Which technology enables devices to gather and exchange data over the internet, which can then be processed and analyzed in the cloud?

  • 5G
  • LoRa
  • MQTT
  • Wi-Fi
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that enables devices to gather and exchange data over the internet. This data can be transmitted to the cloud for processing and analysis. MQTT is commonly used in IoT applications.

Virtualization technology allows multiple ________ to run on a single physical machine.

  • Applications
  • Operating Systems
  • Processors
  • Virtual Machines
Virtualization technology enables multiple virtual machines (VMs) to run on a single physical machine, abstracting and isolating each VM from the host hardware. This enables efficient resource utilization and isolation.

In Kubernetes, what is the role of an "etcd"?

  • A container orchestration tool
  • A container runtime
  • A distributed file system for pod data
  • A network overlay solution
Etcd is a distributed key-value store used in Kubernetes to store all configuration data, which ensures high availability and consistency. It's crucial for maintaining a shared configuration and service discovery among all nodes in the cluster.

Which of the following is a form of virtualization that separates a physical machine into multiple virtual machines?

  • Hypervisor
  • Emulation
  • Containerization
  • Virtual Private Network (VPN)
The correct option is 'Hypervisor.' A hypervisor is a type of virtualization technology that allows a single physical machine to run multiple virtual machines. These virtual machines, or VMs, are isolated from each other and from the host system. The hypervisor controls and allocates hardware resources to these VMs, making it an efficient solution for server virtualization. Virtual Private Networks (VPNs) are not related to machine virtualization. Emulation often replicates a specific environment for compatibility, while containerization is a different virtualization method where applications share the same OS kernel.

A software company in the EU offers a service that uses machine learning to make automated decisions about user profiles. A user is unhappy about a decision made about him and requests an explanation. Under which regulation and provision should the company address this request?

  • CCPA, Section 1798.105
  • GDPR, Article 22
  • HIPAA, Section 164.524
  • ISO 27001, Clause 8.2.3
GDPR, Article 22, grants users the right to request an explanation for automated decisions that significantly affect them. This ensures transparency and accountability in cases where algorithms or AI systems are used for decision-making.

While the ________ strategy offers a faster migration, it may not immediately take full advantage of cloud-native capabilities.

  • Refactoring
  • Rehosting
  • Replatforming
  • Repurchasing
The blank should be filled with "Rehosting." Rehosting is a migration strategy where applications are moved to the cloud with minimal changes, offering a faster migration but not leveraging cloud-native capabilities.

What is the primary focus of cost management tools in cloud computing?

  • Enhancing application performance
  • Ensuring data privacy and security
  • Managing network latency and bandwidth
  • Tracking usage and optimizing spending
The primary focus of cost management tools in cloud computing is to track resource usage and optimize spending. These tools provide insights into how cloud resources are utilized and help organizations make informed decisions to minimize unnecessary expenses.

The practice of continuously monitoring and improving the CI/CD process to ensure optimal performance and reduced risks is known as:

  • Continuous Delivery
  • Continuous Improvement
  • Continuous Integration
  • DevOps
Continuous Improvement is the practice of continuously enhancing the CI/CD process, making it more efficient, secure, and reliable over time.

A financial organization implements strict access controls, ensuring employees can only access the data necessary for their job roles. This strategy primarily helps in reducing the risk of:

  • Data Leakage
  • Insider Trading
  • Phishing Attacks
  • Social Engineering Attacks
Strict access controls help reduce the risk of insider trading by limiting employees' access to only the data necessary for their specific job roles, preventing misuse.

In ________, the cloud provider supplies and manages everything from the infrastructure to the software applications.

  • Database as a Service (DBaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
In Software as a Service (SaaS), the cloud provider supplies and manages both the underlying infrastructure and software applications. Users access the software via the internet, with no need to worry about infrastructure or application maintenance.