Buscar

Administration of Government Cloud Services-Evaluation Exercise - Module 3_ Revisão da tentativa


Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Prévia do material em texto

Painel / Meus cursos / Administration of Government Cloud Services / Module 3: Mechanisms of Cloud Information Security
/ Evaluation Exercise - Module 3
Questão 1
Correto
Atingiu 1,00 de 1,00
Questão 2
Correto
Atingiu 1,00 de 1,00
Iniciado em quinta, 12 out 2023, 16:11
Estado Finalizada
Concluída em quinta, 12 out 2023, 16:12
Tempo
empregado 1 minuto 8 segundos
Notas 3,00/3,00
Avaliar 15,00 de um máximo de 15,00(100%)
Considering the cloud access control techniques, check the correct option.
Examples of best practices on control of access in the cloud are:
Escolha uma opção:
a. It is important to enable two-step authentication for administrator users only.
b. Groups with application access profiles should be created at the provider's console, as there is no
integration with third-party directory services.
c. It is important to limit a user's permissions only to those tasks (Cloud actions or operations) and
resources required for the user's work.  Correct Alternative!
d. Another interesting feature is Single Sign-On authentication, however it is not possible to authenticate
users through social identity providers such as Facebook.
Sua resposta está correta.
It is important to limit a user's permissions only to those tasks (Cloud actions or operations) and resources
required for the user's work. For example, you provide admin-level access to the security team for the accounts
that run the security tools, but grant auditor-level access only for the other accounts for monitoring purposes.
Considering encryption technologies in the cloud, check the correct option.
These are characteristics of data encryption in transit:
Escolha uma opção:
a. Protects data through encryption during storage so that it is not exported or affected if the system is
compromised.
b. Applied to the hardware layer that supports data storage.
c. Protects data if communication is intercepted during data transmission between a website and a cloud
provider or between two services.  Correct Alternative!
d. Employed in the physical transport of data, for example, encryption of data stored on HD's that will be
transferred from one DataCenter to another.
Sua resposta está correta.
Protects data if communication is intercepted during data transmission between a website and a cloud provider
or between two services. This protection is achieved by encrypting the data before transmission, authenticating
the endpoints, and finally decrypting and verifying the data upon arrival. For example, we often use the
Transport Layer Security (TLS) protocol to encrypt data in transit and ensure transport security.
Administration of
Government Cloud
Services
Notas
Area of the Participant
Module 1: Cloud
Computing Overview
Module 2: Basic
Infrastructure Items
Module 3: Mechanisms of
Cloud Information
Security
Module 4: Technological
Imprisonment (Lock-in)
Module 5: Managing Cost
Closure Module
 Painel
 Meus cursos
Selecione o idioma
Powered by Tradutor
https://mooc38.escolavirtual.gov.br/my/
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-3
https://mooc38.escolavirtual.gov.br/mod/quiz/view.php?id=266435
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161
https://mooc38.escolavirtual.gov.br/grade/report/index.php?id=14161
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-0
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-1
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-2
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-3
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-4
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-5
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-6
https://mooc38.escolavirtual.gov.br/my/
https://www.escolavirtual.gov.br/aluno/cursos/andamento
https://translate.google.com/
https://translate.google.com/
https://translate.google.com/
Questão 3
Correto
Atingiu 1,00 de 1,00
Considering the security technologies and availability of cloud applications, check the correct option.
Among the functionalities of a WAF (Web Application Firewall) we can mention:
Escolha uma opção:
a. It allows you to specify which web application traffic is allowed or blocked by defining customizable web
security rules.  Correct Alternative!
b. Improves content delivery by replicating commonly requested files (static content) in a globally
distributed set.
c. Used to route HTTP/HTTPS (or Layer 7) traffic, very suitable for distributing traffic based on geographic
location.
d. Delivers a local copy of the content of a nearby cache border or Point of Presence (PoP).
Sua resposta está correta.
WAF is a web application firewall that helps to protect these applications from common web exploits that can
affect application availability, compromise security, or consume excessive resources. WAF allows you to specify
which web application traffic is allowed or blocked by defining customizable web security rules. You can use WAF
to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules
that are designed specifically for your application. New rules can be deployed in minutes, allowing you to quickly
respond to dynamic traffic patterns. Also, WAF includes an all-in-one API that you can use to automate the
creation, deployment, and maintenance of web security rules.
◄ Evaluation Exercise - Module 2 Seguir para... Evaluation Exercise - Module 4 ►
Administration of
Government Cloud
Services
Notas
Area of the Participant
Module 1: Cloud
Computing Overview
Module 2: Basic
Infrastructure Items
Module 3: Mechanisms of
Cloud Information
Security
Module 4: Technological
Imprisonment (Lock-in)
Module 5: Managing Cost
Closure Module
 Painel
 Meus cursos
Powered by Tradutor
https://mooc38.escolavirtual.gov.br/mod/quiz/view.php?id=266432&forceview=1
https://mooc38.escolavirtual.gov.br/mod/quiz/view.php?id=266438&forceview=1
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161
https://mooc38.escolavirtual.gov.br/grade/report/index.php?id=14161
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-0
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-1
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-2
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-3
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-4
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-5
https://mooc38.escolavirtual.gov.br/course/view.php?id=14161#section-6
https://mooc38.escolavirtual.gov.br/my/
https://www.escolavirtual.gov.br/aluno/cursos/andamento
https://translate.google.com/
https://translate.google.com/
https://translate.google.com/

Continue navegando