A large enterprise wants to use the public cloud for its scalable resources and cost benefits but wishes to keep its sensitive R&D data in-house. Which cloud deployment would best fit this scenario?
- Hybrid Cloud
- On-Premises Cloud
- Private Cloud
- Public Cloud with VPN
For an enterprise looking to utilize the public cloud for scalability and cost-efficiency while securing sensitive R&D data, a "Public Cloud with VPN" allows secure communication between public cloud resources and in-house data.
A software team is looking to package their application with all its dependencies so that it can run uniformly across different environments. Which tool would you recommend?
- Docker
- Git
- Jenkins
- Kubernetes
Docker allows you to package applications and their dependencies into containers, ensuring consistent execution across various environments.
A financial institution wants to shift its legacy applications to the cloud. They want maximum control over the applications, databases, and the operating system but prefer not to manage the underlying infrastructure. Which cloud service model should they consider?
- Function as a Service (FaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
The financial institution should consider Infrastructure as a Service (IaaS). IaaS provides control over applications, databases, and the OS while outsourcing infrastructure management. This aligns with their preference.
Which type of virtualization allows for multiple operating systems to run on a single physical machine?
- Application Virtualization
- Hardware Virtualization
- Network Virtualization
- Storage Virtualization
Hardware virtualization allows multiple operating systems to coexist on a single physical machine by creating isolated virtual machines (VMs).
What does IAM stand for in the context of cloud security?
- Identity and Access Management
- Information Asset Management
- Internet Access Management
- Intrusion and Attack Management
IAM stands for Identity and Access Management in the context of cloud security. It's a critical aspect of controlling and managing user access to cloud resources and data.
In which cloud service would you find the "Function App" concept?
- AWS (Option 2)
- Google Cloud (Option 3)
- IBM Cloud (Option 4)
- Microsoft Azure (Option 1)
The "Function App" concept is found in Microsoft Azure, and it provides a platform for building, deploying, and managing serverless applications, including Azure Functions.
Which security measure is essential in preventing account hijacking in cloud environments?
- Encryption
- Intrusion Detection
- Multi-Factor Authentication (MFA)
- Network Segmentation
Multi-Factor Authentication (MFA) is a crucial security measure that requires users to provide multiple forms of verification, significantly reducing the risk of account hijacking. It enhances security beyond passwords.
In Google Cloud, ________ is a fully managed service for building, deploying, and managing containerized applications.
- Google Container
- Google Container Service
- Google Kube Manager
- Google Kubernetes Engine
In Google Cloud, Google Kubernetes Engine (GKE) is a fully managed service for building, deploying, and managing containerized applications using Kubernetes. It offers a robust container platform.
Which strategy can lead to significant cost savings in the long run when dealing with steady-state workloads in the cloud?
- Auto Scaling
- On-Demand Instances
- Reserved Instances
- Spot Instances
Reserved Instances involve long-term commitments and provide cost savings for steady-state workloads with predictable usage patterns.
In Kubernetes, ________ is the component that manages the worker nodes and the pods in the system.
- Kube-controller
- Kube-proxy
- Kube-scheduler
- Kubelet
The correct answer is "Kubelet." The Kubelet is responsible for managing and maintaining worker nodes and ensures that the containers are running as expected.