Cloud Kahoot Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The cloud's infrastructure must be secure. Who is responsible for securing the cloud's physical infrastructure? A. The cloud provider B. The cloud client C. The user who accesses the internet D. Clients who use on-premises services

A. The cloud provider

What is required to build and run different containers? A. Any Hypervisor is suitable B. A container agent environment C. Only the Linux and Windows OSs D. Containers can run only on AWS

B. A container agent environment

While expanding the company, the CTO decided to implement cloud computing. What could be the MAIN purpose of his decision? A. Providing access to the internet B. Hosting services off-premises C. Increasing computing capabilities D. Securing access to the internet

B. Hosting services off-premises

Which of the following is not a method of securing data in the cloud? A. Using cloud access and a security broker B. Preventing remote access C. Setting up a DLP system D. Using URL filtering

B. Preventing remote access

What is virtualization? A. A pseudo approach to computer systems B. The ability to create logical computer resources C. Separation between software and hardware D. The ability to store information online

B. The ability to create logical computer resources

Which of the following is a benefit of using SECaaS? A. It is more transparent way to manage information security in an organizational environment B. There is no need to maintain a security testing team on a regular basis C. It provides better storage options than other solutions D. It has the best professionals available compared with other options

B. There is no need to maintain a security testing team on a regular basis

Why should access management be enforced in cloud environments? A. To allow logins from different geographical locations and networks B. To allow or restrict users from accessing resources C. To allow or restrict logins to the account D. To manage multiple groups simultaneously

B. To allow or restrict users from accessing resources

What is the purpose of AWS security groups? A. To separate users into groups B. To configure network access control for AWS instances C. To create multiple users for a single AWS account D. To block RDP connections to EC2 instances

B. To configure network access control for AWS instances

Which of the following is a primary reason why the cloud is considered a great solution? A. Ownership and remote location B. Server location and platform maintenance C. Scalability and flexibility D. Sociability and location

C. Scalability and flexibility

John Wants to create a resource in the cloud to provide the ability to fully control the OS, and all of its configurations and data, but not the physical infrastructure. Which of the following service models should he use? A. SaaS B. DRaaS C. PaaS D. IaaS

D. IaaS


Ensembles d'études connexes

Ricci Chapter 51 PrepU (Shock Only)

View Set

BIO 201 TEST 2 PRACTICE QUESTIONS

View Set

Intelligence/Emotional Intelligence

View Set

Part 3: Research for Personal Budgeting

View Set

Chapter 2 - Organizational Behavior

View Set

Stars and Constellations Study guide

View Set

KIN 371 QUIZ questions and answers

View Set