Search Header Logo

UNIT III Quiz

Authored by Jeevitha P

Information Technology (IT)

University

Used 3+ times

UNIT III Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee logs into the corporate cloud system from an unknown device in a different country. The system wants strong authentication without locking out legitimate users. Which method best fits?

Single-factor password

Role-based access control

Adaptive multi-factor authentication

Signed URLs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a healthcare cloud system, doctors need to edit medical records. Billing staff only view billing info. Which access control model suits this requirement?

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Attribute-Based Access Control (ABAC)

Discretionary Access Control (DAC)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants employees to log in once and access apps across multiple cloud providers. Which of the following achieve this smoothly?

RBAC and encryption

Identity Federation and Single Sign-On (SSO)

Multi-factor authentication only

Signed URLs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud admin removes unnecessary software from VMs to minimize vulnerabilities. What is the direct benefit?

More software features

Increased risk

Smaller attack surface and efficiency

Easier password sharing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is true about cloud VM boot security if the goal is to stop unauthorized boot and later verify boot status?

Both verified and measured boot halt boot

Verified boot halts unauthorized boot; measured boot records boot data

Measured boot halts boot; verified boot logs

Both lack cryptographic checks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud security team wants to automatically detect and block attacks in real time. Which solution fits?

Intrusion Detection and Prevention Systems (IDS/IPS)

Password complexity policies

Key Management Services (KMS)

Identity providers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A contractor requires file access for 48 hours only. Which control best fits?

Bucket IP Filtering

Access Control List (ACL)

Signed URL with expiration

Encryption key sharing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?