1. . Cloud Security is focused on:
(A) Increasing storage only
(B) Protecting cloud computing resources, data, and applications from threats
(C) Deleting cloud files automatically
(D) Compressing data
2. . Virtualization security involves:
(A) Increasing RAM only
(B) Deleting virtual disks
(C) Securing virtual machines and virtual infrastructure
(D) Compressing files
3. . Which of the following is a type of cloud deployment model?
(A) Public, Private, Hybrid, Community
(B) LAN, WAN, MAN
(C) HTTP, FTP, SMTP
(D) Windows, Linux, Mac
4. . A common cloud security threat is:
(A) All of the above
(B) Malware
(C) Insecure APIs
(D) Data breaches
5. . Multi-tenancy in cloud computing refers to:
(A) Multiple customers sharing the same cloud infrastructure
(B) Using multiple operating systems
(C) Using multiple monitors
(D) Installing multiple apps
6. . Which of the following is used to encrypt data in cloud storage?
(A) AES (Advanced Encryption Standard)
(B) HTTP
(C) FTP
(D) SMTP
7. . Access control in cloud security ensures:
(A) Data is deleted automatically
(B) All users have full access
(C) Only authorized users can access resources
(D) Virtual machines run faster
8. . Hypervisor security is important because:
(A) It isolates virtual machines and manages their resources
(B) It compresses files
(C) It deletes old virtual disks
(D) It increases internet speed
9. . Which type of hypervisor runs directly on hardware?
(A) Type 2 (Hosted)
(B) Type 1 (Bare-metal)
(C) Type 3
(D) Type 4
10. . Type 2 hypervisors run:
(A) Only in cloud storage
(B) Directly on hardware
(C) On top of a host operating system
(D) Only in virtual networks
11. . Shared responsibility model in cloud security means:
(A) Cloud provider and customer share security responsibilities
(B) Customer handles all security
(C) Provider handles all security
(D) Security is optional
12. . Identity and Access Management (IAM) in cloud ensures:
(A) Automatic backups
(B) Faster cloud storage
(C) Proper authentication, authorization, and access control
(D) Network compression
13. . Virtual Machine (VM) escape is:
(A) Compressing virtual disks
(B) Encrypting files automatically
(C) When an attacker breaks out of a VM to access the host system
(D) Deleting VM snapshots
14. . Cloud APIs must be secured to:
(A) Prevent unauthorized access and data breaches
(B) Delete old files automatically
(C) Compress data
(D) Increase VM speed
15. . Data loss prevention (DLP) in cloud helps to:
(A) Protect sensitive data from accidental or malicious exposure
(B) Delete unnecessary files
(C) Increase CPU speed
(D) Compress files
16. . Network segmentation in virtualization helps to:
(A) Compress virtual disks
(B) Increase internet speed
(C) Delete files automatically
(D) Isolate virtual machines for security purposes
17. . Cloud security monitoring is important to:
(A) Speed up virtual machines
(B) Increase storage only
(C) Compress files
(D) Detect threats, suspicious activity, and policy violations
18. . Data encryption at rest means:
(A) Data in transit is encrypted only
(B) Data stored in cloud is encrypted to prevent unauthorized access
(C) Data is deleted
(D) Files are compressed
19. . Cloud service models include:
(A) HTTP, FTP, SMTP
(B) LAN, MAN, WAN
(C) IaaS, PaaS, SaaS
(D) Windows, Linux, Mac
20. . The main goal of cloud and virtualization security is to:
(A) Ensure confidentiality, integrity, and availability of virtual and cloud resources
(B) Increase storage speed only
(C) Compress files automatically
(D) Delete virtual machines