The primary role of the back end in a cloud computing environment is to:

  • Handle user authentication
  • Host user interfaces
  • Manage server hardware
  • Manage servers
The back end in cloud computing is responsible for managing servers, handling data, and executing the core functionalities of the application. It's the "invisible" part.

Google Cloud's equivalent to AWS's RDS (Relational Database Service) is ________.

  • Bigtable
  • CloudSQL
  • Datastore
  • Firestore
Google Cloud's counterpart to AWS RDS is CloudSQL, which offers managed relational databases like MySQL and PostgreSQL.

Which of the following best describes cloud computing?

  • A way to store personal photos and videos
  • A method for companies to save on IT operational costs
  • A system to play online games
  • Delivering computing services over the internet
Cloud computing is about delivering various computing services like storage, databases, servers, networking, software, and more over the internet. While some of the other options may be components or uses of cloud computing, the core idea is the delivery of computing services via the internet.

A company has a legacy application that is tightly coupled with its current database. They want to migrate to the cloud and modernize the application for better scalability and performance. Which migration strategy should they consider?

  • Rearchitecting (rebuilding)
  • Refactoring (re-architecting)
  • Rehosting (lift-and-shift)
  • Retiring or Decommissioning
Refactoring, or re-architecting, is the most suitable strategy when migrating to the cloud while modernizing an application. It involves making application changes to optimize for the cloud environment, ensuring scalability and performance.

When deploying AI services in the cloud, what is the significance of edge computing, especially concerning IoT devices?

  • Enhanced cloud scalability
  • Improved model complexity
  • Increased cloud cost
  • Reduced latency
Edge computing significantly reduces latency for AI services in IoT. Processing data closer to the source (IoT device) minimizes the time it takes for results, critical in real-time applications.

How does AWS Lambda handle concurrency and scaling when there are multiple invocations?

  • Automatic Scaling
  • Connection Pools and Queues
  • Manual Scaling and Capacity Planning
  • Throttling and Rate Limiting
AWS Lambda automatically handles concurrency and scaling. It dynamically allocates resources to accommodate multiple invocations, ensuring that the desired number of simultaneous executions are maintained.

Which of the following best describes the purpose of Identity and Access Management?

  • Controlling and securing access
  • Ensuring data accuracy
  • Optimizing data storage
  • Protecting data from physical harm
The purpose of Identity and Access Management is to control and secure access to systems and data, ensuring only authorized users have access.

In which migration strategy might an organization choose to break a monolithic application into microservices?

  • Lift and Shift
  • Rearchitect/Rebuild
  • Refactor/Re-architect
  • Rehost/Replatform
The "Refactor/Re-architect" strategy involves restructuring the existing application to make it more suitable for the cloud. Breaking a monolithic app into microservices falls under this category.

The principle that suggests that any code commit that passes all stages of the CI/CD process is ready for deployment to production is known as ________.

  • Continuous Approval (CA)
  • Continuous Deployment (CD)
  • Continuous Integration (CI)
  • Continuous Verification (CV)
Continuous Deployment (CD) is the principle where any code that passes all stages in the CI/CD pipeline is automatically deployed to production, promoting a fast and reliable release process.

Phishing attacks primarily target which aspect of cloud accounts for hijacking?

  • Application Code
  • Cloud Configuration
  • Server Hardware
  • User Credentials
Phishing attacks primarily target user credentials. Attackers use deceptive tactics to trick users into revealing their login information, which can then be used for unauthorized access.