Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

Cloud Data Security Q&A | Encryption, Access Control & Threat Protection with Prof. Mumo

Puntuación
-
Vendido
-
Páginas
27
Grado
A+
Subido en
27-01-2026
Escrito en
2025/2026

This comprehensive Q&A guide covers cloud data security principles including encryption technologies, access management, compliance standards, threat detection, and security best practices for protecting data in cloud environments. • Q&A on cloud encryption technologies and implementation • Identity and access management (IAM) in cloud platforms • Compliance standards and regulatory requirements • Threat detection and security monitoring • Security best practices and risk mitigation

Mostrar más Leer menos
Institución
Cloud Data Security:
Grado
Cloud Data Security:

Vista previa del contenido

Cloud Data Security: Questions and Answers - Prof.
Mumo (2026/2027)




Principles of Cloud Computing Security | Key Domains: Shared Responsibility Model, Data
Encryption (In-Transit & At-Rest), Identity & Access Management (IAM), Cloud Security Posture
Management (CSPM), Incident Response in the Cloud, and Compliance Frameworks (SOC 2, ISO
27001, GDPR) | Expert-Aligned Structure | Multiple-Choice Q&A Format

Introduction

This structured Cloud Data Security Q&A for 2026/2027 provides 70 multiple-choice questions
with correct answers and rationales. It is designed to address the unique security challenges and
best practices associated with protecting data and workloads in public, private, and hybrid cloud
environments, aligning with industry standards and major cloud provider frameworks.

Q&A Structure:

• Cloud Security Practice Bank: (70 MULTIPLE-CHOICE QUESTIONS)

Answer Format

All correct answers and security configurations must appear in bold and cyan blue, accompanied
by concise rationales explaining the division of responsibility in the cloud shared responsibility
model, the appropriate use of a specific security service (e.g., AWS KMS for encryption key
management), the principle of least privilege in IAM policy design, the purpose of a CSPM tool, the
steps in a cloud incident response plan, and why the alternative multiple-choice options create
security gaps, misconfigure resources, or violate compliance requirements.

1. In the AWS Shared Responsibility Model, which of the following is the customer’s
responsibility?


A. Physical security of data centers


B. Patching of the hypervisor

, C. Configuration of security groups for EC2 instances


D. Maintenance of the underlying network infrastructure


Rationale: Under the AWS Shared Responsibility Model, AWS is responsible for "security of the cloud"
(infrastructure), while customers are responsible for "security in the cloud." This includes configuring
firewalls (security groups), managing IAM policies, and encrypting data. Options A, B, and D fall under
AWS’s infrastructure responsibilities.

2. Which encryption method protects data as it moves between a user’s browser and a cloud
application?


A. AES-256 at rest


B. TLS (Transport Layer Security)


C. Disk-level full volume encryption


D. Hash-based message authentication


Rationale: TLS encrypts data in-transit over networks, such as between a client and a web server.
AES-256 and disk encryption protect data at-rest. Hashing ensures integrity but not confidentiality.
Only TLS secures data during transmission.

3. What is the primary purpose of Identity and Access Management (IAM) in cloud
environments?


A. To monitor network traffic for anomalies


B. To automatically scale compute resources


C. To enforce the principle of least privilege for users and services


D. To back up data to secondary regions


Rationale: IAM systems control who (users, roles, services) can access which resources and under what
conditions. The core security principle is least privilege—granting only necessary permissions. Other
options relate to monitoring, scaling, and backup, which are separate functions.

, 4. A Cloud Security Posture Management (CSPM) tool is primarily used to:


A. Encrypt all stored customer data automatically


B. Provide real-time DDoS protection


C. Detect misconfigurations and compliance violations across cloud accounts


D. Replace the need for manual penetration testing


Rationale: CSPM tools continuously assess cloud environments against security best practices and
compliance benchmarks (e.g., CIS, GDPR). They identify risky configurations like public S3 buckets or
overly permissive IAM roles. They do not handle encryption, DDoS mitigation, or fully replace
human-led testing.

5. During a cloud security incident, what is the first recommended step in an incident
response plan?


A. Notify all customers immediately


B. Contain the affected systems to prevent further damage


C. Delete all logs to preserve system performance


D. Rebuild all virtual machines from scratch


Rationale: Containment is critical to limit blast radius—e.g., isolating a compromised instance or
revoking credentials. Notification follows after assessment; deleting logs destroys evidence; rebuilding
may be part of recovery but not the first step. Preservation of forensic data is essential.

6. Which compliance framework specifically addresses data protection and privacy for
individuals within the European Union?


A. SOC 2


B. ISO 27001


C. GDPR

Escuela, estudio y materia

Institución
Cloud Data Security:
Grado
Cloud Data Security:

Información del documento

Subido en
27 de enero de 2026
Número de páginas
27
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$14.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorAgness Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
11
Miembro desde
2 año
Número de seguidores
5
Documentos
513
Última venta
1 semana hace

4.5

2 reseñas

5
1
4
1
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes