nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #91

CERTIFIED-IN-CYBERSECURITY Question #91: Real Exam Question with Answer & Explanation

The correct answer is B: Zero Customer Responsibility. The characteristics of the cloud, also known as the "five essential characteristics" of cloud computing, are (see ISC2 Study Guide, chapter 4, module 3): Broad network access: Cloud resources, such as the internet, can be accessed over a network; Rapid elasticity: Cloud resources

Security Principles

Question

Which of these is NOT a characteristic of the cloud?

Options

  • AMeasured Service
  • BZero Customer Responsibility
  • CRapid Elasticity
  • DBroad Network Access

Explanation

The characteristics of the cloud, also known as the "five essential characteristics" of cloud computing, are (see ISC2 Study Guide, chapter 4, module 3): Broad network access: Cloud resources, such as the internet, can be accessed over a network; Rapid elasticity: Cloud resources can be scaled up or down quickly and automatically to meet changing demand; Measured service: Cloud providers track and measure the use of resources, and users are typically charged based on their usage; Resource pooling: Cloud providers pool resources (such as storage and computing power) and allocate them to users on demand; On-demand self- service: Cloud users can access computing resources on demand without human intervention. Finally, the cloud model is typically run under the shared responsibility model, where the provider is responsible for both maintaining the infrastructure and delivering the resources and services to the customer. In contrast, the customer uses the resources and services according to the terms of their agreement with the provider. Therefore, zero customer responsibility is NOT a characteristic of the cloud.

Topics

#Cloud Computing#Cloud Characteristics#NIST Cloud#Shared Responsibility Model

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions