Trust and Security in the Cloud Quiz Questions and Answers
Q1. Which cloud security principle ensures that security practices and measures align with established standards and guidelines?
Option 1: Confidentiality
Option 2: Integrity
Option 3: Control
Option 4: Compliance
The Correct Answer for Q1 is Option 4
Q2. Which cloud security principle relates to keeping data accurate and trustworthy?
Option 1: Integrity
Option 2: Compliance
Option 3: Control
Option 4: Confidentiality
The Correct Answer for Q2 is Option 1
Q3. What common cybersecurity threat involves tricking users into revealing sensitive information or performing actions that compromise security?
Option 1: Phishing
Option 2: Configuration mishap
Option 3: Ransomware
Option 4: Malware
The Correct Answer for Q3 is Option 1
Q4. Which is the responsibility of the cloud provider in a cloud security model?
Option 1: Securing the customer's data.
Option 2: Maintaining the customer's infrastructure.
Option 3: Configuring the customer's applications.
Option 4: Managing the customer's user access.
The Correct Answer for Q4 is Option 2
Q5. Which cybersecurity threat demands a ransom payment from a victim to regain access to their files and systems?
Option 1: Spyware
Option 2: Trojan
Option 3: Virus
Option 4: Ransomware
The Correct Answer for Q5 is Option 4
Q6. Which security principle advocates granting users only the access they need to perform their job responsibilities?
Option 1: Security by default
Option 2: Privileged access
Option 3: Zero-trust architecture
Option 4: Least privilege
The Correct Answer for Q6 is Option 4
Q7. Which is a benefit of cloud security over traditional on-premises security?
Option 1: Only having to install security updates on a weekly basis.
Option 2: Large upfront capital investment.
Option 3: Having physical access to hardware.
Option 4: Increased scalability.
The Correct Answer for Q7 is Option 4
Q8. Which three essential aspects of cloud security form the foundation of the CIA triad?
Option 1: Containers, infrastructure, and architecture
Option 2: Compliance, identity, and access management
Option 3: Certificates, intelligence, and authentication
Option 4: Confidentiality, integrity, and availability
The Correct Answer for Q8 is Option 4
Q9. Which definition best describes a firewall?
Option 1: A software program that encrypts data to make it unreadable to unauthorized users
Option 2: A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules
Option 3: A set of security measures designed to protect a computer system or network from cyber attacks
Option 4: A security model that assumes no user or device can be trusted by default
The Correct Answer for Q9 is Option 2
Q10. Which cybersecurity threat occurs when errors arise during the setup of resources, inadvertently exposing sensitive data and systems to unauthorized access?
Option 1: Virus
Option 2: Malware
Option 3: Configuration mishaps
Option 4: Phishing
No comments:
Post a Comment
What do you think about this article? just write your feedback in the comment box. Thanks :)