Page 187 - Cloud Essentials
P. 187

terms. Information Security Management allows only authorized users

                     to access any IT-related service or data belonging to an organization.


               46.   Choosing a cloud service that provides the same functionality as an in-
                     house system applies to which ITIL life-cycle phase?
                       A.    Service Design

                       B.    Service Strategy

                       C.    Service Operation
                       D.    Service Transition


                          A. Evaluating functional equivalents of in-house IT systems relates
                     to the Service Design phase.

                          B, C, and D are incorrect. Service Strategy involves defining and
                     implementing service strategies. Service Operation focuses on making
                     sure IT services are accessible and available at all times in the most
                     efficient and cost-effective way possible. Service Transition relates to
                     processes  such  as  Change  Management,  Configuration  Management,

                     and Asset Management.


               47.   The manipulation of people to disclose confidential information
                     defines what type of risk?
                       A.    Malware

                       B.    Denial of service

                       C.    Password cracking
                       D.    Social engineering


                          D. Tricking people to disclose sensitive information is referred to

                     as social engineering. This could be as simple as an imposter posing as
                     a  help-desk  member  calling  an  end  user  and  asking  for  password
                     information.
                            A,  B,  and  C  are  incorrect.  Malware  is  software  that  performs
                     malicious actions, such as deleting files from a hard disk. Denial-of-

                     service attacks render a network service unusable to legitimate users.
                     Password  cracking  involves  breaking  into  user  accounts  once  the
                     password has been determined, usually by automated means.


               48.   Why might a government agency be against storing its data in the
                     cloud?




                                                          187
   182   183   184   185   186   187   188   189   190   191   192