AWS's primary service for object storage is:
- Amazon DynamoDB (NoSQL Database)
- Amazon EC2 (Elastic Compute Cloud)
- Amazon RDS (Relational Database Service)
- Amazon S3 (Simple Storage Service)
Amazon S3 (Simple Storage Service) is AWS's primary service for object storage. It provides scalable, durable, and highly available object storage in the cloud, commonly used for data and file storage.
An organization wants to optimize its cloud costs. They decide to focus on analyzing and optimizing their allocated and used cloud resources. Which part of the cloud architecture should they primarily focus on?
- Cost monitoring tools
- Reserved instances
- Resource tagging and categorization
- Resource utilization analysis
To optimize cloud costs, the organization should focus on analyzing resource utilization and efficiency, identifying underused resources, and rightsizing.
A cloud user received an email claiming to be from the cloud service provider, asking for login details to address a "technical glitch." The user provided the details and later found unauthorized changes in their account. This is an example of how ________ can lead to account hijacking.
- Denial of Service Attack
- Phishing Attack
- Ransomware Attack
- SQL Injection
This is a classic example of a phishing attack, where attackers deceive users into revealing their credentials, leading to unauthorized access and account hijacking.
When an organization opts for a cloud service where they only need to manage and configure the operating system, it is referred to as ________.
- Database as a Service (DBaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
Infrastructure as a Service (IaaS) provides users with virtualized infrastructure components. Organizations manage and configure the operating system, applications, and data on top of this infrastructure while leaving hardware management to the cloud provider.
________ is a strategy where applications are moved to the cloud in their existing form, with the intention of making modifications at a later stage.
- Re-architecting
- Re-factoring
- Re-hosting
- Re-platforming
In the "re-hosting" strategy, applications are migrated as-is to the cloud, with modifications planned for a later phase.
Middleware often acts as a bridge between:
- Clients and databases
- Databases and files
- Hardware and software
- Users and servers
Middleware often acts as a bridge between hardware and software, ensuring seamless communication and interaction between these two components.
Which of the following is NOT typically a function of middleware?
- Data Storage and Retrieval
- Message Routing
- Security
- User Interface
Middleware primarily handles tasks like data storage and retrieval, security, and message routing. User interface management is typically outside the scope of middleware.
Which of the following scenarios is best suited for a hybrid cloud model?
- A company with a strict data residency requirement
- A research institution with high computing demands
- A small business with minimal data
- A startup looking for low costs
A hybrid cloud model is ideal for organizations with varying data residency needs, allowing them to use both public and private clouds, maintaining control over data in the private portion.
Account hijacking can lead to unauthorized data access, making it crucial to monitor and log all ________ in cloud environments.
- Activities
- Logins
- Requests
- Resources
Account hijacking can lead to unauthorized data access, making it crucial to monitor and log all "Logins" in cloud environments. Monitoring and logging login activities can help detect and respond to unauthorized access.
Which practice can potentially lead to account hijacking if not managed properly?
- Regular system backups
- Regular system updates
- Strong encryption practices
- Weak or reused passwords
Weak or reused passwords can potentially lead to account hijacking when not managed properly, as attackers can easily guess or obtain such passwords. Proper management is crucial for security.