Q61
Q61 In cloud environments, what is the purpose of identity and access management (IAM)?
Controlling user access to resources
Reducing latency
Managing storage
Controlling physical security
Q62
Q62 Which of the following cloud security models ensures that data is protected while being processed?
Encryption at rest
Data masking
Homomorphic encryption
Symmetric encryption
Q63
Q63 Which AWS service can be used to enable encryption for data stored in Amazon S3?
AWS Shield
AWS CloudTrail
AWS KMS
AWS EC2
Q64
Q64 Which command would you use in AWS CLI to enable server-side encryption on an S3 bucket?
aws s3 enable-encryption
aws s3api put-bucket-encryption
aws s3api set-encryption
aws s3 secure-bucket
Q65
Q65 What command would you use to retrieve the IAM policy for an AWS user using the AWS CLI?
aws iam get-user-policy
aws iam describe-policy
aws iam list-users
aws iam get-user
Q66
Q66 A cloud user is unable to access resources they previously had access to. What is the likely issue?
Incorrect IAM policy
Network failure
Hardware malfunction
Server downtime
Q67
Q67 A company notices unusual login activities in their cloud environment. What is the most immediate security action to take?
Disable all user accounts
Reset all passwords
Enable multi-factor authentication
Shut down all services
Q68
Q68 A company is facing a data breach in their cloud infrastructure. What is the first step in mitigating the breach?
Shut down the entire cloud system
Notify customers
Isolate the affected system
Update software patches
Q69
Q69 What is the primary purpose of Identity and Access Management (IAM) in cloud computing?
Manage cloud costs
Control access to resources
Increase network speed
Enhance data storage
Q70
Q70 Which of the following is a core feature of IAM?
Network management
Encryption
User authentication
Data storage
Q71
Q71 In cloud IAM, what is the purpose of role-based access control (RBAC)?
To allocate network bandwidth
To limit data storage
To assign permissions based on roles
To increase computational power
Q72
Q72 Which of the following is NOT part of a typical IAM system?
User identities
Resource access
Bandwidth allocation
Permission policies
Q73
Q73 What is the difference between an IAM user and an IAM role in cloud computing?
Roles are used for programmatic access
Users require more permissions
Users represent individuals, roles are assigned to entities
Roles have no permissions
Q74
Q74 Which AWS CLI command is used to create a new IAM user?
aws iam create-user
aws iam add-user
aws iam new-user
aws iam make-user
Q75
Q75 How would you assign a new IAM policy to a user using the AWS CLI?
aws iam assign-policy
aws iam put-user-policy
aws iam attach-user-policy
aws iam set-policy
Q76
Q76 How would you create a new role with specific permissions in Google Cloud IAM using gcloud CLI?
gcloud iam create-role
gcloud create-iam-role
gcloud iam new-role
gcloud iam define-role
Q77
Q77 A user is unable to access a cloud resource even though they have been granted permissions. What could be the cause?
Incorrect IAM policy
Network issues
Storage limit exceeded
Software bugs
Q78
Q78 A user has been granted access to multiple cloud resources but is unable to perform actions in some of them. What is the likely issue?
Overlapping IAM policies
Insufficient permissions
Network latency
Incorrect user role
Q79
Q79 An organization is facing unauthorized access issues despite having IAM policies in place. What could be a potential solution?
Implement multi-factor authentication
Increase user permissions
Disable unused user accounts
Enable network encryption
Q80
Q80 What is the purpose of a Virtual Private Cloud (VPC) in cloud networking?
Provide physical storage
Securely connect on-premise to cloud
Manage identity access
Increase processing speed
Q81
Q81 Which of the following is a core component of cloud networking?
Virtual Machines
Security Groups
Load Balancers
File Storage
Q82
Q82 What role do subnets play in a cloud networking environment?
They route network traffic
They isolate network segments
They store user data
They secure databases
Q83
Q83 Which service allows for direct, private connectivity between a customer's data center and a cloud provider?
VPN
Direct Connect
Load Balancer
NAT Gateway
Q84
Q84 Which cloud networking model provides scalability by abstracting the network layer entirely?
Traditional Networking
Overlay Networking
Underlay Networking
Cloud-Native Networking
Q85
Q85 Which AWS command lists the available subnets in a specific region?
aws ec2 describe-subnets
aws ec2 list-subnets
aws vpc describe-subnets
aws ec2 show-subnets
Q86
Q86 How would you create a new Virtual Private Cloud (VPC) in AWS using the CLI?
aws vpc create-vpc
aws ec2 create-vpc
aws vpc new-vpc
aws ec2 build-vpc
Q87
Q87 How would you attach an internet gateway to a VPC in AWS using the CLI?
aws ec2 attach-igw
aws ec2 create-gateway
aws ec2 attach-internet-gateway
aws ec2 add-igw
Q88
Q88 In Google Cloud, what is the command to create a new VPC using the gcloud CLI?
gcloud compute networks create
gcloud create-vpc
gcloud compute new-vpc
gcloud build-vpc
Q89
Q89 A user is unable to access their cloud resource over the internet. What could be a possible reason?
The VPC is not created
The internet gateway is not attached
Insufficient storage
Incorrect IAM policy
Q90
Q90 A company is facing slow data transfers between their on-premise data center and the cloud. What could be the issue?
High network latency
Data encryption
Over-provisioned servers
Incorrect IAM permissions