Cloud platforms that specifically cater to the needs of IoT devices by offering tools and services for connecting, analyzing, and managing those devices are known as:
- IaaS (Infrastructure as a Service)
- IoTaaS (IoT as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
IoTaaS (IoT as a Service) platforms are designed to support IoT device connectivity, data analysis, and management, making them a specialized choice for IoT applications.
Google Cloud Functions is a ________ computing platform.
- Containerized
- Microservices
- Serverless
- Virtualized
Google Cloud Functions is a serverless computing platform, meaning it allows you to run code without managing the underlying infrastructure.
In the ________ model, the customer has control over applications, data, runtime, and middleware, while the provider manages virtualization, servers, storage, and networking.
- FaaS (Function as a Service)
- IaaS (Infrastructure as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
In the PaaS model, the customer can focus on developing and managing applications without dealing with the underlying infrastructure. The provider takes care of virtualization, servers, storage, and networking.
An organization is setting up a system where every time a new row is added to a Google BigQuery table, some computations should be performed, and the results sent to an external API. Which Google Cloud service would facilitate this behavior?
- Google Cloud App Engine
- Google Cloud Dataflow
- Google Cloud Functions
- Google Cloud Pub/Sub
Google Cloud Dataflow is designed for real-time data processing and can be used to process new rows in BigQuery and send results to an external API.
A company notices that its proprietary software code is available on the dark web. While investigating, they find out that an employee with access rights to the code repository was responsible. This situation is an example of:
- Distributed Denial of Service (DDoS) Attack
- Insider Threat
- Phishing Attack
- Ransomware Attack
This scenario is a classic example of an insider threat, where an employee with authorized access misuses their privileges, leading to a data breach.
An e-commerce company is planning to set up a cloud-based CI/CD pipeline. They want to ensure that their application, once containerized, can be stored, versioned, and easily retrieved for deployments. Which component is essential in their CI/CD setup?
- Artifact Repository
- CI Server
- Container Registry
- Load Balancer
A Container Registry is essential to store, version, and retrieve containerized applications, ensuring they are available for deployment in the CI/CD pipeline.
One of the primary reasons for unexpected cloud costs is ________.
- Cloud Security
- Cost Allocation
- Data Backup Policies
- Overprovisioning
Overprovisioning, or allocating more resources than necessary, can lead to unexpected cloud costs. It's essential to right-size resources to avoid unnecessary expenses while ensuring adequate performance.
Which part of a cloud computing system is directly accessed and interacted with by the user?
- Cloud Service
- Data Center
- User Interface
- Virtual Machine
The "User Interface" is the component of a cloud computing system that users directly access to interact with the cloud services, applications, and data.
Which of the following best describes the architecture of modern cloud-based analytics tools?
- Legacy, Proprietary, and Limited Data Sources
- Monolithic, On-Premises, and Batch Data Processing
- Serverless, Scalable, and Distributed Data Processing
- Single-Tenant, Centralized, and Traditional Data Warehousing
Modern cloud-based analytics tools typically feature a serverless, scalable, and distributed architecture to handle diverse data processing workloads efficiently.
A ________ is a software layer that abstracts the physical hardware to create multiple virtual machines.
- Compiler
- Debugger
- Hypervisor
- Kernel
A Hypervisor is a crucial software layer that manages virtual machines by abstracting and controlling access to physical hardware resources. It enables the creation of multiple VMs on a single physical server.
In the context of virtualization, what is "paravirtualization"?
- A method to create virtual machines
- A technique to emulate hardware devices
- A technology to enhance graphics performance
- A virtualization technique where the guest OS is modified to be aware of the virtualization layer
Paravirtualization involves modifying the guest OS to work more efficiently with the hypervisor, improving performance and allowing for efficient communication with the host.
Kubernetes is best described as:
- Cloud Hosting Service
- Container Orchestration System
- Database Management System
- Virtualization Platform
Kubernetes is best described as a container orchestration system. It automates the deployment, scaling, and management of containerized applications.