Quiz - Cloud Security and Virtualization - Attempt Review
Quiz - Cloud Security and Virtualization - Attempt Review
Question 1
Correct
1 points out of 1
Which two roles are responsible for securing cloud applications? (Choose two.)
Question 2
Correct
1 points out of 1
What runs on a laptop, desktop, or server, and allows you to create a virtual machine (VM)?
Select one:
A basic input/output system (BIOS)
Random access memory (RAM)
A hypervisor
A virtual disk
https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 1/4
6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review
Question 3
Incorrect
0 points out of 1
Select one:
An environment that has applications hosted on different cloud platforms and vendors
An environment that uses local and cloud-based virtual machines
An environment that uses multiple operating systems in the cloud
An environment that uses multiple virtual machines in the cloud
Question 4
Correct
1 points out of 1
Which three security devices are hosted in the cloud? (Choose three.)
Question 5
Correct
1 points out of 1
Select one:
Malware on infected universal serial bus (USB) sticks
Tailgating
Shoulder surfing
Data loss
https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 2/4
6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review
Question 6
Correct
1 points out of 1
Which two actions should you take to secure your data in the cloud? (Choose two.)
Question 7
Correct
1 points out of 1
Select one:
More resources used increases power consumption.
More network traffic increases bandwidth usage.
More data used increases risk of corruption.
More computers increase the risk of compromise.
Question 8
Correct
1 points out of 1
Which security product allows visibility into a cloud environment and examines it for risk, threats, and compliance?
Select one:
Data Loss Prevention
Cloud Native Protection
Intrusion Detection
Packet Capture and Sniffing
https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 3/4
6/7/24, 14:19 Quiz - Cloud Security and Virtualization: Attempt review
Question 9
Correct
1 points out of 1
Which type of proxy sits in front of the protected server and brokers connections before allowing traffic to pass to its destination?
Select one:
Forward proxy
Router proxy
Reverse proxy
Broker proxy
Question 10
Correct
1 points out of 1
What is the advantage of using a cloud access security broker (CASB) to make application programming interface (API) connections to cloud
providers?
Select one:
It prevents denial of service (DoS) attacks.
It increases throughput.
It minimizes points of configuration.
It allows for instant updates of cloud applications.
https://training.fortinet.com/mod/quiz/review.php?attempt=19466672&cmid=485431 4/4