In a microservices architecture, the pattern that isolates failures and ensures that a failure in one service doesn't impact others is called the ________ pattern.
- Adapter
- Circuit Breaker
- Observer
- Singleton
The Circuit Breaker pattern is used to isolate failures in a microservices architecture. It prevents a single service failure from cascading through the system.
When optimizing costs for cloud services, what does the term "Right-sizing" refer to?
- Automatically managing resources to save costs
- Matching resource requirements to workload demands
- Reducing security risks
- Scaling horizontally
"Right-sizing" means matching the resources (e.g., CPU, memory) to the workload's actual demands, preventing over-provisioning and unnecessary costs.
You are the cloud security officer of a company. An employee reports suspicious activity in their cloud account, like unfamiliar files and settings. What is the most likely security concern you should investigate?
- Account Compromise
- Cloud Outage
- Data Leakage
- Unauthorized Access
Suspicious activity in an employee's account with unfamiliar files and settings suggests an account compromise, indicating that someone unauthorized may have accessed the account.
Cloud computing is primarily about:
- Building physical data centers
- Buying new computers for the organization
- Making use of quantum computing
- The shift from traditional software models to the internet
The essence of cloud computing is the transition from conventional software models and hardware reliance to utilizing the power of the internet for many computing needs. It's not specifically about buying hardware or building physical infrastructures.
One of the event sources that can trigger a Google Cloud Function is ________.
- File Upload
- Pub/Sub
- REST API
- SSH Connection
An event source like Google Cloud Pub/Sub can trigger a Google Cloud Function when new messages are published to a topic.
A startup is developing a chatbot that should respond within milliseconds. They want to use a Google Cloud service that can execute code without the overhead of server management and with minimal cold start times. What would you recommend?
- Google Cloud App Engine
- Google Cloud Compute Engine
- Google Cloud Functions
- Google Cloud Run
Google Cloud Run offers serverless execution of containerized applications, providing fast response times with minimal cold starts.
In a cloud computing system, which component is responsible for traffic coordination and load balancing?
- Container Orchestration
- Hypervisor
- Load Balancer
- Virtual Machine
The 'Load Balancer' is responsible for distributing incoming network traffic across multiple servers or resources. It ensures even distribution and efficient utilization, a critical function in cloud environments.
Data lakes allow users to:
- Centralize data access
- Store and analyze structured data
- Store only unstructured data
- Use only predefined schemas
Data lakes allow users to centralize data access, storing both structured and unstructured data. They offer flexibility in terms of data types and don't require predefined schemas, making them suitable for big data storage and analytics.
An e-commerce company during the holiday season wants to temporarily augment its existing private cloud capacity with additional resources from an external cloud provider. Which combined cloud model are they considering?
- Community Cloud
- Hybrid Cloud
- Private Cloud
- Public Cloud
A hybrid cloud combines private and public cloud resources. It allows the e-commerce company to extend its private cloud with public cloud resources temporarily, meeting increased demand during the holiday season.
A primary distinction between Type-1 and Type-2 hypervisors is:
- The ability to run multiple virtual machines
- The need for virtualization support in hardware
- The presence of a host OS
- The use of hardware
Type-1 hypervisors run directly on the hardware without the need for a host OS, while Type-2 hypervisors run on top of an existing OS. This is a fundamental difference in their architecture.
Phishing attacks primarily target which aspect of cloud accounts for hijacking?
- Application Code
- Cloud Configuration
- Server Hardware
- User Credentials
Phishing attacks primarily target user credentials. Attackers use deceptive tactics to trick users into revealing their login information, which can then be used for unauthorized access.
The principle that suggests that any code commit that passes all stages of the CI/CD process is ready for deployment to production is known as ________.
- Continuous Approval (CA)
- Continuous Deployment (CD)
- Continuous Integration (CI)
- Continuous Verification (CV)
Continuous Deployment (CD) is the principle where any code that passes all stages in the CI/CD pipeline is automatically deployed to production, promoting a fast and reliable release process.