1. What does IAM stand for in cloud security?
IAM controls who can access which resources in the cloud. It enforces authentication (who you are) and authorization (what you can do).
Get the Preplance app for a seamless learning experience. Practice offline, get daily streaks, and stay ahead with real-time interview updates.
Get it on
Google Play
4.9/5 Rating on Store
Cloud Basics · Question Set
Cloud Networking & Security interview questions for placements and exams.
Questions
14
Included in this set
Subject
Cloud Basics
Explore more sets
Difficulty
Mixed
Level of this set
Go through each question and its explanation. Use this set as a focused practice pack for Cloud Basics.
IAM controls who can access which resources in the cloud. It enforces authentication (who you are) and authorization (what you can do).
For complete preparation, combine this set with full subject-wise practice for Cloud Basics. You can also explore other subjects and sets from the links below.
A Distributed Denial-of-Service (DDoS) attack overwhelms a server with excessive requests. Cloud providers offer built-in DDoS protection and rate limiting to defend against it.
Firewall rules define which traffic is allowed or denied to resources based on IP, port, and protocol. They can be configured at instance, subnet, or project level to ensure proper access control.
AWS offers VPC Flow Logs, Azure has Network Watcher, and GCP uses Cloud Armor for traffic analysis and DDoS protection. These tools track traffic patterns and detect suspicious activities automatically.
Zero Trust means never trust by default — always verify every request. It enforces strict identity checks and segmentation, assuming that both internal and external networks can be compromised.
A Security Group acts as a virtual firewall for your instance. It controls inbound and outbound traffic based on defined port, protocol, and IP rules.
A load balancer evenly distributes incoming traffic across multiple servers. This ensures high availability, performance, and fault tolerance for applications.
The Shared Responsibility Model defines who manages which part of security. The provider secures the infrastructure (data centers, hardware), while users secure their data, identities, and configurations.
Use least privilege access, enable multi-factor authentication, and rotate credentials regularly. Group permissions with roles instead of assigning them individually for better security and management.
A VPC is a logically isolated section of a cloud provider’s network. It lets you define subnets, routing tables, and firewalls to control communication between resources.
Subnets divide your VPC into smaller address spaces for better organization and security. You can use public subnets for internet-facing resources and private ones for internal servers.
NACLs provide an additional security layer at the subnet level. They allow or deny traffic based on IP, protocol, and port, and apply before Security Groups.
VPNs connect on-premise data centers to cloud networks securely. They use encrypted tunnels to ensure data privacy over public internet connections.
Encryption protects data from unauthorized access by converting it into unreadable text. Most cloud providers support encryption both at rest and in transit.