The cloud infrastructure that is provisioned for open use by the general public is termed as ________.

  • Community
  • Hybrid
  • Private
  • Public
The cloud infrastructure designed for use by the Public is accessible by individuals, businesses, and organizations. It is hosted and managed by a cloud service provider and offers services on a pay-as-you-go basis. Public clouds are shared resources, providing flexibility and cost-effectiveness.

An organization wants to optimize its cloud costs. They decide to focus on analyzing and optimizing their allocated and used cloud resources. Which part of the cloud architecture should they primarily focus on?

  • Cost monitoring tools
  • Reserved instances
  • Resource tagging and categorization
  • Resource utilization analysis
To optimize cloud costs, the organization should focus on analyzing resource utilization and efficiency, identifying underused resources, and rightsizing.

A cloud user received an email claiming to be from the cloud service provider, asking for login details to address a "technical glitch." The user provided the details and later found unauthorized changes in their account. This is an example of how ________ can lead to account hijacking.

  • Denial of Service Attack
  • Phishing Attack
  • Ransomware Attack
  • SQL Injection
This is a classic example of a phishing attack, where attackers deceive users into revealing their credentials, leading to unauthorized access and account hijacking.

When an organization opts for a cloud service where they only need to manage and configure the operating system, it is referred to as ________.

  • Database as a Service (DBaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
Infrastructure as a Service (IaaS) provides users with virtualized infrastructure components. Organizations manage and configure the operating system, applications, and data on top of this infrastructure while leaving hardware management to the cloud provider.

________ is a strategy where applications are moved to the cloud in their existing form, with the intention of making modifications at a later stage.

  • Re-architecting
  • Re-factoring
  • Re-hosting
  • Re-platforming
In the "re-hosting" strategy, applications are migrated as-is to the cloud, with modifications planned for a later phase.

Which practice can potentially lead to account hijacking if not managed properly?

  • Regular system backups
  • Regular system updates
  • Strong encryption practices
  • Weak or reused passwords
Weak or reused passwords can potentially lead to account hijacking when not managed properly, as attackers can easily guess or obtain such passwords. Proper management is crucial for security.

Which of the following is NOT a major cloud service provider (CSP)?

  • Azure
  • IBM Cloud
  • Open Source Cloud
  • Oracle Cloud
IBM, Azure, and Oracle Cloud are major cloud service providers, but "Open Source Cloud" is not a CSP.

Docker is primarily used for:

  • Containerization
  • Hypervisor
  • Orchestration
  • Virtualization
Docker is primarily used for containerization, which is the process of packaging and running applications and their dependencies in isolated containers.

An organization is considering using a managed data warehouse solution in the cloud. They are evaluating AWS and Google Cloud. Which respective services from these providers should they compare?

  • Amazon Web Services (AWS) - Redshift
  • Google Cloud Platform (GCP) - BigQuery
  • IBM Cloud - Db2 Warehouse on Cloud
  • Microsoft Azure - Azure Synapse Analytics
They should compare AWS Redshift and Google BigQuery. AWS Redshift is a managed data warehousing service by AWS, while Google BigQuery is a similar offering by Google Cloud.

Which Google Cloud service is designed to execute your code in response to events without requiring server management?

  • Google App Engine
  • Google Cloud Functions
  • Google Compute Engine
  • Google Kubernetes Engine
Google Cloud Functions is designed to execute your code in response to events without needing to manage servers. It's an event-driven serverless compute service.