In Kubernetes, which component is responsible for scheduling pods onto nodes?

  • Kube-Proxy
  • Kubelet
  • Kubernetes Controller Manager
  • Kubernetes Scheduler
The Kubernetes Scheduler is responsible for deciding which nodes to run new pods on based on resource requirements, node availability, and various policies.

Which tool is commonly used for monitoring applications and infrastructure in the AWS cloud environment?

  • AWS Lambda
  • AWS RDS
  • Amazon CloudWatch
  • Amazon S3
Amazon CloudWatch is a commonly used tool in AWS for monitoring various aspects of applications and infrastructure within the cloud environment.

A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:

  • Cross-Site Scripting (XSS) Vulnerability
  • Distributed Denial of Service
  • Insider Threat
  • Man-in-the-Middle (MitM) Attack
This scenario most likely represents an insider threat, where a trusted insider misuses their access privileges to harm the organization, in this case, by modifying data.

A company notices that their cloud bill has spiked significantly in the last month. They decide to use a tool to break down the costs and find anomalies. Which type of tool are they likely to use?

  • Cloud Cost Analysis Tool
  • Performance Monitoring
  • Security Vulnerability Scanner
  • Version Control System
A Cloud Cost Analysis Tool is designed to track and analyze cloud spending, helping organizations identify cost anomalies and optimize cloud expenses. It provides insights into how resources are being utilized and where cost-saving opportunities exist.

Comprehensive ________ is crucial in detecting anomalous patterns that might indicate insider threats.

  • Authentication
  • Backups
  • Encryption
  • Monitoring
Comprehensive "Monitoring" of user activities and network traffic is essential to identify unusual patterns, a key aspect in detecting insider threats.

In the context of AI in the cloud, what does a pre-trained model refer to?

  • A model that is trained on new data
  • A model that is trained on public data
  • A model that requires further training
  • A model that was trained by a user
A pre-trained model refers to a machine learning model that has already been trained on a large dataset and is available for use without further training. Typically, these models are trained on publicly available data.

Which type of cloud is made available to the general public by cloud service providers?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
A "Public Cloud" is a cloud infrastructure made available to the general public by service providers. It is shared by multiple organizations and is typically accessed over the internet. Public clouds offer scalability and cost-efficiency.

A media company wants to automate the process of video transcoding whenever a new video file is uploaded to their Amazon S3 bucket. Which AWS service would be most suitable for this scenario?

  • AWS Data Pipeline
  • AWS Elastic Transcoder
  • AWS Glue
  • AWS Lambda
AWS Elastic Transcoder is specifically designed for video transcoding tasks. It automatically transcodes videos when new files are uploaded to an S3 bucket, making it a suitable choice for the media company's automation needs.

In a cloud-based CI/CD pipeline, what role does a container registry like Docker Hub or Google Container Registry play?

  • Managing Cloud Resources
  • Running Tests
  • Storing Configuration
  • Storing Containers
Container registries like Docker Hub or Google Container Registry store Docker images, which are key for deploying containers in the CI/CD pipeline.

Which type of cloud provides more control over security and compliance for its users?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
A Private Cloud offers more control over security and compliance because it's dedicated to a single organization, allowing customization and stricter governance.