What does "Account Hijacking" in cloud computing refer to?
- Excessive use of cloud resources
- Gaining physical access to cloud servers
- Inadequate network security in the cloud
- Unauthorized access to a user's cloud account by an attacker
Account hijacking refers to unauthorized access to a user's cloud account by an attacker who gains access to sensitive information or controls the account.
For a company that wants to unify its supply chain, financials, and HR processes into one system, which software would be the most suitable?
- Customer Relationship Management (CRM)
- Enterprise Resource Planning (ERP)
- Human Resource Management System (HRMS)
- Supply Chain Management (SCM)
Enterprise Resource Planning (ERP) is designed to integrate various business processes and functions into a single system, making it suitable for unifying supply chain, financials, and HR processes.
In the context of cloud computing, middleware that facilitates seamless scalability and manages application deployments across multiple servers is known as:
- Container Orchestration
- Content Delivery Network
- Load Balancing Middleware
- Orchestration Middleware
Container Orchestration middleware, such as Kubernetes, is crucial for managing the deployment and scalability of applications across multiple servers in cloud computing. It automates tasks like scaling, load balancing, and failover.
Azure Blob Storage is primarily used for storing ________.
- Code
- Containers
- Data
- Virtualization
Azure Blob Storage is mainly used for storing unstructured data, such as files and media content, within containers (like buckets in AWS S3).
Which system helps companies manage interactions with their customers and potential customers?
- CRM System
- Human Resource System
- Inventory Management System
- Project Management System
A CRM (Customer Relationship Management) system is designed to help companies manage interactions and relationships with customers and potential customers.
The main component responsible for creating and managing virtual machines is called:
- Compiler
- Debugger
- Hypervisor
- Kernel
The main component for creating and managing virtual machines is a "Hypervisor." It's responsible for creating, starting, and managing VMs on the host hardware. The kernel, compiler, and debugger play different roles in computing.
For a company implementing a Service-Oriented Architecture (SOA), which middleware component is vital for managing and routing messages between services?
- API Gateway
- ESB (Enterprise Service Bus)
- Message Broker
- SOA Registry and Repository
An Enterprise Service Bus (ESB) plays a vital role in managing and routing messages between services in a Service-Oriented Architecture (SOA). It acts as an intermediary for communication, enabling various services to interact seamlessly.
Which virtualization type abstracts and isolates workloads from the physical host machine, allowing for portability, flexibility, and scalability?
- Container Virtualization
- Network Virtualization
- Server Virtualization
- Virtual Machine (VM) Virtualization
Virtual Machine (VM) Virtualization abstracts entire VMs from the host, enabling portability and flexibility as VMs can run on different hosts without modification.
Under the GDPR, what rights does an individual have concerning automated decision-making and profiling?
- The right to access results
- The right to data portability
- The right to opt-out
- The right to refuse consent
Under GDPR, individuals have the right to opt-out of automated decision-making and profiling that significantly affects them.
One of the primary reasons for data breaches in an organization is due to ________.
- External Hackers
- Inadequate Encryption
- Insider Threats
- Lack of Firewalls
Insider threats are a significant cause of data breaches, as employees or insiders have access to sensitive data and may misuse it intentionally or unintentionally.