The characteristic of cloud computing that ensures that a user can control and manage the computing resources, even if they don't control the underlying infrastructure, is called:

  • Resource Pooling
  • Resource Virtualization
  • Scalability as a Service
  • Virtual Machine Management
The essential characteristic referred to here is "Resource Pooling." It allows users to control and manage computing resources, abstracting the underlying infrastructure. Resources are pooled together for better utilization and management.

Unlike traditional databases, data lakes can store structured, semi-structured, and ________ data.

  • Encrypted
  • Indexed
  • Relational
  • Unstructured
Data lakes are known for their ability to store a variety of data types, including "unstructured" data, such as text documents, making them versatile for data storage.

What does "Account Hijacking" in cloud computing refer to?

  • Excessive use of cloud resources
  • Gaining physical access to cloud servers
  • Inadequate network security in the cloud
  • Unauthorized access to a user's cloud account by an attacker
Account hijacking refers to unauthorized access to a user's cloud account by an attacker who gains access to sensitive information or controls the account.

Which of the following best describes cloud computing?

  • A model for accessing computing resources over the internet
  • A physical location for data storage
  • A service for virtual reality gaming
  • A technology for weather forecasting
Cloud computing is a model that enables the on-demand access to computing resources like servers, storage, and databases over the internet. It's not about weather forecasting or VR gaming.

Under the GDPR, what rights does an individual have concerning automated decision-making and profiling?

  • The right to access results
  • The right to data portability
  • The right to opt-out
  • The right to refuse consent
Under GDPR, individuals have the right to opt-out of automated decision-making and profiling that significantly affects them.

One of the primary reasons for data breaches in an organization is due to ________.

  • External Hackers
  • Inadequate Encryption
  • Insider Threats
  • Lack of Firewalls
Insider threats are a significant cause of data breaches, as employees or insiders have access to sensitive data and may misuse it intentionally or unintentionally.

An e-commerce platform is experiencing challenges in managing user sessions across its distributed infrastructure. They are considering a middleware solution to manage and maintain user session data uniformly. What kind of middleware should they look into?

  • Distributed Cache
  • Message Queues
  • Publish-Subscribe
  • Remote Procedure Calls
A Distributed Cache can efficiently manage and maintain user session data across a distributed infrastructure, ensuring uniform access and reliability.

For a company that wants to unify its supply chain, financials, and HR processes into one system, which software would be the most suitable?

  • Customer Relationship Management (CRM)
  • Enterprise Resource Planning (ERP)
  • Human Resource Management System (HRMS)
  • Supply Chain Management (SCM)
Enterprise Resource Planning (ERP) is designed to integrate various business processes and functions into a single system, making it suitable for unifying supply chain, financials, and HR processes.

In the context of cloud computing, middleware that facilitates seamless scalability and manages application deployments across multiple servers is known as:

  • Container Orchestration
  • Content Delivery Network
  • Load Balancing Middleware
  • Orchestration Middleware
Container Orchestration middleware, such as Kubernetes, is crucial for managing the deployment and scalability of applications across multiple servers in cloud computing. It automates tasks like scaling, load balancing, and failover.

Azure Blob Storage is primarily used for storing ________.

  • Code
  • Containers
  • Data
  • Virtualization
Azure Blob Storage is mainly used for storing unstructured data, such as files and media content, within containers (like buckets in AWS S3).