Prévia do material em texto
Painel / Meus cursos / Administration of Government Cloud Services / Module 3: Mechanisms of Cloud Information Security / Evaluation Exercise - Module 3 Questão 1 Correto Atingiu 1,00 de 1,00 Questão 2 Correto Atingiu 1,00 de 1,00 Iniciado em quinta, 12 out 2023, 16:11 Estado Finalizada Concluída em quinta, 12 out 2023, 16:12 Tempo empregado 1 minuto 8 segundos Notas 3,00/3,00 Avaliar 15,00 de um máximo de 15,00(100%) Considering the cloud access control techniques, check the correct option. Examples of best practices on control of access in the cloud are: Escolha uma opção: a. It is important to enable two-step authentication for administrator users only. b. Groups with application access profiles should be created at the provider's console, as there is no integration with third-party directory services. c. It is important to limit a user's permissions only to those tasks (Cloud actions or operations) and resources required for the user's work. Correct Alternative! d. Another interesting feature is Single Sign-On authentication, however it is not possible to authenticate users through social identity providers such as Facebook. Sua resposta está correta. It is important to limit a user's permissions only to those tasks (Cloud actions or operations) and resources required for the user's work. For example, you provide admin-level access to the security team for the accounts that run the security tools, but grant auditor-level access only for the other accounts for monitoring purposes. Considering encryption technologies in the cloud, check the correct option. These are characteristics of data encryption in transit: Escolha uma opção: a. Protects data through encryption during storage so that it is not exported or affected if the system is compromised. b. Applied to the hardware layer that supports data storage. c. Protects data if communication is intercepted during data transmission between a website and a cloud provider or between two services. Correct Alternative! d. Employed in the physical transport of data, for example, encryption of data stored on HD's that will be transferred from one DataCenter to another. Sua resposta está correta. Protects data if communication is intercepted during data transmission between a website and a cloud provider or between two services. This protection is achieved by encrypting the data before transmission, authenticating the endpoints, and finally decrypting and verifying the data upon arrival. For example, we often use the Transport Layer Security (TLS) protocol to encrypt data in transit and ensure transport security. Administration of Government Cloud Services Notas Area of the Participant Module 1: Cloud Computing Overview Module 2: Basic Infrastructure Items Module 3: Mechanisms of Cloud Information Security Module 4: Technological Imprisonment (Lock-in) Module 5: Managing Cost Closure Module Painel Meus cursos Selecione o idioma Powered by Tradutor https://mooc38.escolavirtual.gov.br/my/ https://mooc38.escolavirtual.gov.br/course/view.php?id=14161 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-3 https://mooc38.escolavirtual.gov.br/mod/quiz/view.php?id=266435 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161 https://mooc38.escolavirtual.gov.br/grade/report/index.php?id=14161 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-0 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-1 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-2 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-3 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-4 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-5 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-6 https://mooc38.escolavirtual.gov.br/my/ https://www.escolavirtual.gov.br/aluno/cursos/andamento https://translate.google.com/ https://translate.google.com/ https://translate.google.com/ Questão 3 Correto Atingiu 1,00 de 1,00 Considering the security technologies and availability of cloud applications, check the correct option. Among the functionalities of a WAF (Web Application Firewall) we can mention: Escolha uma opção: a. It allows you to specify which web application traffic is allowed or blocked by defining customizable web security rules. Correct Alternative! b. Improves content delivery by replicating commonly requested files (static content) in a globally distributed set. c. Used to route HTTP/HTTPS (or Layer 7) traffic, very suitable for distributing traffic based on geographic location. d. Delivers a local copy of the content of a nearby cache border or Point of Presence (PoP). Sua resposta está correta. WAF is a web application firewall that helps to protect these applications from common web exploits that can affect application availability, compromise security, or consume excessive resources. WAF allows you to specify which web application traffic is allowed or blocked by defining customizable web security rules. You can use WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed specifically for your application. New rules can be deployed in minutes, allowing you to quickly respond to dynamic traffic patterns. Also, WAF includes an all-in-one API that you can use to automate the creation, deployment, and maintenance of web security rules. ◄ Evaluation Exercise - Module 2 Seguir para... Evaluation Exercise - Module 4 ► Administration of Government Cloud Services Notas Area of the Participant Module 1: Cloud Computing Overview Module 2: Basic Infrastructure Items Module 3: Mechanisms of Cloud Information Security Module 4: Technological Imprisonment (Lock-in) Module 5: Managing Cost Closure Module Painel Meus cursos Powered by Tradutor https://mooc38.escolavirtual.gov.br/mod/quiz/view.php?id=266432&forceview=1 https://mooc38.escolavirtual.gov.br/mod/quiz/view.php?id=266438&forceview=1 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161 https://mooc38.escolavirtual.gov.br/grade/report/index.php?id=14161 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-0 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-1 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-2 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-3 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-4 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-5 https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-6 https://mooc38.escolavirtual.gov.br/my/ https://www.escolavirtual.gov.br/aluno/cursos/andamento https://translate.google.com/ https://translate.google.com/ https://translate.google.com/