A global manufacturing company wants to standardize its operations across all its units. They need a system to integrate various functions like HR, finance, and production. Which software solution would you recommend?

  • Customer Relationship Management (CRM)
  • Enterprise Resource Planning (ERP)
  • Human Resource Management (HRM)
  • Supply Chain Management (SCM)
Enterprise Resource Planning (ERP) integrates various functions across an organization, making it the ideal choice for standardization across units.

Edge computing in the context of IoT refers to processing data at the ________ rather than in a centralized cloud server.

  • Cloud
  • Edge
  • Network
  • Periphery
Edge computing means processing data closer to the data source (IoT devices) rather than in a distant centralized cloud server. This reduces latency and bandwidth usage.

Companies that are concerned about the security of their data in a SaaS model might explore ________ options to ensure data encryption.

  • Backup
  • Encryption
  • Networking
  • Virtualization
Data encryption is a common security measure in SaaS. Encrypting data ensures that even if unauthorized access occurs, the data remains protected.

Which of the following strategies is often used when an organization wants to migrate quickly to meet a business objective but plans on optimizing later?

  • Lift and Shift
  • Rearchitect/Rebuild
  • Refactor/Re-architect
  • Rehost/Replatform
The "Lift and Shift" strategy involves migrating an application to the cloud quickly with minimal changes. Organizations often use this when they need rapid migration with optimization as a later step.

How are you billed for Google Cloud Functions?

  • Flat Monthly Fee
  • Free tier available
  • Pay-as-you-go
  • Pay-per-Request
Google Cloud Functions are billed based on the number of requests and the time your code executes. It's a pay-per-request model, ensuring you only pay for what you use.

An organization's IT team detects unusual data transfer activities from a top executive's account during non-working hours. This could be indicative of:

  • Data Theft
  • Routine Maintenance
  • System Upgrade
  • Unauthorized Access
Unusual data transfer activities from a top executive's account during non-working hours can be indicative of data theft, which is a significant security concern.

AWS Lambda is an example of ________ computing.

  • Edge
  • Grid
  • Quantum
  • Serverless
AWS Lambda is a prominent serverless computing service that allows running code without provisioning or managing servers, making it serverless.

In Kubernetes, which component is responsible for scheduling pods onto nodes?

  • Kube-Proxy
  • Kubelet
  • Kubernetes Controller Manager
  • Kubernetes Scheduler
The Kubernetes Scheduler is responsible for deciding which nodes to run new pods on based on resource requirements, node availability, and various policies.

Which tool is commonly used for monitoring applications and infrastructure in the AWS cloud environment?

  • AWS Lambda
  • AWS RDS
  • Amazon CloudWatch
  • Amazon S3
Amazon CloudWatch is a commonly used tool in AWS for monitoring various aspects of applications and infrastructure within the cloud environment.

A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:

  • Cross-Site Scripting (XSS) Vulnerability
  • Distributed Denial of Service
  • Insider Threat
  • Man-in-the-Middle (MitM) Attack
This scenario most likely represents an insider threat, where a trusted insider misuses their access privileges to harm the organization, in this case, by modifying data.