0% found this document useful (0 votes)
236 views4 pages

Quiz - Cloud Security and Virtualization - Attempt Review

asdfaf

Uploaded by

eduard9411
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
236 views4 pages

Quiz - Cloud Security and Virtualization - Attempt Review

asdfaf

Uploaded by

eduard9411
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


Started on Saturday, July 6, 2024, 7:05 PM
State Finished
Completed on Saturday, July 6, 2024, 8:19 PM
Time taken 1 hour 13 mins
Points 9/10
Grade 90 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

Which two roles are responsible for securing cloud applications? (Choose two.)

Select one or more:


Cloud provider
End user local machine
Application developer
Application end user

Question 2
Correct

1 points out of 1

What runs on a laptop, desktop, or server, and allows you to create a virtual machine (VM)?

Select one:
A basic input/output system (BIOS)
Random access memory (RAM)
A hypervisor
A virtual disk

https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 1/4
6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review

Question 3

Incorrect

0 points out of 1

What is a multi-cloud environment?

Select one:
An environment that has applications hosted on different cloud platforms and vendors
An environment that uses local and cloud-based virtual machines
An environment that uses multiple operating systems in the cloud
An environment that uses multiple virtual machines in the cloud 

Question 4

Correct

1 points out of 1

Which three security devices are hosted in the cloud? (Choose three.)

Select one or more:


An email gateway
A web server
An antivirus scanner
A network accelerator
A file share server
A firewall

Question 5
Correct

1 points out of 1

What is a common threat to cloud environments?

Select one:
Malware on infected universal serial bus (USB) sticks
Tailgating
Shoulder surfing
Data loss

https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 2/4
6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review

Question 6
Correct

1 points out of 1

Which two actions should you take to secure your data in the cloud? (Choose two.)

Select one or more:


Secure access to data with authentication.
Keep a local tape backup.
Implement data loss prevention (DLP).
Use only Hyper Text Transfer Protocol (HTTP) to transfer data.
Always back up to a secure universal serial bus (USB) device.

Question 7

Correct

1 points out of 1

Why do virtual machines (VMs) increase the potential attack surface?

Select one:
More resources used increases power consumption.
More network traffic increases bandwidth usage.
More data used increases risk of corruption.
More computers increase the risk of compromise.

Question 8

Correct

1 points out of 1

Which security product allows visibility into a cloud environment and examines it for risk, threats, and compliance?

Select one:
Data Loss Prevention
Cloud Native Protection
Intrusion Detection
Packet Capture and Sniffing

https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 3/4
6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review

Question 9
Correct

1 points out of 1

Which type of proxy sits in front of the protected server and brokers connections before allowing traffic to pass to its destination?

Select one:
Forward proxy
Router proxy
Reverse proxy
Broker proxy

Question 10
Correct

1 points out of 1

What is the advantage of using a cloud access security broker (CASB) to make application programming interface (API) connections to cloud
providers?

Select one:
It prevents denial of service (DoS) attacks.
It increases throughput.
It minimizes points of configuration.
It allows for instant updates of cloud applications.

https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 4/4

You might also like