Which cloud migration strategy involves moving an application from an on-premises environment to the cloud without making changes to its architecture?
- Refactoring (Re-architect)
- Rehosting (Lift and Shift)
- Reimagining (Full Rebuild)
- Replatforming (Lift, Tinker, and Shift)
Rehosting, also known as Lift and Shift, is a migration strategy where you move the application to the cloud as-is, without making significant architectural changes. It's a quick way to get to the cloud, but it might not fully optimize the cloud's capabilities.
During the ________ process, an application might be decomposed and reassembled using cloud-native features for better performance and scalability.
- Rebuilding
- Refactoring
- Rehosting
- Replatforming
The blank should be filled with "Refactoring." Refactoring involves restructuring or optimizing an application for cloud-native features, leading to improved performance and scalability.
A healthcare provider needs to move data to the cloud due to an expiring data center lease. They plan to optimize and leverage cloud-native services in the future. Which initial migration strategy might they employ?
- Augmenting with Cloud Services (Hybrid Cloud)
- Lift, Tinker, and Shift
- Refactoring (re-architecting)
- Rehosting (lift-and-shift)
Augmenting with cloud services, often a hybrid cloud approach, would allow the healthcare provider to quickly move data to the cloud while preparing for future optimization and integration with cloud-native services.
Which service allows you to run code in response to events without provisioning or managing servers: AWS Lambda or Azure Virtual Machines?
- AWS Lambda (Option 1)
- Azure Virtual Machines (Option 2)
- Both (Option 3)
- Neither (Option 4)
AWS Lambda allows you to run code in response to events without provisioning or managing servers. Azure Virtual Machines are traditional virtual servers that require provisioning and management.
When discussing the architecture of cloud computing, the application and user interfaces are typically associated with the:
- Back End
- Front End
- Middleware
- Virtualization
In the context of cloud computing, the front end comprises the user and application interfaces, enabling user interaction. This is the "visible" part of cloud systems.
A retail chain is looking to optimize its inventory levels, streamline its procurement processes, and also enhance its customer engagement strategies. How should they integrate ERP and CRM to achieve these goals?
- Integrate ERP and CRM to share customer data for personalized marketing.
- Keep ERP and CRM as separate systems for simplicity.
- Use ERP for customer engagement and CRM for inventory.
- Use ERP for inventory and procurement, and CRM for customer engagement.
Integrating ERP and CRM to share customer data allows personalized marketing and optimizes inventory, procurement, and customer engagement, aligning with the goals.
In which type of virtualization is the entire desktop environment of a computer emulated on a server?
- Desktop Virtualization
- Server Virtualization
- Network Virtualization
- Application Virtualization
The correct option is 'Desktop Virtualization.' In desktop virtualization, the entire desktop environment of a computer is emulated on a server, and users access their desktops remotely. This approach allows for centralized management, security, and the ability to run different operating systems on the same hardware. Server virtualization, on the other hand, involves virtualizing server hardware to run multiple server instances on a single physical server. Network virtualization focuses on virtualizing network resources, while application virtualization virtualizes individual applications for deployment.
The concept of accessing computing resources over the internet is closely related to:
- Client-server architecture
- Cloud computing
- On-premises data centers
- Traditional telephony systems
The concept of accessing computing resources over the internet is closely related to cloud computing, as it's the essence of cloud services. It's distinct from traditional telephony, on-premises data centers, or client-server models.
A disgruntled employee with elevated access rights who intentionally sabotages the company's data is classified as which type of insider threat?
- Accidental Insider
- Competent Insider
- Malicious Insider
- Negligent Insider
A "Malicious Insider" is an employee with malicious intent who abuses their access to harm the organization intentionally. This is a severe insider threat that organizations need to protect against.
A large enterprise has a policy that mandates all software patches and updates be reviewed and tested before deployment. They are considering adopting a SaaS application. What potential challenge might they face with this approach?
- Complex Licensing Agreements
- Difficulty in Customization
- Limited Control Over Updates
- Potential Security Concerns
The challenge that a large enterprise might face with adopting a SaaS application is limited control over updates. With SaaS, the provider manages updates, which can conflict with an enterprise's patch testing and deployment policy.