CAE (Chapter 1 Part 3)
Interactive Video
•
Computers
•
Vocational training
•
Practice Problem
•
Easy
SYARIFAH ZUBIN
Used 1+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key characteristic of Cloud Alpha Edge as described in the overview?
It is a global cloud service provider with data centers worldwide.
It is a Malaysian-owned sovereign cloud service provider.
It primarily serves individual consumers for personal cloud storage.
It focuses exclusively on providing bare metal servers.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT explicitly mentioned as a security and compliance service offered by Cloud Alpha Edge?
DDoS protection
Web Application Firewall
Data Encryption
Physical server maintenance
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which pair of services represents core pillars of Cloud Alpha Edge's offerings?
Personal blogging and social media management
Computing and Storage
Online gaming and virtual reality
Financial auditing and legal consulting
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of an IAM user in the Cloud Alpha Edge account system?
To own all resources and make payments for them.
To create new accounts for other organizations.
To securely control access to cloud services and resources without sharing account credentials.
To manage the physical infrastructure of the cloud data centers.
5.
MULTIPLE CHOICE QUESTION
30 sec • Ungraded
Are you enjoying the video lesson?
Yes
No
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens when an IAM user is added to multiple user groups?
The user only inherits permissions from the first group they were added to.
The user inherits permissions assigned to all these groups.
The user's permissions are limited to the least restrictive group.
The user's permissions are limited to the most restrictive group.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary difference between roles and policies in granting permissions?
Roles are for individual users, policies are for user groups.
Roles provide fine-grained authorization, while policies are coarse-grained.
Roles are coarse-grained authorization based on job responsibilities, while policies provide fine-grained authorization for specific operations.
Roles are system-defined, while policies are always custom-defined.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade