Search Header Logo

Unit IV

Authored by Jeevitha P

Information Technology (IT)

University

Used 4+ times

Unit IV
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains the relationship between design patterns and cloud security?

Design patterns eliminate the need for encryption by standardizing interfaces.

Security design patterns provide reusable solutions to recurring cloud vulnerabilities.

Cloud design patterns are primarily focused on UI/UX improvement.

Design patterns in the cloud are used only for system performance optimization.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cloud bursting scenario, which factor most critically determines whether automated bursting will succeed?

Availability of redundant VPN gateways

Interoperability between private and public clouds

The geographic proximity of data centers

Type of hypervisor used in private cloud

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A multinational company wants to enforce data residency and access restrictions based on user geography. Which design mechanism directly supports this?

Cloud bursting

Elastic load balancing

Proxy gateway filtering

Geo-tagging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security risk is most specific to geo-tagging in cloud systems?

Data redundancy failure

Unauthorized location inference and profiling

Credential replay attacks

Denial-of-Service from remote endpoints

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following represents the correct sequence of Secure On-Premise Internet Access components when connecting to cloud services?

Proxy → VPN → Firewall → CASB → SIEM

SIEM → CASB → Firewall → Proxy → VPN

VPN → Proxy → CASB → Firewall → SIEM

Firewall → Proxy → VPN → CASB → SIEM

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Zero Trust Network Access (ZTNA) pattern fundamentally differs from traditional perimeter security in that it:

Authenticates only once per session.

Trusts users based on network location.

Dynamically verifies every access request based on identity and context.

Allows implicit trust for devices inside the local subnet.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which combination of components best implements Cloud Resource Access Control?

Firewall, IDS/IPS, Proxy Server

VPN, Load Balancer, API Gateway

Attribute Authority, Secure Token Service, IAM

MFA, Cloud DNS, CASB

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?