Question Bank Cloud Security
Question Bank Cloud Security
MODULE-2
17. Write short notes about the Computer Security Incident Response Team
(CSIRT).
18. Explain the security policy implementation.
19. Summarize different Virtualization Management Roles.
20. Explain virtualization security management in detail with a neat sketch
21. Explain the best practice security techniques for virtualized systems.
22. Describe the criteria that may be used to determine the classification of an
information object.
23. Discuss the virtualization security management with a neat diagram.
24. Explain the identity Management and Access Control in cloud security
architecture
25. Write a short note on different policy types.
26. Discuss Value of SSH .
27. Explain the special cases for the handling of sensitive or critical data.
28. Explain the components of key management in cloud security
architecture.
29. What are the details to be recorded in IT Audit logs
30. Describe the virtualization types
31. Explain virtualization security management with neat sketch
32. Outline the reason behind rogue hypervisors.
33. List different VM Threat Levels.
34. Define autonomic security? List the different autonomic computing
characteristics by IBM.
35. Explain updating and patching security techniques in VM.
36. Discuss Auditing of VM.
37. How are the Information of a organization is Classified
38. Describe the different types of cloud security management controls .
39. Explain the different types of employee termination .
40. Explain Remote Access VPN with a neat diagram.
MODULE-3
41. Differentiate between Internal and External security requirements
42. What are the basic properties that requirements should possess?
43. Define BCP/DRP. What are the alternative services during disasters
44. List out the six main attributes and 21 sub characteristics standard
characterizes software quality
45. Pick any 10 NIST 33 principles and briefly explain them.
46. What are the three primary goals of BIA
47. List and explain the basic properties that requirement should possess.
48. List out the seven principles that support information assurance and
Discuss in detail.
49. Explain in detail about the different types of testing in secure Cloud
software testing.
50. What are the four principle components of a BCP
51. List and explain with an example two types of IT auditors
52. What are the functions audited by IT auditors
53. Differentiate between internal and external security requirements
54. What are seven principles that support information assurance? Explain any
two in brief.
55. Explain in detail any two ISO 9126 software quality standard measures.
56. Explain security testing in detail.
57. What are the specific areas to be addressed by cloud provider’s w.r.t
disaster recovery?
58. 24.Explain the classification of Recovery Time Frame Requirements.
59. List and explain 3 primary goals of BIA along with 4 steps which are
generally involved in the process of BIA.
60. List out and explain in detail various Secure Development Practices
61. Abbreviate the following
a) CIA
b) ISO
c) NIST
d) DRP
e) BCP
MODULE-4
62. Discuss Network level Mitigation.
63. Write the host security threats.
64. Summarize PAAS Application security.
65. Discuss IAAS application security.
66. Describe the public cloud security Limitations.
67. Explain the different aspects of data security.
68. Summarize the types of data security(6M)
69. Define the following
a)Data Lineage b)Data Provenance c) Data Remanence d) Data
Mitigation
70. Describe the challenges of DOS and EDOS
71. Who is responsible for web application security in the cloud?.
72. Explain the types of Data Security.
73. Explain the Infrastructure Security in the Network Level
74. Discuss the Infrastructure security in the Host
75. Explain the Infrastructure security in the Application Level