The characteristic of cloud computing that ensures that a user can control and manage the computing resources, even if they don't control the underlying infrastructure, is called:

  • Resource Pooling
  • Resource Virtualization
  • Scalability as a Service
  • Virtual Machine Management
The essential characteristic referred to here is "Resource Pooling." It allows users to control and manage computing resources, abstracting the underlying infrastructure. Resources are pooled together for better utilization and management.

Unlike traditional databases, data lakes can store structured, semi-structured, and ________ data.

  • Encrypted
  • Indexed
  • Relational
  • Unstructured
Data lakes are known for their ability to store a variety of data types, including "unstructured" data, such as text documents, making them versatile for data storage.

What does "Account Hijacking" in cloud computing refer to?

  • Excessive use of cloud resources
  • Gaining physical access to cloud servers
  • Inadequate network security in the cloud
  • Unauthorized access to a user's cloud account by an attacker
Account hijacking refers to unauthorized access to a user's cloud account by an attacker who gains access to sensitive information or controls the account.

Which of the following best describes cloud computing?

  • A model for accessing computing resources over the internet
  • A physical location for data storage
  • A service for virtual reality gaming
  • A technology for weather forecasting
Cloud computing is a model that enables the on-demand access to computing resources like servers, storage, and databases over the internet. It's not about weather forecasting or VR gaming.

Which system helps companies manage interactions with their customers and potential customers?

  • CRM System
  • Human Resource System
  • Inventory Management System
  • Project Management System
A CRM (Customer Relationship Management) system is designed to help companies manage interactions and relationships with customers and potential customers.

The main component responsible for creating and managing virtual machines is called:

  • Compiler
  • Debugger
  • Hypervisor
  • Kernel
The main component for creating and managing virtual machines is a "Hypervisor." It's responsible for creating, starting, and managing VMs on the host hardware. The kernel, compiler, and debugger play different roles in computing.

For a company implementing a Service-Oriented Architecture (SOA), which middleware component is vital for managing and routing messages between services?

  • API Gateway
  • ESB (Enterprise Service Bus)
  • Message Broker
  • SOA Registry and Repository
An Enterprise Service Bus (ESB) plays a vital role in managing and routing messages between services in a Service-Oriented Architecture (SOA). It acts as an intermediary for communication, enabling various services to interact seamlessly.

Which virtualization type abstracts and isolates workloads from the physical host machine, allowing for portability, flexibility, and scalability?

  • Container Virtualization
  • Network Virtualization
  • Server Virtualization
  • Virtual Machine (VM) Virtualization
Virtual Machine (VM) Virtualization abstracts entire VMs from the host, enabling portability and flexibility as VMs can run on different hosts without modification.

Under the GDPR, what rights does an individual have concerning automated decision-making and profiling?

  • The right to access results
  • The right to data portability
  • The right to opt-out
  • The right to refuse consent
Under GDPR, individuals have the right to opt-out of automated decision-making and profiling that significantly affects them.

One of the primary reasons for data breaches in an organization is due to ________.

  • External Hackers
  • Inadequate Encryption
  • Insider Threats
  • Lack of Firewalls
Insider threats are a significant cause of data breaches, as employees or insiders have access to sensitive data and may misuse it intentionally or unintentionally.