What is the significance of "zero trust" in the context of preventing insider threats?
- Trust is granted by default
- Trust is granted widely
- Trust is never assumed
- Trust is revoked easily
In a "Zero Trust" security model, trust is never assumed, and verification is required from anyone trying to access resources. This approach minimizes insider threats by not assuming trust based on roles or location.
In the context of cloud computing, what does the "elasticity" characteristic ensure?
- Data Encryption
- Dynamic Scalability
- Redundancy Management
- Resource Efficiency
Elasticity in cloud computing refers to the ability to dynamically and automatically scale resources up or down in response to changing workloads. It ensures efficient resource allocation, cost savings, and performance optimization.
Which cloud migration strategy involves moving an application from an on-premises environment to the cloud without making changes to its architecture?
- Refactoring (Re-architect)
- Rehosting (Lift and Shift)
- Reimagining (Full Rebuild)
- Replatforming (Lift, Tinker, and Shift)
Rehosting, also known as Lift and Shift, is a migration strategy where you move the application to the cloud as-is, without making significant architectural changes. It's a quick way to get to the cloud, but it might not fully optimize the cloud's capabilities.
A healthcare provider needs to move data to the cloud due to an expiring data center lease. They plan to optimize and leverage cloud-native services in the future. Which initial migration strategy might they employ?
- Augmenting with Cloud Services (Hybrid Cloud)
- Lift, Tinker, and Shift
- Refactoring (re-architecting)
- Rehosting (lift-and-shift)
Augmenting with cloud services, often a hybrid cloud approach, would allow the healthcare provider to quickly move data to the cloud while preparing for future optimization and integration with cloud-native services.
During the ________ process, an application might be decomposed and reassembled using cloud-native features for better performance and scalability.
- Rebuilding
- Refactoring
- Rehosting
- Replatforming
The blank should be filled with "Refactoring." Refactoring involves restructuring or optimizing an application for cloud-native features, leading to improved performance and scalability.
Which service allows you to run code in response to events without provisioning or managing servers: AWS Lambda or Azure Virtual Machines?
- AWS Lambda (Option 1)
- Azure Virtual Machines (Option 2)
- Both (Option 3)
- Neither (Option 4)
AWS Lambda allows you to run code in response to events without provisioning or managing servers. Azure Virtual Machines are traditional virtual servers that require provisioning and management.
An agricultural company wants to deploy drones to monitor the health of crops using AI. They need a solution that can process vast amounts of data from various drones simultaneously. Which cloud-based AI service might be suitable?
- Amazon SageMaker
- Azure Machine Learning Service
- Google Cloud AutoML
- IBM Watson
Amazon SageMaker is a comprehensive AI service on AWS that can handle large-scale AI model training and inference. It's suitable for processing data from multiple drones for crop monitoring.
A financial institution wants to set up a cloud infrastructure where they have complete control over their sensitive data and can ensure it doesn't leave their premises. Which cloud deployment model would be most suitable?
- Community Cloud
- Hybrid Cloud
- Private Cloud
- Public Cloud
A private cloud is the ideal choice for a financial institution to maintain control over sensitive data. It's hosted within the organization's premises or by a third-party provider, ensuring data stays on-site.
How does Docker handle dependencies for an application?
- By fetching dependencies from the internet
- By packaging dependencies within the application's container
- By using a separate dependency container
- By using host system dependencies
Docker typically handles application dependencies by packaging them within the container image. This approach ensures that the application runs consistently, regardless of the host system, and isolates dependencies from the host and other containers.
An individual within the organization who poses a potential security risk, whether intentional or unintentional, is referred to as a(n) ________.
- External Consultant
- Insider Threat
- Security Administrator
- Whistleblower
An 'Insider Threat' is someone within the organization who may compromise security, either deliberately or accidentally, making them a significant risk.