Unlike traditional databases, data lakes can store structured, semi-structured, and ________ data.

  • Encrypted
  • Indexed
  • Relational
  • Unstructured
Data lakes are known for their ability to store a variety of data types, including "unstructured" data, such as text documents, making them versatile for data storage.

The characteristic of cloud computing that ensures that a user can control and manage the computing resources, even if they don't control the underlying infrastructure, is called:

  • Resource Pooling
  • Resource Virtualization
  • Scalability as a Service
  • Virtual Machine Management
The essential characteristic referred to here is "Resource Pooling." It allows users to control and manage computing resources, abstracting the underlying infrastructure. Resources are pooled together for better utilization and management.

In Kubernetes, which object allows you to maintain a stable IP address for pods as they are rescheduled?

  • ConfigMap
  • PodDisruptionBudget
  • Secret
  • Service
A Kubernetes Service is used to maintain a stable IP address for pods. It acts as an abstraction layer over a set of pods, allowing access to them through a consistent DNS name or IP address. This ensures that clients can reach the pods, even if they are rescheduled.

An e-commerce platform is experiencing challenges in managing user sessions across its distributed infrastructure. They are considering a middleware solution to manage and maintain user session data uniformly. What kind of middleware should they look into?

  • Distributed Cache
  • Message Queues
  • Publish-Subscribe
  • Remote Procedure Calls
A Distributed Cache can efficiently manage and maintain user session data across a distributed infrastructure, ensuring uniform access and reliability.

One of the primary reasons for data breaches in an organization is due to ________.

  • External Hackers
  • Inadequate Encryption
  • Insider Threats
  • Lack of Firewalls
Insider threats are a significant cause of data breaches, as employees or insiders have access to sensitive data and may misuse it intentionally or unintentionally.

Under the GDPR, what rights does an individual have concerning automated decision-making and profiling?

  • The right to access results
  • The right to data portability
  • The right to opt-out
  • The right to refuse consent
Under GDPR, individuals have the right to opt-out of automated decision-making and profiling that significantly affects them.

Which virtualization type abstracts and isolates workloads from the physical host machine, allowing for portability, flexibility, and scalability?

  • Container Virtualization
  • Network Virtualization
  • Server Virtualization
  • Virtual Machine (VM) Virtualization
Virtual Machine (VM) Virtualization abstracts entire VMs from the host, enabling portability and flexibility as VMs can run on different hosts without modification.

For a company implementing a Service-Oriented Architecture (SOA), which middleware component is vital for managing and routing messages between services?

  • API Gateway
  • ESB (Enterprise Service Bus)
  • Message Broker
  • SOA Registry and Repository
An Enterprise Service Bus (ESB) plays a vital role in managing and routing messages between services in a Service-Oriented Architecture (SOA). It acts as an intermediary for communication, enabling various services to interact seamlessly.

The main component responsible for creating and managing virtual machines is called:

  • Compiler
  • Debugger
  • Hypervisor
  • Kernel
The main component for creating and managing virtual machines is a "Hypervisor." It's responsible for creating, starting, and managing VMs on the host hardware. The kernel, compiler, and debugger play different roles in computing.

Which system helps companies manage interactions with their customers and potential customers?

  • CRM System
  • Human Resource System
  • Inventory Management System
  • Project Management System
A CRM (Customer Relationship Management) system is designed to help companies manage interactions and relationships with customers and potential customers.

Azure Blob Storage is primarily used for storing ________.

  • Code
  • Containers
  • Data
  • Virtualization
Azure Blob Storage is mainly used for storing unstructured data, such as files and media content, within containers (like buckets in AWS S3).

In the context of cloud computing, middleware that facilitates seamless scalability and manages application deployments across multiple servers is known as:

  • Container Orchestration
  • Content Delivery Network
  • Load Balancing Middleware
  • Orchestration Middleware
Container Orchestration middleware, such as Kubernetes, is crucial for managing the deployment and scalability of applications across multiple servers in cloud computing. It automates tasks like scaling, load balancing, and failover.