Cloud Security Essentials

Description: This test consists of questions related to Cloud computing technology, which are useful to computer science and gate aspirants.
Number of Questions: 15
Created by:
Tags: Cloud security questions CS Test CS cloud data GATE practice questions IT questions Information Technology
Attempted 0/15 Correct 0 Score 0

Which of the following is termed as Detective controls in cloud security?

  1. These controls are used to upgrade the strength of the system by managing the vulnerabilities.

  2. This control will signal the preventative or corrective controls to address the issue in case of an attack.

  3. These controls reduce the effect of an attack.

  4. These controls are used to prevent any purposeful attack on a cloud system.

  5. These controls reduce the actual vulnerability of a system.


Correct Option: B
Explanation:

This is true statement as Detective controls are used to detect the attacks, occurring to the system.

What is the difference between the corrective controls and the preventive controls in cloud security?

  1. Corrective controls use mechanisms to reduce the effect of an attack while preventive controls do not use any mechanism.

  2. Preventive controls do take the action when the attack occurs on the cloud system.

  3. Preventive controls signals the corrective controls about the attack on the cloud system.

  4. Preventive controls are used to upgrade the strength of the system while corrective are not.

  5. Both (1) and (3).


Correct Option: D
Explanation:

This is true as Preventive controls upgrade the strength of the system while corrective not. Preventive controls cover the attack and reduce the damage and violation to the system's security.

Which of the following is/are true about deterrent controls in cloud security?

  1. These controls prevent any attack in a cloud system by providing alerts to the system.

  2. These controls are used to upgrade the strength of the system by managing the vulnerabilities.

  3. These controls are used to recover the vulnerabilities of the system.

  4. These controls do not reduce the actual vulnerability of a system.

  5. Both (1) and (4).


Correct Option: E
Explanation:

These are the correct statements.

Which of the following is known as 'scalability and performance' in cloud security architectural consideration?

  1. The cloud computing security implementation should support the large workloads and the underlying infrastructure.

  2. There should be a cloud security policy design that can be enforced consistently in both physical and virtual environments.

  3. The user credentials should be authenticated.

  4. The cloud security implementation should be automated.

  5. Both (1) and (4).


Correct Option: A
Explanation:

This is true about 'Scalability and performance' and these consideration is applicable for high density virtual machines.

Which of the following is/are true about architectural consideration of cloud security?

  1. There should be a cloud security policy design for cloud security solution.

  2. The security controls need to be implemented to secure the logical entities.

  3. The cloud security needs to provisioned as a automated process.

  4. All of the above.

  5. Both (2) and (3).


Correct Option: D
Explanation:

These are the correct statements.

Which of the following is/are cloud security solutions provides by Cisco?

  1. Secure cloud infrastructure

  2. Cloud security services

  3. Secure cloud access and communication solutions

  4. All of the above

  5. Both (2) and (3)


Correct Option: D
Explanation:

These are the correct statements.

Which of the following is false about Cisco SecureX framework?

  1. It provides consistent security enforcement throughout the organization.

  2. It provides greater alignment of security policies with business needs.

  3. It provides Integrated global intelligence.

  4. It also provides Cisco Security Intelligence Operations (SIO) service.

  5. Both (3) and (4).


Correct Option: D
Explanation:

Cisco SecureX framework does not provide that service.

Which of the following compliances are included in the dimensions of cloud security?

  1. Logs and audit trails

  2. Data recovery and business continuity

  3. Additional security concerns around data jurisdiction

  4. All of the above

  5. Both (2) and (3)


Correct Option: D
Explanation:

Yes, it is the correct answer.

Which of the following is not included in the ''security and privacy' dimension of cloud computing security?

  1. Identity management

  2. Availability

  3. Privacy

  4. Compliance

  5. Application security


Correct Option: D
Explanation:

''Security and privacy' dimension does not include compliances. This is another one of the dimension of Cloud computing security.

What is/are the main security problem(s) that the customers face in cloud computing?

  1. The information among the customers is not isolated.

  2. The operations in the data center might cause data corruption and information leakage.

  3. The reliability problem in shared environment.

  4. Multiple cloud services at a time might cause authentication problems.

  5. All of the above.


Correct Option: E
Explanation:

All are the correct statements.

Which of the following is not a compliance factor in cloud security?

  1. Reporting and auditing

  2. Platform integrity and security

  3. User privileges

  4. Data store compliance

  5. None of the above


Correct Option: E
Explanation:

All are the compliance factors.

What is data segregation in cloud computing security?

  1. Encryption problems can make data totally unusable.

  2. The sensitive data processed outside the enterprise might bring an inherent level of risk.

  3. Data segregation can cause policy related problems.

  4. The integrity of the data can be lost in Data segregation.

  5. Both (1) and (2).


Correct Option: A
Explanation:

The data in the cloud is typically in a shared environment alongside data from other customers, so Encryption is not so effective. This is called Data segregation.

Which of the following areas do the compliances and contracts cover in cloud security?

  1. Privacy

  2. Information Security Laws

  3. Auditing

  4. All of the above

  5. Both (2) and (3)


Correct Option: D
Explanation:

All are the statements related to Compliances and contracts in cloud security.

Which of the following is/are the security issues in the private clouds?

  1. The virtual machines belonging to different security zones, should not be hosted on the same virtual server.

  2. The host operating system must be free from malware.

  3. The host operating system should not have internet connectivity.

  4. There should be encryption and authentication mechanism at each network level.

  5. All of the above.


Correct Option: E
Explanation:

Yes, it is the correct answer.

Which of the following phases are analysed in Microsoft Operations Framework for cloud security?

  1. Reduced IT service costs

  2. Improved business agility

  3. Deliver phase

  4. All of the above

  5. Both (1) and (2)


Correct Option: D
Explanation:

Yes, it is the correct answer.

- Hide questions