0% found this document useful (0 votes)
261 views4 pages

Quiz - Cloud Security and Virtualization - Attempt Review

The document is a summary of a technical introduction to cybersecurity course completed on March 24, 2024 in under 10 minutes with a perfect score. It covered topics like infrastructure as a service, security in the cloud, security as a service, common cloud threats, virtual machine security, cloud firewalls, securing cloud applications, single sign-on protocols, and securing cloud data.

Uploaded by

studiokapulana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
261 views4 pages

Quiz - Cloud Security and Virtualization - Attempt Review

The document is a summary of a technical introduction to cybersecurity course completed on March 24, 2024 in under 10 minutes with a perfect score. It covered topics like infrastructure as a service, security in the cloud, security as a service, common cloud threats, virtual machine security, cloud firewalls, securing cloud applications, single sign-on protocols, and securing cloud data.

Uploaded by

studiokapulana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

 FCF - Technical Introduction to Cybersecurity 1.

0 Self-Paced
Started on Sunday, March 24, 2024, 11:04 PM
State Finished
Completed on Sunday, March 24, 2024, 11:13 PM
Time taken 9 mins 38 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

What is an example of Infrastructure-as-a-Service (IaaS)?

Select one:
Netflix
Microsoft Office 365
A virtual machine (VM)
A VMWare player

Question 2
Correct

1 points out of 1

Which three security devices are hosted in the cloud? (Choose three.)

Select one or more:


An antivirus scanner
An email gateway
A web server
A file share server
A network accelerator
A firewall
Question 3

Correct

1 points out of 1

Which two security services can be performed as Security-as-a-Service (SECaaS)? (Choose two.)

Select one or more:


Intrusion detection and prevention (IDP)
Security information and event management (SIEM)
Local confidential data protection
Hardware forensics
User deployment

Question 4

Correct

1 points out of 1

What is a common threat to cloud environments?

Select one:
Tailgating
Shoulder surfing
Data loss
Malware on infected universal serial bus (USB) sticks

Question 5

Correct

1 points out of 1

Why do virtual machines (VMs) increase the potential attack surface?

Select one:
More data used increases risk of corruption.
More computers increase the risk of compromise.
More resources used increases power consumption.
More network traffic increases bandwidth usage.
Question 6
Correct

1 points out of 1

What would you install in front of a protected cloud network to partition it from the internet?

Select one:
A security information and event management (SIEM) system
A cloud access security broker (CASB)
A cloud native firewall
A web gateway
A router

Question 7

Correct

1 points out of 1

Which two roles are responsible for securing cloud applications? (Choose two.)

Select one or more:


Application developer
Cloud provider
End user local machine
Application end user

Question 8

Correct

1 points out of 1

Which two protocols can you use as a single sign-on (SSO) protocol for cloud applications? (Choose two.)

Select one or more:


Hyper Text Transfer Protocol Secure (HTTPS)
Secure Assertion Markup Language (SAML)
Open Authorization (OAuth)
Remote Authentication Dial-In User Service (RADIUS)
Lightweight Directory Access Protocol (LDAP)
Question 9
Correct

1 points out of 1

Which two actions should you take to secure your data in the cloud? (Choose two.)

Select one or more:


Implement data loss prevention (DLP).
Secure access to data with authentication.
Keep a local tape backup.
Use only Hyper Text Transfer Protocol (HTTP) to transfer data.
Always back up to a secure universal serial bus (USB) device.

Question 10

Correct

1 points out of 1

What is the advantage of using a cloud access security broker (CASB) to make application programming interface (API) connections to cloud
providers?

Select one:
It increases throughput.
It minimizes points of configuration.
It prevents denial of service (DoS) attacks.
It allows for instant updates of cloud applications.

You might also like