
Cloud Security
Authored by Saurabh Singhal
Computers
University
Used 25+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Do not put confidential information, including personally identifiable information (PII) into the Cloud.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The major security concerns of Cloud Computing are
IT Leaders struggle to trust relatively new and unfamiliar cloud providers as part of their extended enterprises.
IT professionals question whether cloud providers have the levels of infrastructure security to be able to ward off cyber-attacks.
Providers have the mechanisms in place to be able to manage, measure and report on industry regulations? And can they be accountable if they fail to comply?
IT managers are right to look for service level guarantees. But in the case of the cloud, response times cannot be guaranteed since data travels through the Internet.
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______are responsible for keeping their applications up to date – and must therefore ensure they have a patch strategy (to ensure that their applications are screened from malware and hackers scanning for vulnerabilities that allow unauthorized access to their data within the cloud to be gained).
Customers
Providers
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cloud security protects
Data
Applications
Infrastructure
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cloud providers ensure that the ________in the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code.
Applications available as a service
Infrastructure as a service
Platform as a service
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
WHICH OF THE FOLLOWING IS NOT A PHASE OF KEY MANAGEMENT
CREATION
VERIFICATION
MONITORING
DESTRUCTION
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
OBJECTIVES OF AUDITING
VERIFY DATA PROTECTION POLICIES, ACCESS POLICY UPDATION
ENCRYPTING AND DECRYPTION OF DATA
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
14 questions
Linux: Users and Groups
Quiz
•
9th Grade - University
15 questions
tik kelas 7
Quiz
•
1st Grade - University
18 questions
SQL Quiz
Quiz
•
University
10 questions
Adobe Photoshop
Quiz
•
University
10 questions
Choose the level of Bloom’s Taxonomy
Quiz
•
University
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
10 questions
Pengantar Coding
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade