countermeasures.
- Cloud-based security places a load on a virtual machine’s ______.
- Security ______ can allow...