Search Header Logo

cloud security

Authored by Saurabh Singhal

Computers

University

Used 43+ times

cloud security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Do not put confidential information, including personally identifiable information (PII) into the Cloud.

True

False

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The major security concerns of Cloud Computing are

IT Leaders struggle to trust relatively new and unfamiliar cloud providers as part of their extended enterprises.

IT professionals question whether cloud providers have the levels of infrastructure security to be able to ward off cyber-attacks.

Providers have the mechanisms in place to be able to manage, measure and report on industry regulations? And can they be accountable if they fail to comply?

IT managers are right to look for service level guarantees. But in the case of the cloud, response times cannot be guaranteed since data travels through the Internet.

All of the above

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

_______are responsible for keeping their applications up to date – and must therefore ensure they have a patch strategy (to ensure that their applications are screened from malware and hackers scanning for vulnerabilities that allow unauthorized access to their data within the cloud to be gained).

Customers

Providers

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Cloud security protects

Data

Applications

Infrastructure

All of the above

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Cloud providers ensure that the ________in the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code.

Applications available as a service

Infrastructure as a service

Platform as a service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

------------ refers to digitally confirming the identity of the entity requesting access to some protected information

Authentication

SSO

SECURITY OF DATA

AUTHORIZATION

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

------------ Enables the users to access multiple systems or applications after signing in only once,for the first time

SSO

AUTHENTICATION

AUTHORIZATION

All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers