In which service model is the underlying server, storage, and network infrastructure managed by the cloud provider?

  • Function as a Service (FaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
Infrastructure as a Service (IaaS) is the service model where the cloud provider manages the underlying infrastructure, including servers, storage, and networking. Users have control over the operating system, applications, and data, while the cloud provider handles the hardware and data center operations.

In Kubernetes, which component is responsible for scheduling pods onto nodes?

  • Kube-Proxy
  • Kubelet
  • Kubernetes Controller Manager
  • Kubernetes Scheduler
The Kubernetes Scheduler is responsible for deciding which nodes to run new pods on based on resource requirements, node availability, and various policies.

Which tool is commonly used for monitoring applications and infrastructure in the AWS cloud environment?

  • AWS Lambda
  • AWS RDS
  • Amazon CloudWatch
  • Amazon S3
Amazon CloudWatch is a commonly used tool in AWS for monitoring various aspects of applications and infrastructure within the cloud environment.

A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:

  • Cross-Site Scripting (XSS) Vulnerability
  • Distributed Denial of Service
  • Insider Threat
  • Man-in-the-Middle (MitM) Attack
This scenario most likely represents an insider threat, where a trusted insider misuses their access privileges to harm the organization, in this case, by modifying data.

A company notices that their cloud bill has spiked significantly in the last month. They decide to use a tool to break down the costs and find anomalies. Which type of tool are they likely to use?

  • Cloud Cost Analysis Tool
  • Performance Monitoring
  • Security Vulnerability Scanner
  • Version Control System
A Cloud Cost Analysis Tool is designed to track and analyze cloud spending, helping organizations identify cost anomalies and optimize cloud expenses. It provides insights into how resources are being utilized and where cost-saving opportunities exist.

Comprehensive ________ is crucial in detecting anomalous patterns that might indicate insider threats.

  • Authentication
  • Backups
  • Encryption
  • Monitoring
Comprehensive "Monitoring" of user activities and network traffic is essential to identify unusual patterns, a key aspect in detecting insider threats.

An organization is migrating its on-premises data warehouse to the cloud. They want to ensure that the new cloud-based solution can integrate seamlessly with their existing data visualization tools and also provide enhanced query performance. Which tool should they consider?

  • Amazon Redshift
  • Microsoft Excel
  • MySQL
  • Tableau
Amazon Redshift is a data warehousing solution that can integrate with data visualization tools and offers enhanced query performance in the cloud. It's a good choice for this scenario.

In Google Cloud Functions, the maximum execution time for a function is ________ minutes.

  • 1
  • 15
  • 5
  • 60
Google Cloud Functions have a maximum execution time of 60 minutes. This allows for longer-running tasks that may be necessary for certain applications.

Which of the following best describes an insider threat in the context of data security?

  • A threat from employees
  • A threat from external hackers
  • A threat from natural disasters
  • A threat from viruses
An insider threat in data security refers to threats originating from individuals within the organization, such as employees or contractors. These individuals have access to sensitive data and may misuse it intentionally or unintentionally.

In a scenario where an organization wants to quickly test a new application in a cost-effective manner without concerns for initial infrastructure investments, which cloud model is more appropriate?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
Public Cloud is the best choice for quickly testing new applications with minimal upfront costs. It provides scalable resources and doesn't require organizations to invest heavily in infrastructure. Private clouds are more suited for long-term, controlled environments.