Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

Cloud Security

--------------
In this lesson, we explore the mysterious "cloud", what it really is, how it came
to be, and some of the security issues that we encounter there.

Question 1
Basic cloud security can be achieved by implementing native cloud security tools.
What problem might occur if customers rely solely on these tools?
Select one:
The tools may have limitations customers are not aware of. [CORRECT ANSWER]
The tools are often too complex to be correctly implemented by the customer.
The tools interfere with Wi-Fi applications.
The tools are too expensive.

Question 2
Which three cloud service vendors does the Fortinet Security Fabric integrate with?
(Choose three.)
Select one or more:
AWS [CORRECT ANSWER]
VMware ESXi
Google Cloud [CORRECT ANSWER]
Azure [CORRECT ANSWER]
SAP

Question 3
What drove organizations to move from the traditional network architecture to the
cloud?
Select one:
The cloud allows for potential cost savings, and moves costs from capital to
operational budgets. [CORRECT ANSWER]
The cloud can double the throughput of network devices.
The cloud allows you to move data centers and other services to a third-party
network.
The cloud can make network security more complicated.

Question 4
What is cloud computing?
Select one:
The practice of using in-house servers with high speed Internet links.
The practice of connecting various computers and other network devices together
using hubs, switches, and routers.
A collection of computers interconnected through virtual private networks.
The practice of using a network of remote servers hosted on the Internet to store,
manage, and process data. [CORRECT ANSWER]

Question 5
When a customer’s data and services are moved to the cloud, who is ultimately
responsible for the security of the data?
Select one:
The cloud provider
The customer [CORRECT ANSWER]
The device provider
The Internet service provider

You might also like