Azure Functions uses a file named ________ to define the function bindings and triggers.
- azure.json
- function.json
- host.json
- settings.json
Azure Functions utilize a file named "function.json" to specify the function bindings and triggers, allowing developers to configure how the function operates.
The process of automatically deploying application changes to a production environment, ensuring zero downtime, is referred to as ________.
- Blue-Green Deployment
- Canary Deployment
- Continuous Delivery
- Continuous Integration
Blue-Green Deployment is a deployment strategy that involves having two identical production environments (blue and green) and switching between them to deploy application changes with zero downtime.
Which type of cloud deployment model combines both private and public cloud structures?
- Community Cloud
- Hybrid Cloud
- Private Cloud
- Public Cloud
A Hybrid Cloud combines both private and public cloud structures, allowing organizations to have flexibility in deploying resources based on their needs.
Which migration strategy is often the quickest and least expensive initially but might not fully leverage the benefits of the cloud?
- Refactoring (Re-architect)
- Rehosting (Lift and Shift)
- Reimagining (Full Rebuild)
- Replatforming (Lift, Tinker, and Shift)
Rehosting (Lift and Shift) is typically the quickest and least expensive migration strategy initially, but it may not fully exploit the cloud's potential because it doesn't make significant changes to the application's architecture.
Using multi-factor authentication can greatly reduce the risk of ________ in cloud environments.
- Account Hijacking
- Data Loss
- Network Intrusion
- Unauthorized Access
Using multi-factor authentication can greatly reduce the risk of "Account Hijacking" in cloud environments by requiring multiple verification methods, making it more challenging for attackers to gain access.
In the SaaS model, software applications are hosted on remote servers and delivered to users over the ________.
- Internet
- Intranet
- Local Network
- Mainframe
In the Software as a Service (SaaS) model, applications are hosted on remote servers and delivered to users over the Internet. Users access the software via web browsers.
What is the primary purpose of encryption in cloud computing?
- Data Analysis
- Data Backup
- Data Security
- Data Transfer
Encryption in cloud computing primarily serves the purpose of data security. It ensures that data stored in the cloud remains confidential and protected from unauthorized access.
Google Cloud Functions is primarily used for:
- Executing code in response to events
- Hosting websites
- Managing databases
- Running server applications
Google Cloud Functions is primarily used for executing code in response to events without requiring server management. It's ideal for event-driven functions.
Cloud-based data lakes primarily store data in its raw form, often referred to as ________.
- Big Data
- Raw Data
- Structured Data
- Unstructured Data
Cloud-based data lakes store data in its raw, unaltered form, often referred to as 'Raw Data.' This allows for flexible processing and analysis.
To mitigate the risk of insider threats, it's essential to regularly review and update ________.
- Employee Contracts
- Employee Salaries
- Hardware Inventory
- Security Policies
Reviewing and updating 'Security Policies' is essential to mitigate insider threats, as clear policies can help in prevention, detection, and response to potential risks.