Question

Discuss the protocol, security services available in AWS and AZURE.

Discuss the protocol, security services available in AWS and AZURE.

Homework Answers

Answer #1

ANSWERS :

ANS 1. Security services available in AZURE :

1. It provides Backup.

2. It ensures recovery from the disaster.

3. It provides the security to the database.

4. It ensures that no random person gets access i.e. provides access management.

5. It also provides the storage security.

--- Protocol present and used in AZURE :

1. MQTT ( MQ Telemetry Transport )

2. AMQP ( Advance Message Queuing Protocol )

3. HTTPS

----The security services available in AWS :

1. It provides security to the infrastructure.

2. It ensures the privacy of the data.

3. It also ensure that no random person gets the access i.e. provides access management.

4. It provides the protection to the data.

5. It provides regular monitoring.

6. The threats are also detected accurately and efficiently.

--- Protocol present and used in AWS :

1. HTTP ( Hyper text transfer protocol )

2. MQTT ( MQ Telemetry Transport )

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
During a course project in AWS or a similar cloud services, imagine running an application that...
During a course project in AWS or a similar cloud services, imagine running an application that could have access to a Hadoop Distributed File System (HDFS), an Elastic Block Service (EBS) and a Simple Storage Service (S3).
When is data available during a read protocol versus a write protocol? Answer in terms of...
When is data available during a read protocol versus a write protocol? Answer in terms of the setup, read, and write timing windows.
We know that TCP does not provide security services, but it can be enhanced with TLS...
We know that TCP does not provide security services, but it can be enhanced with TLS to do that. Answer the following: [ / 4] a) Does TLS operate at the transport layer or the application layer? b) Where does an application developer should write the TLS code? c) What security services TLS can provide? d) To what layer of the OSI protocol stack TLS belongs?
What AWS resource acts as a firewall and can be configured to only allow traffic from...
What AWS resource acts as a firewall and can be configured to only allow traffic from specific resources/ports to provide hardened network security? Group of answer choices Identity and Access Management (IAM) Security groups Cloud firewall AWS Web Application Firewall (WAF)
A security analyst has been to implement secure protocol is to prevent clear text credentials from...
A security analyst has been to implement secure protocol is to prevent clear text credentials from being transmitted or the internal Network. Which of the following protocols is a security analyst most likely to implement? Select 2 SNMPv3 s/mime Dnssec SSH SFTP
A security analyst has been to implement secure protocol to prevent clear text credentials from being...
A security analyst has been to implement secure protocol to prevent clear text credentials from being transmitted or the internal Network. Which of the following protocols is a security analyst most likely to implement? Select 2 SNMPv3 s/mime Dnssec SSH SFTP
explain the importance of internet control management protocol (ICMP) in delivery of internet protocol (IP) best-effort...
explain the importance of internet control management protocol (ICMP) in delivery of internet protocol (IP) best-effort service and discuss the categories of icmp message.
Appendix: Adjustment Data on an End-of-Period Spreadsheet Alert Security Services Co. offers security services to business...
Appendix: Adjustment Data on an End-of-Period Spreadsheet Alert Security Services Co. offers security services to business clients. The trial balance for Alert Security Services Co. has been prepared on the following end-of-period spreadsheet for the year ended October 31, 20Y5. In addition, the data for year-end adjustments are as follows: Fees earned but not yet billed, $37. Supplies on hand, $9. Insurance premiums expired, $46. Depreciation expense, $18. Wages accrued but not paid, $18. Enter the adjustment data and place...
Discuss the security of the Kerberos authentication system?
Discuss the security of the Kerberos authentication system?
To ensure the information security of outsourced IT services, which of the following is the MOST...
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity? A. Review samples of service level reports from the service provider. B. Assess the level of security awareness of the service provider. C. Request that the service provider comply with information security policy. D. Review the security status of the service provider. Correct Answer: C?? or D???