Search Header Logo

Cloud Computing #7

Authored by Lawrence L.W.

Computers

Professional Development

Used 16+ times

Cloud Computing #7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Secure authentication and authorization requires that the communication is _________.

authorized

private

reliable

all of the above

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

______________ is used to Monitor and identify application usage patterns pointing to misuse.

Data encryption

Intrusion detection

Compliance

Access control

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Certificate is an ________________ method

authorisation

authentication

encryption

anonymous

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Service traffic hijacking on the cloud means___________.

hackers can create chaos and redirecting customers to illicit sites

data traffic without proper filtering

malicious scripts allowing backdoor to applications

hackers can decrypt your API keys to gain access

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What is so special about JSON Web Tokens?

Compact and self-contained way for securely transmitting information

A security service that authorizes access to API operations

Most effective way for data protection

All of the above

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

When does data encryption take place?

On premise

On the cloud

In transport

All of the above

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which tops the list as the most effective way to secure your data?

Network encryption

Access control

Intrusion detection

Data encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?