0% found this document useful (0 votes)
6 views

Mock Exam Questions 3

The document consists of multiple-choice questions related to cloud security concepts, including topics such as disaster recovery planning, infrastructure as code, cloud data security, and various cloud service models. It assesses knowledge on key cloud security practices like multi-factor authentication, cloud encryption, and identity federation. The questions aim to evaluate understanding of cloud computing principles and security measures essential for professionals in the field.

Uploaded by

vinay_mdr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Mock Exam Questions 3

The document consists of multiple-choice questions related to cloud security concepts, including topics such as disaster recovery planning, infrastructure as code, cloud data security, and various cloud service models. It assesses knowledge on key cloud security practices like multi-factor authentication, cloud encryption, and identity federation. The questions aim to evaluate understanding of cloud computing principles and security measures essential for professionals in the field.

Uploaded by

vinay_mdr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CCSP Certified Cloud Security Professional

Set-3
Multiple Choice Questions

1. Which component in a cloud environment is responsible for managing virtual machines?


a) Cloud service provider
b) Hypervisor
c) Cloud service broker
d) Identity and access management system

2. What is the primary goal of 'disaster recovery planning' (DRP)?


a) Encrypting sensitive data
b) Ensuring rapid recovery of IT systems after a disaster
c) Automating cloud resource management
d) Securing physical access to data centers

3. What is 'Infrastructure as Code' (IaC) in cloud computing?


a) Writing code to develop cloud applications
b) Managing cloud infrastructure through machine-readable scripts
c) Encrypting data stored in the cloud
d) Monitoring cloud service performance
4. Which of the following is a benefit of using 'serverless computing'?
a) Permanent allocation of resources
b) Lower operational costs by only paying for execution time
c) Full control over the underlying infrastructure
d) Increased need for physical servers

5. What is 'Cloud Data Security' primarily concerned with?


a) Managing user access
b) Ensuring data privacy, integrity, and availability
c) Developing cloud-based applications
d) Automating cloud infrastructure

6. Which cloud service model provides the most control to the user over the infrastructure?
a) Software as a Service (SaaS)
b) Platform as a Service (PaaS)
c) Infrastructure as a Service (IaaS)
d) Security as a Service (SecaaS)

7. What does 'multi-factor authentication' (MFA) enhance in cloud security?


a) Scalability
b) Compliance
c) Access control
d) Cost efficiency
8. What is the main purpose of 'cloud encryption'?
a) Increasing data redundancy
b) Preventing unauthorised access to data
c) Improving data transmission speeds
d) Simplifying cloud service management

9. Which of the following best describes a 'private cloud'?


a) A cloud environment accessible to the general public
b) A cloud environment used exclusively by one organisation
c) A cloud service model for developing applications
d) A cloud strategy involving multiple public clouds

10. What does the term 'cloud service orchestration' refer to?
a) Encrypting data at rest
b) Managing user identities and access
c) Automating the coordination of cloud services
d) Monitoring network traffic

11. What is the key advantage of 'pay-as-you-go' pricing in cloud computing?


a) Predictable fixed costs
b) Lower initial investment and cost savings
c) Unlimited resource usage
d) Enhanced security features
12. What is 'identity federation' in the context of cloud computing?
a) Managing and provisioning cloud infrastructure
b) Encrypting data before storing it in the cloud
c) Allowing users to access multiple systems with a single identity
d) Automating cloud service deployment

13. Which of the following is a common use case for 'Platform as a Service' (PaaS)?
a) Virtual machine provisioning
b) Application development and deployment
c) Data encryption and security
d) Network traffic monitoring

14. What is the primary function of a 'cloud access security broker' (CASB)?
a) Managing virtual machines
b) Enforcing security policies between cloud users and providers
c) Developing cloud-based applications
d) Providing data storage solutions

15. What does 'cloud elasticity' enable in a cloud environment?


a) Permanent allocation of resources
b) Automatic scaling of resources based on demand
c) Fixed resource limits
d) Manual resource management
16. Which security measure helps ensure that only authorised users can access cloud
resources?
a) Data encryption
b) Identity and access management (IAM)
c) Resource provisioning
d) Cloud orchestration

17. What is 'data at rest' encryption?


a) Encrypting data during transmission
b) Encrypting inactive data stored on physical or virtual media
c) Encrypting data before deletion
d) Encrypting data during processing

18. What is a 'cloud service broker' responsible for?


a) Developing cloud-based applications
b) Facilitating transactions between cloud providers and consumers
c) Managing cloud infrastructure
d) Encrypting data in transit

19. Which principle ensures that security measures are integrated throughout the entire cloud
service lifecycle?
a) Least privilege
b) Defense in depth
c) Security by design
d) Compliance
20. What is the purpose of 'cloud monitoring'?
a) Encrypting data before storage
b) Tracking and analysing cloud resource usage and performance
c) Managing user identities and access
d) Automating cloud service deployment

You might also like