Which of the following is NOT a typical characteristic of SaaS?

  • Automatic updates
  • High initial investment
  • Local software installation
  • Scalability
SaaS typically does not involve a high initial investment, as it's known for its cost-effectiveness. It offers scalability, automatic updates, and eliminates the need for local software installation, but it's not associated with a high upfront cost.

The ability for cloud systems to scale according to demand is known as:

  • Automation
  • Elasticity
  • Redundancy
  • Virtualization
Elasticity refers to the cloud's ability to scale resources up or down based on demand, ensuring optimal performance and cost-efficiency.

A telecommunications company wants to improve its customer service by having a unified system to track customer complaints, feedback, and interactions. Which type of system would best suit their needs?

  • Customer Feedback Management System (CFMS)
  • Customer Relationship Management (CRM)
  • Enterprise Resource Planning (ERP)
  • Supply Chain Management (SCM)
Customer Relationship Management (CRM) is designed to manage customer interactions, complaints, and feedback, making it ideal for improving customer service.

Middleware is best described as:

  • A component that
  • A layer of software
  • A program that connects
  • Software that sits
Middleware is a layer of software that acts as a bridge between different software applications, helping them communicate and function together.

During the ________ process, an application might be decomposed and reassembled using cloud-native features for better performance and scalability.

  • Rebuilding
  • Refactoring
  • Rehosting
  • Replatforming
The blank should be filled with "Refactoring." Refactoring involves restructuring or optimizing an application for cloud-native features, leading to improved performance and scalability.

Which cloud migration strategy involves moving an application from an on-premises environment to the cloud without making changes to its architecture?

  • Refactoring (Re-architect)
  • Rehosting (Lift and Shift)
  • Reimagining (Full Rebuild)
  • Replatforming (Lift, Tinker, and Shift)
Rehosting, also known as Lift and Shift, is a migration strategy where you move the application to the cloud as-is, without making significant architectural changes. It's a quick way to get to the cloud, but it might not fully optimize the cloud's capabilities.

In the context of cloud computing, what does the "elasticity" characteristic ensure?

  • Data Encryption
  • Dynamic Scalability
  • Redundancy Management
  • Resource Efficiency
Elasticity in cloud computing refers to the ability to dynamically and automatically scale resources up or down in response to changing workloads. It ensures efficient resource allocation, cost savings, and performance optimization.

What is the significance of "zero trust" in the context of preventing insider threats?

  • Trust is granted by default
  • Trust is granted widely
  • Trust is never assumed
  • Trust is revoked easily
In a "Zero Trust" security model, trust is never assumed, and verification is required from anyone trying to access resources. This approach minimizes insider threats by not assuming trust based on roles or location.

For complex cloud architectures, which feature of cloud monitoring tools is crucial for understanding the interplay between different services?

  • Auto Scaling
  • Dependency Mapping
  • Log Collection
  • Performance Metrics
Dependency mapping is crucial for understanding how different services in a complex architecture rely on each other, helping diagnose issues and optimize.

A large enterprise has a policy that mandates all software patches and updates be reviewed and tested before deployment. They are considering adopting a SaaS application. What potential challenge might they face with this approach?

  • Complex Licensing Agreements
  • Difficulty in Customization
  • Limited Control Over Updates
  • Potential Security Concerns
The challenge that a large enterprise might face with adopting a SaaS application is limited control over updates. With SaaS, the provider manages updates, which can conflict with an enterprise's patch testing and deployment policy.

A disgruntled employee with elevated access rights who intentionally sabotages the company's data is classified as which type of insider threat?

  • Accidental Insider
  • Competent Insider
  • Malicious Insider
  • Negligent Insider
A "Malicious Insider" is an employee with malicious intent who abuses their access to harm the organization intentionally. This is a severe insider threat that organizations need to protect against.

The concept of accessing computing resources over the internet is closely related to:

  • Client-server architecture
  • Cloud computing
  • On-premises data centers
  • Traditional telephony systems
The concept of accessing computing resources over the internet is closely related to cloud computing, as it's the essence of cloud services. It's distinct from traditional telephony, on-premises data centers, or client-server models.