These Cloud Security multiple-choice questions and their answers will help you strengthen your grip on the subject of Cloud Security. You can prepare for an upcoming exam or job interview with these Cloud Security MCQs.
So scroll down and start answering.
A. Ensuring trusted SSL communications
B. Complying with company-specific IT standards
C. Protecting the integrity of stored information
D. Securing web page content from modification
A. Hosted SaaS connection between the datacenter and IaaS provider
B. Virtual DLP connection between the datacenter and the IaaS provider
C. IPSEC VPN connection between the datacenter and the IaaS provider
D. On-demand PGP connection between the datacenter and the IaaS provider
A. Proprietary beta release product application software and its supporting kernel-level programming code
B. The development team application servers that require constant physical configuration changes the development team? application servers that require constant physical configuration changes
C. Layer 3 switches that are being used to segregate the various business units and separate the production and testing environments
D. Database servers that are being used by the QA team to test load handling
A. Security risks introduced by a multi-tenant cloud
B. Loss of administrative control of the application in the cloud
C. Lack of operational resiliency in the cloud
D. Inability to enforce strong authentication in the cloud
A. Implement data encryption
B. Implement firewall policies
C. Implement data loss prevention
D. Implement an automated patch management process
A. Message is scanned for viruses > message is scanned for spam > message attachments are scanned for policy violations
B. Message is scanned for viruses > message is scanned for content violations and data loss > message is scanned for spam
C. Message is scanned for viruses > message is scanned for spam > message is scanned for content violations and data loss
D. Message is scanned for spam > message is scanned for viruses > message is scanned for content violations and data loss
A. Broken fault tolerance
B. Ineffective resource pooling
C. Virtual machines being shut down
D. Virtual machines removed from data store
A. Harden applications sufficiently for multi-tenant environments
B. Revert a public cloud to a private cloud during an emergency
C. Apply anti-spam measures on the endpoint accessing the cloud
D. Activate de duplication on the cloud-based storage
A. Legal
B. Technical
C. Non-cloud specific
D. Policy and organizational
A. Hybrid SaaS
B. Multi-tenant IaaS
C. Multi-tenant PaaS
D. Multi-tenant SaaS
A. Modify the email body to redirect to a quarantine location
B. Use a Flex Response plug-in to modify the email header
C. Add a header to an email to route to an encryption gateway
D. Modify the email attachment content to remove confidential information
A. Symantec Validation and Identity Protection
B. Symantec Critical Systems Protection
C. Symantec Control Compliance Suite
D. Symantec Data Loss Prevention
A. SEP analyzes virtual system configurations to identify vulnerabilities.
B. SEP reduces the spread of malware by hardening VMware vCenter.
C. SEP checks that offline VMware machines are safe before bringing them online.
D. SEP identifies malicious attacks to ESX/ESXi hypervisors without using signatures.
A. Symantec Web Gateway
B. Symantec Messaging Gateway
C. Symantec Network Prevent for Email
A. CCS Policy Manager
B. CCS Standards Manager
C. CCS Response Assessment Manager
D. CCS External Data Interface Manager
A. Private cloud
B. Virtual private network
C. Wide area network
A. Magnetic storage
B. Internet access
C. Statistical analysis of aircraft wing flutter
D. Optical processors
A. Provides better visibility of security and disaster preparedness capabilities
B. Minimizes the risk of investing in technology that will soon become obsolete
C. Provides greater control over the location of data
D. Requires a significant amount of capital
A. Digital certificate
B. Cookie
C. Smartfilter
D. Accelerator