introduction to cloud computing coursera week 5 quiz answers

Practice Quiz: Cloud Security and Monitoring

1. What are the three main areas that cloud monitoring assesses?

  • Data, applications, and infrastructure.
  • Applications, data, and frameworks.
  • Infrastructure, resources, and framework.
  • Data, resources, and infrastructure.

2. What does data encryption do?

  • Keeps sensitive data password protected.
  • Stores data in the cloud where it can be accessed even without a key.
  • Saves data to the cloud and is accessible to any shared user.
  • Scrambles data in a way that makes the data illegible.

3. What is the purpose of cloud directory services?

  • Securely saves user data in a repository.
  • Encrypts user accounts.
  • Serves as a data hub for files and folders.
  • Securely manage user profiles and their credentials.

4. What does a distribute-denial-of-service (DDoS) attack do?

  • ADDOS attack installs malware onto the user’s computer.
  • ADDOS attack disconnects a user from the internet.
  • ADDoS attack targets the server in the enterprise by overloading it with traffic from multiple synchronized systems.
  • ADDoS attack targets enterprise systems by installing a worm virus.

5. Which is another element of cloud security?

  • Cloud streaming.
  • Cloud network security.
  • Device security.
  • Offline cloud access.

Practice Quiz: Case Studies and Jobs

6. Cloud computing is a key part of an enterprise's digital transformation strategy. True or false.

  • True
  • False

7. What are some best practices organizations need to follow in order to protect their cloud resources and systems? Select two.

  • Run security monitoring tools on a periodic basis to ensure security threats and breaches are flagged
  • Adopt a shared responsibility model
  • Distribute tasks, workloads, and network traffic
  • Active monitoring for security and compliance

8. Which of the following are key components of Identity and Access Management (IAM)? Select two.

  • Cloud Directory Services
  • Protecting data while it is at rest, in motion, and in use
  • Audit and Compliance
  • Embedding security through the life cycle of an application

9. Which of these statements is true of cloud encryption? A. Encryption ensures only authorized users have access to sensitive data. B. When encrypted data is intercepted without authorization, it is unreadable and meaningless? C. Encryption protects data when it is at rest, in transit, and in use in memo. D. Encryption eliminates data security risk

  • A, B, C, and D
  • A,B, and C only
  • A, B, and D only
  • A and C only

10. Identify some of the standard cloud monitoring best practices from the provided options. Select two.

  • Leverage end-user experience monitoring solutions to capture the performance of an application from the point of view of its end users.
  • Track usage and cost of our cloud resources and services.
  • Authenticate users attempting to access their cloud resources.
  • Encrypt data before it is sent to the cloud.

Module 5 Graded Quiz: Cloud Security, Monitoring, Case Studies, & Jobs

11. Fill in the blank. ______ is a key part of an enterprise's digital transformation strategy.

  • Encryption
  • Cloud computing
  • Databases
  • Local storage devices

12. Which of the following are some best practices organizations must follow to protect their cloud resources and systems?

  • Distribute tasks, workloads, and network traffic
  • Run security monitoring tools periodically to ensure security threats and breaches are flagged
  • Distribute tasks, workloads, and monitoring software
  • Adopt a shared responsibility model of active monitoring for security and compliance

13. Which of the following are key Identity and Access Management (AM) components?

  • Encryption security practices
  • Protecting data while it is at rest, in motion, and in use
  • Embedding security through the life cycle of an application
  • Cloud Directory Services, Audits, and Compliance

14. Which of these statements is true of cloud encryption? A. Encryption ensures that only authorized users have access to sensitive data. B. When encrypted data is intercepted without authorization, it is unreadable and meaningless? C. Encryption protects data when it is at rest, in transit, and in use in memo. D. Encryption eliminates data security risks.

  • A, B, C, and D
  • A, B, and D only
  • A, B, and C only
  • A and C only

15. Identify some of the standard cloud monitoring best practices from the provided options.

  • Encrypt data before it is sent to the cloud.
  • Leverage end-user experience monitoring solutions to capture the performance of an application from the point of view of its end users and track the usage and cost of your cloud resources and services.
  • Authenticate users attempting to access their cloud resources.
  • Encrypt data on a physical storage device.

16. What are some of the monitoring tools that help you to gain insights about your posture, compliance, and threats?

  • Data encryption
  • Hypervisors
  • Flow logs and hypervisors
  • Flow logs from the network and security events

17. What are some of the benefits of using access groups?

  • Access groups define the users, the resources to which access is granted, and the permission level each user has on these resources.
  • Access groups create an additional level of authentication for application users.
  • The use of access groups helps to reduce the number of policies in an account. Access groups provide a more streamlined way to assign access rights.
  • Access groups help increase the number of policies of an account.

18. Identify the two main parts of an encryption system from the provided options.

  • Client-side encryption
  • Server-side encryption
  • Physical encryption device
  • The encryption algorithm and decryption key

19. What are some of the benefits that cloud monitoring solutions offer?

  • Accelerate the diagnosis and resolution of performance incidents and provide proactive notifications of abnormal or unusual situations.
  • Prevent unauthorized users from accessing the systems
  • Troubleshoot applications and infrastructure
  • Enhanced security to user accounts

20. The Weather Company migrated its weather web property to a secure, scalable, and global architecture in the IBM Cloud. What benefits did they realize as a result of this migration?

  • Faster development and release of new apps and digital self-service tools to customers
  • Increase development and increased latency
  • Harness local data centers to minimize latency for users and optimize their systems for elasticity in handling extreme spikes in demand
  • Increase asset availability and overall equipment effectiveness

Leave a Reply