Unit 6 - Practice Quiz

INT363 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary objective of the 'Shared Responsibility Model' in cloud security?

A. To share security passwords between the provider and the customer
B. To assign all security liabilities to the Cloud Service Provider
C. To define which security tasks belong to the provider and which belong to the customer
D. To assign all security liabilities to the Cloud Customer

2 In an IaaS (Infrastructure as a Service) model, which of the following is strictly the customer's responsibility?

A. Patching the hypervisor
B. Disposal of physical disk drives
C. Physical security of data centers
D. Guest operating system updates and application security

3 Which principle of 'Security by Design' advocates granting users only the permissions necessary to perform their work?

A. Security through Obscurity
B. Open Design
C. Defense in Depth
D. Principle of Least Privilege

4 Which component is considered the 'perimeter' in modern cloud-native security architectures?

A. The DMZ
B. The physical firewall
C. Identity
D. The router

5 What is the main function of IAM (Identity and Access Management)?

A. To monitor physical server performance
B. To encrypt data at rest
C. To manage network traffic routing
D. To authenticate users and authorize access to resources

6 Which attack vector involves an attacker overwhelming a cloud service to make it unavailable to legitimate users?

A. Man-in-the-Middle (MitM)
B. Distributed Denial of Service (DDoS)
C. SQL Injection
D. Cross-Site Scripting (XSS)

7 In the context of Cloud Security Layers, where does 'Physical Security' fall?

A. It is the foundational layer managed primarily by the Cloud Service Provider
B. It is the data layer managed by database administrators
C. It is the top layer managed by the customer
D. It is the application layer managed by developers

8 What is a 'Security Group' in the context of cloud networking?

A. A compliance certification
B. A group of users with admin privileges
C. A team of security guards at the data center
D. A virtual firewall that controls inbound and outbound traffic for instances

9 Which concept ensures that data is unreadable to unauthorized users while it is being transmitted over a network?

A. Data Deduplication
B. Encryption in Transit
C. Encryption at Rest
D. Data Sovereignty

10 What is 'Host Hardening'?

A. Adding more physical RAM to a server
B. The process of securing a system by reducing its surface of vulnerability
C. Physically reinforcing the server rack
D. Overclocking the CPU for better encryption speed

11 Which tool is commonly used by Cloud Service Providers to manage cryptographic keys?

A. Load Balancer
B. Key Management Service (KMS)
C. Virtual Private Cloud (VPC)
D. Content Delivery Network (CDN)

12 What does GDPR stand for in the context of security compliance?

A. Global Digital Policy Requirement
B. Global Data Protection Regulation
C. General Data Protection Regulation
D. General Digital Privacy Rule

13 Which compliance standard is specifically designed to handle credit card information?

A. PCI DSS
B. HIPAA
C. ISO 27001
D. SOC 2

14 What is a major interoperability challenge in cloud security?

A. Lack of internet connection
B. Too much bandwidth availability
C. Cheaper storage costs
D. Vendor Lock-in and inconsistent security APIs across providers

15 What is the purpose of a SIEM (Security Information and Event Management) system in cloud operations?

A. To aggregate logs and analyze security alerts in real-time
B. To design user interfaces
C. To manage payroll
D. To backup database files

16 How does 'Edge Computing' impact cloud security architectures?

A. It eliminates the need for encryption
B. It removes the need for Identity Management
C. It centralizes all data in one location
D. It expands the attack surface by distributing processing to decentralized locations

17 Which AI application is most beneficial for Cloud Security Operations?

A. Generating marketing emails
B. Creating 3D graphics
C. Automated anomaly detection and threat response
D. Project management scheduling

18 In the context of Cloud Microservices, what is 'Service Mesh' primarily used for regarding security?

A. Physical server cooling
B. User password resets
C. Managing service-to-service communication with mTLS (mutual TLS)
D. Database partitioning

19 What is 'Data Sovereignty'?

A. A backup strategy for cloud data
B. The idea that data owns itself
C. The concept that data is subject to the laws of the country in which it is physically located
D. The speed at which data travels

20 Which of the following is a 'Security by Design' strategy for APIs?

A. Implementing rate limiting and throttling
B. Making all endpoints public for ease of use
C. Disabling logging to save space
D. Using hardcoded credentials

21 What is the risk of 'Insider Threats' in cloud computing?

A. Hardware failure due to overheating
B. Software bugs in open source libraries
C. Authorized users misusing their access privileges
D. External hackers breaching the firewall

22 What does Multi-Factor Authentication (MFA) add to security?

A. It adds layers of verification beyond just a password (e.g., something you have or are)
B. It requires multiple users to log in at once
C. It speeds up the login process
D. It removes the need for passwords

23 In cloud monitoring, what is the difference between 'Logs' and 'Metrics'?

A. There is no difference
B. Logs are numerical data; Metrics are text records
C. Metrics are only for billing; Logs are only for security
D. Logs record discrete events; Metrics measure numerical data over time

24 What is 'Federated Identity'?

A. An anonymous login method
B. Linking a user's identity across multiple distinct security domains
C. Using the same password for all websites
D. A government-issued ID

25 Which cloud security tool is primarily used for identifying vulnerabilities in container images?

A. Load Balancer
B. Network Firewall
C. Container Registry Scanning
D. VPN

26 What is the purpose of a 'Bastion Host' or 'Jump Box'?

A. To store backup files
B. To run the web application frontend
C. To host the main database
D. To serve as a secure gateway for administrators to access private resources

27 Which regulation governs the protection of personal health information in the US?

A. HIPAA
B. FERPA
C. GDPR
D. SOX

28 What is 'Defense in Depth'?

A. Relying solely on encryption
B. A military strategy not applicable to cloud
C. Using multiple layered security controls to protect data
D. Using a very thick firewall

29 What is a 'Zero Trust' architecture?

A. Operating without any security software
B. Not trusting the cloud provider
C. Trusting everyone inside the network but no one outside
D. Never trust, always verify, regardless of network location

30 Which interoperability standard allows the exchange of authentication and authorization data between security domains?

A. SAML (Security Assertion Markup Language)
B. HTML
C. TCP/IP
D. SQL

31 What is the primary security concern regarding 'Shadow IT' in cloud environments?

A. Unsanctioned use of cloud services leads to lack of visibility and control
B. It slows down the internet speed
C. It requires dark mode interfaces
D. It costs too much money

32 In the Shared Responsibility Model for SaaS (Software as a Service), what is the customer responsible for?

A. Physical security
B. Data and Identity Management
C. Application code
D. Network controls

33 What is 'Cloud Security Posture Management' (CSPM)?

A. Training employees on posture ergonomics
B. Managing physical security guards
C. Automated tools that identify misconfigurations and compliance risks in cloud environments
D. Writing code for cloud applications

34 How does 'Casus belli' relate to Cyberwarfare in future cloud trends? (Note: Contextual interpretation)

A. It refers to AI-generated code
B. It is a cloud monitoring tool
C. It refers to acts that justify war, now potentially including severe state-sponsored cyberattacks
D. It is a new coding language

35 What is a 'Man-in-the-Middle' (MitM) attack?

A. A physical theft of a server
B. An attack where the attacker secretly relays and possibly alters communications between two parties
C. An attack on the central server
D. A virus that deletes data

36 Why is 'Observability' important for security performance management?

A. It reduces the cost of storage
B. It allows you to see the physical servers
C. It is required by law
D. It enables understanding the internal state of a system based on external outputs (logs, metrics, traces) to diagnose security incidents

37 Which of the following is a challenge of AI in cloud security?

A. AI cannot process data
B. Adversarial attacks where attackers manipulate input data to fool AI models
C. AI requires manual operation
D. AI works too slowly

38 What role does 'DevSecOps' play in security?

A. It integrates security practices into the DevOps software delivery lifecycle
B. It slows down deployment
C. It is a specific software tool
D. It separates developers from security teams

39 What is 'Data Loss Prevention' (DLP)?

A. A backup system
B. Software that detects and prevents potential data breaches by blocking sensitive data from leaving the network
C. A method to delete data permanently
D. A database optimization technique

40 Which encryption type protects data stored on a hard drive or database?

A. End-to-End Encryption
B. Encryption at Rest
C. Symmetric Encryption only
D. Encryption in Transit

41 What is the primary function of a Web Application Firewall (WAF)?

A. To block all internet access
B. To scan for viruses on user desktops
C. To filter email spam
D. To protect web applications by filtering and monitoring HTTP traffic

42 What is a 'Hypervisor' security risk?

A. It cannot run Windows
B. VM Escape, where an attacker breaks out of a virtual machine to access the host
C. The hypervisor is too slow
D. It uses too much electricity

43 In the context of Interoperability, what is 'Portability'?

A. Using mobile phones for access
B. The speed of the network
C. The weight of the server
D. The ability to move applications and data from one cloud provider to another

44 What is SOC 2 (Service Organization Control 2)?

A. A programming language
B. A type of computer chip
C. A compliance standard for service organizations, focusing on security, availability, processing integrity, confidentiality, and privacy
D. A networking protocol

45 Which future trend involves processing data on local devices (like IoT) rather than sending it to a centralized cloud?

A. Edge Computing
B. Monolithic Computing
C. Centralized Computing
D. Mainframe Computing

46 What is 'Configuration Drift'?

A. Slow internet speeds
B. When ad-hoc changes cause environments to diverge from their known secure state
C. A racing game
D. Moving servers to a new location

47 What is the benefit of 'Immutable Infrastructure' for security?

A. Servers are never modified after deployment; they are replaced with new instances
B. It allows manual patching
C. Servers are never replaced
D. It is cheaper

48 Which tool is an example of 'Infrastructure as Code' (IaC) that helps standardize security configurations?

A. Microsoft Word
B. Skype
C. Terraform
D. Photoshop

49 What is the primary goal of a 'Penetration Test'?

A. To install antivirus software
B. To repair broken hardware
C. To train users on phishing
D. To simulate a cyberattack against your computer system to check for exploitable vulnerabilities

50 How does 'Fog Computing' relate to Cloud Security?

A. It is an intermediate layer between the Edge and the Cloud, requiring security protocols for data aggregation
B. It deletes old data
C. It is a weather monitoring system
D. It clouds the vision of attackers