Question.51 Which encryption algorithm is commonly used to protect data in transit in cloud environments? (A) AES (Advanced Encryption Standard) (B) DES (Data Encryption Standard) (C) RSA (Rivest-Shamir-Adleman) (D) MD5 (Message Digest Algorithm 5) |
51. Click here to View Answer
Correct Answer: (A) AES (Advanced Encryption Standard)
Question.52 Which of the following is a characteristic of a public cloud deployment model? (A) Dedicated infrastructure for a single organization (B) Limited scalability (C) Shared infrastructure for multiple organizations (D) Full control over hardware and software configurations |
52. Click here to View Answer
Correct Answer: (C) Shared infrastructure for multiple organizations
Question.53 At which layer of the TCP/IP protocol stack does a firewall operate? (A) Layer 1 (B) Layer 2 (C) Layer 3 (D) Layer 4 |
53. Click here to View Answer
Correct Answer: (D) Layer 4
Question.54 What is the primary purpose of using a salt when hashing passwords? (A) To add flavor to the password (B) To increase the entropy of the hashed passwords (C) To make the passwords easier to crack (D) To decrease the security of the hashing algorithm |
54. Click here to View Answer
Correct Answer: (B) To increase the entropy of the hashed passwords
Question.55 Which security control is used to prevent unauthorized access to sensitive data in cloud databases? (A) Role-based access control (RBAC) (B) Network intrusion detection systems (NIDS) (C) Distributed denial of service (DDoS) mitigation (D) Security information and event management (SIEM) |
55. Click here to View Answer
Correct Answer: (A) Role-based access control (RBAC)