Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

75F Sunny Remaining Time: 57 minutes, 21 seconds. Question Completion Status: 1 2 3 4 QUESTION 1 P 5 6 7 8 @X Briefly

imageimageimageimageimageimageimageimageimage

75F Sunny Remaining Time: 57 minutes, 21 seconds. Question Completion Status: 1 2 3 4 QUESTION 1 P 5 6 7 8 @X Briefly discuss the possible techniques to minimize/prevent data loss/leakage in cloud networking. Relate your discussion to different classes of data. [2 marks] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). BIUS Paragraph Arial = = = = 3.8 8: 1:3 TO) X X 9 10 & 53 T I 10pt TT < Click Save and Submit to save and submit. Click Save All Answers to save all answers. +] ABC !!! > S ASUS ZenBook !!! A V " A 8.8 - I Q5 2 X C QE = 0 2 points Save All Answers ... 8&A= Save Answer 0 WORDS POWERED BY TINY ENG US Save and Submit 10:51 AM 8/18/2022 x : VLON 78F Question Completion Status: 1 P 2 3 QUESTION 10 minutes, 21 seconds. 4 5 c. Availability d. Loyalty e. Confidentiality 6 7 8 9 10 In network storage virtualization, the three tenets of security are: (choose all applicable) [1 mark] a. Integrity b. Access lateness Click Save and Submit to save and submit. Click Save All Answers to save all answers. 0 WORDS POWERED BY 1 points Save A Save All Answers Save and Sub ENG US Remaining Time: 57 minutes, 15 seconds. Question Completion Status: 1 2 3 4 QUESTION 3 5 6 7 8 9 10 QUESTION 2 Chose all true best practices to ensure the security of sensitive data when it comes to encryption: (Choose all applicable) [1 mark] a. Encrypt data in motion at the client network using SSL/TLS or VPN tunnels for non-web-based applications. b. When the data is at rest on the enterprise premises or in the cloud it does not need to be encrypted. O c. All data should be encrypted using approved algorithms and long random encryption keys. d. The cloud provider and its staff should never have direct access to the decryption keys. e. A trustworthy cloud provider may have access to the decryption keys and will be considered liable in case of a security breach of the data. Appendix H. Practice for Chapter X Click Save and Submit to save and submit. Click Save All Answers to save all answers. + 2 points In network block storage virtualization the address blocks of all participant disk drives are aggregated as a single large logical drive. Consumers do not care about the physical aspect- storage such as the number of drives or arrays. Instead, they have simple requirements of network storage virtualization. Indicate and briefly explain these requirements. [2 Marks] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). 1 po Save All Answers S X T- 200 XI E Priva Remaining Time: 57 minutes, 09 seconds. 75F Sunny Question Completion Status: 1 2 3 QUESTION 3 4 5 6 7 8 2 points In network block storage virtualization the address blocks of all participant disk drives are aggregated as a single large logical drive. Consumers do not care about the physical aspects of data storage such as the number of drives or arrays. Instead, they have simple requirements of network storage virtualization. Indicate and briefly explain these requirements. [2 marks] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). BIUS Paragraph EEEE * 9 10 X XG 3.8 8 13 {:} O Arial KH + 10pt > < - Click Save and Submit to save and submit. Click Save All Answers to save all answers. +] ABC ASUS ZenBook V A V " V Ix V XQ5 Save All Answers Save Answer QWORDS POWERED RV TINV Save and Submit ENG US C 10:51 AM 8/18/2022 X a 1- gal E Priva Remaining Time: 57 minutes, 03 seconds. Question Completion Status: 75F Sunny 1 2 3 QUESTION 4 4 == 38 BE 5 6 2 points Briefly explain why auditing and logging are important in cloud computing. What are the challenges of auditing in cloud computing? Do cloud vendors need certification? Why do business consumers need to have access to their logs on the network? [2 marks] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). BIUS Paragraph v Arial E 7 {} 8 9 10 X X O K KU + v 10pt < T Click Save and Submit to save and submit. Click Save All Answers to save all answers. +] > V O ASUS ZenBook W v A V Ix A J A 88 1.A Save All Answers Save Answer 0 WORDS POWERED BY TINY ENG US Save and Submit 10:51 AM 8/18/2022 Remaining Time: 56 minutes, 57 seconds. Question Completion Status: 1 2 3 QUESTION 5 233 P 3.8 8.5 13 4 5 6 7 1/cl/outline 8 Indicate the advantage(s) and drawback(s) of provider-side encryption to secure the data in a cloud which is favored by Microsoft, Google, and Yahoo. [2 marks] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). BIUS Paragraph V Arial * O X X 9 10 V I 10pt >T TT < - Click Save and Submit to save and submit. Click Save All Answers to save all answers. +] ABC :3 v L !!! Appendix H. Practice for Chapter X A E Tx T FAY X F XQ5 + 8 2 points Save All Answers Save Answer 0 WORDS POWERED BY TINY 9 EX3 ENG Save and Submit 10:51 AM 8/19/2022 0 Priva 75F Sunny 1 2 3 QUESTION 6 4 QUESTION 7 5 6 7 80 9 10 For data sovereignty, active in-force laws of the country, regulations of the enterprise, and data sensitivity should be considered in specifying how to store the data. However, all enterprises should trust storing all of their data in the cloud as a common trustworthy solution. [1 mark] True O False In storing data in the cloud a technique called sharding is used to break the data in different data centers. The following is true about this technique: [1 Mark] Oa. It enhances security and performance. Ob. It worsens security but enhances performance. O c. It enhances security but may affect performance. Od. It enhances reliability but may affect security. Oe. It enhances security, reliability, and performance. Click Save and Submit to save and submit. Click Save All Answers to save all answers. ASUS ZenBook W Save All Answers 1 points 1 points ENG US Save A Save and Submit 8 Remaining Time: 56 minutes, 35 seconds. necacollege.ca/ultra/courses/_665129_1/cl/outline Question Completion Status: 1 2 3 QUESTION 8 4 5 6 QUESTION 9 7 8 9 10 CSN305 Virtual Classroom X The following is true about SDN and NFV: (Choose all applicable) [1 mark] a. Highly regulated industries such as healthcare and pharmaceutical that may have well-established service-oriented application network infrastructures that have served them well for decades are unlikely to benefit from SDN and NFV in the short term. O Appendix H. Practice for Chapter X b. Industries such as banking and financial services are prime candidates for adopting SDN and NFV because they are experiencing tremendous data growth in their data centers. Oc. Cloud providers will not embrace SDN and NFV innovations because their technology approaches do not need elastic and agile networks with support to large multitenant domains. Od. Likewise other inventions, the benefits of SDN and NFV will eventually be profound for industrial applications. Click Save and Submit to save and submit. Click Save All Answers to save all answers. The cloud and SDN present formidable security challenges. Discuss the encryption options available to secure the data while in motion in the cloud. [2 mark] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). + 1 points Save 2 points Save All Answers Save An Save and Sub X 19 D E Priv 75F Sunny Remaining Time: 56 minutes, 28 seconds. Question Completion Status: 1 2 QUESTION 9 3 == P 4 P 5 6 The cloud and SDN present formidable security challenges. Discuss the encryption options available to secure the data while in motion in the cloud. [2 mark] For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). BIUS Paragraph V Arial 3.8 8 3 {;} 7 8 9 10 O X X V 10pt I 1 Click Save and Submit to save and submit. Click Save All Answers to save all answers. [+ C ABC !!! V IT V A LOU I X O Q X AA @HAE 2 points Save Answer Save All Answers O WORDS POWERED BY TINY Save and Submit ENG US 10:52 8/18/2

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Forecasting

Authors: John E. Hanke, Dean Wichern

9th edition

132301202, 978-0132301206

More Books

Students also viewed these Computer Network questions

Question

How does the "invisible hand" work in a competitive market system?

Answered: 1 week ago