When discussing cloud security, the process of ensuring that only authorized entities can access specific resources is known as:
- Access Control
- Authentication
- Authorization
- Secure Data Transfer
Access Control in cloud security ensures that only authorized entities have access to resources, thereby enhancing security.
Loading...
Related Quiz
- Which migration strategy is often the quickest and least expensive initially but might not fully leverage the benefits of the cloud?
- While the ________ strategy offers a faster migration, it may not immediately take full advantage of cloud-native capabilities.
- How does AWS Lambda handle concurrency and scaling when there are multiple invocations?
- A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:
- When discussing the architecture of cloud computing, the application and user interfaces are typically associated with the: