Which of the following best describes Type-1 (bare-metal) hypervisors?
- They are primarily used for development and testing environments.
- They rely on Type-2 hypervisors for operation.
- They require a full-fledged operating system to function properly.
- They run directly on the physical hardware, without the need for an underlying operating system.
Type-1 (bare-metal) hypervisors operate directly on the hardware, eliminating the need for an underlying OS, which provides better performance and security for virtual machines.
Which aspect of SaaS can be a potential concern for businesses with stringent data residency requirements?
- Data Backup Strategy
- Data Encryption
- Data Location
- Data Security
For businesses with stringent data residency requirements, the location of data in a SaaS solution can be a significant concern. They need to ensure that their data remains within specified geographical boundaries or jurisdictions.
What role does an IAM system typically play in cloud computing?
- Data encryption and decryption
- Data storage management
- Identity and access management
- Resource allocation and scaling
IAM systems in cloud computing are responsible for Identity and Access Management, controlling who has access to what resources, enhancing security.
The equivalent of AWS's Elastic Compute Cloud (EC2) in Google Cloud is:
- Google App Engine
- Google Cloud Functions
- Google Compute Engine
- Google Kubernetes Engine
Google Compute Engine is Google Cloud's counterpart to AWS EC2, offering virtual machine instances for running applications and services.
In the SaaS model, software applications are hosted on remote servers and delivered to users over the ________.
- Internet
- Intranet
- Local Network
- Mainframe
In the Software as a Service (SaaS) model, applications are hosted on remote servers and delivered to users over the Internet. Users access the software via web browsers.
What is the primary purpose of encryption in cloud computing?
- Data Analysis
- Data Backup
- Data Security
- Data Transfer
Encryption in cloud computing primarily serves the purpose of data security. It ensures that data stored in the cloud remains confidential and protected from unauthorized access.
Google Cloud Functions is primarily used for:
- Executing code in response to events
- Hosting websites
- Managing databases
- Running server applications
Google Cloud Functions is primarily used for executing code in response to events without requiring server management. It's ideal for event-driven functions.
Cloud-based data lakes primarily store data in its raw form, often referred to as ________.
- Big Data
- Raw Data
- Structured Data
- Unstructured Data
Cloud-based data lakes store data in its raw, unaltered form, often referred to as 'Raw Data.' This allows for flexible processing and analysis.
To mitigate the risk of insider threats, it's essential to regularly review and update ________.
- Employee Contracts
- Employee Salaries
- Hardware Inventory
- Security Policies
Reviewing and updating 'Security Policies' is essential to mitigate insider threats, as clear policies can help in prevention, detection, and response to potential risks.
In a cloud scenario, if an attacker gains control over a user's access credentials, it can lead to ________.
- Account Lockout
- Data Loss
- Resource Optimization
- Unauthorized Access
In a cloud scenario, if an attacker gains control over a user's access credentials, it can lead to "Unauthorized Access." This access can be used to compromise data, resources, or even perform malicious actions within the cloud environment.