0% found this document useful (0 votes)
1K views

Cloud UNIT 4 MCQ

This document contains a multiple choice quiz on cloud computing concepts. It includes 36 total questions across various topics like cloud security, identity management, monitoring, and service models. Correct answers are provided for each question. The document collects some basic information from the user including their name and email address.

Uploaded by

Arun Vasu Vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Cloud UNIT 4 MCQ

This document contains a multiple choice quiz on cloud computing concepts. It includes 36 total questions across various topics like cloud security, identity management, monitoring, and service models. Correct answers are provided for each question. The document collects some basic information from the user including their name and email address.

Uploaded by

Arun Vasu Vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

UNIT 4 MCQ Total points 36/50

ASSESSMENT CLOUD COMPUTING

Point out the wrong statement. * 1/1

a) You can use proxy and brokerage services to separate clients from direct access
to shared cloud storage

b) Any distributed application has a much greater attack surface than an application
that is closely held on a Local Area Network

c) Cloud computing doesn’t have vulnerabilities associated with Internet


applications

d) All of the mentioned

A zero-trust cloud security approach: * 0/1

Eliminates the perimeter

Moves the perimeter closer to protected areas

Expands the perimeter to end-user devices

None of the above

Correct answer

Moves the perimeter closer to protected areas


SaaS providers manage and secure all the following except: * 0/1

Infrastructure

OS

Application stack

Access controls

Correct answer

Access controls

Which of the following model allows vendor to provide security as part of1/1
the Service Level Agreement ? *

SAAS

PAAS

IAAS

NONE OF THESE

Amazon Web Services supports ________ Type II Audits. * 1/1

a) SAS70

b) SAS20

c) SAS702

d) None of the mentioned


Which of the following is a complementary mechanism to OpenID and is 1/1
used to create SSO systems? *

a) OpenSSL

b) CHAP

c) SMAL

d) None of the mentioned

Mail ID *

[email protected]

Point out the correct statement. * 1/1

a) Identities are not tied to the concept of accounts and can be used for contacts or
“ID cards”

b) Identities are important from a reliability standpoint

c) Presence is important in cloud computing because it adds context that can


modify services and service delivery

d) All of the mentioned


When is centralized cloud application monitoring most useful? * 0/1

When applications must span hybrid architectures

When applications are hosted solely in the cloud

When an organization's applications are all on premises

When an organization uses a single cloud application

Correct answer

When applications must span hybrid architectures

Which of the following standard is the key to creating Single Sign-On 1/1
(SSO) systems? *

a) OpenID 2.0

b) CHAP

c) SMAL

d) None of the mentioned


Point out the correct statement: * 1/1

Cloud management includes not only managing resources in the cloud, but
managing resources on-premises

The management of resources in the cloud requires new technology

Management of resources on-premises allows vendors to use well-established


network management technologies

All of the mentioned

The following flowchart is intended to evaluate __________ in any cloud. * 1/1

a) risk

b) errors

c) inconsistencies

d) none of the mentioned


Point out the wrong statement. * 1/1

a) In the cloud, the particular service model you are using directly affects the type of
monitoring you are responsible for

b) In AaaS, you can alter aspects of your deployment

c) You can monitor your usage of resources through Amazon CloudWatch

d) None of the mentioned

Which of the following is done by Identity management? * 1/1

a) controlling access to data in the cloud

b) maintaining user roles

c) preventing unauthorized uses

d) all of the mentioned

Point out the wrong statement. * 1/1

a) OpenID 2.0 is the standard associated with creating an identity

b) OpenID doesn’t specify the means for authentication of identity

c) OpenID provides access to important Web sites

d) None of the mentioned


Which of the following is a key mechanism for protecting data? * 1/1

a) Access control

b) Auditing

c) Authentication

d) All of the mentioned

What percentage of web application attacks were attributed to cloud- 0/1


based email servers, according to Verizon's 2019 Data Breach
Investigations Report (DBIR)? *

20%

40%

60%

80%

Correct answer

60%
Which of the following is not the feature of Network management 1/1
systems ? *

Accounting

Security

Performance

None of the mentioned

When you deploy an application on Google’s PaaS App Engine cloud 1/1
service, the Administration Console provides you with the which of the
following monitoring capabilities? *

a) View data and error logs

b) Analyze your network traffic

c) View the application’s scheduled tasks

d) All of the mentioned

How many categories need to be monitored for entire cloud computing ? 1/1
*

None of the mentioned


Which is not a form of confidential computing? * 1/1

Zero-trust networks

Trust execution environments

Fully homomorphic encryption

Secure multiparty computation

Which of the following services that need to be negotiated in Service 1/1


Level Agreements? *

a) Logging

b) Auditing

c) Regulatory compliance

d) All of the mentioned

which are the following are the reasons for cloud security ? * 1/1

manage remote work

ensure disaster recovery

comply with regulations

All of the above


Which of the following cloud does not require mapping? * 0/1

a) Public

b) Private

c) Hybrid

d) None of the mentioned

Correct answer

b) Private

Which of the following is a common means for losing encrypted data ? * 1/1

lose the keys

lose the account

none of these

lose the encryption standard


Point out the correct statement. * 1/1

a) Different types of cloud computing service models provide different levels of


security services

b) Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in
your chosen cloud service provider

c) Data should be transferred and stored in an encrypted format for security purpose

d) All of the mentioned

VMN0 *

VM11445

Which of the following is application and infrastructure management 1/1


software for hybrid multi-clouds ? *

VMware Hyperic

Webmetrics

Univa UD

Tapinsystems
Which of the following aims to deploy methods for measuring various 1/1
aspects of cloud performance in a standard way ? *

RIM

SIM

SMI

All of the mentioned

During which phase of a cloud migration framework is security the most 1/1
critical? *

Discovery phase

Cloud migration phase

Operations phase

All of the above

Which of the following “cloudly” characteristics that cloud management 1/1


service must have ? *

Billing is on a pay-as-you-go basis

The management service is extremely scalable

The management service is ubiquitous

All of the mentioned


Which of the following is required by Cloud Computing? * 1/1

a) That you establish an identity

b) That the identity be authenticated

c) That the authentication be portable

d) All of the mentioned

Which data may not be suitable for public clouds? * 0/1

Legacy application data

Mission-critical workloads

Sensitive data

All of the above

Correct answer

All of the above

NAME *

AJITHKUMAR A
Which of the following model type is not trusted in terms of security? * 1/1

a) Public

b) Private

c) Hybrid

d) None of the mentioned

Simple Cloud, jclouds and Libcloud are all examples of: * 0/1

Vendor-specific cloud APIs

Cross-platform APIs

IaaS APIs

Apache APIs

Correct answer

Cross-platform APIs

Which of the following is used for Web performance management and 1/1
load testing? *

a) VMware Hyperic

b) Webmetrics

c) Univa UD

d) Tapinsystems
Point out the wrong statement. * 0/1

a) Securing data sent to, received from, and stored in the cloud is the single largest
security concern

b) The problem with the data you store in the cloud is that it can be located
anywhere in the cloud service provider’s system

c) One and only approach to isolating storage in the cloud from direct client access
is to create layered access to the data

d) All of the mentioned

Correct answer

c) One and only approach to isolating storage in the cloud from direct client access is
to create layered access to the data

Which of the following area of cloud computing is uniquely troublesome? 0/1


*

a) Auditing

b) Data integrity

c) e-Discovery for legal compliance

d) All of the mentioned

Correct answer

d) All of the mentioned


Which of the following entity queries the OpenID identity provider to 0/1
authenticate the veracity of the OpenID credentials? *

a) serving party

b) relieving party

c) relaying party

d) none of the mentioned

Correct answer

c) relaying party

Which of the following provides tools for managing Windows servers and 1/1
desktops? *

a) Microsoft System Center

b) System Service

c) System Cloud

d) All of the mentioned


Which of the following provides a token service that can be used to 1/1
present validated access to resources? *

a) OAuth

b) OCheck

c) SAML

d) None of the mentioned

Which of the following is the operational domain of CSA? * 1/1

a) Scalability

b) Portability and interoperability

c) Flexibility

d) None of the mentioned

Which of the following service provider provides the least amount of 0/1
built in security? *

a) SaaS

b) PaaS

c) IaaS

d) All of the mentioned

Correct answer

c) IaaS
Which of the following is a compliance standard ? * 1/1

PCI-DSS

HIPPA

GLBA

All of the mentioned

Which of the following service model is owned in terms of infrastructure 0/1


by both vendor and customer? *

a) Public

b) Private

c) Hybrid

d) None of the mentioned

Correct answer

c) Hybrid

Which of the following has infrastructure security managed and owned 1/1
by the vendor? *

a) Hybrid

b) Private/Community

c) Public

d) None of the mentioned


How can we protect our cloud services * 1/1

Avoid storing sensitive information in the cloud

by reading the user agreement

by being serious about passwords.

all of the above

CASBs can help enterprises boost security through all the following 0/1
features and offerings, except: *

Enabling two-factor authentication and other login security best practices

Helping reduce shadow IT control

Adding a layer of shielding for threat protection

Replacing data loss prevention mechanisms

Correct answer

Replacing data loss prevention mechanisms

__________ allows users to authenticate their access to applications both 1/1


locally and in the cloud with a claims-based identity. *

a) AD FS

b) AC

c) SAS

d) None of the mentioned


How many security accounts per client is provided by Microsoft? * 0/1

a) 1

b) 3

c) 5

d) 7

Correct answer

c) 5

what are the security risks in cloud? * 1/1

phishing

social engineering attacks

system vulnerabilities

all of the above

___________ is a framework tool for managing cloud infrastructure. * 1/1

IBM Tivoli Service Automation Manager

Microsoft Tivoli Service Automation Manager

Google Service Automation Manager

Windows Live Hotmail

This form was created inside of Vel Tech Multi Tech Dr.RR Dr.SR Engineering College.
 Forms

You might also like