In virtualization, the physical machine on which the hypervisor runs is commonly referred to as the ________.

  • Client
  • Host
  • Node
  • Server
The physical machine that hosts the hypervisor and virtual machines is referred to as the Host. This is where the virtualization environment is created and managed.

A data breach that occurs due to an employee's unintentional actions, like clicking on a phishing link, is often referred to as a ________ breach.

  • Accidental
  • Cybersecurity
  • Insider
  • Malicious
An "Accidental" breach typically involves inadvertent actions by authorized users, making them susceptible to threats like phishing.

In the context of SaaS, the ability to serve multiple customers using a single instance of a software application is referred to as ________.

  • Interoperability
  • Multi-Tenancy
  • Scalability
  • Virtualization
Multi-Tenancy is a key characteristic of SaaS where a single instance of the software serves multiple customers, each with their data and configurations.

Cloud users are advised to regularly change their ________ to prevent account hijacking.

  • Credit Card Information
  • Email Addresses
  • Passwords
  • Physical Addresses
Cloud users are advised to regularly change their "Passwords" to prevent account hijacking. Frequent password changes make it more difficult for unauthorized users to access accounts.

In distributed systems, middleware plays a crucial role in:

  • Communication and Integration
  • Data Presentation
  • End-User Interaction
  • Processing and Storage
Middleware serves as an intermediary layer facilitating communication and integration between various distributed system components. It ensures data can flow between them efficiently.

In Kubernetes, which object allows you to maintain a stable IP address for pods as they are rescheduled?

  • ConfigMap
  • PodDisruptionBudget
  • Secret
  • Service
A Kubernetes Service is used to maintain a stable IP address for pods. It acts as an abstraction layer over a set of pods, allowing access to them through a consistent DNS name or IP address. This ensures that clients can reach the pods, even if they are rescheduled.

The characteristic of cloud computing that ensures that a user can control and manage the computing resources, even if they don't control the underlying infrastructure, is called:

  • Resource Pooling
  • Resource Virtualization
  • Scalability as a Service
  • Virtual Machine Management
The essential characteristic referred to here is "Resource Pooling." It allows users to control and manage computing resources, abstracting the underlying infrastructure. Resources are pooled together for better utilization and management.

Unlike traditional databases, data lakes can store structured, semi-structured, and ________ data.

  • Encrypted
  • Indexed
  • Relational
  • Unstructured
Data lakes are known for their ability to store a variety of data types, including "unstructured" data, such as text documents, making them versatile for data storage.

What does "Account Hijacking" in cloud computing refer to?

  • Excessive use of cloud resources
  • Gaining physical access to cloud servers
  • Inadequate network security in the cloud
  • Unauthorized access to a user's cloud account by an attacker
Account hijacking refers to unauthorized access to a user's cloud account by an attacker who gains access to sensitive information or controls the account.

Which of the following best describes cloud computing?

  • A model for accessing computing resources over the internet
  • A physical location for data storage
  • A service for virtual reality gaming
  • A technology for weather forecasting
Cloud computing is a model that enables the on-demand access to computing resources like servers, storage, and databases over the internet. It's not about weather forecasting or VR gaming.