Search Header Logo

Cloud Security

Authored by Saurabh Singhal

Computers

University

Used 25+ times

Cloud Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Do not put confidential information, including personally identifiable information (PII) into the Cloud.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The major security concerns of Cloud Computing are

IT Leaders struggle to trust relatively new and unfamiliar cloud providers as part of their extended enterprises.

IT professionals question whether cloud providers have the levels of infrastructure security to be able to ward off cyber-attacks.

Providers have the mechanisms in place to be able to manage, measure and report on industry regulations? And can they be accountable if they fail to comply?

IT managers are right to look for service level guarantees. But in the case of the cloud, response times cannot be guaranteed since data travels through the Internet.

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______are responsible for keeping their applications up to date – and must therefore ensure they have a patch strategy (to ensure that their applications are screened from malware and hackers scanning for vulnerabilities that allow unauthorized access to their data within the cloud to be gained).

Customers

Providers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cloud security protects

Data

Applications

Infrastructure

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cloud providers ensure that the ________in the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code.

Applications available as a service

Infrastructure as a service

Platform as a service

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

WHICH OF THE FOLLOWING IS NOT A PHASE OF KEY MANAGEMENT

CREATION

VERIFICATION

MONITORING

DESTRUCTION

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

OBJECTIVES OF AUDITING

VERIFY DATA PROTECTION POLICIES, ACCESS POLICY UPDATION

ENCRYPTING AND DECRYPTION OF DATA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers