0%

Which security model is widely used in cloud computing to control access?

Correct! Wrong!

The Role-Based Access Control (RBAC) model ensures that users have appropriate permissions based on their roles within the organization.

What is the primary function of a cloud firewall?

Correct! Wrong!

A cloud firewall acts as a security barrier that filters incoming and outgoing traffic to protect cloud resources from threats.

Which compliance standard is commonly required for handling healthcare data in the cloud?

Correct! Wrong!

HIPAA (Health Insurance Portability and Accountability Act) ensures the security and privacy of healthcare-related data stored and processed in the cloud.

What is a key advantage of multi-factor authentication (MFA) in cloud security?

Correct! Wrong!

MFA adds an extra layer of security by requiring users to verify their identity using multiple factors, reducing the risk of unauthorized access.

Which encryption method is commonly used to secure data at rest in the cloud?

Correct! Wrong!

AES (Advanced Encryption Standard) is a widely adopted encryption method that provides strong protection for data stored in the cloud.

What is the purpose of a cloud compliance audit?

Correct! Wrong!

A cloud compliance audit assesses whether cloud services meet required regulatory and security standards, ensuring legal and operational compliance.