Arcitura Education Cloud Technology Concepts C90.02 Exam Questions

Page: 1 / 14
Total 90 questions
Question 1

Messages being sent from a cloud service consumer to a cloud service are intercepted and maliciously altered by an intermediary service. This is an example of which cloud security threat?

Select the correct answer.



Answer : D


Question 2

A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: __________________.

Select the correct answer.



Answer : A


Question 3

A cloud service built as a SOAP-based Web service will have a service contract that is physically decoupled from the service's logic.

Select the correct answer.



Answer : A


Question 4

The resource replication mechanism can encompass a hypervisor that can support the multitenancy cloud characteristic.

Select the correct answer.



Answer : A


Question 5

Which of the following can be the result of a successful malicious intermediary attack?

SELECT ALL THAT APPLY



Answer : A, B, C, D


Question 6

Which of the following security threats is classified as a data-oriented threat?

Select the correct answer.



Answer : B


Question 7

A human working for a cloud consumer can access a virtual server to set up or maintain a cloud service that belongs to the cloud consumer.

Select the correct answer.



Answer : A


Page:    1 / 14   
Total 90 questions