0
0
Cybersecurityknowledge~20 mins

Cloud network security groups in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Cloud Network Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding the primary function of security groups

What is the main purpose of a cloud network security group?

ATo manage cloud resource billing and cost allocation
BTo store data backups securely in the cloud
CTo monitor user activity logs for compliance
DTo control inbound and outbound traffic to cloud resources based on rules
Attempts:
2 left
💡 Hint

Think about how cloud resources are protected from unwanted network access.

📋 Factual
intermediate
2:00remaining
Default behavior of security groups

What is the default behavior of a newly created cloud security group regarding inbound traffic?

AAll inbound traffic is denied by default
BAll inbound traffic is allowed by default
CInbound traffic is allowed only from the same security group
DInbound traffic is allowed only from trusted IP addresses
Attempts:
2 left
💡 Hint

Consider the principle of least privilege in security.

🔍 Analysis
advanced
2:00remaining
Effect of overlapping security group rules

If a cloud resource is associated with two security groups where one allows inbound HTTP (port 80) from any IP and the other denies all inbound traffic, what will be the effective inbound HTTP access?

AInbound HTTP traffic will be allowed only from specific IPs
BInbound HTTP traffic will be denied due to the deny rule
CInbound HTTP traffic will be allowed from any IP
DInbound HTTP traffic will be blocked unless explicitly allowed in both groups
Attempts:
2 left
💡 Hint

Remember how security groups handle allow and deny rules.

Comparison
advanced
2:00remaining
Difference between security groups and network ACLs

Which statement correctly distinguishes cloud security groups from network ACLs (Access Control Lists)?

ABoth security groups and network ACLs are stateful and operate at the instance level
BSecurity groups operate at the instance level and are stateful; network ACLs operate at the subnet level and are stateless
CSecurity groups operate at the subnet level and are stateless; network ACLs operate at the instance level and are stateful
DBoth security groups and network ACLs are stateless and operate at the subnet level
Attempts:
2 left
💡 Hint

Think about where each applies and how they track connections.

Reasoning
expert
2:00remaining
Diagnosing connectivity issues with security groups

A user reports that their cloud virtual machine cannot receive SSH connections (port 22) from their office IP, even though a security group rule allows inbound SSH from that IP. Which is the most likely cause?

AThe network ACL associated with the subnet blocks inbound SSH traffic
BThe security group rule is set to allow outbound SSH instead of inbound
CThe virtual machine's firewall is blocking SSH connections
DThe security group is missing an outbound rule allowing return traffic
Attempts:
2 left
💡 Hint

Consider other network controls besides security groups that affect traffic.