As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which of the following is a correct statement?
- The cloud service provider will inherently provide the required security features.
- To define the security needed, you need to do a comprehensive assessment of the cloud service and the application.
- A cloud application security control mirrors the controls in native applications.
- All of the above.
- Which of the following is the standard for interoperable cloud-based key management?
- KMIP
- PMIK
- AIMK
- CMIL
- Which of the following is one of the most actively developing and important areas of cloud computing technology?
- Logging
- Auditing
- Regulatory compliance
- Authentication
- AWS supports ________ Type II audits.
- SAS70
- SAS20
- SAS702
- SAS07
- Security methods such as private encryption, VLANs, and firewalls come under the __________ subject area.
a...