Implementing Cloud Security

Implementing Cloud Security

Professional Development

10 Qs

quiz-placeholder

Similar activities

Security+ Study Guide-05 Securing Hosts and Data

Security+ Study Guide-05 Securing Hosts and Data

Professional Development

15 Qs

MS900 - Module 4 - Full Quiz

MS900 - Module 4 - Full Quiz

Professional Development

15 Qs

Quiz on Operating System Services

Quiz on Operating System Services

Professional Development

15 Qs

S3 Introduction

S3 Introduction

Professional Development

8 Qs

Encryption

Encryption

Professional Development

15 Qs

DST07 - Day 2 quiz

DST07 - Day 2 quiz

Professional Development

10 Qs

DBMS Advanced Features and Distributed Databases

DBMS Advanced Features and Distributed Databases

Professional Development

10 Qs

SE Master

SE Master

Professional Development

8 Qs

Implementing Cloud Security

Implementing Cloud Security

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Usama Yehia Ibrahim

Used 10+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data are referred to as what?

API inspection and integration

Secrets management

Dynamic resource allocation

Container security

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following terms is not related to storage security in the cloud?

Permissions

High availability

Segmentation

Encryption

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Resource policies involve all of the following except?

Permissions

IAM

Cost

Access

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Virtual networking in a cloud environment can include all of the following except?

VPC endpoint

Public subnets

Private subnets

Network function virtualization

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What structure is used to manage users in cloud environments?

Permissions

Incident awareness

Dynamic resource allocations

Security groups

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a security policy enforcement point placed between cloud service consumers and cloud service providers to manage enterprise security policies as cloud-based resources are accessed?

SWG

VPC endpoint

CASB

Resource policies

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Secure web gateways operate by inspecting at what point in the communication channel?

Security group membership

Application layer

Instance awareness

API inspection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?