Which technology enables devices to gather and exchange data over the internet, which can then be processed and analyzed in the cloud?

  • 5G
  • LoRa
  • MQTT
  • Wi-Fi
MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol that enables devices to gather and exchange data over the internet. This data can be transmitted to the cloud for processing and analysis. MQTT is commonly used in IoT applications.

Virtualization technology allows multiple ________ to run on a single physical machine.

  • Applications
  • Operating Systems
  • Processors
  • Virtual Machines
Virtualization technology enables multiple virtual machines (VMs) to run on a single physical machine, abstracting and isolating each VM from the host hardware. This enables efficient resource utilization and isolation.

In Kubernetes, what is the role of an "etcd"?

  • A container orchestration tool
  • A container runtime
  • A distributed file system for pod data
  • A network overlay solution
Etcd is a distributed key-value store used in Kubernetes to store all configuration data, which ensures high availability and consistency. It's crucial for maintaining a shared configuration and service discovery among all nodes in the cluster.

Which of the following is a form of virtualization that separates a physical machine into multiple virtual machines?

  • Hypervisor
  • Emulation
  • Containerization
  • Virtual Private Network (VPN)
The correct option is 'Hypervisor.' A hypervisor is a type of virtualization technology that allows a single physical machine to run multiple virtual machines. These virtual machines, or VMs, are isolated from each other and from the host system. The hypervisor controls and allocates hardware resources to these VMs, making it an efficient solution for server virtualization. Virtual Private Networks (VPNs) are not related to machine virtualization. Emulation often replicates a specific environment for compatibility, while containerization is a different virtualization method where applications share the same OS kernel.

A software company in the EU offers a service that uses machine learning to make automated decisions about user profiles. A user is unhappy about a decision made about him and requests an explanation. Under which regulation and provision should the company address this request?

  • CCPA, Section 1798.105
  • GDPR, Article 22
  • HIPAA, Section 164.524
  • ISO 27001, Clause 8.2.3
GDPR, Article 22, grants users the right to request an explanation for automated decisions that significantly affect them. This ensures transparency and accountability in cases where algorithms or AI systems are used for decision-making.

While the ________ strategy offers a faster migration, it may not immediately take full advantage of cloud-native capabilities.

  • Refactoring
  • Rehosting
  • Replatforming
  • Repurchasing
The blank should be filled with "Rehosting." Rehosting is a migration strategy where applications are moved to the cloud with minimal changes, offering a faster migration but not leveraging cloud-native capabilities.

Refactoring/Re-architecting during cloud migration often involves:

  • Code modifications and restructuring
  • Migrating without any alterations
  • No changes to the code, just a change in the environment
  • Rewriting the entire codebase
Refactoring/re-architecting typically involves making code modifications and restructuring to align the application with cloud requirements, improving its performance and scalability.

The ability of a single hypervisor to manage multiple virtual machines simultaneously is due to:

  • Cloud-based architecture
  • Network segmentation
  • Resource virtualization
  • VM cloning and snapshot capabilities
Resource virtualization is the fundamental capability that enables a hypervisor to manage multiple virtual machines concurrently. It abstracts and allocates physical resources efficiently.

Which virtualization method involves creating virtual versions of network resources, such as virtual switches or routers?

  • Network Virtualization
  • Desktop Virtualization
  • Server Virtualization
  • Containerization
The correct option is 'Network Virtualization.' Network virtualization involves creating virtual versions of network resources, such as switches, routers, and firewalls. These virtual network components can be managed and configured independently, allowing for flexible and isolated networking in a virtualized environment. Desktop virtualization is about virtualizing desktop environments, server virtualization focuses on virtualizing server hardware, and containerization deals with application-level virtualization.

Organizations that want to maintain sensitive data on their on-premises infrastructure while utilizing public cloud for non-sensitive operations often opt for a ________ model.

  • Hybrid Cloud
  • Multi-Cloud
  • Private Cloud
  • Public Cloud
In a Hybrid Cloud model, organizations can balance their need for security (private) with the flexibility of the public cloud. Sensitive data remains on-premises, while less sensitive operations can utilize the public cloud.