A system that restricts access to resources based on continuous verification is known as ________.

  • Authentication
  • Authorization
  • Encryption
  • Firewall
An "Authorization" system verifies access rights continuously to ensure that only authorized users can access resources, maintaining security.

A company wants to set up a testing environment where they can run multiple versions of their software on different OS platforms without investing in new hardware. Which type of virtualization would best serve their needs?

  • Client-Side Virtualization
  • Container-based Virtualization
  • Hosted Virtualization
  • Hypervisor-based Virtualization
Hypervisor-based virtualization allows running multiple virtual machines (VMs) on a single physical server, enabling the company to test various OS platforms without new hardware.

A startup wants to deploy a collaboration tool for its remote workforce without any upfront investment in infrastructure or software licenses. Which cloud service model would be most suitable for this requirement?

  • FaaS (Function as a Service)
  • IaaS (Infrastructure as a Service)
  • PaaS (Platform as a Service)
  • SaaS (Software as a Service)
The most suitable cloud service model for the startup's requirement is SaaS. SaaS applications are hosted in the cloud and accessible on a subscription basis, eliminating the need for infrastructure investment. It's an ideal choice for cost-effectively providing collaboration tools.

Which of the following is NOT a requirement under GDPR for data processors and controllers?

  • Appointment of a Data Protection Officer
  • Data backup and retention policies
  • Data breach notification
  • Data encryption at rest
GDPR, the General Data Protection Regulation, does not explicitly require data backup and retention policies. However, it emphasizes data protection, breach notification, and the appointment of a Data Protection Officer.

A telecommunications company wants to improve its customer service by having a unified system to track customer complaints, feedback, and interactions. Which type of system would best suit their needs?

  • Customer Feedback Management System (CFMS)
  • Customer Relationship Management (CRM)
  • Enterprise Resource Planning (ERP)
  • Supply Chain Management (SCM)
Customer Relationship Management (CRM) is designed to manage customer interactions, complaints, and feedback, making it ideal for improving customer service.

The ability for cloud systems to scale according to demand is known as:

  • Automation
  • Elasticity
  • Redundancy
  • Virtualization
Elasticity refers to the cloud's ability to scale resources up or down based on demand, ensuring optimal performance and cost-efficiency.

Which of the following is NOT a typical characteristic of SaaS?

  • Automatic updates
  • High initial investment
  • Local software installation
  • Scalability
SaaS typically does not involve a high initial investment, as it's known for its cost-effectiveness. It offers scalability, automatic updates, and eliminates the need for local software installation, but it's not associated with a high upfront cost.

The servers and data storage systems that make up the backbone of a cloud computing system are collectively referred to as the:

  • Cloud Backbone
  • Cloud Core
  • Cloud Infrastructure
  • Cloud Superstructure
The term "Cloud Infrastructure" refers to the underlying servers and storage systems that form the foundation of a cloud computing system.

A tech startup wants a cloud solution where they can deploy their applications without provisioning the infrastructure. Which cloud service model best fits their needs?

  • Function as a Service (FaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
For a tech startup looking for a solution without dealing with infrastructure provisioning, Platform as a Service (PaaS) is ideal. It allows them to focus on application development while the provider handles the underlying infrastructure.

A hospital is migrating its patient data to a cloud provider. They want to ensure that the cloud provider has mechanisms in place to constantly monitor and report any unauthorized access or potential breaches. Which auditing and monitoring practice should they inquire about?

  • Disaster Recovery Plans
  • Intrusion Detection Systems (IDS)
  • Penetration Testing
  • Security Information and Event Management (SIEM)
To monitor and report unauthorized access or breaches, hospitals should inquire about Security Information and Event Management (SIEM) systems. SIEM solutions provide real-time analysis of security alerts and event management to ensure the early detection of potential threats.