Cloud Security
Cloud Security
a) Authentication
b) Authorization
c) Encryption
Answer: c) Encryption
3. Which cloud security component controls who can access specific cloud resources and what
actions they can perform?
a) Data Encryption
d) Network Security
4. What does Multi-Factor Authentication (MFA) require users to provide before accessing cloud
resources?
c) A fingerprint scan
d) A security token
a) By encrypting data
6. What does data backup and disaster recovery in cloud security involve?
Answer: b) Regularly backing up data and having plans to recover it in case of disasters
7. Which cloud security component helps detect suspicious behavior and security incidents?
a) Data Encryption
c) Security responsibilities are shared between the cloud provider and the customer.
Answer: c) Security responsibilities are shared between the cloud provider and the customer.
9. What are some of the challenges in cloud security?
10. Which cloud security challenge refers to leaving sensitive data publicly accessible due to
misconfigurations?
a) Data breaches
d) Cloud misconfigurations
11. What is the term for a security attack that overwhelms a cloud service with excessive traffic,
leading to service disruption?
b) Ransomware attack
c) Phishing attack
12. Which cloud security component involves defining who can access specific cloud resources
and what actions they can perform?
a) Network security
b) Data encryption
Answer: c) By requiring users to provide multiple forms of identification before accessing cloud
resources
15. What is the term for managing access to cloud resources based on user roles and
permissions?
a) Data encryption
c) Network security
16. How does network security in cloud computing protect against external threats?
a) By encrypting data
17. What is the purpose of data backup and disaster recovery in cloud security?
Answer: c) To regularly back up data and have plans to recover it in case of disasters
18. What does security monitoring and logging in cloud security help detect?
c) Security responsibilities are shared between the cloud provider and the customer.
Answer: c) Security responsibilities are shared between the cloud provider and the customer.
21. What is the term for a security attack that overwhelms a cloud service with excessive traffic,
leading to service disruption?
b) Ransomware attack
c) Phishing attack
22. Which cloud security component involves defining who can access specific cloud resources
and what actions they can perform?
a) Network security
b) Data encryption
Answer: c) By requiring users to provide multiple forms of identification before accessing cloud
resources
25. What is the term for managing access to cloud resources based on user roles and
permissions?
a) Data encryption
c) Network security
26. How does network security in cloud computing protect against external threats?
a) By encrypting data
27. What is the purpose of data backup and disaster recovery in cloud security?
Answer: c) To regularly back up data and have plans to recover it in case of disasters
28. What does security monitoring and logging in cloud security help detect?
c) Security responsibilities are shared between the cloud provider and the customer.
Answer: c) Security responsibilities are shared between the cloud provider and the customer.