Refactoring/Re-architecting during cloud migration often involves:
- Code modifications and restructuring
- Migrating without any alterations
- No changes to the code, just a change in the environment
- Rewriting the entire codebase
Refactoring/re-architecting typically involves making code modifications and restructuring to align the application with cloud requirements, improving its performance and scalability.
In cloud computing, the characteristic that allows for pooling of computing resources to serve multiple consumers using a multi-tenant model is called ________.
- Elasticity
- Multi-Tenancy
- Scalability
- Virtualization
Multi-Tenancy is the characteristic that enables multiple consumers to share computing resources in a cloud environment. It enhances resource utilization and cost-effectiveness.
Which of the following refers to an incident where unauthorized individuals gain access to confidential data?
- Data Backup
- Data Breach
- Data Compression
- Data Encryption
A 'Data Breach' is an incident in which unauthorized individuals gain access to confidential data, often with malicious intent. It's a critical security concern.
What is the default maximum execution time for a single AWS Lambda function invocation?
- 15 seconds
- 1 minute
- 5 minutes
- 15 minutes
The default maximum execution time for a single AWS Lambda function invocation is 3 seconds, not mentioned among the given options. Lambda allows you to set a maximum execution time, but the default is important to understand.
Key management in cloud encryption is crucial because:
- It enables data replication
- It ensures data availability
- It ensures data confidentiality
- It speeds up data transmission
Key management in cloud encryption primarily focuses on ensuring data confidentiality by securely managing encryption keys, preventing unauthorized access.
You are tasked with setting up a system where multiple microservices need to be orchestrated, scaled, and managed efficiently. Which technology would be most appropriate for this task?
- Apache Kafka
- Kubernetes
- MongoDB
- Redis
Kubernetes is a powerful orchestration system for microservices. It enables efficient scaling, management, and orchestration of containerized applications.
What is the primary purpose of IT auditing in a cloud environment?
- Data Encryption
- Ensuring Compliance
- Network Troubleshooting
- Software Development
The primary purpose of IT auditing in a cloud environment is to ensure compliance with regulations and standards, assess the security of cloud infrastructure, and verify the proper management of data.
In a cloud environment, computational power, storage, and network capabilities are examples of:
- Data as a Service (DaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
Computational power, storage, and network capabilities are part of Infrastructure as a Service (IaaS) in cloud computing, providing essential infrastructure resources.
AWS stands for:
- Advanced Web Server
- All Web Solutions
- Amazon Web Services
- Automated Web Service
AWS stands for Amazon Web Services. It offers a wide range of cloud computing services and is a leader in the industry.
________ clouds are best suited for sectors like government, healthcare, or banking, where several entities have similar cloud needs but want to remain distinct from the public cloud.
- Community Cloud
- Hybrid Cloud
- Multi-Cloud
- Private Cloud
Community Clouds are designed for a specific community of organizations with shared interests, like regulatory requirements in government or healthcare. It offers a balance between public and private cloud features.
Which of the following tools is commonly used for CI/CD in the cloud?
- AWS CodePipeline
- Docker
- GitLab CI/CD
- Jenkins
GitLab CI/CD is a popular choice for CI/CD in the cloud, providing a platform for continuous integration and continuous deployment with built-in features for DevOps processes.
Which of the following is a security method that translates data into a code to prevent unauthorized access?
- Compression
- Duplication
- Encryption
- Fragmentation
Encryption is a security method that translates data into a code to prevent unauthorized access. It makes the data unreadable without the correct decryption key, enhancing data security.