0% found this document useful (0 votes)
172 views

Security Risks & Addressing - PreQuiz - Attempt Review

The document discusses the results of a quiz on cloud computing and cybersecurity fundamentals. It provides 10 multiple choice questions testing topics like cloud computing models, security frameworks, vulnerabilities, and risks. It lists the questions, correct answers, and marks received on each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
172 views

Security Risks & Addressing - PreQuiz - Attempt Review

The document discusses the results of a quiz on cloud computing and cybersecurity fundamentals. It provides 10 multiple choice questions testing topics like cloud computing models, security frameworks, vulnerabilities, and risks. It lists the questions, correct answers, and marks received on each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1/20/24, 12:17 AM Security Risks & Addressing - PreQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Cloud & Cloud Security Fundamentals / Security Risks & Addressing

Quiz review
Started on Saturday, 20 January 2024, 12:07 AM
State Finished
Completed on Saturday, 20 January 2024, 12:16 AM
Time taken 9 mins 31 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

Which of the following is not a benefit of cloud computing?

Scalability
Flexibility
46684
Cost savings
Data ownership

The correct answer is: Data ownership

Question 2
Correct

Mark 1.00 out of 1.00

46684
What is a vulnerability in the context of cybersecurity?

A backup copy of data


An encrypted communication channel
A weakness or flaw that can be exploited by a threat
A strong security measure

The correct answer is: A weakness or flaw that can be exploited by a threat

Question 3
46684
Correct

Mark 1.00 out of 1.00

Application and database security primarily focus on safeguarding:

Hardware components
Software code
User accounts
Network connections

The correct answer is: Software code

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=972919&cmid=8072 1/4
1/20/24, 12:17 AM Security Risks & Addressing - PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which security framework provides a set of guidelines and best practices for securing information systems?

COBIT
ISO 9001
ITIL
SOX

The correct answer is: COBIT

Question 5
Correct

Mark 1.00 out of 1.00

46684
In cloud computing, what does "IaaS" stand for?

Internet as a Service
Integrated Application Storage Service
Information and Applications Service
Infrastructure as a Service

The correct answer is: Infrastructure as a Service

Question 6
Correct
46684
Mark 1.00 out of 1.00

What type of virtualization allows multiple operating systems to run on a single physical machine?

Network virtualization
Storage virtualization
Application virtualization
Server virtualization

The correct answer is: Server virtualization


46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=972919&cmid=8072 2/4
1/20/24, 12:17 AM Security Risks & Addressing - PreQuiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

What is the primary goal of security in the IT industry?

To minimize software costs


To protect data and systems from threats
To maximize system performance
To increase network bandwidth

The correct answer is: To protect data and systems from threats

Question 8
Correct

Mark 1.00 out of 1.00

46684
What is a common security risk associated with human error or negligence?

Malware
Zero-day vulnerabilities
DDoS attacks
Social engineering

The correct answer is: Social engineering

Question 9
Correct
46684
Mark 1.00 out of 1.00

What is one of the possible security threats in cloud infrastructure?

Physical access to servers


Outdated antivirus software
Printed documents
Strong password policies

The correct answer is: Physical access to servers


46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=972919&cmid=8072 3/4
1/20/24, 12:17 AM Security Risks & Addressing - PreQuiz: Attempt review

Question 10
Correct

Mark 1.00 out of 1.00

Which component of an operating system is responsible for managing hardware resources and processes?

Registry
File system
Kernel
User interface

The correct answer is: Kernel

◄ Introduction to Cloud and Cloud Security - PostQuiz

Jump to...
46684 Security risks in cloud computing ►

46684

46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=972919&cmid=8072 4/4

You might also like