CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

quiz-placeholder

Similar activities

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

AAS Cloud

AAS Cloud

University - Professional Development

10 Qs

APIs

APIs

University - Professional Development

10 Qs

Cloud Storage

Cloud Storage

8th Grade - University

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

Introduction to Database

Introduction to Database

University

10 Qs

API terms

API terms

11th Grade - University

8 Qs

Cloud Computing

Cloud Computing

University

10 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

Assessment

Quiz

Computers

University

Easy

Created by

Nurul Zinni

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is Cloud Security threat

A cloud security threat is a risk that can compromise the confidentiality, integrity, or availability of cloud data.

Cloud security threats do not affect small businesses.
Cloud security threats are only caused by natural disasters.
Cloud security threats are solely related to hardware failures.

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Give an example of a data breach related to cloud services.

Yahoo data breach in 2013 affecting email accounts.
Capital One data breach in 2019 due to misconfigured AWS settings.
Target data breach in 2013 due to point-of-sale malware.
Equifax data breach in 2017 from a website vulnerability.

Answer explanation

Keywords "misconfigured"

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What does IAM stand for, and why is it important?

Identity and Access Management System
Identity and Access Module
Identity and Access Mechanism
Identity and Access Management

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is a Denial of Service (DoS) attack?

A Denial of Service (DoS) attack is a security measure to protect resources.
A Denial of Service (DoS) attack is a method to enhance network performance.
A Denial of Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
A Denial of Service (DoS) attack is a technique to increase user access to a system.

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Name one key finding from the CSA report.

Increased reliance on outdated software systems.

Increased emphasis on inadequate Identity and Access Management.

Reduction in workforce training programs.
Decreased funding for technology initiatives.

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Why is encryption crucial in cloud security?

Encryption slows down data access in the cloud.
Encryption is only necessary for on-premises data.
Encryption is primarily used for data backup purposes.
Encryption is crucial in cloud security because it safeguards sensitive data from unauthorized access.

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is the role of regular audits in cloud security?

Regular audits are only necessary for financial records.
Audits are primarily used to increase storage capacity.
Regular audits are not relevant to cloud security.
Regular audits are essential for identifying vulnerabilities, ensuring compliance, and improving overall cloud security.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?