0
0
Cybersecurityknowledge~10 mins

Why cloud environments need different security in Cybersecurity - Test Your Understanding

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to explain why cloud security is important.

Cybersecurity
Cloud environments require different security because they are [1] and accessible over the internet.
Drag options to blanks, or click blank then click option'
Ashared
Bisolated
Coffline
Dprivate
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'isolated' because it sounds secure, but clouds are shared.
2fill in blank
medium

Complete the sentence to describe a cloud security challenge.

Cybersecurity
One challenge in cloud security is that data is stored [1], outside the user's direct control.
Drag options to blanks, or click blank then click option'
Alocally
Bremotely
Coffline
Dmanually
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'locally' because it feels safer, but cloud data is not local.
3fill in blank
hard

Fix the error in the statement about cloud security responsibility.

Cybersecurity
In cloud security, the provider is always [1] responsible for all security aspects.
Drag options to blanks, or click blank then click option'
Anever
Balways
Cpartially
Dsometimes
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'always' because it seems like the provider handles everything.
4fill in blank
hard

Fill both blanks to complete the cloud security principle.

Cybersecurity
Cloud security requires [1] controls and [2] monitoring to protect data.
Drag options to blanks, or click blank then click option'
Aaccess
Bphysical
Ccontinuous
Dmanual
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'physical' for access, but cloud access is digital.
5fill in blank
hard

Fill all three blanks to complete the cloud security best practice.

Cybersecurity
Use [1] encryption, [2] authentication, and [3] updates to secure cloud systems.
Drag options to blanks, or click blank then click option'
Adata
Bmulti-factor
Cregular
Dnetwork
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'network' encryption instead of 'data' encryption.