
FT_1
Authored by Benisha s
Engineering
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best defines Infrastructure Security in a cloud environment?
Security of user credentials during authentication
Protection of virtual machines, networks, and physical servers from threats
Monitoring user activity in SaaS platforms
Data encryption at rest and in transit
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security model focuses on ensuring only authorized users and systems have access to specific cloud resources?
Data Loss Prevention (DLP)
Identity and Access Management (IAM)
Network Access Control (NAC)
Security Information and Event Management (SIEM)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cloud infrastructure, segmentation at the virtual network layer primarily helps in:
Improving data redundancy
Isolating workloads to limit lateral movement during an attack
Increasing latency for better monitoring
Enabling faster cloud provisioning
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a major data privacy concern in multi-tenant cloud environments?
High availability
Data deduplication
Unauthorized data access
Network latency
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the Shared Responsibility Model in cloud security?
Cloud provider handles all layers of security
Customer handles application security, provider handles physical and network security
Both share all responsibilities equally
Provider is responsible only for encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Network-level security in cloud environments commonly employs:
Firewalls and Intrusion Detection Systems
User authentication methods
Virtualization and APIs
Backup and disaster recovery tools
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mechanism in cloud computing is most effective in mitigating Man-in-the-Middle (MITM) attacks?
Tokenization
SSL/TLS encryption
Hypervisor isolation
Key escrow systems
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?