You are the cloud security officer of a company. An employee reports suspicious activity in their cloud account, like unfamiliar files and settings. What is the most likely security concern you should investigate?
- Account Compromise
- Cloud Outage
- Data Leakage
- Unauthorized Access
Suspicious activity in an employee's account with unfamiliar files and settings suggests an account compromise, indicating that someone unauthorized may have accessed the account.
Which term describes the combination of the software and hardware that a user interacts with in a cloud service?
- Client Environment
- Cloud Interface
- Service Endpoint
- User Experience
The "Cloud Interface" encompasses the software and hardware components that a user interacts with when using a cloud service, including web applications and APIs.
When optimizing costs for cloud services, what does the term "Right-sizing" refer to?
- Automatically managing resources to save costs
- Matching resource requirements to workload demands
- Reducing security risks
- Scaling horizontally
"Right-sizing" means matching the resources (e.g., CPU, memory) to the workload's actual demands, preventing over-provisioning and unnecessary costs.
When deploying AI services in the cloud, what is the significance of edge computing, especially concerning IoT devices?
- Enhanced cloud scalability
- Improved model complexity
- Increased cloud cost
- Reduced latency
Edge computing significantly reduces latency for AI services in IoT. Processing data closer to the source (IoT device) minimizes the time it takes for results, critical in real-time applications.
How does AWS Lambda handle concurrency and scaling when there are multiple invocations?
- Automatic Scaling
- Connection Pools and Queues
- Manual Scaling and Capacity Planning
- Throttling and Rate Limiting
AWS Lambda automatically handles concurrency and scaling. It dynamically allocates resources to accommodate multiple invocations, ensuring that the desired number of simultaneous executions are maintained.
Which of the following best describes the purpose of Identity and Access Management?
- Controlling and securing access
- Ensuring data accuracy
- Optimizing data storage
- Protecting data from physical harm
The purpose of Identity and Access Management is to control and secure access to systems and data, ensuring only authorized users have access.
In which migration strategy might an organization choose to break a monolithic application into microservices?
- Lift and Shift
- Rearchitect/Rebuild
- Refactor/Re-architect
- Rehost/Replatform
The "Refactor/Re-architect" strategy involves restructuring the existing application to make it more suitable for the cloud. Breaking a monolithic app into microservices falls under this category.
The principle that suggests that any code commit that passes all stages of the CI/CD process is ready for deployment to production is known as ________.
- Continuous Approval (CA)
- Continuous Deployment (CD)
- Continuous Integration (CI)
- Continuous Verification (CV)
Continuous Deployment (CD) is the principle where any code that passes all stages in the CI/CD pipeline is automatically deployed to production, promoting a fast and reliable release process.
Phishing attacks primarily target which aspect of cloud accounts for hijacking?
- Application Code
- Cloud Configuration
- Server Hardware
- User Credentials
Phishing attacks primarily target user credentials. Attackers use deceptive tactics to trick users into revealing their login information, which can then be used for unauthorized access.
A primary distinction between Type-1 and Type-2 hypervisors is:
- The ability to run multiple virtual machines
- The need for virtualization support in hardware
- The presence of a host OS
- The use of hardware
Type-1 hypervisors run directly on the hardware without the need for a host OS, while Type-2 hypervisors run on top of an existing OS. This is a fundamental difference in their architecture.