Which virtualization method involves creating virtual versions of network resources, such as virtual switches or routers?

  • Network Virtualization
  • Desktop Virtualization
  • Server Virtualization
  • Containerization
The correct option is 'Network Virtualization.' Network virtualization involves creating virtual versions of network resources, such as switches, routers, and firewalls. These virtual network components can be managed and configured independently, allowing for flexible and isolated networking in a virtualized environment. Desktop virtualization is about virtualizing desktop environments, server virtualization focuses on virtualizing server hardware, and containerization deals with application-level virtualization.

Organizations that want to maintain sensitive data on their on-premises infrastructure while utilizing public cloud for non-sensitive operations often opt for a ________ model.

  • Hybrid Cloud
  • Multi-Cloud
  • Private Cloud
  • Public Cloud
In a Hybrid Cloud model, organizations can balance their need for security (private) with the flexibility of the public cloud. Sensitive data remains on-premises, while less sensitive operations can utilize the public cloud.

When discussing cloud security, the process of ensuring that only authorized entities can access specific resources is known as:

  • Access Control
  • Authentication
  • Authorization
  • Secure Data Transfer
Access Control in cloud security ensures that only authorized entities have access to resources, thereby enhancing security.

In the context of GDPR, a ________ is the entity that determines the purposes, conditions, and means of the processing of personal data.

  • Data Controller
  • Data Inspector
  • Data Processor
  • Data Subject
In the context of GDPR (General Data Protection Regulation), a Data Controller is the entity responsible for determining how and why personal data is processed. They have control over the purposes, conditions, and means of processing.

What is the primary role of a hypervisor in virtualization?

  • Allocating memory for VMs
  • Managing hardware resources for virtual machines
  • Providing a user-friendly interface for VM management
  • Securing data within virtual machines
The primary role of a hypervisor in virtualization is to manage and allocate hardware resources, such as CPU, memory, and storage, among virtual machines to ensure efficient and isolated operation.

AWS Redshift is designed to analyze data using SQL and is optimized for ________.

  • Data Warehousing
  • Graph Databases
  • NoSQL Databases
  • Real-time Data Processing
AWS Redshift is designed for data warehousing, making it optimized for SQL-based analytics, allowing complex querying and reporting.

Process is a type of virtualization that allows multiple instances of an application to run concurrently on a single OS, without interfering with each other.

  • Application
  • Network
  • Server
  • Storage
Process virtualization allows multiple instances of an application to run without conflicts on a single operating system. This is often used in server environments.

Which of the following is a security method that translates data into a code to prevent unauthorized access?

  • Compression
  • Duplication
  • Encryption
  • Fragmentation
Encryption is a security method that translates data into a code to prevent unauthorized access. It makes the data unreadable without the correct decryption key, enhancing data security.

Which of the following tools is commonly used for CI/CD in the cloud?

  • AWS CodePipeline
  • Docker
  • GitLab CI/CD
  • Jenkins
GitLab CI/CD is a popular choice for CI/CD in the cloud, providing a platform for continuous integration and continuous deployment with built-in features for DevOps processes.

________ clouds are best suited for sectors like government, healthcare, or banking, where several entities have similar cloud needs but want to remain distinct from the public cloud.

  • Community Cloud
  • Hybrid Cloud
  • Multi-Cloud
  • Private Cloud
Community Clouds are designed for a specific community of organizations with shared interests, like regulatory requirements in government or healthcare. It offers a balance between public and private cloud features.