Cloud Security

Cloud Security

Professional Development

15 Qs

quiz-placeholder

Similar activities

AWS-Basics

AWS-Basics

Professional Development

20 Qs

AWS Cloud

AWS Cloud

Professional Development

15 Qs

AWS Certified Cloud Practitioner

AWS Certified Cloud Practitioner

Professional Development

10 Qs

CW CT AC

CW CT AC

Professional Development

10 Qs

AWS Shield

AWS Shield

Professional Development

11 Qs

ArqCloud Advanced - Clase 2

ArqCloud Advanced - Clase 2

Professional Development

16 Qs

AWS Cloud Foundations - Aula02

AWS Cloud Foundations - Aula02

University - Professional Development

20 Qs

Cloud Security

Cloud Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Palanichamy Palanichamy Naveen

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the characteristic of something being made accessible only to authorized parties?

Integrity

Confidentiality

Authenticity

Availability

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of threat agent is an entity capable of carrying out an attack?

Malicious Service Agent

Trusted Attacker

Malicious Insider

Anonymous Attacker

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of attack occurs when data being transferred to or within a cloud is passively intercepted by a malicious service agent?

Denial of Service

Traffic Eavesdropping

Insufficient Authorization

Virtualization Attack

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of hashing in cloud security?

To reduce the risk of DoS attacks

To manage user identities and access privileges

To preserve the confidentiality and integrity of data

To provide evidence of data authenticity and integrity

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which IAM component is used to manage access to AWS resources?

IAM user

IAM role

IAM group

IAM policy

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of an IAM group in AWS Identity and Access Management?

To manage access to AWS resources

To grant the same permissions to multiple users

To provide temporary security credentials

To define fine-grained access rights

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of IAM policy is attached to a resource like an S3 bucket?

Full access policy

Read-only policy

Resource-based policy

Identity-based policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?