Cloud Security Flashcards

1
Q

What happens with Shared Physical Server Vulnerabilities in a cloud environment?

A

This can lead to vulnerabilities if one users data is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens with Inadequate Virtual Environment Security in a cloud environment?

A

can lead to unauthorized access, data breaches, and other security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens with User Access Management in a cloud environment?

A

can lead to unauthorized access to sensitive data and systems.

This is often due to weak passwords, excessive permissions, or lack of user activity monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens with Lack of Up-to-Date Security Measures in a cloud environment?

A

Can lead to leaving the system vulnerable to new threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens with Single Points of Failure in a cloud environment?

A

can lead to a complete system outage affecting all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens with Weak Authentication & Encryption Practices in a cloud environment?

A

Weak authentication can allow unauthorized users to gain access to cloud systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens with Unclear Policies in a cloud environment?

A

lack of clear guidelines or procedures for various security aspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Data Remnants in a cloud environment

A

residual data left behind after deletion or erasure processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly