
UNIT III Quiz
Authored by Jeevitha P
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee logs into the corporate cloud system from an unknown device in a different country. The system wants strong authentication without locking out legitimate users. Which method best fits?
Single-factor password
Role-based access control
Adaptive multi-factor authentication
Signed URLs
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a healthcare cloud system, doctors need to edit medical records. Billing staff only view billing info. Which access control model suits this requirement?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Discretionary Access Control (DAC)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants employees to log in once and access apps across multiple cloud providers. Which of the following achieve this smoothly?
RBAC and encryption
Identity Federation and Single Sign-On (SSO)
Multi-factor authentication only
Signed URLs
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cloud admin removes unnecessary software from VMs to minimize vulnerabilities. What is the direct benefit?
More software features
Increased risk
Smaller attack surface and efficiency
Easier password sharing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is true about cloud VM boot security if the goal is to stop unauthorized boot and later verify boot status?
Both verified and measured boot halt boot
Verified boot halts unauthorized boot; measured boot records boot data
Measured boot halts boot; verified boot logs
Both lack cryptographic checks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cloud security team wants to automatically detect and block attacks in real time. Which solution fits?
Intrusion Detection and Prevention Systems (IDS/IPS)
Password complexity policies
Key Management Services (KMS)
Identity providers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A contractor requires file access for 48 hours only. Which control best fits?
Bucket IP Filtering
Access Control List (ACL)
Signed URL with expiration
Encryption key sharing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?