
Unit IV
Authored by Jeevitha P
Information Technology (IT)
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains the relationship between design patterns and cloud security?
Design patterns eliminate the need for encryption by standardizing interfaces.
Security design patterns provide reusable solutions to recurring cloud vulnerabilities.
Cloud design patterns are primarily focused on UI/UX improvement.
Design patterns in the cloud are used only for system performance optimization.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a cloud bursting scenario, which factor most critically determines whether automated bursting will succeed?
Availability of redundant VPN gateways
Interoperability between private and public clouds
The geographic proximity of data centers
Type of hypervisor used in private cloud
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A multinational company wants to enforce data residency and access restrictions based on user geography. Which design mechanism directly supports this?
Cloud bursting
Elastic load balancing
Proxy gateway filtering
Geo-tagging
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security risk is most specific to geo-tagging in cloud systems?
Data redundancy failure
Unauthorized location inference and profiling
Credential replay attacks
Denial-of-Service from remote endpoints
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following represents the correct sequence of Secure On-Premise Internet Access components when connecting to cloud services?
Proxy → VPN → Firewall → CASB → SIEM
SIEM → CASB → Firewall → Proxy → VPN
VPN → Proxy → CASB → Firewall → SIEM
Firewall → Proxy → VPN → CASB → SIEM
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Zero Trust Network Access (ZTNA) pattern fundamentally differs from traditional perimeter security in that it:
Authenticates only once per session.
Trusts users based on network location.
Dynamically verifies every access request based on identity and context.
Allows implicit trust for devices inside the local subnet.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which combination of components best implements Cloud Resource Access Control?
Firewall, IDS/IPS, Proxy Server
VPN, Load Balancer, API Gateway
Attribute Authority, Secure Token Service, IAM
MFA, Cloud DNS, CASB
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?