Day 1 Quiz

Day 1 Quiz

University

25 Qs

quiz-placeholder

Similar activities

Mitigating Data Loss

Mitigating Data Loss

University

20 Qs

pre-final Quiz in Soft Eng'g

pre-final Quiz in Soft Eng'g

University

20 Qs

034_Virtualization Vulnerabilities – Security+

034_Virtualization Vulnerabilities – Security+

9th Grade - University

20 Qs

Digital Transformation

Digital Transformation

University - Professional Development

25 Qs

Device Hardening

Device Hardening

University

20 Qs

Exploring Cloud Computing Concepts

Exploring Cloud Computing Concepts

8th Grade - University

20 Qs

Test blanc

Test blanc

University

20 Qs

Cloud Architecting - Week 9

Cloud Architecting - Week 9

University

20 Qs

Day 1 Quiz

Day 1 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Joseph Raymond V

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is key component under cloud security?

Code Security

Data Security

Physical Security

Product Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.... ensures cloud deployments adhere to industry regulations and standards, such as GDPR, HIPAA, and PCI DSS.

Compliance

Security Monitoring

Logging

IAM

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which activity is very closer to the source?

Data Processing

Reducy

Real-time analytics

Cost Optimization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unauthorized access to sensitive data is ....

Dos Attack.

data breaches

misconfiguration

malware attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method to protect data in transit within cloud environments?

Encryption

Data Masking

Tokenization

Access Control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a critical aspect of cloud identity management?

Single Sign-On

Data Backup

Network Segmentation

Load Balancing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves overwhelming a cloud service with traffic?

Phishing

DDoS Attack

SQL Injection

Man-in-the-Middle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?