Skip to content

Module 5 Graded Quiz: Cloud Security, Monitoring, Case Studies, & Jobs :Introduction to Cloud Computing (Cloud Application Development Foundations Specialization) Answers 2025

1. Question 1

Fill in the blank: _____________ is a key part of an enterprise’s digital transformation strategy.

❌ Databases
❌ Local storage devices
❌ Encryption
Cloud computing

Explanation:
Cloud computing enables scalability, agility, innovation, and modernization — foundational for digital transformation.


2. Question 2

Best practices to protect cloud resources:

❌ Distribute tasks, workloads, and network traffic
❌ Distribute tasks, workloads, and monitoring software
Adopt a shared responsibility model of active monitoring for security and compliance
❌ Run security monitoring tools periodically (needs continuous monitoring, not periodic)

Explanation:
Cloud security requires continuous monitoring and adherence to shared responsibility principles.


3. Question 3

Key IAM components:

❌ Embedding security through the SDLC
❌ Protecting data in motion, rest, and use
❌ Encryption practices
Cloud Directory Services, Audits, and Compliance

Explanation:
IAM centers on identity directories, authentication, authorization, and auditing.


4. Question 4

Which statements about cloud encryption are true?

A = True
B = True
C = True (encryption protects data at rest, in transit; “in use” is limited but acceptable)
D = False (encryption reduces but does NOT eliminate security risk)

Correct answer:
A, B, and C only
❌ A, B, and D
❌ A and C
❌ A, B, C, and D


5. Question 5

Standard cloud monitoring best practices:

❌ Encrypt data before sending to cloud (security practice, not monitoring)
Leverage end-user experience monitoring + track usage/cost
❌ Encrypt data on physical storage (again, security, not monitoring)
❌ Authenticate users (IAM, not monitoring)

Explanation:
Cloud monitoring focuses on visibility, performance, and cost optimization.


6. Question 6

Monitoring tools that provide posture, compliance, and threat insights:

Flow logs from the network and security events
❌ Flow logs and hypervisors
❌ Hypervisors
❌ Data encryption

Explanation:
Flow logs reveal network activity; security events provide threat/compliance visibility.


7. Question 7

Benefits of access groups:

Reduce number of policies + streamline access rights
❌ Increase number of policies
Define users, resources, and permissions
❌ Create an additional authentication level (false)

Explanation:
Access groups simplify access management and ensure consistent authorization controls.


8. Question 8

Two main parts of an encryption system:

❌ Physical encryption device
❌ Server-side encryption
❌ Client-side encryption
Encryption algorithm and decryption key

Explanation:
All encryption systems rely on algorithms + keys.


9. Question 9

Benefits of cloud monitoring solutions:

Troubleshoot applications and infrastructure
Accelerate diagnosis, resolution, and provide proactive alerts
❌ Enhanced security to user accounts (not a monitoring feature)
❌ Prevent unauthorized access (IAM, not monitoring)

Explanation:
Cloud monitoring improves performance insight, reliability, and issue resolution.


10. Question 10

Benefits The Weather Company realized after IBM Cloud migration:

Faster development and release of new apps
❌ Increase asset availability and equipment effectiveness (manufacturing-related)
❌ Increased latency (wrong direction)
Harness local data centers to minimize latency & handle extreme spikes

Explanation:
They leveraged a global, scalable architecture for performance and rapid innovation.


🧾 SUMMARY TABLE

Q# Correct Answer
1 Cloud computing
2 Shared responsibility model + active monitoring
3 Cloud Directory Services, Audits, Compliance
4 A, B, C only
5 End-user experience monitoring + cost tracking
6 Flow logs + security events
7 Reduce policies & define users/resources/permissions
8 Algorithm + decryption key
9 Troubleshooting + proactive alerts
10 Faster development + lower latency via global DCs