0% found this document useful (0 votes)
1K views4 pages

Security Risks & Addressing - PostQuiz - Attempt Review

1) The user completed a quiz on security risks and addressing in cloud computing, scoring 8 out of 10 points. 2) The quiz covered topics like multi-tenancy, privacy policies, loss of governance, mandatory access control, data protection, federated identity management, and two-factor authentication. 3) The user reviewed the questions and answers, correcting the two questions that were initially answered incorrectly.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views4 pages

Security Risks & Addressing - PostQuiz - Attempt Review

1) The user completed a quiz on security risks and addressing in cloud computing, scoring 8 out of 10 points. 2) The quiz covered topics like multi-tenancy, privacy policies, loss of governance, mandatory access control, data protection, federated identity management, and two-factor authentication. 3) The user reviewed the questions and answers, correcting the two questions that were initially answered incorrectly.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1/20/24, 12:22 AM Security Risks & Addressing - PostQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Cloud & Cloud Security Fundamentals / Security Risks & Addressing

Quiz review
Started on Saturday, 20 January 2024, 12:18 AM
State Finished
Completed on Saturday, 20 January 2024, 12:22 AM
Time taken 4 mins 42 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

A cloud service provider offers multiple tenants to share the same physical resources. What concept is this an example of in cloud computing?

System virtual machine 46684


Enhanced suitability of response to incidents
Hypervisor
Multi-tenancy

The correct answer is: Multi-tenancy

Question 2
Correct

Mark 1.00 out of 1.00

46684
A company is considering migrating its HR system to a cloud service. They are concerned about ensuring the privacy of employee data. What step should
they take to address this concern?

Evaluate security controls on physical infrastructure


Audit business and operational processes
Enforce privacy policies
Manage roles, people, and identities

46684
The correct answer is: Enforce privacy policies

Question 3
Correct

Mark 1.00 out of 1.00

A company is considering moving its data to a cloud service provider. What is the primary security risk they should be concerned about?

Decreased data privacy concerns


Loss of governance
Data encryption
Penetration testing

The correct answer is: Loss of governance

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973025&cmid=8073 1/4
1/20/24, 12:22 AM Security Risks & Addressing - PostQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

A healthcare organization stores sensitive patient information in the cloud. They are worried about potential breaches and need to ensure that only
authorized personnel can access the data. Which access control model should they consider implementing?

Insecure or incomplete data deletion


Mandatory Access Control (MAC)
Management of the identity
Loss of governance

The correct answer is: Mandatory Access Control (MAC)

Question 5
Correct

Mark 1.00 out of 1.00

46684
You are the IT administrator of a company that uses a cloud-based file storage service. One of your employees accidentally deletes an important file. What
security concern does this scenario highlight?

Compliance and legal risks


Loss of governance
Data protection
Vendor lock-in

46684
The correct answer is: Data protection

Question 6
Incorrect

Mark 0.00 out of 1.00

An organization uses multiple cloud services for various business processes. They want to ensure that their users have appropriate access to these
services based on their roles within the organization. Which identity management model would be most suitable for this scenario?

Isolated identity management


Centralized identity management
Role-based access control 
Federated identity management 46684
The correct answer is: Federated identity management

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973025&cmid=8073 2/4
1/20/24, 12:22 AM Security Risks & Addressing - PostQuiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

A cloud service provider offers to let customers perform penetration testing on their virtual machines. What type of hypervisor is the provider likely using?

Type 1 hypervisor
System virtual machine
Type 2 hypervisor
Process virtual machine

The correct answer is: Type 1 hypervisor

Question 8
Correct

Mark 1.00 out of 1.00

46684
A company is concerned about the risk of unauthorized access to its cloud resources. They want to implement a more secure authentication method that
requires two factors for login. What is this called?

Single sign-on (SSO)


Two-factor authentication (2FA)
Discretionary Access Control (DAC)
Role-based access control (RBAC)

The correct answer is: Two-factor authentication (2FA)

Question 9
46684
Incorrect

Mark 0.00 out of 1.00

A company wants to ensure that its cloud service provider allows them to audit the services properly. Which type of deployment should they choose?

Event-Driven Deployment 
Automatic Deployment
Scheduled Deployment

46684
Custom Deployment

The correct answer is: Custom Deployment

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973025&cmid=8073 3/4
1/20/24, 12:22 AM Security Risks & Addressing - PostQuiz: Attempt review

Question 10
Correct

Mark 1.00 out of 1.00

A company is planning to use a cloud service for data storage. Which security benefit is associated with the scale of cloud computing?

Increased manual deployment


Enhanced suitability of response to incidents
Decreased data privacy concerns
Improved data encryption

The correct answer is: Enhanced suitability of response to incidents

◄ Addressing security risks in cloud & Identity Management

Jump to...
46684 Encryption & Decryption - PreQuiz ►

46684

46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=973025&cmid=8073 4/4

You might also like