Module 5 Graded Quiz: Cloud Security, Monitoring, Case Studies, & Jobs :Introduction to Cloud Computing (Cloud Application Development Foundations Specialization) Answers 2025
1. Question 1
Fill in the blank: _____________ is a key part of an enterprise’s digital transformation strategy.
❌ Databases
❌ Local storage devices
❌ Encryption
✅ Cloud computing
Explanation:
Cloud computing enables scalability, agility, innovation, and modernization — foundational for digital transformation.
2. Question 2
Best practices to protect cloud resources:
❌ Distribute tasks, workloads, and network traffic
❌ Distribute tasks, workloads, and monitoring software
✅ Adopt a shared responsibility model of active monitoring for security and compliance
❌ Run security monitoring tools periodically (needs continuous monitoring, not periodic)
Explanation:
Cloud security requires continuous monitoring and adherence to shared responsibility principles.
3. Question 3
Key IAM components:
❌ Embedding security through the SDLC
❌ Protecting data in motion, rest, and use
❌ Encryption practices
✅ Cloud Directory Services, Audits, and Compliance
Explanation:
IAM centers on identity directories, authentication, authorization, and auditing.
4. Question 4
Which statements about cloud encryption are true?
A = True
B = True
C = True (encryption protects data at rest, in transit; “in use” is limited but acceptable)
D = False (encryption reduces but does NOT eliminate security risk)
Correct answer:
✅ A, B, and C only
❌ A, B, and D
❌ A and C
❌ A, B, C, and D
5. Question 5
Standard cloud monitoring best practices:
❌ Encrypt data before sending to cloud (security practice, not monitoring)
✅ Leverage end-user experience monitoring + track usage/cost
❌ Encrypt data on physical storage (again, security, not monitoring)
❌ Authenticate users (IAM, not monitoring)
Explanation:
Cloud monitoring focuses on visibility, performance, and cost optimization.
6. Question 6
Monitoring tools that provide posture, compliance, and threat insights:
✅ Flow logs from the network and security events
❌ Flow logs and hypervisors
❌ Hypervisors
❌ Data encryption
Explanation:
Flow logs reveal network activity; security events provide threat/compliance visibility.
7. Question 7
Benefits of access groups:
✅ Reduce number of policies + streamline access rights
❌ Increase number of policies
✅ Define users, resources, and permissions
❌ Create an additional authentication level (false)
Explanation:
Access groups simplify access management and ensure consistent authorization controls.
8. Question 8
Two main parts of an encryption system:
❌ Physical encryption device
❌ Server-side encryption
❌ Client-side encryption
✅ Encryption algorithm and decryption key
Explanation:
All encryption systems rely on algorithms + keys.
9. Question 9
Benefits of cloud monitoring solutions:
✅ Troubleshoot applications and infrastructure
✅ Accelerate diagnosis, resolution, and provide proactive alerts
❌ Enhanced security to user accounts (not a monitoring feature)
❌ Prevent unauthorized access (IAM, not monitoring)
Explanation:
Cloud monitoring improves performance insight, reliability, and issue resolution.
10. Question 10
Benefits The Weather Company realized after IBM Cloud migration:
✅ Faster development and release of new apps
❌ Increase asset availability and equipment effectiveness (manufacturing-related)
❌ Increased latency (wrong direction)
✅ Harness local data centers to minimize latency & handle extreme spikes
Explanation:
They leveraged a global, scalable architecture for performance and rapid innovation.
🧾 SUMMARY TABLE
| Q# | Correct Answer |
|---|---|
| 1 | Cloud computing |
| 2 | Shared responsibility model + active monitoring |
| 3 | Cloud Directory Services, Audits, Compliance |
| 4 | A, B, C only |
| 5 | End-user experience monitoring + cost tracking |
| 6 | Flow logs + security events |
| 7 | Reduce policies & define users/resources/permissions |
| 8 | Algorithm + decryption key |
| 9 | Troubleshooting + proactive alerts |
| 10 | Faster development + lower latency via global DCs |