q7


What helps protect core business assets from internal and external attacks by implementing strong technical controls and adhering to industry best practices?

Select one:
a.Attack resiliency
b.Resiliency nonvulnerable attacks
c.Cloud security resilience
d.Cybersecurity resilience

When considering how to protect assets and data in the cloud, it is important to make the distinction between ___ and ___ clouds.

Select one:
a.Private, non-private
b.Public, private
c.Both A and B

d.None of the above

When deploying security controls for your organization’s cloud environment, it’s important to take into consideration?

Select one:
a.the different facets involved, and the requirements needed to gain a comfortable level of visibility and response capability.
b.challenges and security issues that are introduced when an organization wants to migrate services to the cloud
c.both A and B

d.none of the above

What type of scanners often the answer to help inspect and identify security risks and vulnerabilities when deploying systems in the cloud?

Select one:
a.3D Scanner
b.4D Scanner printer
c.Vulnerability scanners
d.None of the above

Vulnerability testing should be_____.
Select one:
a.Rigorous and consistent
b.IaaS configurations
c.Default configuration
d.Network configuration

In choosing a padding method, we need to address two aspects:

Select one:
a.satisfying the privacy property and minimizing padding cost.
b.Minimize security cost and meet the expectations of privacy and propriety method
c.Both A and B

d.None of the Above

A natural way to address the PPTP issue is to apply the well-known concept of ____.

Select one:
a.Differential privacy
b.In differential privacy
c.Cyber privacy

d.None of the above

Before discussing our solution, we first examine

Select one:
a.existing countermeasures,
b.packet-size rounding (increasing the size of each packet up to the closest multiple of given bytes) and random padding (increasing each packet size up to a random value).

c.apply the privacy preserving data publishing (PPDP) technique of generalization
d.Both A and B