SC900 M1 P1

SC900 M1 P1

Professional Development

15 Qs

quiz-placeholder

Similar activities

WiDS Bangalore @ IBM - International Women's Day

WiDS Bangalore @ IBM - International Women's Day

Professional Development

15 Qs

Amazon VPC Cloudfront and Route 53

Amazon VPC Cloudfront and Route 53

Professional Development

10 Qs

InfoSec All Hands 08202021

InfoSec All Hands 08202021

Professional Development

10 Qs

Ethical Hacking Essentials

Ethical Hacking Essentials

Professional Development

13 Qs

Cloud Computing- Revision 1

Cloud Computing- Revision 1

Professional Development

15 Qs

Salesforce Admin 20Q - Test 02

Salesforce Admin 20Q - Test 02

Professional Development

20 Qs

EC2_AWS

EC2_AWS

Professional Development

20 Qs

Power BI Short Quiz

Power BI Short Quiz

Professional Development

10 Qs

SC900 M1 P1

SC900 M1 P1

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Fauzi Lazim

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IaaS stand for in cloud computing?

Identity as a Service

Internet as a Service

Infrastructure as a Service

Integration as a Service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cloud service requires the most management by the cloud customer?

SaaS

PaaS

On-Prem

IaaS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of PaaS in cloud computing?

To manage hardware

To create applications quickly without managing infrastructure

To provide physical security

To encrypt sensitive data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cloud service requires the least amount of management by the cloud customer?

On-Prem

IaaS

PaaS

SaaS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for in cybersecurity strategy?

Critical Information Assurance

Cybersecurity Intelligence Assessment

Confidentiality, Integrity, Availability

Central Intelligence Agency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Zero Trust Model based on?

Share all data openly

Trust everyone by default

Verify explicitly, Least privileged access, Assume breach

Assume everyone is a threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of making data unreadable and unusable to unauthorized viewers?

Encoding

Decryption

Hashing

Compression

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?