Implementing Cloud Security

Implementing Cloud Security

Professional Development

10 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

Forcepoint - Corporate 2 Division

Forcepoint - Corporate 2 Division

Professional Development

10 Qs

Security+ 701 - Quiz 2

Security+ 701 - Quiz 2

Professional Development

15 Qs

Cloud Computing

Cloud Computing

Professional Development

10 Qs

Pivotal Cloud Foundry

Pivotal Cloud Foundry

Professional Development

12 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

Security+ Lesson 8

Security+ Lesson 8

Professional Development

10 Qs

CLOUD SECURITY QUIZ

CLOUD SECURITY QUIZ

Professional Development

15 Qs

Implementing Cloud Security

Implementing Cloud Security

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Usama Yehia Ibrahim

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data are referred to as what?

API inspection and integration

Secrets management

Dynamic resource allocation

Container security

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following terms is not related to storage security in the cloud?

Permissions

High availability

Segmentation

Encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Resource policies involve all of the following except?

Permissions

IAM

Cost

Access

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Virtual networking in a cloud environment can include all of the following except?

VPC endpoint

Public subnets

Private subnets

Network function virtualization

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What structure is used to manage users in cloud environments?

Permissions

Incident awareness

Dynamic resource allocations

Security groups

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a security policy enforcement point placed between cloud service consumers and cloud service providers to manage enterprise security policies as cloud-based resources are accessed?

SWG

VPC endpoint

CASB

Resource policies

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Secure web gateways operate by inspecting at what point in the communication channel?

Security group membership

Application layer

Instance awareness

API inspection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?