#1
Which of the following is a primary concern in cloud computing security?
Data privacy
ExplanationProtection of sensitive information from unauthorized access.
#2
What is the purpose of encryption in cloud computing security?
To convert data into a form that is unreadable without a decryption key
ExplanationEnsures confidentiality by making data unreadable to unauthorized parties.
#3
What is the role of a firewall in cloud computing security?
To filter network traffic and prevent unauthorized access
ExplanationActs as a barrier to incoming and outgoing traffic, enforcing security policies.
#4
Which of the following is a common challenge in cloud security management?
Data breaches
ExplanationUnauthorized access leading to leakage, theft, or loss of sensitive information.
#5
Which of the following is NOT a common cloud deployment model?
Personal cloud
ExplanationCloud deployment intended for individual use, not typically a standard model.
#6
What does the term 'multi-tenancy' refer to in cloud computing?
Multiple users sharing the same physical infrastructure
ExplanationOptimizes resource utilization by serving multiple users on the same infrastructure.
#7
Which authentication factor is commonly used in cloud computing?
Something you know
ExplanationAuthentication based on knowledge like passwords.
#8
What is the purpose of a Virtual Private Network (VPN) in cloud computing?
To establish a secure connection over the internet
ExplanationEnsures secure communication over public networks by creating encrypted tunnels.
#9
What is the main advantage of using Identity and Access Management (IAM) in cloud computing?
Enhanced security by controlling user access to resources
ExplanationGranular control over user permissions, reducing the risk of unauthorized access.
#10
What is 'Data Loss Prevention' (DLP) in the context of cloud security?
A process to detect and prevent potential data breaches
ExplanationPreventive measures to safeguard sensitive data from unauthorized disclosure or theft.
#11
What is a 'Man-in-the-Middle' attack in the context of cloud computing?
A cyber-attack where the attacker intercepts communication between two parties
ExplanationInterception of data between communicating parties by an unauthorized entity.