1. Which of the following is a primary benefit of using cloud services?
• A) Fixed costs
• B) Scalability and flexibility
• C) Complete control over hardware
• Answer: B) Scalability and flexibility
• Explanation: Cloud services allow organizations to scale resources up or down as needed,
providing flexibility to meet varying demands.
2. What is a significant security concern when using public cloud services?
• A) Increased hardware costs
• B) Limited access to customer support
• C) Data breaches and unauthorized access
• Answer: C) Data breaches and unauthorized access
• Explanation: Public clouds can expose sensitive data to security vulnerabilities, making data
breaches and unauthorized access significant concerns.
3. Which of the following is an example of Infrastructure as a Service (IaaS)?
• A) Microsoft Office 365
• B) Amazon EC2
• C) Google Drive
• Answer: B) Amazon EC2
• Explanation: Amazon EC2 provides virtualized computing resources over the Internet, classifying
it as an IaaS offering.
4. What does the term "shared responsibility model" refer to in cloud security?
• A) Both cloud provider and customer share responsibility for security
• B) Security responsibilities are solely on the cloud provider
• C) Security responsibilities are solely on the customer
• Answer: A) Both cloud provider and customer share responsibility for security
• Explanation: In the shared responsibility model, the cloud provider is responsible for securing
the infrastructure, while the customer is responsible for securing their data and applications.
5. Which cloud service model provides the most control over the environment?
• A) Software as a Service (SaaS)
• B) Platform as a Service (PaaS)
• C) Infrastructure as a Service (IaaS)
• Answer: C) Infrastructure as a Service (IaaS)
, • Explanation: IaaS provides users with control over the operating system, storage, and
applications, allowing for greater customization than SaaS or PaaS.
6. What is a common risk associated with multi-tenant cloud environments?
• A) Improved performance
• B) Data isolation issues
• C) Enhanced security
• Answer: B) Data isolation issues
• Explanation: In multi-tenant environments, data from different customers is stored on the same
infrastructure, which can lead to risks regarding data isolation and confidentiality.
7. Which of the following best describes a cloud access security broker (CASB)?
• A) A type of malware
• B) A cloud security solution that acts as an intermediary
• C) A protocol for secure communication
• Answer: B) A cloud security solution that acts as an intermediary
• Explanation: A CASB provides visibility and security controls between cloud service consumers
and cloud service providers, ensuring secure access to cloud resources.
8. Which type of encryption is commonly used to secure data at rest in cloud
storage?
• A) Symmetric encryption
• B) Asymmetric encryption
• C) Hashing
• Answer: A) Symmetric encryption
• Explanation: Symmetric encryption is often used for encrypting data at rest because it is
efficient for large amounts of data, requiring the same key for both encryption and decryption.
9. What is the main purpose of identity and access management (IAM) in cloud
environments?
• A) To monitor network performance
• B) To manage user identities and control access to resources
• C) To encrypt sensitive data
• Answer: B) To manage user identities and control access to resources
• Explanation: IAM systems ensure that the right individuals have appropriate access to cloud
resources, enhancing security and compliance.
10. Which cloud deployment model offers the highest level of data control and
security?
• A) Public cloud
• B) Private cloud