#1
Which of the following is NOT a key concern in cloud computing security?
Data virtualization
ExplanationData virtualization is not a primary security concern; other options involve more critical aspects like encryption and access control.
#2
What is a hypervisor in the context of virtualization?
A software that creates and manages virtual machines
ExplanationA hypervisor is a software layer that facilitates the creation and management of virtual machines in a virtualized environment.
#3
Which cryptographic technique is commonly used to ensure data confidentiality in the cloud?
AES
ExplanationAdvanced Encryption Standard (AES) is commonly used for data encryption in the cloud to ensure confidentiality.
#4
What is meant by the term 'multi-tenancy' in the context of cloud computing?
Multiple tenants sharing the same physical resources
ExplanationMulti-tenancy involves multiple users or tenants sharing common physical resources, which is a key concept in cloud computing.
#5
What is the principle behind the 'shared responsibility model' in cloud security?
Security responsibility is shared between the cloud provider and the customer.
ExplanationThe shared responsibility model delineates security responsibilities between the cloud provider and the customer, emphasizing collaboration for a secure environment.
#6
Which of the following is NOT a potential threat to virtualized environments?
Data duplication
ExplanationData duplication is not a typical threat to virtualized environments; common threats include vulnerabilities, malware, and unauthorized access.
#7
What is meant by 'VM sprawl' in the context of virtualization?
A sudden increase in the number of virtual machines
ExplanationVM sprawl refers to the uncontrolled proliferation of virtual machines, leading to management challenges and potential security risks.
#8
What is containerization, and how does it relate to cloud security?
It is a technique for packaging and deploying applications along with their dependencies, and it can enhance security by isolating applications.
ExplanationContainerization involves packaging and deploying applications with dependencies, enhancing security by isolating them from the underlying system.
#9
Which of the following is an example of a security measure for cloud computing?
Data encryption
ExplanationData encryption is a crucial security measure in cloud computing to protect sensitive information from unauthorized access.
#10
What is the purpose of network segmentation in cloud security?
To isolate sensitive resources and limit the impact of breaches
ExplanationNetwork segmentation in cloud security aims to isolate critical resources, preventing lateral movement of attackers and limiting the impact of security breaches.
#11
What role does threat intelligence play in cloud security?
It assists in monitoring and mitigating security threats.
ExplanationThreat intelligence aids in monitoring and proactively mitigating security threats in a cloud environment.
#12
What is meant by the term 'zero-trust security' in the context of cloud computing?
Verifying every request regardless of its source, thereby assuming that no entity can be trusted by default
ExplanationZero-trust security involves verifying every request, regardless of its source, operating under the assumption that no entity can be inherently trusted.
#13
How does 'immutable infrastructure' contribute to cloud security?
It ensures that cloud resources cannot be modified after deployment, reducing the risk of unauthorized changes.
ExplanationImmutable infrastructure prevents post-deployment modifications, reducing the risk of unauthorized changes and enhancing overall cloud security.
#14
What is the purpose of a cloud access security broker (CASB) in cloud security architecture?
To monitor and enforce security policies for cloud-based services
ExplanationA Cloud Access Security Broker (CASB) monitors and enforces security policies for cloud-based services, enhancing overall security architecture.