Cloud Kahoot Questions
The cloud's infrastructure must be secure. Who is responsible for securing the cloud's physical infrastructure? A. The cloud provider B. The cloud client C. The user who accesses the internet D. Clients who use on-premises services
A. The cloud provider
What is required to build and run different containers? A. Any Hypervisor is suitable B. A container agent environment C. Only the Linux and Windows OSs D. Containers can run only on AWS
B. A container agent environment
While expanding the company, the CTO decided to implement cloud computing. What could be the MAIN purpose of his decision? A. Providing access to the internet B. Hosting services off-premises C. Increasing computing capabilities D. Securing access to the internet
B. Hosting services off-premises
Which of the following is not a method of securing data in the cloud? A. Using cloud access and a security broker B. Preventing remote access C. Setting up a DLP system D. Using URL filtering
B. Preventing remote access
What is virtualization? A. A pseudo approach to computer systems B. The ability to create logical computer resources C. Separation between software and hardware D. The ability to store information online
B. The ability to create logical computer resources
Which of the following is a benefit of using SECaaS? A. It is more transparent way to manage information security in an organizational environment B. There is no need to maintain a security testing team on a regular basis C. It provides better storage options than other solutions D. It has the best professionals available compared with other options
B. There is no need to maintain a security testing team on a regular basis
Why should access management be enforced in cloud environments? A. To allow logins from different geographical locations and networks B. To allow or restrict users from accessing resources C. To allow or restrict logins to the account D. To manage multiple groups simultaneously
B. To allow or restrict users from accessing resources
What is the purpose of AWS security groups? A. To separate users into groups B. To configure network access control for AWS instances C. To create multiple users for a single AWS account D. To block RDP connections to EC2 instances
B. To configure network access control for AWS instances
Which of the following is a primary reason why the cloud is considered a great solution? A. Ownership and remote location B. Server location and platform maintenance C. Scalability and flexibility D. Sociability and location
C. Scalability and flexibility
John Wants to create a resource in the cloud to provide the ability to fully control the OS, and all of its configurations and data, but not the physical infrastructure. Which of the following service models should he use? A. SaaS B. DRaaS C. PaaS D. IaaS
D. IaaS