Search Header Logo

Cloud Security and Cybersecurity Quiz

Authored by NetworkHaz NetworkHaz

Information Technology (IT)

12th Grade

Used 1+ times

Cloud Security and Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary function of a Cloud Access Security Broker (CASB)?

Encrypting all data stored on local devices

Monitoring and enforcing security policies for cloud applications

Managing physical security of data centres

Providing internet connectivity to cloud services

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in implementing a CASB solution in an organisation?

Selecting a cloud service provider

Identifying and assessing cloud applications in use

Installing antivirus software

Upgrading network hardware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a best practice when configuring a firewall?

Allowing all incoming traffic by default

Using a default password for firewall management

Applying the principle of least privilege

Disabling logging features

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which compliance standard is specifically designed for protecting health information in Australia?

PCI DSS

ISO/IEC 27001

Australian Privacy Principles (APPs)

GDPR

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of threat detection in cloud environments?

To increase storage capacity

To identify and respond to security incidents

To reduce internet speed

To manage billing and subscriptions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common data loss prevention (DLP) technique?

Disabling all user accounts

Encrypting sensitive data before transmission

Allowing unrestricted file sharing

Ignoring audit logs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Identity and Access Management (IAM) primarily control?

Physical access to server rooms

User authentication and authorisation to resources

Internet bandwidth allocation

Hardware maintenance schedules

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?