Insider threats are particularly challenging to defend against because:

  • Insiders are less likely to cause harm
  • Insiders are less motivated to attack
  • Insiders can be easily detected
  • Insiders have better knowledge of the system
Insider threats are challenging to defend against because insiders have intimate knowledge of the system, making it harder to detect and prevent their activities. They may know weaknesses that external hackers wouldn't.

Middleware that provides a set of services to authenticate, authorize, and account users is known as ________.

  • Communication Middleware
  • Identity Middleware
  • Security Middleware
  • Transaction Middleware
Identity Middleware is responsible for authenticating users, authorizing their access, and accounting for their activities. It ensures secure user management.

The ________ migration strategy is also known as the "rehosting" approach.

  • Re-architecting
  • Re-engineering
  • Re-hosting
  • Re-platforming
The "rehosting" strategy, often referred to as the "lift-and-shift" approach, involves moving applications to the cloud without major modifications.

What is the primary purpose of a cloud-based data lake?

  • Managing cloud resources
  • Running virtual machines
  • Storing structured data
  • Storing unstructured data
A cloud-based data lake is primarily used for storing unstructured data like raw text, images, audio, or log files, enabling flexible and scalable data storage for later processing and analysis.

Which of the following is a potential security concern when using hypervisors for virtualization?

  • Memory allocation issues
  • Network latency
  • Overcommitting resources
  • VM escape attacks
VM escape attacks are a significant security concern where a malicious VM tries to break out of its virtual environment and access the host system, potentially compromising security.

If a sales team is struggling with tracking leads, sales opportunities, and customer feedback, which system would be most beneficial to implement?

  • Customer Relationship Management (CRM)
  • Enterprise Resource Planning (ERP)
  • Human Resource Management System (HRMS)
  • Sales Force Automation (SFA)
A Customer Relationship Management (CRM) system is specialized for managing customer interactions, leads, and sales opportunities, making it the most beneficial choice for the sales team's needs.

What best describes the primary purpose of a community cloud?

  • Economical for small businesses
  • Highly secure and isolated
  • Serves multiple organizations
  • Shared resources for the public
A community cloud serves multiple organizations with common concerns, offering a shared cloud infrastructure tailored to their specific needs.

Which of the following analytics tools is serverless and fully managed by its cloud provider?

  • Amazon Athena
  • Apache Hadoop
  • Microsoft SQL Server
  • MongoDB Atlas
Amazon Athena is a serverless and fully managed analytics tool provided by AWS. It doesn't require infrastructure provisioning and can execute SQL queries on data stored in Amazon S3, making it a convenient choice for serverless analytics.

An organization is deploying a new application and wants to ensure they have visibility into its performance, uptime, and any potential issues. Which kind of tool would be most suitable for this purpose?

  • Application Performance Monitoring Tool
  • Data Backup and Recovery Tool
  • Database Management Tool
  • Project Management Software
An Application Performance Monitoring Tool is essential for real-time monitoring, analysis, and reporting of an application's performance, ensuring that the organization has visibility into uptime, performance metrics, and potential issues, which is crucial for maintaining a reliable application.

Virtualization that requires modifications to the guest operating system to communicate with the underlying hardware is known as ________.

  • Full Virtualization
  • Hardware Virtualization
  • Paravirtualization
  • Software Virtualization
Paravirtualization is a form of virtualization that requires modifications to the guest OS to improve performance and communication with the underlying hardware. It offers enhanced efficiency but requires OS modifications.

Account hijacking can lead to which of the following unauthorized actions?

  • Enhanced User Experience
  • Improved Application Performance
  • Increased Cloud Storage
  • Unauthorized Data Access
Account hijacking can lead to unauthorized access to data, which can result in data breaches and loss of sensitive information.

Which of the following is a primary benefit of using SaaS?

  • Complex software development
  • Cost-effectiveness and scalability.
  • High hardware maintenance cost
  • Latency in accessing software.
A primary benefit of SaaS is cost-effectiveness and scalability. Users avoid high upfront costs and can easily scale their usage as needed.