Unit 6 - Practice Quiz

INT363

1 What is the primary objective of the 'Shared Responsibility Model' in cloud security?

A. To assign all security liabilities to the Cloud Service Provider
B. To assign all security liabilities to the Cloud Customer
C. To define which security tasks belong to the provider and which belong to the customer
D. To share security passwords between the provider and the customer

2 In an IaaS (Infrastructure as a Service) model, which of the following is strictly the customer's responsibility?

A. Physical security of data centers
B. Patching the hypervisor
C. Disposal of physical disk drives
D. Guest operating system updates and application security

3 Which principle of 'Security by Design' advocates granting users only the permissions necessary to perform their work?

A. Defense in Depth
B. Principle of Least Privilege
C. Security through Obscurity
D. Open Design

4 Which component is considered the 'perimeter' in modern cloud-native security architectures?

A. The physical firewall
B. Identity
C. The router
D. The DMZ

5 What is the main function of IAM (Identity and Access Management)?

A. To encrypt data at rest
B. To manage network traffic routing
C. To authenticate users and authorize access to resources
D. To monitor physical server performance

6 Which attack vector involves an attacker overwhelming a cloud service to make it unavailable to legitimate users?

A. SQL Injection
B. Cross-Site Scripting (XSS)
C. Distributed Denial of Service (DDoS)
D. Man-in-the-Middle (MitM)

7 In the context of Cloud Security Layers, where does 'Physical Security' fall?

A. It is the top layer managed by the customer
B. It is the foundational layer managed primarily by the Cloud Service Provider
C. It is the application layer managed by developers
D. It is the data layer managed by database administrators

8 What is a 'Security Group' in the context of cloud networking?

A. A team of security guards at the data center
B. A compliance certification
C. A virtual firewall that controls inbound and outbound traffic for instances
D. A group of users with admin privileges

9 Which concept ensures that data is unreadable to unauthorized users while it is being transmitted over a network?

A. Data Sovereignty
B. Encryption in Transit
C. Data Deduplication
D. Encryption at Rest

10 What is 'Host Hardening'?

A. Adding more physical RAM to a server
B. The process of securing a system by reducing its surface of vulnerability
C. Physically reinforcing the server rack
D. Overclocking the CPU for better encryption speed

11 Which tool is commonly used by Cloud Service Providers to manage cryptographic keys?

A. Key Management Service (KMS)
B. Load Balancer
C. Content Delivery Network (CDN)
D. Virtual Private Cloud (VPC)

12 What does GDPR stand for in the context of security compliance?

A. Global Data Protection Regulation
B. General Data Protection Regulation
C. General Digital Privacy Rule
D. Global Digital Policy Requirement

13 Which compliance standard is specifically designed to handle credit card information?

A. HIPAA
B. SOC 2
C. PCI DSS
D. ISO 27001

14 What is a major interoperability challenge in cloud security?

A. Lack of internet connection
B. Vendor Lock-in and inconsistent security APIs across providers
C. Too much bandwidth availability
D. Cheaper storage costs

15 What is the purpose of a SIEM (Security Information and Event Management) system in cloud operations?

A. To manage payroll
B. To aggregate logs and analyze security alerts in real-time
C. To design user interfaces
D. To backup database files

16 How does 'Edge Computing' impact cloud security architectures?

A. It centralizes all data in one location
B. It eliminates the need for encryption
C. It expands the attack surface by distributing processing to decentralized locations
D. It removes the need for Identity Management

17 Which AI application is most beneficial for Cloud Security Operations?

A. Generating marketing emails
B. Automated anomaly detection and threat response
C. Creating 3D graphics
D. Project management scheduling

18 In the context of Cloud Microservices, what is 'Service Mesh' primarily used for regarding security?

A. Physical server cooling
B. Managing service-to-service communication with mTLS (mutual TLS)
C. Database partitioning
D. User password resets

19 What is 'Data Sovereignty'?

A. The concept that data is subject to the laws of the country in which it is physically located
B. The idea that data owns itself
C. A backup strategy for cloud data
D. The speed at which data travels

20 Which of the following is a 'Security by Design' strategy for APIs?

A. Making all endpoints public for ease of use
B. Implementing rate limiting and throttling
C. Using hardcoded credentials
D. Disabling logging to save space

21 What is the risk of 'Insider Threats' in cloud computing?

A. External hackers breaching the firewall
B. Authorized users misusing their access privileges
C. Hardware failure due to overheating
D. Software bugs in open source libraries

22 What does Multi-Factor Authentication (MFA) add to security?

A. It removes the need for passwords
B. It requires multiple users to log in at once
C. It adds layers of verification beyond just a password (e.g., something you have or are)
D. It speeds up the login process

23 In cloud monitoring, what is the difference between 'Logs' and 'Metrics'?

A. Logs are numerical data; Metrics are text records
B. Logs record discrete events; Metrics measure numerical data over time
C. There is no difference
D. Metrics are only for billing; Logs are only for security

24 What is 'Federated Identity'?

A. A government-issued ID
B. Linking a user's identity across multiple distinct security domains
C. Using the same password for all websites
D. An anonymous login method

25 Which cloud security tool is primarily used for identifying vulnerabilities in container images?

A. Container Registry Scanning
B. Network Firewall
C. VPN
D. Load Balancer

26 What is the purpose of a 'Bastion Host' or 'Jump Box'?

A. To host the main database
B. To serve as a secure gateway for administrators to access private resources
C. To store backup files
D. To run the web application frontend

27 Which regulation governs the protection of personal health information in the US?

A. GDPR
B. HIPAA
C. FERPA
D. SOX

28 What is 'Defense in Depth'?

A. Using a very thick firewall
B. A military strategy not applicable to cloud
C. Using multiple layered security controls to protect data
D. Relying solely on encryption

29 What is a 'Zero Trust' architecture?

A. Trusting everyone inside the network but no one outside
B. Never trust, always verify, regardless of network location
C. Not trusting the cloud provider
D. Operating without any security software

30 Which interoperability standard allows the exchange of authentication and authorization data between security domains?

A. HTML
B. SAML (Security Assertion Markup Language)
C. SQL
D. TCP/IP

31 What is the primary security concern regarding 'Shadow IT' in cloud environments?

A. It costs too much money
B. Unsanctioned use of cloud services leads to lack of visibility and control
C. It slows down the internet speed
D. It requires dark mode interfaces

32 In the Shared Responsibility Model for SaaS (Software as a Service), what is the customer responsible for?

A. Application code
B. Network controls
C. Data and Identity Management
D. Physical security

33 What is 'Cloud Security Posture Management' (CSPM)?

A. Training employees on posture ergonomics
B. Automated tools that identify misconfigurations and compliance risks in cloud environments
C. Managing physical security guards
D. Writing code for cloud applications

34 How does 'Casus belli' relate to Cyberwarfare in future cloud trends? (Note: Contextual interpretation)

A. It is a new coding language
B. It refers to AI-generated code
C. It refers to acts that justify war, now potentially including severe state-sponsored cyberattacks
D. It is a cloud monitoring tool

35 What is a 'Man-in-the-Middle' (MitM) attack?

A. An attack where the attacker secretly relays and possibly alters communications between two parties
B. An attack on the central server
C. A physical theft of a server
D. A virus that deletes data

36 Why is 'Observability' important for security performance management?

A. It allows you to see the physical servers
B. It enables understanding the internal state of a system based on external outputs (logs, metrics, traces) to diagnose security incidents
C. It is required by law
D. It reduces the cost of storage

37 Which of the following is a challenge of AI in cloud security?

A. AI works too slowly
B. Adversarial attacks where attackers manipulate input data to fool AI models
C. AI cannot process data
D. AI requires manual operation

38 What role does 'DevSecOps' play in security?

A. It separates developers from security teams
B. It integrates security practices into the DevOps software delivery lifecycle
C. It is a specific software tool
D. It slows down deployment

39 What is 'Data Loss Prevention' (DLP)?

A. A backup system
B. Software that detects and prevents potential data breaches by blocking sensitive data from leaving the network
C. A method to delete data permanently
D. A database optimization technique

40 Which encryption type protects data stored on a hard drive or database?

A. Encryption in Transit
B. Encryption at Rest
C. End-to-End Encryption
D. Symmetric Encryption only

41 What is the primary function of a Web Application Firewall (WAF)?

A. To filter email spam
B. To protect web applications by filtering and monitoring HTTP traffic
C. To block all internet access
D. To scan for viruses on user desktops

42 What is a 'Hypervisor' security risk?

A. The hypervisor is too slow
B. VM Escape, where an attacker breaks out of a virtual machine to access the host
C. It uses too much electricity
D. It cannot run Windows

43 In the context of Interoperability, what is 'Portability'?

A. The ability to move applications and data from one cloud provider to another
B. The weight of the server
C. Using mobile phones for access
D. The speed of the network

44 What is SOC 2 (Service Organization Control 2)?

A. A type of computer chip
B. A compliance standard for service organizations, focusing on security, availability, processing integrity, confidentiality, and privacy
C. A networking protocol
D. A programming language

45 Which future trend involves processing data on local devices (like IoT) rather than sending it to a centralized cloud?

A. Centralized Computing
B. Edge Computing
C. Mainframe Computing
D. Monolithic Computing

46 What is 'Configuration Drift'?

A. Moving servers to a new location
B. When ad-hoc changes cause environments to diverge from their known secure state
C. A racing game
D. Slow internet speeds

47 What is the benefit of 'Immutable Infrastructure' for security?

A. Servers are never replaced
B. Servers are never modified after deployment; they are replaced with new instances
C. It is cheaper
D. It allows manual patching

48 Which tool is an example of 'Infrastructure as Code' (IaC) that helps standardize security configurations?

A. Terraform
B. Microsoft Word
C. Photoshop
D. Skype

49 What is the primary goal of a 'Penetration Test'?

A. To install antivirus software
B. To simulate a cyberattack against your computer system to check for exploitable vulnerabilities
C. To train users on phishing
D. To repair broken hardware

50 How does 'Fog Computing' relate to Cloud Security?

A. It clouds the vision of attackers
B. It is an intermediate layer between the Edge and the Cloud, requiring security protocols for data aggregation
C. It is a weather monitoring system
D. It deletes old data