1. What is a key concept of cloud security?
______.
The shared responsibility model.
a) Unlimited storage for all users. (Unbegrenzter Speicher für alle Nutzer.)
b) The shared responsibility model. (Das Modell der geteilten Verantwortung.)
c) No need for updates. (Keine Updates notwendig.)
2. In cloud environments, who secures the physical data centers?
______.
The cloud provider.
a) The customer. (Der Kunde.)
b) The cloud provider. (Der Cloud-Anbieter.)
c) Random internet users. (Zufällige Internetnutzer.)
3. What should be used to protect cloud accounts?
______.
Multi-factor authentication (MFA).
a) Multi-factor authentication (MFA). (Multi-Faktor-Authentifizierung.)
b) Shared passwords. (Geteilte Passwörter.)
c) No login protection. (Kein Login-Schutz.)
4. What is the purpose of identity and access management (IAM)?
______.
Control who can access cloud resources.
a) Improve internet speed. (Internetgeschwindigkeit erhöhen.)
b) Control who can access cloud resources. (Zugriff auf Cloud-Ressourcen steuern.)
c) Increase screen brightness. (Bildschirmhelligkeit erhöhen.)
5. What does “least privilege” mean in cloud security?
______.
Grant only the minimum access required.
a) Give everyone admin rights. (Allen Adminrechte geben.)
b) Grant only the minimum access required. (Nur minimal notwendige Zugriffe gewähren.)
c) Disable user accounts. (Benutzerkonten deaktivieren.)
6. Why encrypt data in the cloud?
______.
Protect data at rest and in transit.
a) Protect data at rest and in transit. (Daten im Ruhezustand und bei Übertragung schützen.)
b) Increase storage size. (Speicher vergrößern.)
c) Improve graphics quality. (Grafikqualität verbessern.)
7. What is a cloud security misconfiguration risk?
______.
Publicly exposed storage buckets.
a) Publicly exposed storage buckets. (Öffentlich zugängliche Speicher-Buckets.)
b) Dark mode settings. (Dunkelmodus.)
c) Screen brightness. (Bildschirmhelligkeit.)
8. What is logging and monitoring used for in cloud security?
______.
Detect suspicious activity.
a) Detect suspicious activity. (Verdächtige Aktivitäten erkennen.)
b) Increase internet speed. (Internetgeschwindigkeit erhöhen.)
c) Improve fonts. (Schriftarten verbessern.)
9. Why are backups important in the cloud?
______.
Protect against data loss and ransomware.
a) Improve color themes. (Farben verbessern.)
b) Protect against data loss and ransomware. (Vor Datenverlust und Ransomware schützen.)
c) Increase CPU speed. (CPU-Geschwindigkeit erhöhen.)
10. What is network segmentation in cloud environments?
______.
Separating resources into isolated networks.
a) Increasing Wi-Fi speed. (WLAN-Geschwindigkeit erhöhen.)
b) Separating resources into isolated networks. (Ressourcen in isolierte Netzwerke trennen.)
c) Disabling firewalls. (Firewalls deaktivieren.)
11. What is a security group or firewall rule used for?
______.
Control inbound and outbound traffic.
a) Improve graphics performance. (Grafikleistung verbessern.)
b) Control inbound and outbound traffic. (Ein- und ausgehenden Verkehr steuern.)
c) Increase screen brightness. (Bildschirmhelligkeit erhöhen.)
12. Why rotate API keys and secrets regularly?
______.
Reduce risk if credentials are exposed.
a) Reduce risk if credentials are exposed. (Risiko reduzieren, falls Zugangsdaten offengelegt werden.)
b) Increase internet speed. (Internetgeschwindigkeit erhöhen.)
c) Improve display colors. (Anzeige-Farben verbessern.)
13. What is vulnerability scanning in cloud systems?
______.
Checking systems for known security weaknesses.
a) Checking systems for known security weaknesses. (Systeme auf bekannte Schwachstellen prüfen.)
b) Increasing storage size. (Speicher vergrößern.)
c) Improving battery life. (Akkulaufzeit verbessern.)
14. What is container security focused on?
______.
Securing container images and runtime environments.
a) Improving camera quality. (Kameraqualität verbessern.)
b) Securing container images and runtime environments. (Container-Images und Laufzeit sichern.)
c) Increasing internet speed. (Internetgeschwindigkeit erhöhen.)
15. Why implement strong authentication for cloud admins?
______.
Admin accounts are high-value targets.
a) Improve display resolution. (Anzeigeauflösung verbessern.)
b) Admin accounts are high-value targets. (Admin-Konten sind besonders wertvolle Ziele.)
c) Increase storage capacity. (Speicher erhöhen.)
16. What is Infrastructure as Code (IaC) security?
______.
Securing automated infrastructure configurations.
a) Securing automated infrastructure configurations. (Automatisierte Infrastruktur-Konfiguration sichern.)
b) Increasing CPU speed. (CPU-Geschwindigkeit erhöhen.)
c) Improving UI design. (UI-Design verbessern.)
17. What is a secure cloud logging practice?
______.
Centralize and protect logs from tampering.
a) Increase page speed. (Seitengeschwindigkeit erhöhen.)
b) Centralize and protect logs from tampering. (Logs zentralisieren und vor Manipulation schützen.)
c) Remove logs weekly. (Logs wöchentlich löschen.)
18. Why use private endpoints or VPN access?
______.
Limit exposure of cloud resources to the internet.
a) Limit exposure of cloud resources to the internet. (Cloud-Ressourcen vor öffentlichem Internet schützen.)
b) Improve screen brightness. (Bildschirmhelligkeit verbessern.)
c) Increase app speed. (App-Geschwindigkeit erhöhen.)
19. What is data classification in the cloud?
______.
Categorizing data based on sensitivity.
a) Categorizing data based on sensitivity. (Daten nach Sensibilität klassifizieren.)
b) Increasing storage automatically. (Speicher automatisch erhöhen.)
c) Improving fonts. (Schriftarten verbessern.)
20. Why use secure backups in a different region?
______.
Improve disaster recovery and resilience.
a) Improve disaster recovery and resilience. (Desaster-Recovery und Resilienz verbessern.)
b) Increase CPU performance. (CPU-Leistung erhöhen.)
c) Improve screen brightness. (Bildschirmhelligkeit verbessern.)
21. What is Zero Trust in cloud security?
______.
Never trust, always verify access requests.
a) Never trust, always verify access requests. (Niemals vertrauen, immer verifizieren.)
b) Trust all internal traffic automatically. (Internem Verkehr automatisch vertrauen.)
c) Disable authentication. (Authentifizierung deaktivieren.)
22. What is a common cloud monitoring goal?
______.
Detect unusual behavior and security threats.
a) Detect unusual behavior and security threats. (Ungewöhnliches Verhalten erkennen.)
b) Increase graphics performance. (Grafikleistung erhöhen.)
c) Improve color themes. (Farbdesign verbessern.)
23. Why secure serverless functions?
______.
They can expose data or permissions if misconfigured.
a) Increase battery life. (Akkulaufzeit erhöhen.)
b) They can expose data or permissions if misconfigured. (Fehlkonfiguration kann Daten oder Rechte offenlegen.)
c) Improve UI speed. (UI-Geschwindigkeit verbessern.)
24. What is a key benefit of security automation?
______.
Faster detection and response to threats.
a) Faster detection and response to threats. (Schnellere Erkennung und Reaktion.)
b) Increase screen size. (Bildschirmgröße erhöhen.)
c) Improve image resolution. (Bildauflösung verbessern.)
25. What is the main goal of cloud security?
______.
Protect cloud systems, data, and services.
a) Improve website colors. (Websitefarben verbessern.)
b) Protect cloud systems, data, and services. (Cloud-Systeme, Daten und Dienste schützen.)
c) Increase device brightness. (Gerätehelligkeit erhöhen.)