Module 5 Graded Quiz:
Which of these statements is true of cloud encryption?
A, B, and C only
Which of the following are key components of Identity and Access Management (IAM)? Select two.
Cloud Directory Services Audit and Compliance
What are some best practices organizations need to follow in order to protect their cloud resources and systems? Select two.
Active monitoring for security and compliance Adopt a shared responsibility model
Identify some of the standard cloud monitoring best practices from the provided options. Select two.
Leverage end-user experience monitoring solutions to capture the performance of an application from the point of view of its end users. Track usage and cost of your cloud resources and services.
Cloud computing is a key part of an enterprise's digital transformation strategy. True or false.
True