In the context of AI in the cloud, what does a pre-trained model refer to?

  • A model that is trained on new data
  • A model that is trained on public data
  • A model that requires further training
  • A model that was trained by a user
A pre-trained model refers to a machine learning model that has already been trained on a large dataset and is available for use without further training. Typically, these models are trained on publicly available data.

An e-commerce platform experiences high traffic surges during sale events. They want to migrate to the cloud efficiently, with minimal downtime. Which strategy would be best for them?

  • Cloud Bursting
  • Horizontal Scaling
  • Serverless Computing (FaaS)
  • Vertical Scaling
Cloud bursting is the most suitable strategy for an e-commerce platform with traffic surges. It allows the platform to scale dynamically to the cloud to handle peak loads while minimizing the migration effort.

In a hybrid cloud, the orchestration between different cloud services is enabled by:

  • Edge Computing
  • Hybrid Cloud Management Platform (CMP)
  • Hypervisor
  • Virtual Private Network (VPN)
Orchestration in a hybrid cloud is facilitated by Hybrid Cloud Management Platforms (CMP), which provide tools to manage and integrate services across multiple cloud environments.

AWS Lambda supports automatic scaling by adjusting the number of ________ it runs in parallel.

  • Containers
  • Functions
  • Instances
  • Threads
AWS Lambda is a serverless compute service. It scales by adjusting the number of functions it runs in parallel, not instances, threads, or containers.

A company wants to ensure zero downtime deployments for their application. They are considering Kubernetes. Which feature of Kubernetes would facilitate this?

  • Automatic load balancing
  • Cloud resource management
  • Containerization
  • Self-healing capabilities
Kubernetes provides self-healing capabilities, enabling it to automatically replace or reschedule containers if they fail, ensuring minimal downtime during deployments.

In distributed systems, middleware plays a crucial role in:

  • Communication and Integration
  • Data Presentation
  • End-User Interaction
  • Processing and Storage
Middleware serves as an intermediary layer facilitating communication and integration between various distributed system components. It ensures data can flow between them efficiently.

Cloud users are advised to regularly change their ________ to prevent account hijacking.

  • Credit Card Information
  • Email Addresses
  • Passwords
  • Physical Addresses
Cloud users are advised to regularly change their "Passwords" to prevent account hijacking. Frequent password changes make it more difficult for unauthorized users to access accounts.

In the context of SaaS, the ability to serve multiple customers using a single instance of a software application is referred to as ________.

  • Interoperability
  • Multi-Tenancy
  • Scalability
  • Virtualization
Multi-Tenancy is a key characteristic of SaaS where a single instance of the software serves multiple customers, each with their data and configurations.

A data breach that occurs due to an employee's unintentional actions, like clicking on a phishing link, is often referred to as a ________ breach.

  • Accidental
  • Cybersecurity
  • Insider
  • Malicious
An "Accidental" breach typically involves inadvertent actions by authorized users, making them susceptible to threats like phishing.

In virtualization, the physical machine on which the hypervisor runs is commonly referred to as the ________.

  • Client
  • Host
  • Node
  • Server
The physical machine that hosts the hypervisor and virtual machines is referred to as the Host. This is where the virtualization environment is created and managed.

Which of the following best describes cloud computing?

  • A model for accessing computing resources over the internet
  • A physical location for data storage
  • A service for virtual reality gaming
  • A technology for weather forecasting
Cloud computing is a model that enables the on-demand access to computing resources like servers, storage, and databases over the internet. It's not about weather forecasting or VR gaming.

What does "Account Hijacking" in cloud computing refer to?

  • Excessive use of cloud resources
  • Gaining physical access to cloud servers
  • Inadequate network security in the cloud
  • Unauthorized access to a user's cloud account by an attacker
Account hijacking refers to unauthorized access to a user's cloud account by an attacker who gains access to sensitive information or controls the account.