You are the cloud security officer of a company. An employee reports suspicious activity in their cloud account, like unfamiliar files and settings. What is the most likely security concern you should investigate?
- Account Compromise
- Cloud Outage
- Data Leakage
- Unauthorized Access
Suspicious activity in an employee's account with unfamiliar files and settings suggests an account compromise, indicating that someone unauthorized may have accessed the account.
Loading...
Related Quiz
- An e-commerce platform experiences high traffic surges during sale events. They want to migrate to the cloud efficiently, with minimal downtime. Which strategy would be best for them?
- Which service model is most appropriate for businesses that have significant existing investments in software licenses and want to maintain a higher degree of control over their application environment?
- For complex cloud architectures, which feature of cloud monitoring tools is crucial for understanding the interplay between different services?
- In the context of cloud deployment models, which type of cloud typically has a higher upfront cost due to infrastructure investments?
- Which of the following is NOT a major cloud service provider (CSP)?