An e-commerce company has recently faced a breach where an employee was able to access customer payment details. They want to implement a system where each employee only has access to the information necessary for their specific job. What would be the best approach for this company?

  • Biometric Authentication
  • Firewall
  • Intrusion Prevention System
  • Principle of Least Privilege
Implementing the Principle of Least Privilege ensures that each employee has access only to the information necessary for their specific job, reducing the risk of breaches.

Which standard or regulation would a healthcare provider in the United States need to adhere to when storing patient data in the cloud?

  • FERPA (Family Educational Rights and Privacy Act)
  • GDPR (General Data Protection Regulation)
  • HIPAA (Health Insurance Portability and Accountability Act)
  • PCI DSS (Payment Card Industry Data Security Standard)
Healthcare providers in the United States must adhere to HIPAA when storing patient data in the cloud. HIPAA ensures the privacy and security of patients' health information. The other regulations are not specific to healthcare.

An agricultural company wants to deploy drones to monitor the health of crops using AI. They need a solution that can process vast amounts of data from various drones simultaneously. Which cloud-based AI service might be suitable?

  • Amazon SageMaker
  • Azure Machine Learning Service
  • Google Cloud AutoML
  • IBM Watson
Amazon SageMaker is a comprehensive AI service on AWS that can handle large-scale AI model training and inference. It's suitable for processing data from multiple drones for crop monitoring.

A financial institution wants to set up a cloud infrastructure where they have complete control over their sensitive data and can ensure it doesn't leave their premises. Which cloud deployment model would be most suitable?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
A private cloud is the ideal choice for a financial institution to maintain control over sensitive data. It's hosted within the organization's premises or by a third-party provider, ensuring data stays on-site.

How does Docker handle dependencies for an application?

  • By fetching dependencies from the internet
  • By packaging dependencies within the application's container
  • By using a separate dependency container
  • By using host system dependencies
Docker typically handles application dependencies by packaging them within the container image. This approach ensures that the application runs consistently, regardless of the host system, and isolates dependencies from the host and other containers.

An individual within the organization who poses a potential security risk, whether intentional or unintentional, is referred to as a(n) ________.

  • External Consultant
  • Insider Threat
  • Security Administrator
  • Whistleblower
An 'Insider Threat' is someone within the organization who may compromise security, either deliberately or accidentally, making them a significant risk.

In the context of cloud deployment models, which type of cloud typically has a higher upfront cost due to infrastructure investments?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
Private Clouds are typically associated with higher upfront costs because organizations need to invest in their infrastructure and management. Public clouds share resources and costs with multiple organizations.

What distinguishes a hybrid cloud from a multi-cloud?

  • Hybrid uses physical servers
  • Mixing public and private clouds
  • Multi-cloud combines different cloud service providers
  • The use of multiple private clouds in a hybrid setup
A hybrid cloud combines public and private cloud infrastructure, whereas a multi-cloud involves using services from different cloud providers, which may not be public-private mix.

The cloud infrastructure that is provisioned for open use by the general public is termed as ________.

  • Community
  • Hybrid
  • Private
  • Public
The cloud infrastructure designed for use by the Public is accessible by individuals, businesses, and organizations. It is hosted and managed by a cloud service provider and offers services on a pay-as-you-go basis. Public clouds are shared resources, providing flexibility and cost-effectiveness.

A multinational corporation is looking for a cloud solution that can be accessed from any of their global locations, without any restrictions on the devices used. Which characteristic of cloud computing best fits their needs?

  • Accessibility
  • Elasticity
  • On-Demand Usage
  • Scalability
Accessibility is a key aspect of cloud computing that ensures that resources are available from anywhere, on any device, making it suitable for global use.