30 Questions
Which aspect of cybersecurity does the fabric approach cover?
Cloud security
What does the FortiGate provide in the fabric?
Cloud-native security automation
What does FortiCNP help organizations with?
Cloud-native protection
What is the purpose of Resource Risk Insights (RRI)?
To resolve cloud security issues
Why is securing cloud-based email important?
To avoid the loss of sensitive information
What are the available forms of FortiMail messaging security solutions?
Cloud-based and on-premises solutions
What is the main purpose of FortiMail messaging security solutions?
To protect against email threats
What are organizations increasingly adopting for email solutions?
Microsoft Office 365
What does the fabric provide in terms of visibility and control?
Broad visibility and control of an organization’s entire digital attack surface
What does Fortinet offer in both public and private cloud deployments?
Network security
Which deployment model focuses on the infrastructure-as-a-service (IaaS) solution?
Public cloud
What does PaaS stand for?
Platform as a Service
Which type of cloud solution involves the customer using services as a consumer for running applications?
SaaS
What are some advantages of migrating to the cloud?
Improved efficiency
What are some challenges of migrating to the cloud?
New security concerns
Which type of cloud service involves the customer being responsible for programming applications?
PaaS
What does the term 'public cloud' refer to in the technology world?
Infrastructure-as-a-service
What is the main focus of this course?
IaaS solution
What are some potential cost reductions of migrating to the cloud?
Improved efficiency
What are some examples of software-as-a-service (SaaS) solutions?
Salesforce
Which cloud service providers are mentioned in the text?
Amazon Web Services; AWS, Google Cloud Platform; GCP, Microsoft Azure, Oracle Cloud Infrastructure, and IBM Cloud
What is one downside of adopting a multi-cloud infrastructure?
The need to learn the idiosyncrasies of each cloud environment
What are some challenges in maintaining a secure cloud environment?
Visibility into cloud data, Control over data, Access to cloud data and applications, Compliance, Cloud-native breaches, Misconfiguration, Disaster recovery, Insider threats
What does 'cloud-native breach' refer to?
A series of actions by an adversarial actor in which they exploit errors or vulnerabilities in a cloud deployment without using malware
What is one challenge in detecting insider attacks in the cloud?
56% believe detecting insider attacks has become significantly to somewhat harder since migrating to the cloud
What is the purpose of a disaster recovery plan?
To enable the recovery of data and allow an organization to continue operations and business
What is one challenge in maintaining control over cloud data?
In a third-party cloud service provider’s environment, IT teams have less access to data than when they controlled servers and applications on their own premises
What is one challenge in managing access to cloud data and applications?
Users may access cloud applications and data over the internet, making access controls based on the traditional datacenter network perimeter no longer effective
Why is visibility into cloud data important for maintaining a secure cloud?
IT teams need the ability to see into the cloud service itself to have full visibility over data
What percentage of companies can currently audit their IaaS environments for configuration errors?
26%
Understanding the Different Versions of Public Cloud Solutions Quiz: Test your knowledge on the various concepts and versions of public cloud solutions. Explore the differences between on-premises scenarios and cloud-based infrastructure.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free