A software company in the EU offers a service that uses machine learning to make automated decisions about user profiles. A user is unhappy about a decision made about him and requests an explanation. Under which regulation and provision should the company address this request?
- CCPA, Section 1798.105
- GDPR, Article 22
- HIPAA, Section 164.524
- ISO 27001, Clause 8.2.3
GDPR, Article 22, grants users the right to request an explanation for automated decisions that significantly affect them. This ensures transparency and accountability in cases where algorithms or AI systems are used for decision-making.
While the ________ strategy offers a faster migration, it may not immediately take full advantage of cloud-native capabilities.
- Refactoring
- Rehosting
- Replatforming
- Repurchasing
The blank should be filled with "Rehosting." Rehosting is a migration strategy where applications are moved to the cloud with minimal changes, offering a faster migration but not leveraging cloud-native capabilities.
What is the primary focus of cost management tools in cloud computing?
- Enhancing application performance
- Ensuring data privacy and security
- Managing network latency and bandwidth
- Tracking usage and optimizing spending
The primary focus of cost management tools in cloud computing is to track resource usage and optimize spending. These tools provide insights into how cloud resources are utilized and help organizations make informed decisions to minimize unnecessary expenses.
The practice of continuously monitoring and improving the CI/CD process to ensure optimal performance and reduced risks is known as:
- Continuous Delivery
- Continuous Improvement
- Continuous Integration
- DevOps
Continuous Improvement is the practice of continuously enhancing the CI/CD process, making it more efficient, secure, and reliable over time.
A financial organization implements strict access controls, ensuring employees can only access the data necessary for their job roles. This strategy primarily helps in reducing the risk of:
- Data Leakage
- Insider Trading
- Phishing Attacks
- Social Engineering Attacks
Strict access controls help reduce the risk of insider trading by limiting employees' access to only the data necessary for their specific job roles, preventing misuse.
In ________, the cloud provider supplies and manages everything from the infrastructure to the software applications.
- Database as a Service (DBaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
In Software as a Service (SaaS), the cloud provider supplies and manages both the underlying infrastructure and software applications. Users access the software via the internet, with no need to worry about infrastructure or application maintenance.
To gain insights into cloud expenses, companies often use ________ to visualize and manage their cloud spend.
- Budget Management
- Cloud Billing
- Cost Visualization
- Expense Analytics
Cloud Billing systems allow companies to visualize and manage cloud spend. They provide detailed insights into how resources are being used and where cost-saving opportunities exist, helping to manage expenses effectively.
A company is developing a stock trading platform where real-time data and quick response times are crucial. They need a middleware solution that can handle high-speed messaging and ensure data integrity. Which middleware type would be most appropriate?
- Message Queues
- Publish-Subscribe
- Remote Procedure Calls
- WebSockets
In this context, WebSockets would be most appropriate for real-time, high-speed messaging in stock trading due to their low overhead and bidirectional communication.
Which security measure is essential in preventing account hijacking in cloud environments?
- Encryption
- Intrusion Detection
- Multi-Factor Authentication (MFA)
- Network Segmentation
Multi-Factor Authentication (MFA) is a crucial security measure that requires users to provide multiple forms of verification, significantly reducing the risk of account hijacking. It enhances security beyond passwords.
Azure Functions can be triggered by which of the following events?
- HTTP requests
- File changes
- Temperature variations
- Brainwave patterns
Azure Functions can be triggered by HTTP requests. These requests are often used to create RESTful APIs, webhooks, and other HTTP-triggered functions. The other options are unrelated to Azure Functions.