What are the security risks of cloud computing? MCQs.

Cloud computing offers a range of advantages, like increased collaboration, easy accessibility, mobility, and storage capacity, to name a few. Cloud computing, however, comes with its own set of security concerns. Data loss, hacked interfaces, insecure APIs, data breach, vendor lock-in, denial of service, and account hijacking are just a few of the concerns. So to avoid these security risks it is important to have a robust security plan in place.

Pursuing cloud computing online training and certification  is a great way to get started with a career in cloud computing and if you’re already somewhat advanced and interested in cloud computing, try the PG program in cloud computing.

Cloud Computing

 Let us have a look at the security risks of cloud computing.

Q1. Which service provider out of the following options provides the least amount of built-in security?

  1. SaaS
  2. IaaS
  3. PaaS
  4. None of the above.

Answer- (a.) IaaS

Q2. Which service provider out of the following options provides the most amount of built-in

security?

  1. IaaS
  2. PaaS
  3. SaaS
  4. None of the above.

Answer- ( c.) SaaS

Q3. Which out of the following services mentioned below is required to be negotiated in

Service Level Agreements?

  1. Regulatory Compliance
  2. Logging
  3. Auditing
  4. All of the above.

Answer- (d.) All of the above.

Q4. What is the biggest concern regarding cloud computing?

  1. Accessibility
  2. Privacy
  3. Security
  4. Both b and c

Answer- (d.) Both b and c.

Q5. Which cloud computing model is implemented using dedicated resources and

infrastructure within an organization?

  1. Internal cloud
  2. Hybrid cloud
  3. External cloud
  4. Public cloud

Answer- (a.) Internal Cloud.

Q6. Which of the following aspects of cloud computing seems to be the most challenging or

troublesome?

  1. e-Discovery for the legal compliance
  2. Auditing
  3. Data integrity
  4. All of the above.

Answer-  (d.) All of the above

Q7. What are three key areas of auditing?

  1. Operation visibility, change control process, incident response.
  2. Consideration of risks, errors, and inconsistencies
  3. Selection and planning, execution and reporting, follow-up.
  4. Logging, auditing, and regulatory compliance

Answer- (a.) Operation visibility, change control process, incident response.

Q8. What aspect of cloud computing is responsible for preventing downtime and determining costs?

  1. Bandwidth cost
  2. Committing to service level agreements or SLAs
  3. Application programming interfaces
  4. Virtual private network or VPN.

Answer- (b.) Committing to service level agreements or SLAs

Q9. Which organization promotes cloud computing security standards?

  1. Cloud Security Watchdog
  2.     Cloud Security Alliance
  3. Cloud Security Standards Working Group
  4. None of the above.

Answer- (b.) Cloud Security Alliance

Q10. Cloud computing models are designed to support-

  1. Private, Public, and Hybrid Clouds
  2. Only Public Cloud and Hybrid Cloud
  3. Only Private Cloud and Public Cloud
  4. Only Hybrid Cloud

Answer- (a.) Private, Public, and Hybrid Clouds

Q11. Which of these is not a security risk of cloud computing?

  1. Reduced visibility and control over data.
  2. Regulatory non-compliance by the cloud service provider or CSP.
  3. Data breaches by malicious co-tenants
  4. Disaster Recovery.

Answer- (d.) Disaster Recovery

Q12.  When migrating your on-premises systems to the cloud, you must first identify what security mechanisms are required and then map those to controls provided by your cloud service provider.

  1. True
  2. False

Answer- (a.)True.

Q13. Which out of the following is considered the operational domain of CSA?

  1. Flexibility and Scalability
  2. Portability and Interoperability
  3. Authentication and Control
  4. None of the above.

Answer- (b.) Portability and Interoperability

Q14. A CSP that keeps track of sensitive information like credit card details is an invitation for cybercriminals.

  1. True
  2. False

Answer- (a.)True

Q15. Which is the correct full form of CDN?

  1. Control Distribution Network
  2. Content Distribution Network
  3. Content Delivery Network
  4. Control Delivery Network

Answer- (c.) Content Delivery Network

Q16. A group of technologies that operate together on a network to ensure that it can reliably run high-priority applications and traffic despite restricted network capacity and includes the non-functional requirements such as disaster recovery, security, and dependability.

  1. Service Development
  2. Plan Development
  3. Technical Service
  4. Quality of Service.

Answer- (d.) Quality of Service.

Q17. Local networks, web browsers, and web applications are all part of the__________  cloud infrastructure.

  1. Front-end
  2. Back end
  3. Hybrid cloud
  4. None of the above

Q18.  ______________ refers to the encoding or transforming of data before it is transferred to a cloud storage system.

a.Cloud Decryption

b.Cloud Encryption

  1. Symmetric Algorithm
  2. Asymmetric Algorithm

Q19. When an attacker creates a script that consumes all of the resources on a cloud server, ___________ threat occurs.

  1. Customer Manipulation
  2. Data Loss
  3. Account Hijacking
  4. Denial of Service

Q20. Data being transmitted in an unauthorized way to an external recipient from within an organisation is known as ________________.

  1. Data Misinterpretation
  2. Data Loss
  3. Data Leakage
  4. Denial of Service



Be the first to comment

Leave a Reply

counter for wordpress