CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

quiz-placeholder

Similar activities

TES AWAL MODUL 2

TES AWAL MODUL 2

University

10 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

uas-siber

uas-siber

University

10 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Internet

Internet

University

11 Qs

have fun with econometrics

have fun with econometrics

University

15 Qs

PSSI Chp 1 dan 2

PSSI Chp 1 dan 2

University

12 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

N_ Z

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is Cloud Security threat

A cloud security threat is a risk that can compromise the confidentiality, integrity, or availability of cloud data.

Cloud security threats do not affect small businesses.
Cloud security threats are only caused by natural disasters.
Cloud security threats are solely related to hardware failures.

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Give an example of a data breach related to cloud services.

Yahoo data breach in 2013 affecting email accounts.
Capital One data breach in 2019 due to misconfigured AWS settings.
Target data breach in 2013 due to point-of-sale malware.
Equifax data breach in 2017 from a website vulnerability.

Answer explanation

Keywords "misconfigured"

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What does IAM stand for, and why is it important?

Identity and Access Management System
Identity and Access Module
Identity and Access Mechanism
Identity and Access Management

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is a Denial of Service (DoS) attack?

A Denial of Service (DoS) attack is a security measure to protect resources.
A Denial of Service (DoS) attack is a method to enhance network performance.
A Denial of Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
A Denial of Service (DoS) attack is a technique to increase user access to a system.

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Name one key finding from the CSA report.

Increased reliance on outdated software systems.

Increased emphasis on inadequate Identity and Access Management.

Reduction in workforce training programs.
Decreased funding for technology initiatives.

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Why is encryption crucial in cloud security?

Encryption slows down data access in the cloud.
Encryption is only necessary for on-premises data.
Encryption is primarily used for data backup purposes.
Encryption is crucial in cloud security because it safeguards sensitive data from unauthorized access.

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What is the role of regular audits in cloud security?

Regular audits are only necessary for financial records.
Audits are primarily used to increase storage capacity.
Regular audits are not relevant to cloud security.
Regular audits are essential for identifying vulnerabilities, ensuring compliance, and improving overall cloud security.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?