Page 187 - Cloud Essentials
P. 187
terms. Information Security Management allows only authorized users
to access any IT-related service or data belonging to an organization.
46. Choosing a cloud service that provides the same functionality as an in-
house system applies to which ITIL life-cycle phase?
A. Service Design
B. Service Strategy
C. Service Operation
D. Service Transition
A. Evaluating functional equivalents of in-house IT systems relates
to the Service Design phase.
B, C, and D are incorrect. Service Strategy involves defining and
implementing service strategies. Service Operation focuses on making
sure IT services are accessible and available at all times in the most
efficient and cost-effective way possible. Service Transition relates to
processes such as Change Management, Configuration Management,
and Asset Management.
47. The manipulation of people to disclose confidential information
defines what type of risk?
A. Malware
B. Denial of service
C. Password cracking
D. Social engineering
D. Tricking people to disclose sensitive information is referred to
as social engineering. This could be as simple as an imposter posing as
a help-desk member calling an end user and asking for password
information.
A, B, and C are incorrect. Malware is software that performs
malicious actions, such as deleting files from a hard disk. Denial-of-
service attacks render a network service unusable to legitimate users.
Password cracking involves breaking into user accounts once the
password has been determined, usually by automated means.
48. Why might a government agency be against storing its data in the
cloud?
187