Who Goes There!?
You Shall Not Pass!
100

In cloud security, what is the core principle of Identity and Access Management (IAM) that ensures users and systems are granted only the minimum permissions needed to perform their tasks?

Principle of Least Privilege

100

You need to limit a user's access to specific resources in a cloud environment, such as granting permission only to certain virtual machines while restricting access to others. What security mechanism should you use?

Authorization

200

What does an IAM policy define? 



Permission and access control rules

200

A network engineer sets up firewall rules to protect their organization's web application from online threats. To further enhance the application's security against common web exploits like SQL injection or cross-site scripting (XSS), what additional tool should they implement?

WAF

300

In Google Cloud, what is used to authenticate applications and services, allowing them to securely access Google Cloud resources?


Service Accounts

300

Your company’s website experiences a sudden surge in traffic, overwhelming the servers and causing the site to crash. What type of attack is likely responsible for this disruption?

DDoS Attack (Distributed Denial of Service)


400

You need to ensure that different teams have varying levels of access to resources across your cloud environment, what IAM solution allows you to grant precise permissions, facilitating seamless collaboration between your teams while maintaining security and governance?

IAM Roles (AWS)

400


In a cloud environment, a hacker attempts to overload a specific web application with a high volume of fake requests, causing it to slow down and eventually crash. What type of cyberattack does this scenario represent?




What is an Application Layer Attack, or HTTP Floods/DNS Query Attacks




500

The following image contains an IAM policy for a network engineer.

TWO PART QUESTION:
1) Name the cloud platform where the policy originates.
2) Does the policy follow the principles of least privilege?

1) Google Cloud Platform (GCP)

2) Policy does not follow the principles of least privilege

500


In a cloud environment, a hacker launches a massive flood of network traffic with the intention of overwhelming the network's capacity, causing it to become unresponsive. At what layer would this cyberattack occur?



Infrastructure layer or, Layer 3 & Layer 4 of the OSI model