0% found this document useful (0 votes)
23 views8 pages

Cloud Security

Uploaded by

almaraniabwmalk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views8 pages

Cloud Security

Uploaded by

almaraniabwmalk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1. What is the primary purpose of cloud security?

a) Maximizing cloud performance

b) Ensuring data availability

c) Protecting data, applications, and infrastructure hosted on cloud platforms

d) Reducing cloud costs

Answer: c) Protecting data, applications, and infrastructure hosted on cloud platforms

2. What is the term for encrypting data to prevent unauthorized access?

a) Authentication

b) Authorization

c) Encryption

d) Multi-Factor Authentication (MFA)

Answer: c) Encryption

3. Which cloud security component controls who can access specific cloud resources and what
actions they can perform?

a) Data Encryption

b) Identity and Access Management (IAM)

c) Multi-Factor Authentication (MFA)

d) Network Security

Answer: b) Identity and Access Management (IAM)

4. What does Multi-Factor Authentication (MFA) require users to provide before accessing cloud
resources?

a) A username and password

b) A password and a one-time code sent to their mobile device

c) A fingerprint scan

d) A security token

Answer: b) A password and a one-time code sent to their mobile device


5. How does network security in cloud computing protect against external threats?

a) By encrypting data

b) By controlling access to cloud resources

c) By monitoring and filtering network traffic

d) By backing up data regularly

Answer: c) By monitoring and filtering network traffic

6. What does data backup and disaster recovery in cloud security involve?

a) Encrypting data at rest and in transit

b) Regularly backing up data and having plans to recover it in case of disasters

c) Managing access to cloud resources

d) Securing physical data centers

Answer: b) Regularly backing up data and having plans to recover it in case of disasters

7. Which cloud security component helps detect suspicious behavior and security incidents?

a) Data Encryption

b) Identity and Access Management (IAM)

c) Security Monitoring and Logging

d) Multi-Factor Authentication (MFA)

Answer: c) Security Monitoring and Logging

8. What is the shared responsibility model in cloud security?

a) Cloud providers are solely responsible for all security aspects.

b) Customers are solely responsible for all security aspects.

c) Security responsibilities are shared between the cloud provider and the customer.

d) The government takes responsibility for cloud security.

Answer: c) Security responsibilities are shared between the cloud provider and the customer.
9. What are some of the challenges in cloud security?

a) Lack of data backups and disaster recovery plans

b) Insufficient encryption of data

c) Excessive cloud costs

d) Lack of scalability in cloud solutions

Answer: b) Insufficient encryption of data

10. Which cloud security challenge refers to leaving sensitive data publicly accessible due to
misconfigurations?

a) Data breaches

b) Lack of visibility and control

c) Shared responsibility model

d) Cloud misconfigurations

Answer: d) Cloud misconfigurations

11. What is the term for a security attack that overwhelms a cloud service with excessive traffic,
leading to service disruption?

a) Distributed Denial of Service (DDoS) attack

b) Ransomware attack

c) Phishing attack

d) Man-in-the-Middle (MITM) attack

Answer: a) Distributed Denial of Service (DDoS) attack

12. Which cloud security component involves defining who can access specific cloud resources
and what actions they can perform?

a) Network security

b) Data encryption

c) Identity and Access Management (IAM)

d) Security monitoring and logging

Answer: c) Identity and Access Management (IAM)


13. What is the purpose of data encryption in cloud security?

a) To prevent unauthorized access to sensitive information

b) To enhance the performance of cloud services

c) To reduce cloud costs

d) To improve cloud scalability

Answer: a) To prevent unauthorized access to sensitive information

14. How does Multi-Factor Authentication (MFA) enhance cloud security?

a) By encrypting data at rest and in transit

b) By allowing multiple users to share the same credentials

c) By requiring users to provide multiple forms of identification before accessing cloud


resources

d) By automatically backing up data regularly

Answer: c) By requiring users to provide multiple forms of identification before accessing cloud
resources

15. What is the term for managing access to cloud resources based on user roles and
permissions?

a) Data encryption

b) Identity and Access Management (IAM)

c) Network security

d) Multi-Factor Authentication (MFA)

Answer: b) Identity and Access Management (IAM)

16. How does network security in cloud computing protect against external threats?

a) By encrypting data

b) By controlling access to cloud resources

c) By monitoring and filtering network traffic

d) By regularly updating cloud software


Answer: c) By monitoring and filtering network traffic

17. What is the purpose of data backup and disaster recovery in cloud security?

a) To prevent unauthorized access to sensitive information

b) To enhance the performance of cloud services

c) To regularly back up data and have plans to recover it in case of disasters

d) To reduce cloud costs

Answer: c) To regularly back up data and have plans to recover it in case of disasters

18. What does security monitoring and logging in cloud security help detect?

a) Unauthorized access attempts

b) Cloud service outages

c) Performance bottlenecks in cloud services

d) Software vulnerabilities in cloud applications

Answer: a) Unauthorized access attempts

19. What is the shared responsibility model in cloud security?

a) Cloud providers are solely responsible for all security aspects.

b) Customers are solely responsible for all security aspects.

c) Security responsibilities are shared between the cloud provider and the customer.

d) The government takes responsibility for cloud security.

Answer: c) Security responsibilities are shared between the cloud provider and the customer.

20. Which of the following is a challenge in cloud security

a) Lack of data backups and disaster recovery plans

b) Insufficient encryption of data

c) Excessive cloud costs


d) Lack of scalability in cloud solutions

Answer: b) Insufficient encryption of data

21. What is the term for a security attack that overwhelms a cloud service with excessive traffic,
leading to service disruption?

a) Distributed Denial of Service (DDoS) attack

b) Ransomware attack

c) Phishing attack

d) Man-in-the-Middle (MITM) attack

Answer: a) Distributed Denial of Service (DDoS) attack

22. Which cloud security component involves defining who can access specific cloud resources
and what actions they can perform?

a) Network security

b) Data encryption

c) Identity and Access Management (IAM)

d) Security monitoring and logging

Answer: c) Identity and Access Management (IAM)

23. What is the purpose of data encryption in cloud security?

a) To prevent unauthorized access to sensitive information

b) To enhance the performance of cloud services

c) To reduce cloud costs

d) To improve cloud scalability

Answer: a) To prevent unauthorized access to sensitive information

24. How does Multi-Factor Authentication (MFA) enhance cloud security?

a) By encrypting data at rest and in transit

b) By allowing multiple users to share the same credentials


c) By requiring users to provide multiple forms of identification before accessing cloud
resources

d) By automatically backing up data regularly

Answer: c) By requiring users to provide multiple forms of identification before accessing cloud
resources

25. What is the term for managing access to cloud resources based on user roles and
permissions?

a) Data encryption

b) Identity and Access Management (IAM)

c) Network security

d) Multi-Factor Authentication (MFA)

Answer: b) Identity and Access Management (IAM)

26. How does network security in cloud computing protect against external threats?

a) By encrypting data

b) By controlling access to cloud resources

c) By monitoring and filtering network traffic

d) By regularly updating cloud software

Answer: c) By monitoring and filtering network traffic

27. What is the purpose of data backup and disaster recovery in cloud security?

a) To prevent unauthorized access to sensitive information

b) To enhance the performance of cloud services

c) To regularly back up data and have plans to recover it in case of disasters

d) To reduce cloud costs

Answer: c) To regularly back up data and have plans to recover it in case of disasters

28. What does security monitoring and logging in cloud security help detect?

a) Unauthorized access attempts


b) Cloud service outages

c) Performance bottlenecks in cloud services

d) Software vulnerabilities in cloud applications

Answer: a) Unauthorized access attempts

29. What is the shared responsibility model in cloud security?

a) Cloud providers are solely responsible for all security aspects.

b) Customers are solely responsible for all security aspects.

c) Security responsibilities are shared between the cloud provider and the customer.

d) The government takes responsibility for cloud security.

Answer: c) Security responsibilities are shared between the cloud provider and the customer.

30. Which of the following is a challenge in cloud security?

a) Lack of data backups and disaster recovery plans

b) Insufficient encryption of data

c) Excessive cloud costs

d) Lack of scalability in cloud solutions

Answer: b) Insufficient encryption of data

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy