How are you billed for Google Cloud Functions?

  • Flat Monthly Fee
  • Free tier available
  • Pay-as-you-go
  • Pay-per-Request
Google Cloud Functions are billed based on the number of requests and the time your code executes. It's a pay-per-request model, ensuring you only pay for what you use.

An organization's IT team detects unusual data transfer activities from a top executive's account during non-working hours. This could be indicative of:

  • Data Theft
  • Routine Maintenance
  • System Upgrade
  • Unauthorized Access
Unusual data transfer activities from a top executive's account during non-working hours can be indicative of data theft, which is a significant security concern.

AWS Lambda is an example of ________ computing.

  • Edge
  • Grid
  • Quantum
  • Serverless
AWS Lambda is a prominent serverless computing service that allows running code without provisioning or managing servers, making it serverless.

A large enterprise is transitioning to a microservices architecture for its core applications. They need a middleware solution to manage service discovery, load balancing, and routing. Which middleware component would be a primary consideration?

  • API Gateway
  • Message Queues
  • Publish-Subscribe
  • Remote Procedure Calls
An API Gateway is a crucial middleware component for microservices, handling service discovery, load balancing, and routing, making it a primary choice in this scenario.

A startup wants to ensure that their application's codebase is always in a deployable state. They are looking for a practice that emphasizes automated testing and continuous feedback. Which approach should they adopt?

  • Continuous Delivery
  • Continuous Deployment
  • Continuous Integration (CI)
  • Test-Driven Development
Continuous Delivery emphasizes automated testing, continuous feedback, and ensuring the codebase is always deployable but doesn't deploy automatically to production.

In Kubernetes, which component is responsible for scheduling pods onto nodes?

  • Kube-Proxy
  • Kubelet
  • Kubernetes Controller Manager
  • Kubernetes Scheduler
The Kubernetes Scheduler is responsible for deciding which nodes to run new pods on based on resource requirements, node availability, and various policies.

Which tool is commonly used for monitoring applications and infrastructure in the AWS cloud environment?

  • AWS Lambda
  • AWS RDS
  • Amazon CloudWatch
  • Amazon S3
Amazon CloudWatch is a commonly used tool in AWS for monitoring various aspects of applications and infrastructure within the cloud environment.

A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:

  • Cross-Site Scripting (XSS) Vulnerability
  • Distributed Denial of Service
  • Insider Threat
  • Man-in-the-Middle (MitM) Attack
This scenario most likely represents an insider threat, where a trusted insider misuses their access privileges to harm the organization, in this case, by modifying data.

A company notices that their cloud bill has spiked significantly in the last month. They decide to use a tool to break down the costs and find anomalies. Which type of tool are they likely to use?

  • Cloud Cost Analysis Tool
  • Performance Monitoring
  • Security Vulnerability Scanner
  • Version Control System
A Cloud Cost Analysis Tool is designed to track and analyze cloud spending, helping organizations identify cost anomalies and optimize cloud expenses. It provides insights into how resources are being utilized and where cost-saving opportunities exist.

Comprehensive ________ is crucial in detecting anomalous patterns that might indicate insider threats.

  • Authentication
  • Backups
  • Encryption
  • Monitoring
Comprehensive "Monitoring" of user activities and network traffic is essential to identify unusual patterns, a key aspect in detecting insider threats.