Which cloud provider's primary offering for big data analytics is BigQuery?

  • Amazon Web Services (AWS)
  • Google Cloud Platform (GCP)
  • IBM Cloud (IBM)
  • Microsoft Azure (Azure)
Google Cloud Platform (GCP) offers BigQuery as its primary offering for big data analytics. BigQuery is a serverless, highly scalable data warehousing and analytics service that allows users to run SQL-like queries on large datasets.

Which type of virtualization allows for multiple operating systems to run on a single physical machine?

  • Application Virtualization
  • Hardware Virtualization
  • Network Virtualization
  • Storage Virtualization
Hardware virtualization allows multiple operating systems to coexist on a single physical machine by creating isolated virtual machines (VMs).

What does IAM stand for in the context of cloud security?

  • Identity and Access Management
  • Information Asset Management
  • Internet Access Management
  • Intrusion and Attack Management
IAM stands for Identity and Access Management in the context of cloud security. It's a critical aspect of controlling and managing user access to cloud resources and data.

In which cloud service would you find the "Function App" concept?

  • AWS (Option 2)
  • Google Cloud (Option 3)
  • IBM Cloud (Option 4)
  • Microsoft Azure (Option 1)
The "Function App" concept is found in Microsoft Azure, and it provides a platform for building, deploying, and managing serverless applications, including Azure Functions.

Which security measure is essential in preventing account hijacking in cloud environments?

  • Encryption
  • Intrusion Detection
  • Multi-Factor Authentication (MFA)
  • Network Segmentation
Multi-Factor Authentication (MFA) is a crucial security measure that requires users to provide multiple forms of verification, significantly reducing the risk of account hijacking. It enhances security beyond passwords.

In Google Cloud, ________ is a fully managed service for building, deploying, and managing containerized applications.

  • Google Container
  • Google Container Service
  • Google Kube Manager
  • Google Kubernetes Engine
In Google Cloud, Google Kubernetes Engine (GKE) is a fully managed service for building, deploying, and managing containerized applications using Kubernetes. It offers a robust container platform.

Which strategy can lead to significant cost savings in the long run when dealing with steady-state workloads in the cloud?

  • Auto Scaling
  • On-Demand Instances
  • Reserved Instances
  • Spot Instances
Reserved Instances involve long-term commitments and provide cost savings for steady-state workloads with predictable usage patterns.

In Kubernetes, ________ is the component that manages the worker nodes and the pods in the system.

  • Kube-controller
  • Kube-proxy
  • Kube-scheduler
  • Kubelet
The correct answer is "Kubelet." The Kubelet is responsible for managing and maintaining worker nodes and ensures that the containers are running as expected.

Microservices architecture is best described as:

  • A software architecture exclusively used for database management
  • A software architecture that structures an application as a collection of small, loosely coupled services
  • A software architecture where a single, massive service handles all application functionality
  • A software architecture where monolithic systems are preferred
Microservices architecture is a design approach in which a software application is structured as a collection of small, loosely coupled services that communicate with each other through APIs. This promotes flexibility and scalability.

A financial institution wants to ensure that only specific employees can access certain financial records in their cloud storage. They want a system that can define and manage user roles and access privileges. Which system would best fit their needs?

  • Access Control Lists (ACL)
  • Public Key Infrastructure (PKI)
  • Role-Based Access Control (RBAC)
  • Two-Factor Authentication (2FA)
Role-Based Access Control (RBAC) is a system that defines and manages user roles and access privileges, making it the best fit for the financial institution's needs.