0
0
Microservicessystem_design~10 mins

Why security spans all services in Microservices - Test Your Understanding

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the main reason security must be applied across all microservices.

Microservices
Security is important in microservices because each service can be a [1] point for attacks.
Drag options to blanks, or click blank then click option'
Asingle
Bredundant
Cbackup
Dvulnerable
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'single' because it sounds like one point, but the focus is on weakness.
2fill in blank
medium

Complete the code to explain why security policies must be consistent across services.

Microservices
Security policies must be [1] across all services to prevent gaps attackers can exploit.
Drag options to blanks, or click blank then click option'
Auniform
Binconsistent
Coptional
Dignored
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'inconsistent' which means the opposite of what is needed.
3fill in blank
hard

Fix the error in the statement about microservices security.

Microservices
Each microservice should have its own [1] to avoid a single point of failure.
Drag options to blanks, or click blank then click option'
Aauthentication
Bfirewall
Cdatabase
Dbackup
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'firewall' which is a network security tool but not per service authentication.
4fill in blank
hard

Fill both blanks to complete the sentence about microservices security design.

Microservices
To secure microservices, implement [1] and [2] at each service boundary.
Drag options to blanks, or click blank then click option'
Aauthentication
Blogging
Cauthorization
Dcaching
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'logging' or 'caching' which are not access control mechanisms.
5fill in blank
hard

Fill all three blanks to complete the security best practices for microservices.

Microservices
Use [1] to encrypt data, [2] to monitor access, and [3] to isolate services.
Drag options to blanks, or click blank then click option'
ATLS
Baudit logs
Cnetwork segmentation
Dload balancing
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'load balancing' which is for distributing traffic, not security.