Which of the following is a potential security concern when using hypervisors for virtualization?
- Memory allocation issues
- Network latency
- Overcommitting resources
- VM escape attacks
VM escape attacks are a significant security concern where a malicious VM tries to break out of its virtual environment and access the host system, potentially compromising security.
What is the primary purpose of a cloud-based data lake?
- Managing cloud resources
- Running virtual machines
- Storing structured data
- Storing unstructured data
A cloud-based data lake is primarily used for storing unstructured data like raw text, images, audio, or log files, enabling flexible and scalable data storage for later processing and analysis.
The ________ migration strategy is also known as the "rehosting" approach.
- Re-architecting
- Re-engineering
- Re-hosting
- Re-platforming
The "rehosting" strategy, often referred to as the "lift-and-shift" approach, involves moving applications to the cloud without major modifications.
Middleware that provides a set of services to authenticate, authorize, and account users is known as ________.
- Communication Middleware
- Identity Middleware
- Security Middleware
- Transaction Middleware
Identity Middleware is responsible for authenticating users, authorizing their access, and accounting for their activities. It ensures secure user management.
A network administrator wants to simulate a complex network topology without buying additional hardware components. Which virtualization approach should they consider?
- Network Emulation
- Network Virtualization
- Server Virtualization
- Storage Virtualization
Network emulation allows the simulation of complex network topologies using software, eliminating the need to buy additional hardware, making it an efficient choice for the network administrator.
With Hypervisor virtualization, multiple independent domains or instances can run on a single physical system, sharing the same hardware resources.
- Application
- Cluster
- Container
- Network
Hypervisor virtualization, also known as hardware virtualization, involves a hypervisor that allows multiple VMs to run independently on the same physical hardware.
Which CSP offers the Azure Kubernetes Service (AKS) for container orchestration?
- Amazon Web Services (AWS)
- Google Cloud Platform (GCP)
- IBM Cloud (IBM)
- Microsoft Azure (Azure)
Microsoft Azure, often referred to as Azure, offers the Azure Kubernetes Service (AKS) for container orchestration. Azure is a leading cloud provider known for its container management services.
Google Cloud's primary service for running containers is called:
- Google Cloud Container Orchestrator
- Google Cloud Container Service
- Google Container Engine
- Google Kubernetes Engine (GKE)
Google Kubernetes Engine (GKE) is Google Cloud's primary service for running containers. It's based on Kubernetes, a popular container orchestration platform.
Microservices communicate with each other using lightweight protocols, often relying on ________ for data interchange.
- HTTP
- JSON
- REST
- SOAP
Microservices often rely on JSON (JavaScript Object Notation) for data interchange due to its lightweight and easy-to-parse structure. JSON is commonly used in RESTful API communication between microservices.
AWS Lambda allows you to write functions in multiple languages, including Python, Java, and ________.
- C#
- Node.js
- Ruby
- Swift
AWS Lambda supports various programming languages, including Python, Java, and Node.js, among others, providing developers with a versatile set of choices.