
Implementing Cloud Security
Authored by Usama Yehia Ibrahim
Computers
Professional Development
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data are referred to as what?
API inspection and integration
Secrets management
Dynamic resource allocation
Container security
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following terms is not related to storage security in the cloud?
Permissions
High availability
Segmentation
Encryption
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Resource policies involve all of the following except?
Permissions
IAM
Cost
Access
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Virtual networking in a cloud environment can include all of the following except?
VPC endpoint
Public subnets
Private subnets
Network function virtualization
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What structure is used to manage users in cloud environments?
Permissions
Incident awareness
Dynamic resource allocations
Security groups
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a security policy enforcement point placed between cloud service consumers and cloud service providers to manage enterprise security policies as cloud-based resources are accessed?
SWG
VPC endpoint
CASB
Resource policies
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Secure web gateways operate by inspecting at what point in the communication channel?
Security group membership
Application layer
Instance awareness
API inspection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?