In a cloud scenario, if an attacker gains control over a user's access credentials, it can lead to ________.

  • Account Lockout
  • Data Loss
  • Resource Optimization
  • Unauthorized Access
In a cloud scenario, if an attacker gains control over a user's access credentials, it can lead to "Unauthorized Access." This access can be used to compromise data, resources, or even perform malicious actions within the cloud environment.

Which of the following can be a preventive measure against data breaches caused by insider threats?

  • Ignoring insider threats
  • Increasing firewall strength
  • Reducing the number of external threats
  • Regular security training for employees
Preventive measures against insider threats include regular security training for employees to make them aware of security best practices and the risks associated with insider threats. Education can help reduce the likelihood of insider incidents.

In a data center, which type of virtualization would be used to manage and pool the physical storage from multiple network storage devices?

  • Application Virtualization
  • Network Virtualization
  • Server Virtualization
  • Storage Virtualization
Storage Virtualization is used to abstract and pool storage resources from multiple devices, allowing for centralized management and efficient use.

A healthcare tech startup is working on a wearable device that can predict potential health anomalies in users. They want to use AI to analyze the data but are concerned about patient privacy. What could be a cloud-based solution for this?

  • Federated Learning
  • Limiting data collection
  • Storing all data centrally
  • Using a public AI service
Federated Learning is a privacy-preserving technique where AI models are trained across multiple decentralized devices (wearables, in this case) without moving raw data to a central location. It ensures patient privacy while using AI for analysis.

In a scenario where there's a tight deadline to exit a data center, which migration approach might be prioritized, even if it doesn't yield immediate cloud optimization benefits?

  • Rearchitect (rebuild)
  • Refactor (re-architect)
  • Rehost (lift and shift)
  • Repurchase (buy a new one)
When facing a tight deadline to exit a data center, 'Rehost' (lift and shift) might be prioritized, even if it doesn't yield immediate cloud optimization benefits, as it's the quickest and least disruptive approach.

A key advantage of SaaS is the elimination of the need for individual ________ and maintenance.

  • Data Centers
  • Installation
  • Licensing
  • Servers
SaaS eliminates the need for individual servers and maintenance. Users don't have to worry about the physical infrastructure, as it's managed by the SaaS provider.

The ________ is a platform provided by AWS specifically tailored for IoT devices.

  • AWS EC2
  • AWS IoT Core
  • AWS Lambda
  • AWS S3
AWS IoT Core is a managed cloud service designed to connect IoT devices to the cloud, making it suitable for IoT applications. It provides features for device communication, security, and data management.

When considering cold starts in Google Cloud Functions, which runtime generally has the fastest initialization time?

  • Go
  • Java
  • Node.js
  • Python
In Google Cloud Functions, Go generally has the fastest cold start initialization time due to its efficient runtime. This is important for minimizing latency.

The ________ is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

  • FERPA
  • HIPAA
  • PCI DSS
  • SOX
PCI DSS (Payment Card Industry Data Security Standard) is a comprehensive set of security standards designed to protect credit card information and ensure that companies maintain a secure environment when handling such data.

The primary role of the back end in a cloud computing environment is to:

  • Handle user authentication
  • Host user interfaces
  • Manage server hardware
  • Manage servers
The back end in cloud computing is responsible for managing servers, handling data, and executing the core functionalities of the application. It's the "invisible" part.