EH Chapter 15: Cloud Computing And The Internet Of Things

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

20 Terms

1
New cards

Which of these is not an example of an IoT device?

Chromebook

2
New cards

Why is REST a common approach to web application design?

HTTP is stateless.

3
New cards

Which of these cloud offerings relies on the customer having the most responsibility?

Infrastructure as a service

4
New cards

Which of these is less likely to be a common element of cloud‐native design?

Virtual machines

5
New cards

Which of these is not an advantage of using automation in a cloud environment?

Fault tolerance

6
New cards

What common element of a general‐purpose computing platform does an IoT not typically have?

External keyboards

7
New cards

If you wanted to share documents with someone using a cloud provider, which service would you be most likely to use?

Storage as a service

8
New cards

What tool could you use to identify IoT devices on a network?

nmap

9
New cards

What might you be most likely to use to develop a web application that used a mobile application for the user interface?

RESTful API

10
New cards

Which of these might be a concern with moving services to a cloud provider, away from on‐premise services?

Inability to implement security controls

11
New cards

What modern capability does fog computing support?

IoT

12
New cards

Which of these is an example of grid computing?

SETI@home

13
New cards

What is a botnet an example of?

Grid computing

14
New cards

Which of these would be least likely as a vulnerability to serverless web applications?

Command injection

15
New cards

No matter what cloud‐based service model is being used, which of these is the customer always responsible for?

Data

16
New cards

What devices would you find at the lowest layer of the Purdue model and, as a result, should be the best protected?

Sensors and actuators

17
New cards

What aspect of the Purdue model is considered essential from a security perspective?

Segmentation

18
New cards

What is a good mitigation against credential compromise in cloud‐based services?

Requiring MFA

19
New cards

Which of these might be a common problem with a cloud‐based service leading to data exposure?

Public buckets

20
New cards

Which of these would not be used to automate deployment of systems into a cloud environment?

Containers

Explore top flashcards