Which type of cloud deployment model combines both private and public cloud structures?
- Community Cloud
- Hybrid Cloud
- Private Cloud
- Public Cloud
A Hybrid Cloud combines both private and public cloud structures, allowing organizations to have flexibility in deploying resources based on their needs.
The process of automatically deploying application changes to a production environment, ensuring zero downtime, is referred to as ________.
- Blue-Green Deployment
- Canary Deployment
- Continuous Delivery
- Continuous Integration
Blue-Green Deployment is a deployment strategy that involves having two identical production environments (blue and green) and switching between them to deploy application changes with zero downtime.
Azure Functions uses a file named ________ to define the function bindings and triggers.
- azure.json
- function.json
- host.json
- settings.json
Azure Functions utilize a file named "function.json" to specify the function bindings and triggers, allowing developers to configure how the function operates.
The process where an ML model is initially trained on a large dataset and then fine-tuned for a specific task using a smaller dataset is called ________.
- Deep Learning
- Reinforcement Learning
- Supervised Learning
- Transfer Learning
Transfer learning involves taking an ML model pretrained on a large dataset and fine-tuning it for a specific task with a smaller dataset. It's a common technique in machine learning.
In cloud monitoring, ________ is the process of validating and ensuring that resources in the cloud are functioning as expected and efficiently.
- Cloud Optimization
- Performance Assessment
- Resource Monitoring
- Validation
Cloud Optimization is the process of continuously improving resource utilization and performance in the cloud. It involves monitoring, analysis, and adjustments to ensure optimal resource efficiency.
To mitigate the risk of insider threats, it's essential to regularly review and update ________.
- Employee Contracts
- Employee Salaries
- Hardware Inventory
- Security Policies
Reviewing and updating 'Security Policies' is essential to mitigate insider threats, as clear policies can help in prevention, detection, and response to potential risks.
Cloud-based data lakes primarily store data in its raw form, often referred to as ________.
- Big Data
- Raw Data
- Structured Data
- Unstructured Data
Cloud-based data lakes store data in its raw, unaltered form, often referred to as 'Raw Data.' This allows for flexible processing and analysis.
Google Cloud Functions is primarily used for:
- Executing code in response to events
- Hosting websites
- Managing databases
- Running server applications
Google Cloud Functions is primarily used for executing code in response to events without requiring server management. It's ideal for event-driven functions.
What is the primary purpose of encryption in cloud computing?
- Data Analysis
- Data Backup
- Data Security
- Data Transfer
Encryption in cloud computing primarily serves the purpose of data security. It ensures that data stored in the cloud remains confidential and protected from unauthorized access.
In the SaaS model, software applications are hosted on remote servers and delivered to users over the ________.
- Internet
- Intranet
- Local Network
- Mainframe
In the Software as a Service (SaaS) model, applications are hosted on remote servers and delivered to users over the Internet. Users access the software via web browsers.
The equivalent of AWS's Elastic Compute Cloud (EC2) in Google Cloud is:
- Google App Engine
- Google Cloud Functions
- Google Compute Engine
- Google Kubernetes Engine
Google Compute Engine is Google Cloud's counterpart to AWS EC2, offering virtual machine instances for running applications and services.
What role does an IAM system typically play in cloud computing?
- Data encryption and decryption
- Data storage management
- Identity and access management
- Resource allocation and scaling
IAM systems in cloud computing are responsible for Identity and Access Management, controlling who has access to what resources, enhancing security.