What is the default maximum execution time for a single AWS Lambda function invocation?
- 15 seconds
- 1 minute
- 5 minutes
- 15 minutes
The default maximum execution time for a single AWS Lambda function invocation is 3 seconds, not mentioned among the given options. Lambda allows you to set a maximum execution time, but the default is important to understand.
Which of the following refers to an incident where unauthorized individuals gain access to confidential data?
- Data Backup
- Data Breach
- Data Compression
- Data Encryption
A 'Data Breach' is an incident in which unauthorized individuals gain access to confidential data, often with malicious intent. It's a critical security concern.
In cloud computing, the characteristic that allows for pooling of computing resources to serve multiple consumers using a multi-tenant model is called ________.
- Elasticity
- Multi-Tenancy
- Scalability
- Virtualization
Multi-Tenancy is the characteristic that enables multiple consumers to share computing resources in a cloud environment. It enhances resource utilization and cost-effectiveness.
When discussing cloud security, the process of ensuring that only authorized entities can access specific resources is known as:
- Access Control
- Authentication
- Authorization
- Secure Data Transfer
Access Control in cloud security ensures that only authorized entities have access to resources, thereby enhancing security.
In the context of GDPR, a ________ is the entity that determines the purposes, conditions, and means of the processing of personal data.
- Data Controller
- Data Inspector
- Data Processor
- Data Subject
In the context of GDPR (General Data Protection Regulation), a Data Controller is the entity responsible for determining how and why personal data is processed. They have control over the purposes, conditions, and means of processing.
What is the primary role of a hypervisor in virtualization?
- Allocating memory for VMs
- Managing hardware resources for virtual machines
- Providing a user-friendly interface for VM management
- Securing data within virtual machines
The primary role of a hypervisor in virtualization is to manage and allocate hardware resources, such as CPU, memory, and storage, among virtual machines to ensure efficient and isolated operation.
AWS Redshift is designed to analyze data using SQL and is optimized for ________.
- Data Warehousing
- Graph Databases
- NoSQL Databases
- Real-time Data Processing
AWS Redshift is designed for data warehousing, making it optimized for SQL-based analytics, allowing complex querying and reporting.
Process is a type of virtualization that allows multiple instances of an application to run concurrently on a single OS, without interfering with each other.
- Application
- Network
- Server
- Storage
Process virtualization allows multiple instances of an application to run without conflicts on a single operating system. This is often used in server environments.
Which of the following is a security method that translates data into a code to prevent unauthorized access?
- Compression
- Duplication
- Encryption
- Fragmentation
Encryption is a security method that translates data into a code to prevent unauthorized access. It makes the data unreadable without the correct decryption key, enhancing data security.
Which of the following tools is commonly used for CI/CD in the cloud?
- AWS CodePipeline
- Docker
- GitLab CI/CD
- Jenkins
GitLab CI/CD is a popular choice for CI/CD in the cloud, providing a platform for continuous integration and continuous deployment with built-in features for DevOps processes.