Question.46 What is the primary purpose of data encryption in transit in cloud environments? (A) To prevent unauthorized access to cloud resources (B) To protect data from unauthorized disclosure during transmission over networks (C) To optimize cloud resource utilization (D) To automate software deployment processes |
46. Click here to View Answer
Correct Answer: (B) To protect data from unauthorized disclosure during transmission over networks
Question.47 What is the primary objective of a disaster recovery plan in cloud computing? (A) To prevent unauthorized access to cloud resources (B) To ensure continuous availability of critical services during a disaster (C) To optimize cloud resource utilization (D) To automate software deployment processes |
47. Click here to View Answer
Correct Answer: (B) To ensure continuous availability of critical services during a disaster
Question.48 What is the primary purpose of using a digital certificate in public key infrastructure (PKI)? (A) To encrypt data for secure transmission (B) To authenticate the identity of users and devices (C) To generate random cryptographic keys (D) To prevent buffer overflow attacks |
48. Click here to View Answer
Correct Answer: (B) To authenticate the identity of users and devices
Question.49 A hacker gains access to a company’s network and begins to intercept network traffic in order to steal login credentials. Which OSI layer is being attacked? (A) Physical layer (B) Data link layer (C) Network layer (D) Application layer |
49. Click here to View Answer
Correct Answer: (B) Data link layer
Question.50 Which security control is used to verify the integrity and authenticity of cloud service providers? (A) Service level agreements (SLAs) (B) Cloud security certifications (C) Encryption protocols (D) Intrusion detection systems (IDS) |
50. Click here to View Answer
Correct Answer: (B) Cloud security certifications