1. What is the primary benefit of using multi-factor authentication (MFA) in
cloud security?
• A) Faster login process
• B) Enhanced protection against unauthorized access
• C) Reduced password complexity
• Answer: B) Enhanced protection against unauthorized access
• Explanation: MFA requires users to provide two or more verification factors, significantly
increasing security and reducing the risk of unauthorized access.
2. Which of the following is a cloud security framework that helps organizations
manage data security and privacy?
• A) ISO 9001
• B) NIST Cybersecurity Framework
• C) PCI DSS
• Answer: B) NIST Cybersecurity Framework
• Explanation: The NIST Cybersecurity Framework provides a policy framework of computer
security guidance for how private sector organizations can assess and improve their ability to
prevent, detect, and respond to cyber attacks.
3. What is a potential consequence of poor cloud data management?
• A) Increased performance
• B) Data breaches
• C) Enhanced collaboration
• Answer: B) Data breaches
• Explanation: Poor data management practices can lead to vulnerabilities and increase the
likelihood of data breaches due to misconfigured settings or improper access controls.
4. Which cloud service model typically provides the least amount of user control
over security?
• A) IaaS
• B) PaaS
• C) SaaS
• Answer: C) SaaS
• Explanation: SaaS providers manage all aspects of the service, including security, limiting user
control over security configurations compared to IaaS or PaaS.
5. What is the primary purpose of implementing a security incident response
plan in cloud environments?
, • A) To enhance user training
• B) To outline steps for responding to security incidents
• C) To improve system performance
• Answer: B) To outline steps for responding to security incidents
• Explanation: A security incident response plan details procedures for identifying, responding to,
and recovering from security incidents, helping organizations mitigate impact.
6. Which of the following is a common cloud security challenge?
• A) Improved scalability
• B) Shadow IT
• C) Simplified compliance
• Answer: B) Shadow IT
• Explanation: Shadow IT refers to unauthorized applications or services used by employees,
which can introduce security risks and compliance challenges.
7. What does "data sovereignty" mean in the context of cloud computing?
• A) Storing data in multiple locations
• B) Laws governing the data's location and access
• C) Eliminating the need for backups
• Answer: B) Laws governing the data's location and access
• Explanation: Data sovereignty refers to the legal implications of where data is stored and
processed, requiring compliance with local laws and regulations.
8. Which of the following technologies can help prevent unauthorized access to
cloud services?
• A) Single sign-on (SSO)
• B) Network segmentation
• C) Data compression
• Answer: B) Network segmentation
• Explanation: Network segmentation separates different parts of a network, limiting access and
enhancing security by controlling traffic flow between segments.
9. What is a cloud service provider (CSP) responsible for in a shared
responsibility model?
• A) User account management
• B) Physical security of the infrastructure
• C) Data classification
• Answer: B) Physical security of the infrastructure
• Explanation: In the shared responsibility model, the CSP is responsible for securing the physical
infrastructure, while the customer manages their data and application security.