Which type of cloud is made available to the general public by cloud service providers?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
A "Public Cloud" is a cloud infrastructure made available to the general public by service providers. It is shared by multiple organizations and is typically accessed over the internet. Public clouds offer scalability and cost-efficiency.

A media company wants to automate the process of video transcoding whenever a new video file is uploaded to their Amazon S3 bucket. Which AWS service would be most suitable for this scenario?

  • AWS Data Pipeline
  • AWS Elastic Transcoder
  • AWS Glue
  • AWS Lambda
AWS Elastic Transcoder is specifically designed for video transcoding tasks. It automatically transcodes videos when new files are uploaded to an S3 bucket, making it a suitable choice for the media company's automation needs.

In a cloud-based CI/CD pipeline, what role does a container registry like Docker Hub or Google Container Registry play?

  • Managing Cloud Resources
  • Running Tests
  • Storing Configuration
  • Storing Containers
Container registries like Docker Hub or Google Container Registry store Docker images, which are key for deploying containers in the CI/CD pipeline.

Which type of cloud provides more control over security and compliance for its users?

  • Community Cloud
  • Hybrid Cloud
  • Private Cloud
  • Public Cloud
A Private Cloud offers more control over security and compliance because it's dedicated to a single organization, allowing customization and stricter governance.

In virtualization, the physical machine on which the hypervisor runs is commonly referred to as the ________.

  • Client
  • Host
  • Node
  • Server
The physical machine that hosts the hypervisor and virtual machines is referred to as the Host. This is where the virtualization environment is created and managed.

A data breach that occurs due to an employee's unintentional actions, like clicking on a phishing link, is often referred to as a ________ breach.

  • Accidental
  • Cybersecurity
  • Insider
  • Malicious
An "Accidental" breach typically involves inadvertent actions by authorized users, making them susceptible to threats like phishing.

In the context of SaaS, the ability to serve multiple customers using a single instance of a software application is referred to as ________.

  • Interoperability
  • Multi-Tenancy
  • Scalability
  • Virtualization
Multi-Tenancy is a key characteristic of SaaS where a single instance of the software serves multiple customers, each with their data and configurations.

Cloud users are advised to regularly change their ________ to prevent account hijacking.

  • Credit Card Information
  • Email Addresses
  • Passwords
  • Physical Addresses
Cloud users are advised to regularly change their "Passwords" to prevent account hijacking. Frequent password changes make it more difficult for unauthorized users to access accounts.

In distributed systems, middleware plays a crucial role in:

  • Communication and Integration
  • Data Presentation
  • End-User Interaction
  • Processing and Storage
Middleware serves as an intermediary layer facilitating communication and integration between various distributed system components. It ensures data can flow between them efficiently.

In Kubernetes, which object allows you to maintain a stable IP address for pods as they are rescheduled?

  • ConfigMap
  • PodDisruptionBudget
  • Secret
  • Service
A Kubernetes Service is used to maintain a stable IP address for pods. It acts as an abstraction layer over a set of pods, allowing access to them through a consistent DNS name or IP address. This ensures that clients can reach the pods, even if they are rescheduled.