Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
________ is a dedicated key management service and cloud hardware security module (HSM) that supports industry standards such as PKCS #11 that allow you to protect cloud encryption and is the only service in the industry built on FIPS 140-2 Level-4 certified hardware.
Which connectivity option would an enterprise use to connect multiple IBM Cloud VPCs with classic infrastructure resources?
____________ is defined as a single-tenant KMS and hardware security module (HSM) that's controlled and accessed by you. It is one of two IBM key management systems, the other being IBM Key Protect.
___________ allows for Federated users to be added to access groups based on specific identity attributes, such as a LDAP group you are a member of. Based on the rules you set, Federated IDs are automatically mapped when the user logs in.Dynamic Rules for Access Groups
This IBM Cloud security service helps view, capture, record, search, and export API call logs made by applications and users to IBM CloudAPIs/Resources.
Which IBM Cloud service provides protection starting from the build, through deployment and management for Linux workloads on IBM Z and LinuxONE, and throughout the application lifecycle?
Which two IBM Cloud services provides secure key storage and cryptographic operations within a FIPS 140-2 Level 3 and is tamper-resistant?
_______ enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host and provides data-in-use protection.
When is a customer's data protected when using Virtual Private Cloud Virtual Server Instance (VPC VSIs) from the storage system to the host/hypervisor within IBM Cloud?
When you integrate a supported service with Hyper Protect Crypto Services, you ________________ for that service and wrap in your data encryptions keys for data at rest.
This tool is used to monitor successful and unsuccessful login attempts by application developers.
Which connectivity option should an enterprise choose if their data center is on-premises and they need to connect to all IBM Cloud regions worldwide from a single connection?
Which Encryption Key Lifecycle state is defined as: "...the key is unable to cryptographically protect data and can be moved only to the Active or Destroyed states?"
_______ and _______ enable users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host and provides data-in-use protection.
_________ offers a flexible and scalable platform where you can provision and manage a PostgreSQL database or a MongoDB database that implements security protection at all levels, including workload isolation, data encryption (Bring Your Own Key and Keep Your Own Key), and identity and administration access control to ensure that your data is protected in a multi-tenancy environment.
What allows you to secure apps, back-end resources and APIs; customize use user's data to customize their experience in your app; and create a Cloud Directory, which makes it possible for you to add user sign-up and sign-in to your apps?
In IBM Cloud Kubernetes Service, which two integrated tools can be used to capture all cluster-related events, such as adding a worker node, rolling update progress, or capacity usage information?
_________ is the process of storing files on edge servers.
This service helps monitor threats, discover cloud security risks, and centrally manages all security tools in IBM Cloud.
What connectivity option should an enterprise choose if their data center is in a physical location that can't reach a dedicated colocation facility and their data needs are less than 5 GBPS?
