CAE (Chapter 1 Part 3)

CAE (Chapter 1 Part 3)

Assessment

Interactive Video

Computers

Vocational training

Practice Problem

Easy

Created by

SYARIFAH ZUBIN

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of Cloud Alpha Edge as described in the overview?

It is a global cloud service provider with data centers worldwide.

It is a Malaysian-owned sovereign cloud service provider.

It primarily serves individual consumers for personal cloud storage.

It focuses exclusively on providing bare metal servers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT explicitly mentioned as a security and compliance service offered by Cloud Alpha Edge?

DDoS protection

Web Application Firewall

Data Encryption

Physical server maintenance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which pair of services represents core pillars of Cloud Alpha Edge's offerings?

Personal blogging and social media management

Computing and Storage

Online gaming and virtual reality

Financial auditing and legal consulting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of an IAM user in the Cloud Alpha Edge account system?

To own all resources and make payments for them.

To create new accounts for other organizations.

To securely control access to cloud services and resources without sharing account credentials.

To manage the physical infrastructure of the cloud data centers.

5.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Are you enjoying the video lesson?

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an IAM user is added to multiple user groups?

The user only inherits permissions from the first group they were added to.

The user inherits permissions assigned to all these groups.

The user's permissions are limited to the least restrictive group.

The user's permissions are limited to the most restrictive group.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary difference between roles and policies in granting permissions?

Roles are for individual users, policies are for user groups.

Roles provide fine-grained authorization, while policies are coarse-grained.

Roles are coarse-grained authorization based on job responsibilities, while policies provide fine-grained authorization for specific operations.

Roles are system-defined, while policies are always custom-defined.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?