1
Correct
API Connect with DataPower gateway has two gateway script methods related to JWT. Which of the following is indicative of this gateway script?
Select one:
a.
jwt-generate
b.
jwt-authenticate
c.
jwt-authorize
d.
jwt-select
Question 2
Correct
Not flaggedFlag question
Question text
Cloud security attacks happen either on premise, external or Cloud. Which of the following example depicts an attack on premise?
Select one:
a.
Unauthorized access via the internal network
b.
Traffic between customer and cloud site being read e.g. uncrypted data for a test environment
c.
Data being read when exchanged between applications in the cloud
d.
Hacked access via phishing
Question 3
Correct
Not flaggedFlag question
Question text
If you had to choose the highest malware growth with cloud security concerns, which of the following would come to mind first?
Select one:
a.
mobile malware
b.
sophisticated attacks
c.
reputations being damaged
d.
vendor fraud
Question 4
Correct
Not flaggedFlag question
Question text
API Connect with DataPower gateway has two gateway script methods related to JWT. Which of the following is indicative of this gateway script?
Select one:
a.
jwt-validate
b.
jwt-authenticate
c.
jwt-authorize
d.
jwt-select
Question 5
Incorrect
Not flaggedFlag question
Question text
Secure authentication and authorization requires that the communication is _________. Fill in the blank.
Select one:
a.
private
b.
secure
c.
encrypted
d.
authorized
Question 6
Correct
Not flaggedFlag question
Question text
Which of the following is an example of regulatory compliance?
Select one:
a.
GDPR
b.
RESTful services
c.
OAuth
d.
BasicAuth
Question 7
Correct
Not flaggedFlag question
Question text
Security technologies and controls are most effective to protect data in the cloud include: data encryption, network encryption, access control and intrusion detection. Which tops the list as the most effective way to secure your data?
Select one:
a.
data encryption
b.
network encryption
c.
access control
d.
intrusion detection
Question 8
Correct
Not flaggedFlag question
Question text
To Monitor and identify application usage patterns pointing to misuse is best described by which of the following cloud security dimensions?
Select one:
a.
Data encryption
b.
intrusion detection
c.
Compliance
d.
Access control