01. What mechanism ensures data privacy and security when accessing cloud services from various geographical locations?
a) Data localization
b) Geofencing
c) Virtual Private Network (VPN)
d) Content Delivery Network (CDN)
02. How does segmentation improve cloud network security?
a) By reducing the overall cost of the network
b) By limiting the scope of potential breaches
c) By increasing the speed of the network
d) By enhancing user accessibilities
03. What are the key benefits of integrating SIEM (Security Information and Event Management) solutions in cloud-based network security monitoring?
(Choose two)
a) Automated incident response
b) Enhanced user productivity
c) Real-time visibility and threat detection
d) Reduced need for data encryption
04. Which of the following is a key advantage of using Infrastructure as Code (IaC) for provisioning cloud resources?
a) Increased dependency on manual documentation.
b) Slower deployment cycles.
c) Enhanced consistency and repeatability in resource provisioning.
d) Higher risk of configuration drift.
05. During a cloud-focused penetration test, which of the following outcomes should be a key deliverable?
a) Comprehensive details on the social engineering tactics used.
b) Identification of all physical vulnerabilities within the data center.
c) An exhaustive list of all employee names and roles.
d) Detailed findings on misconfigurations and vulnerabilities.
06. Which three considerations are key when maintaining the attack surface of compute resources through automation practices?
(Choose Three)
a) Automatically escalating privileges for convenience.
b) Periodically reviewing and adjusting security group configurations.
c) Automating the monitoring of network traffic to and from compute instances.
d) Regularly updating automation scripts to adhere to best security practices.
e) Disabling logging to increase performance.
07. In a Platform as a Service (PaaS) setup, the cloud provider is responsible for securing the ________.
a) Data
b) Applications
c) Runtime
d) Endpoints
08. What role does compliance play in cloud risk management?
a) It guarantees the elimination of all cloud risks.
b) It provides a framework for legal and regulatory adherence.
c) It replaces the need for an internal risk management process.
d) It ensures automatic data encryption across all cloud services.
09. Why is it essential to have a process for regularly reviewing and updating compute resource configurations in the cloud?
a) To adapt to evolving security threats and maintain compliance.
b) To align with the latest cloud gaming trends.
c) To ensure configurations remain overly permissive for user convenience.
d) To standardize configurations regardless of the workload.
10. How do encryption and tunneling contribute to secure data transmission in cloud environments?
a) By ensuring data is publicly accessible
b) By verifying the identity of users accessing the data
c) By protecting data integrity and confidentiality during transit
d) By increasing the data transfer speed