Search Header Logo

FT_1

Authored by Benisha s

Engineering

Professional Development

Used 1+ times

FT_1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines Infrastructure Security in a cloud environment?

Security of user credentials during authentication

Protection of virtual machines, networks, and physical servers from threats

Monitoring user activity in SaaS platforms

Data encryption at rest and in transit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security model focuses on ensuring only authorized users and systems have access to specific cloud resources?

Data Loss Prevention (DLP)

Identity and Access Management (IAM)

Network Access Control (NAC)

Security Information and Event Management (SIEM)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cloud infrastructure, segmentation at the virtual network layer primarily helps in:

Improving data redundancy

Isolating workloads to limit lateral movement during an attack

Increasing latency for better monitoring

Enabling faster cloud provisioning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a major data privacy concern in multi-tenant cloud environments?

High availability

Data deduplication

Unauthorized data access

Network latency

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Shared Responsibility Model in cloud security?

Cloud provider handles all layers of security

Customer handles application security, provider handles physical and network security

Both share all responsibilities equally

Provider is responsible only for encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network-level security in cloud environments commonly employs:

Firewalls and Intrusion Detection Systems

User authentication methods

Virtualization and APIs

Backup and disaster recovery tools

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mechanism in cloud computing is most effective in mitigating Man-in-the-Middle (MITM) attacks?

Tokenization

SSL/TLS encryption

Hypervisor isolation

Key escrow systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?