CAE (Chapter 1 Part 3)

CAE (Chapter 1 Part 3)

Assessment

Interactive Video

Computers

Vocational training

Easy

Created by

SYARIFAH ZUBIN

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of Cloud Alpha Edge as described in the overview?

It is a global cloud service provider with data centers worldwide.

It is a Malaysian-owned sovereign cloud service provider.

It primarily serves individual consumers for personal cloud storage.

It focuses exclusively on providing bare metal servers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT explicitly mentioned as a security and compliance service offered by Cloud Alpha Edge?

DDoS protection

Web Application Firewall

Data Encryption

Physical server maintenance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which pair of services represents core pillars of Cloud Alpha Edge's offerings?

Personal blogging and social media management

Computing and Storage

Online gaming and virtual reality

Financial auditing and legal consulting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of an IAM user in the Cloud Alpha Edge account system?

To own all resources and make payments for them.

To create new accounts for other organizations.

To securely control access to cloud services and resources without sharing account credentials.

To manage the physical infrastructure of the cloud data centers.

5.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Are you enjoying the video lesson?

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens when an IAM user is added to multiple user groups?

The user only inherits permissions from the first group they were added to.

The user inherits permissions assigned to all these groups.

The user's permissions are limited to the least restrictive group.

The user's permissions are limited to the most restrictive group.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary difference between roles and policies in granting permissions?

Roles are for individual users, policies are for user groups.

Roles provide fine-grained authorization, while policies are coarse-grained.

Roles are coarse-grained authorization based on job responsibilities, while policies provide fine-grained authorization for specific operations.

Roles are system-defined, while policies are always custom-defined.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an advantage of IAM?

Limited access control for resources.

Inability to delegate resources across accounts.

Federated access to cloud resources using existing enterprise accounts.

Requires separate login credentials for each cloud service.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of infrastructure security in the cloud?

Data security

Host security

Tenant lifecycle management

Virtual network security