AWS Lambda integrates with AWS ________ to enable function execution in response to data modifications in Amazon RDS, Amazon DynamoDB, and other sources.

  • AWS EventBridge
  • AWS Kinesis
  • AWS SNS
  • AWS SQS
AWS Lambda integrates with AWS EventBridge to respond to events and data changes in various AWS services like RDS and DynamoDB.

In the context of ML services, cloud providers often offer ________ to help developers without in-depth machine learning knowledge build models.

  • AutoML
  • Blockchain services
  • Container orchestration
  • GPU instances
AutoML refers to Automated Machine Learning, a service offered by cloud providers that automates the process of building machine learning models, making it accessible to developers with limited ML expertise.

Which of the following is NOT a requirement under GDPR for data processors and controllers?

  • Appointment of a Data Protection Officer
  • Data backup and retention policies
  • Data breach notification
  • Data encryption at rest
GDPR, the General Data Protection Regulation, does not explicitly require data backup and retention policies. However, it emphasizes data protection, breach notification, and the appointment of a Data Protection Officer.

A startup wants to deploy a collaboration tool for its remote workforce without any upfront investment in infrastructure or software licenses. Which cloud service model would be most suitable for this requirement?

  • FaaS (Function as a Service)
  • IaaS (Infrastructure as a Service)
  • PaaS (Platform as a Service)
  • SaaS (Software as a Service)
The most suitable cloud service model for the startup's requirement is SaaS. SaaS applications are hosted in the cloud and accessible on a subscription basis, eliminating the need for infrastructure investment. It's an ideal choice for cost-effectively providing collaboration tools.

A company wants to set up a testing environment where they can run multiple versions of their software on different OS platforms without investing in new hardware. Which type of virtualization would best serve their needs?

  • Client-Side Virtualization
  • Container-based Virtualization
  • Hosted Virtualization
  • Hypervisor-based Virtualization
Hypervisor-based virtualization allows running multiple virtual machines (VMs) on a single physical server, enabling the company to test various OS platforms without new hardware.

A system that restricts access to resources based on continuous verification is known as ________.

  • Authentication
  • Authorization
  • Encryption
  • Firewall
An "Authorization" system verifies access rights continuously to ensure that only authorized users can access resources, maintaining security.

Companies that are looking to maximize the benefits of cloud capabilities like elasticity, managed services, and serverless components would most likely employ the ________ migration strategy.

  • Rebuilding
  • Refactoring
  • Rehosting
  • Replatforming
The blank should be filled with "Rebuilding." Rebuilding is the strategy where applications are redesigned or redeveloped to take full advantage of cloud-native capabilities, making it suitable for maximizing cloud benefits.

Which cloud model can be hosted both on-premises and off-premises?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
A Hybrid Cloud combines aspects of both on-premises and off-premises hosting, providing flexibility and scalability by integrating public and private cloud resources.

Azure's platform-as-a-service (PaaS) offering for web hosting is called:

  • Azure App Service
  • Azure Functions
  • Azure Virtual Machines
  • Azure Web Apps
Azure App Service is a fully managed PaaS offering in Azure designed for hosting web applications, making it a suitable choice for web hosting.

For a Google Cloud Function to interact with other Google Cloud services within the same project, which of the following should be considered?

  • Billing considerations
  • External data sources
  • IAM permissions
  • Network latency
IAM permissions are crucial for defining access and permissions within Google Cloud, ensuring secure interaction between services within the same project.

What is the primary function of ARM Templates in Azure?

  • Infrastructure as Code
  • Resource monitoring
  • Resource organization
  • Resource provisioning
ARM Templates in Azure are used for Infrastructure as Code (IaC), allowing you to define and deploy resources in a declarative manner.

In Azure, the effective security rules for a network interface are determined by evaluating the rules from both NSGs and _______.

  • ASGs (Application Security Groups)
  • NVA (Network Virtual Appliance)
  • UDRs (User Defined Routes)
  • UTM (Unified Threat Management)
The effective security rules for a network interface are determined by the combination of NSG and ASG rules. ASGs help in grouping VMs for fine-grained security policies.