1) Which type of attack is commonly used to compromise cloud applications by injecting malicious code? a) Denial of Service (DoS) attack b) Phishing attack c) SQL Injection d) Ransomware 2) What does the acronym IAM stand for in cloud security?Cyber Security a) Infrastructure Access Management b) Identity and Access Management c) Information Access Model d) Internal Access Method 3) Cyber AttacksWhich security feature is designed to detect and prevent unauthorized access to data? a) Firewall b) Antivirus c) Intrusion Detection System (IDS) d) Virtual Private Network (VPN) 4) Which of the following is a major risk associated with cloud storage? a) Scalability b) Elasticity c) Data Breaches d) Resource Pooling 5) Which is the most commonly used encryption method to secure data in transit in cloud environments? a) RSA Encryption b) SHA-256 c) TLS/SSL d) DES Encryption 6) In a cloud context, what is the primary purpose of data encryption at rest? a) To ensure fast retrieval of data b) To prevent unauthorized access to stored data c) To improve cloud storage performance d) To enable efficient data backups 7) Which cloud security control focuses on safeguarding the access points into the network? a) Data Masking b) Perimeter Security c) Load Balancing d) Elastic Compute Security 8) Federated Identity Management in cloud security is primarily used for? a) Encrypting data at rest b) Enabling data backups across platforms c) Sharing identities across multiple systems d) Restricting access to on-premises resources only 9) Which type of encryption key management system is often used to give cloud customers control over their own keys? a) Provider Managed Key Service (PMKS) b) Customer Managed Keys (CMK) c) Centralized Key Directory (CKD) d) Public Key Infrastructure (PKI) 10) Which of the following cloud security tools would be best suited to monitor user activity and enforce policies? a) Cloud Storage Service b) Cloud Access Security Broker (CASB) c) Intrusion Detection System (IDS) d) Multi-factor Authentication (MFA) 11) Which approach helps to isolate workloads and resources to prevent unauthorized access within a cloud environment? a) Encryption b) Sandboxing c) Load Balancing d) Data Replication 12) Data residency laws impact cloud security by: a) Requiring data encryption for data in transit b) Mandating data to be stored in specific geographic locations c) Ensuring data is always accessible in real-time d) Standardizing backup procedures

IT Security Awareness Challenge

autor

Tabela

Vizuelni stil

Postavke

Promeni šablon

Vrati automatski sačuvano: ?