Chapter 4: Implementing Cloud Security
A, C, D. Cloud segmentation is the process of dividing up your cloud deployment into sections that allow for granular security. Common segments include compute, network, and storage. APIs, JSON, and XML are software constructs to enable automation.
B, D. One-time numerical tokens are generated on keyfob hardware devices and smartphone soft-token applications.
C. Applying security applications on a virtual server will cause an increase in CPU usage.
C. Automation of cloud deployments was instrumental in the growth of cloud-based services.
B, D. Storage systems and database applications are both examples of data at rest or being processed in the cloud. While VPNs and client encryption are valid security systems, they are not associated with your internal cloud security posture.
C. A dashboard is a graphical portal that provides updates and an overview of operations.
Ultimately the responsibility for data in the cloud belongs to the organization...