Copyright

Securing Applications in the Cloud: Approaches & Tools

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Why is the existence of Shadow IT risky?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Why is sensitive info an important possible threat to Cloud application security?

2. How are anomalous events handled?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Quiz yourself on securing applications in the Cloud with this multiple-choice assessment. Topics you'll examine include risk associated with the existence of Shadow IT and a possible threat to Cloud application security through sensitive information.

Quiz & Worksheet Goals

These points are addressed on the quiz/worksheet:

  • How anomalous events are dealt with
  • Compliance definition
  • Vulnerabilities of Cloud apps

Skills Practiced

  • Defining key concepts - make sure you can accurately define compliance
  • Making connections - use your understanding of sensitive information and how it's connected to threats associated with Cloud app security
  • Information recall - access the knowledge you've gained regarding the risk that comes with Shadow IT

Additional Learning

The lesson entitled Securing Applications in the Cloud: Approaches & Tools will teach you more about the following areas:

  • Description of Shadow IT on the Cloud
  • The dangers faced by CSPs with regard to sensitive data
  • Cyber threats
  • Tracing anomalies
Support