A large enterprise wants to use the public cloud for its scalable resources and cost benefits but wishes to keep its sensitive R&D data in-house. Which cloud deployment would best fit this scenario?

  • Hybrid Cloud
  • On-Premises Cloud
  • Private Cloud
  • Public Cloud with VPN
For an enterprise looking to utilize the public cloud for scalability and cost-efficiency while securing sensitive R&D data, a "Public Cloud with VPN" allows secure communication between public cloud resources and in-house data.

In a ________ cloud, services are rendered over a network that is open for public use.

  • Community
  • Hybrid
  • Private
  • Public
In a Public cloud, services are provided over a network open to the general public. These services can include computing resources, storage, and applications, accessible to anyone who needs them, making it a cost-effective and scalable solution for many organizations.

Message-oriented middleware (MOM) is primarily used for:

  • Asynchronous Communication
  • Load Balancing
  • Real-time Processing
  • User Authentication
Message-oriented middleware (MOM) excels in asynchronous communication, allowing systems to communicate messages without needing to be in sync. Real-time processing, load balancing, and authentication aren't its primary purpose.

Which cloud model is best suited for organizations that require strict data sovereignty and regulatory compliance?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
Private Clouds are ideal for organizations requiring strict data sovereignty and regulatory compliance, as they offer more control over the infrastructure and data management. Public clouds may not meet these requirements.

Which IAM principle ensures that users are only given the minimum levels of access necessary to perform their jobs?

  • Least Privilege
  • Need-to-Know Principle
  • Role-Based Access Control
  • Separation of Duties
The principle of "Least Privilege" ensures that users have the minimum access required to perform their tasks, reducing security risks.

For organizations aiming to run complex queries on vast datasets without managing infrastructure, ________ serves as an ideal solution.

  • Apache Hadoop
  • Data Warehouses
  • NoSQL Databases
  • Serverless Services
"Serverless Services" are an ideal solution for organizations as they allow complex queries on large datasets without infrastructure management, enhancing ease of use.

A financial institution wants to ensure that only specific employees can access certain financial records in their cloud storage. They want a system that can define and manage user roles and access privileges. Which system would best fit their needs?

  • Access Control Lists (ACL)
  • Public Key Infrastructure (PKI)
  • Role-Based Access Control (RBAC)
  • Two-Factor Authentication (2FA)
Role-Based Access Control (RBAC) is a system that defines and manages user roles and access privileges, making it the best fit for the financial institution's needs.

Microservices architecture is best described as:

  • A software architecture exclusively used for database management
  • A software architecture that structures an application as a collection of small, loosely coupled services
  • A software architecture where a single, massive service handles all application functionality
  • A software architecture where monolithic systems are preferred
Microservices architecture is a design approach in which a software application is structured as a collection of small, loosely coupled services that communicate with each other through APIs. This promotes flexibility and scalability.

In Kubernetes, ________ is the component that manages the worker nodes and the pods in the system.

  • Kube-controller
  • Kube-proxy
  • Kube-scheduler
  • Kubelet
The correct answer is "Kubelet." The Kubelet is responsible for managing and maintaining worker nodes and ensures that the containers are running as expected.

Which strategy can lead to significant cost savings in the long run when dealing with steady-state workloads in the cloud?

  • Auto Scaling
  • On-Demand Instances
  • Reserved Instances
  • Spot Instances
Reserved Instances involve long-term commitments and provide cost savings for steady-state workloads with predictable usage patterns.

In Google Cloud, ________ is a fully managed service for building, deploying, and managing containerized applications.

  • Google Container
  • Google Container Service
  • Google Kube Manager
  • Google Kubernetes Engine
In Google Cloud, Google Kubernetes Engine (GKE) is a fully managed service for building, deploying, and managing containerized applications using Kubernetes. It offers a robust container platform.

Which security measure is essential in preventing account hijacking in cloud environments?

  • Encryption
  • Intrusion Detection
  • Multi-Factor Authentication (MFA)
  • Network Segmentation
Multi-Factor Authentication (MFA) is a crucial security measure that requires users to provide multiple forms of verification, significantly reducing the risk of account hijacking. It enhances security beyond passwords.