Copyright

Cloud Security Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What does compliance mean?

Question 2 2. Why is the existence of Shadow IT risky?

Question 3 3. Why is sensitive info an important possible threat to Cloud application security?

Question 4 4. How are anomalous events handled?

Question 5 5. What is true about Cloud apps vulnerabilities?

Page 2

Question 6 6. Pick the phrase that best matches the definition of authentication.

Question 7 7. What is the benefit of adopting Single Sign-On?

Question 8 8. Pick the name of a leading organization in cloud computing security.

Question 9 9. What does OAuth allow?

Question 10 10. Pick that phrase that best matches the definition of data at rest

Page 3

Question 11 11. Symmetric data encryption involves _____, while asymmetric data encryption involves _____

Question 12 12. Securing data in the cloud involves _____.

Question 13 13. In Encryption Key Management, key deletion involves _____.

Question 14 14. Which of the following is NOT a security protocol for data in motion?

Question 15 15. Auditing and Logging Data Transactions is very important because _____

Cloud Security Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Introduction to Cloud Computing  /  Computer Science Courses
Support