0% found this document useful (0 votes)
19 views16 pages

Unit 6 MCQs

The document provides a comprehensive overview of cloud computing, including definitions, benefits, service models, security concerns, and various cloud deployment models. It covers essential concepts such as encryption, access control, and security measures like Data Loss Prevention and Cloud Security Posture Management. Additionally, the document addresses security attacks and the roles of different cloud services in ensuring secure cloud environments.

Uploaded by

prasad.pratape
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views16 pages

Unit 6 MCQs

The document provides a comprehensive overview of cloud computing, including definitions, benefits, service models, security concerns, and various cloud deployment models. It covers essential concepts such as encryption, access control, and security measures like Data Loss Prevention and Cloud Security Posture Management. Additionally, the document addresses security attacks and the roles of different cloud services in ensuring secure cloud environments.

Uploaded by

prasad.pratape
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

1. What is cloud computing?

A. Local storage of data


B. On-premise server management
C. Internet-based computing services
D. Wired networking infrastructure

C. Internet-based computing services


Cloud computing refers to the delivery of computing services, including storage,
processing power, and applications, over the internet.

2. What is the main benefit of using a public cloud service?

A. Enhanced security controls


B. Increased customization options
C. Cost-effective scalability
D. Complete control over infrastructure

C. Cost-effective scalability
Public cloud services offer cost-effective scalability, allowing users to pay for resources
based on their actual usage.

3. Which cloud service model provides virtualized computing resources over the

internet?

A. Infrastructure as a Service (IaaS)


B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Function as a Service (FaaS)

A. Infrastructure as a Service (IaaS)


Infrastructure as a Service (IaaS) provides virtualized computing resources, such as
virtual machines, over the internet.
4. What is the responsibility model in cloud computing?

A. Sharing computing resources with other users


B. Distributing data across multiple servers
C. Defining the division of security responsibilities between the cloud provider and
the customer
D. Virtualizing network infrastructure

C. Defining the division of security responsibilities between the cloud provider and
the customer
The responsibility model in cloud computing defines the division of security
responsibilities between the cloud provider and the customer.

5. What is a common security concern related to multi-tenancy in cloud computing?

A. Lack of internet connectivity


B. Data segregation
C. Limited scalability
D. Insufficient processing power

B. Data segregation
Data segregation is a common security concern in multi-tenancy, where multiple users
share the same resources in a cloud environment.

6. Which encryption technique is commonly used to protect data in transit between a

user and a cloud service?

A. AES (Advanced Encryption Standard)


B. DES (Data Encryption Standard)
C. RSA (Rivest-Shamir-Adleman)
D. MD5 (Message Digest Algorithm 5)

A. AES (Advanced Encryption Standard)


AES (Advanced Encryption Standard) is commonly used to encrypt data in transit in
cloud computing.
7. What is the term for a security attack where an attacker intercepts and alters

communication between two parties in a cloud environment?

A. DDoS attack
B. Man-in-the-Middle (MitM) attack
C. SQL injection
D. Cross-Site Scripting (XSS)

B. Man-in-the-Middle (MitM) attack


A Man-in-the-Middle (MitM) attack involves an attacker intercepting and altering
communication between two parties.

8. What cloud deployment model allows organizations to have the highest level of

control over their infrastructure?

A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud

B. Private cloud
Private cloud deployment allows organizations to have the highest level of control over
their infrastructure.

9. What is the primary purpose of a Cloud Access Security Broker (CASB)?

A. Managing cloud infrastructure


B. Ensuring data privacy
C. Enforcing security policies in cloud services
D. Optimizing cloud resource usage

C. Enforcing security policies in cloud services


CASB enforces security policies in cloud services and ensures secure access to cloud
resources.
10. Which security challenge is associated with the "shared responsibility model" in

cloud computing?

A. Lack of scalability
B. Data segregation
C. Limited customization options
D. Unclear security responsibilities

D. Unclear security responsibilities


The shared responsibility model in cloud computing can lead to unclear security
responsibilities between the cloud provider and the customer.

11. What is the term for the practice of securing data by converting it into a code that

is unreadable without the correct decryption key?

A. Hashing
B. Salting
C. Encryption
D. Tokenization

C. Encryption
Encryption is the practice of securing data by converting it into a code that is
unreadable without the correct decryption key.

12. What is the primary purpose of a Virtual Private Network (VPN) in cloud security?

A. Data storage
B. Network isolation
C. Server management
D. Cloud resource optimization

B. Network isolation
A Virtual Private Network (VPN) in cloud security provides network isolation to secure
communication over the internet.
13. What is the term for a security attack where an attacker tries to exploit

vulnerabilities in a cloud service by injecting malicious SQL code?

A. DDoS attack
B. SQL injection
C. Man-in-the-Middle (MitM) attack
D. Cross-Site Scripting (XSS)

B. SQL injection
SQL injection is a security attack where an attacker injects malicious SQL code to exploit
vulnerabilities in a cloud service.

14. What is the purpose of a Security Information and Event Management (SIEM)

system in cloud security?

A. Managing cloud infrastructure


B. Monitoring and analyzing security events
C. Enforcing data privacy policies
D. Optimizing cloud resource usage

B. Monitoring and analyzing security events


SIEM systems in cloud security are used for monitoring and analyzing security events to
detect and respond to security incidents.

15. Which authentication method involves using a combination of something the user

knows and something the user possesses?

A. Single Sign-On (SSO)


B. Multi-Factor Authentication (MFA)
C. Biometric authentication
D. OAuth authentication

B. Multi-Factor Authentication (MFA)


Multi-Factor Authentication (MFA) involves using a combination of something the user
knows (password) and something the user possesses (token, smartphone, etc.).
16. What is the purpose of tokenization in cloud security?

A. Encrypting data at rest


B. Authenticating users
C. Securing communication channels
D. Protecting sensitive data

D. Protecting sensitive data


Tokenization in cloud security involves replacing sensitive data with a token to protect
the original data.

17. What is the term for a cloud security model where data is stored in multiple

locations to ensure availability and resilience?

A. Data encryption
B. Data segregation
C. Data mirroring
D. Data redundancy

D. Data redundancy
Data redundancy is a cloud security model where data is stored in multiple locations to
ensure availability and resilience.

18. What cloud deployment model involves using a combination of private and public

clouds to host an organization's applications?

A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud

C. Hybrid cloud
Hybrid cloud deployment involves using a combination of private and public clouds to
host an organization's applications.
19. What is the term for a security measure that restricts user access to only the

information and resources necessary for their role?

A. Least privilege principle


B. Role-based access control
C. Network segmentation
D. Identity and Access Management (IAM)

B. Role-based access control


Role-based access control (RBAC) restricts user access based on their roles, ensuring
they only have access to necessary information and resources.

20. What is the primary goal of a Distributed Denial of Service (DDoS) attack in the

context of cloud security?

A. Data theft
B. Unauthorized access
C. Disrupting service availability
D. Code injection

C. Disrupting service availability


The primary goal of a DDoS attack in the context of cloud security is to disrupt service
availability by overwhelming the targeted system with a flood of traffic.

21. Which cloud service model provides a platform that allows customers to develop,

run, and manage applications without dealing with the complexity of building and

maintaining the infrastructure?

A. Infrastructure as a Service (IaaS)


B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Function as a Service (FaaS)

B. Platform as a Service (PaaS)


Platform as a Service (PaaS) provides a platform that allows customers to develop, run,
and manage applications without dealing with the underlying infrastructure.
22. What is the term for the process of securing data by applying a mathematical

function to generate a fixed-size string of characters?

A. Hashing
B. Salting
C. Encryption
D. Tokenization

A. Hashing
Hashing is the process of securing data by applying a mathematical function to generate
a fixed-size string of characters.

23. What is the purpose of Cloud Security Posture Management (CSPM)?

A. Managing cloud infrastructure


B. Ensuring data privacy
C. Assessing and maintaining security configurations in the cloud
D. Optimizing cloud resource usage

C. Assessing and maintaining security configurations in the cloud


Cloud Security Posture Management (CSPM) is used for assessing and maintaining
security configurations in the cloud.

24. What is the term for a security attack where an attacker tricks a user into

revealing sensitive information by pretending to be a trustworthy entity?

A. DDoS attack
B. Phishing attack
C. SQL injection
D. Cross-Site Scripting (XSS)

B. Phishing attack
A phishing attack involves an attacker tricking a user into revealing sensitive
information by pretending to be a trustworthy entity.

25. What cloud service model provides end-users with access to software

applications over the internet without the need for installation on their devices?
A. Infrastructure as a Service (IaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Function as a Service (FaaS)

C. Software as a Service (SaaS)


Software as a Service (SaaS) provides end-users with access to software applications
over the internet without the need for installation on their devices.

26. What is the primary goal of Cloud Security Access Brokers (CSAB)?

A. Ensuring data privacy


B. Managing cloud infrastructure
C. Enforcing security policies in cloud services
D. Optimizing cloud resource usage

C. Enforcing security policies in cloud services


Cloud Security Access Brokers (CSAB) enforce security policies in cloud services and
ensure secure access to cloud resources.

27. What is the term for a security attack where an attacker injects malicious scripts

into web pages viewed by other users?

A. DDoS attack
B. Phishing attack
C. SQL injection
D. Cross-Site Scripting (XSS)

D. Cross-Site Scripting (XSS)


Cross-Site Scripting (XSS) is a security attack where an attacker injects malicious scripts
into web pages viewed by other users.

28. What is the purpose of a Web Application Firewall (WAF) in cloud security?

A. Managing cloud infrastructure


B. Protecting against DDoS attacks
C. Enforcing security policies for web applications
D. Optimizing cloud resource usage

C. Enforcing security policies for web applications


A Web Application Firewall (WAF) in cloud security is used to enforce security policies
for web applications and protect against various web-based attacks.

29. What is the term for a security measure that separates a network into segments

to prevent unauthorized access to sensitive data?

A. Least privilege principle


B. Role-based access control
C. Network segmentation
D. Identity and Access Management (IAM)

C. Network segmentation
Network segmentation is a security measure that separates a network into segments to
prevent unauthorized access to sensitive data.

30. Which cloud deployment model involves providing cloud services to a specific

group of organizations with shared interests or requirements?

A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud

D. Community cloud
Community cloud deployment involves providing cloud services to a specific group of
organizations with shared interests or requirements.

31. What is the term for a cloud security model where resources are allocated
dynamically based on demand, allowing for efficient resource utilization?

A. Elasticity
B. Redundancy
C. Scalability
D. Virtualization

A. Elasticity
Elasticity in cloud computing allows resources to be allocated dynamically based on
demand, ensuring efficient resource utilization.
32. Which cloud service model provides on-demand access to computing resources,

including servers, storage, and networking, without the need for physical hardware?

A. Infrastructure as a Service (IaaS)


B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Function as a Service (FaaS)

A. Infrastructure as a Service (IaaS)


Infrastructure as a Service (IaaS) provides on-demand access to computing resources
without the need for physical hardware

33. What is the term for a security measure that monitors and controls network traffic

between virtual machines within a cloud environment?

A. Intrusion Detection System (IDS)


B. Network Address Translation (NAT)
C. Virtual Private Network (VPN)
D. Microsegmentation

D. Microsegmentation
Microsegmentation is a security measure that monitors and controls network traffic
between virtual machines within a cloud environment.

34. What cloud deployment model involves sharing cloud resources among multiple

organizations with similar security and compliance requirements?

A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud

D. Community cloud
Community cloud deployment involves sharing cloud resources among multiple
organizations with similar security and compliance requirements.
35. What is the primary goal of a Cloud Service Level Agreement (SLA)?

A. Managing cloud infrastructure


B. Ensuring data privacy
C. Defining the terms and conditions of service between a cloud provider and a
customer
D. Optimizing cloud resource usage

C. Defining the terms and conditions of service between a cloud provider and a
customer
A Cloud Service Level Agreement (SLA) defines the terms and conditions of service
between a cloud provider and a customer.

36. What is the term for a cloud security measure that involves authenticating and

authorizing users and devices to access cloud resources?

A. Least privilege principle


B. Role-based access control
C. Identity and Access Management (IAM)
D. Network segmentation

C. Identity and Access Management (IAM)


Identity and Access Management (IAM) involves authenticating and authorizing users
and devices to access cloud resources.

37. What is the purpose of Data Loss Prevention (DLP) in cloud security?

A. Managing cloud infrastructure


B. Ensuring data privacy
C. Monitoring and preventing the unauthorized transmission of sensitive data
D. Optimizing cloud resource usage

C. Monitoring and preventing the unauthorized transmission of sensitive data


Data Loss Prevention (DLP) in cloud security involves monitoring and preventing the
unauthorized transmission of sensitive data.

38. What is the term for a cloud security measure that involves encrypting data

stored in the cloud to protect it from unauthorized access?

A. Data mirroring
B. Data encryption
C. Data redundancy
D. Data segregation

B. Data encryption
Data encryption in cloud security involves encrypting data stored in the cloud to protect
it from unauthorized access.

39. Which cloud security model provides a set of controls and best practices for

securing information in the cloud?

A. Cloud Access Security Broker (CASB)


B. Cloud Security Posture Management (CSPM)
C. Cloud Security Alliance (CSA)
D. Cloud Service Level Agreement (SLA)

C. Cloud Security Alliance (CSA)


Cloud Security Alliance (CSA) provides a set of controls and best practices for securing
information in the cloud.

40. What is the purpose of a Cloud Access Security Broker (CASB) in cloud

security?

A. Managing cloud infrastructure


B. Ensuring data privacy
C. Enforcing security policies in cloud services
D. Optimizing cloud resource usage

C. Enforcing security policies in cloud services


CASB enforces security policies in cloud services and ensures secure access to cloud
resources.
41. What is the term for a security measure that involves creating backups of data to

prevent data loss in the event of a security incident or system failure?

A. Data mirroring
B. Data encryption
C. Data redundancy
D. Data segregation

C. Data redundancy
Data redundancy involves creating backups of data to prevent data loss in the event of a
security incident or system failure.

42. What is the purpose of a Cloud Security Information and Event Management

(SIEM) system?

A. Managing cloud infrastructure


B. Monitoring and analyzing security events in the cloud
C. Enforcing data privacy policies
D. Optimizing cloud resource usage

B. Monitoring and analyzing security events in the cloud


Cloud Security Information and Event Management (SIEM) systems are used for
monitoring and analyzing security events in the cloud.

43. Which cloud deployment model involves using both on-premise infrastructure

and cloud services to host an organization's applications?

A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud

C. Hybrid cloud
Hybrid cloud deployment involves using both on-premise infrastructure and cloud
services to host an organization's applications.

44. What is the purpose of Cloud Security Posture Management (CSPM) in cloud
security?
A. Managing cloud infrastructure
B. Ensuring data privacy
C. Assessing and maintaining security configurations in the cloud
D. Optimizing cloud resource usage

C. Assessing and maintaining security configurations in the cloud


CSPM is used for assessing and maintaining security configurations in the cloud.

45. What is the term for a security attack where an attacker floods a network or

system with traffic to disrupt its normal functioning?

A. DDoS attack
B. Man-in-the-Middle (MitM) attack
C. SQL injection
D. Cross-Site Scripting (XSS)

A. DDoS attack
A Distributed Denial of Service (DDoS) attack involves flooding a network or system
with traffic to disrupt its normal functioning.

46. Which cloud service model provides a runtime environment for executing code in

response to events without the need for server management?

A. Infrastructure as a Service (IaaS)


B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Function as a Service (FaaS)

D. Function as a Service (FaaS)


Function as a Service (FaaS) provides a runtime environment for executing code in
response to events without the need for server management.

47. What is the term for a cloud security measure that involves monitoring and

controlling user access to cloud resources based on predefined policies?

A. Least privilege principle


B. Role-based access control
C. Identity and Access Management (IAM)
D. Network segmentation
B. Role-based access control
Role-based access control (RBAC) involves monitoring and controlling user access to
cloud resources based on predefined policies.

48. What is the primary purpose of a Cloud Security Access Broker (CSAB) in cloud

security?

A. Ensuring data privacy


B. Managing cloud infrastructure
C. Enforcing security policies in cloud services
D. Optimizing cloud resource usage

C. Enforcing security policies in cloud services


CSAB enforces security policies in cloud services and ensures secure access to cloud
resources.

49. What is the term for a security measure that involves monitoring and analyzing

user activities in the cloud to detect and respond to suspicious behavior?

A. Intrusion Detection System (IDS)


B. Security Information and Event Management (SIEM)
C. Virtual Private Network (VPN)
D. Network Address Translation (NAT)

B. Security Information and Event Management (SIEM)


SIEM is a security measure that involves monitoring and analyzing user activities in the
cloud to detect and respond to suspicious behavior.

50. What is the purpose of Cloud Security Posture Management (CSPM) in cloud

security?

A. Managing cloud infrastructure


B. Ensuring data privacy
C. Assessing and maintaining security configurations in the cloud
D. Optimizing cloud resource usage

C. Assessing and maintaining security configurations in the cloud


CSPM is used for assessing and maintaining security configurations in the cloud.

You might also like