Which of the following refers to an incident where unauthorized individuals gain access to confidential data?

  • Data Backup
  • Data Breach
  • Data Compression
  • Data Encryption
A 'Data Breach' is an incident in which unauthorized individuals gain access to confidential data, often with malicious intent. It's a critical security concern.

In cloud computing, the characteristic that allows for pooling of computing resources to serve multiple consumers using a multi-tenant model is called ________.

  • Elasticity
  • Multi-Tenancy
  • Scalability
  • Virtualization
Multi-Tenancy is the characteristic that enables multiple consumers to share computing resources in a cloud environment. It enhances resource utilization and cost-effectiveness.

Refactoring/Re-architecting during cloud migration often involves:

  • Code modifications and restructuring
  • Migrating without any alterations
  • No changes to the code, just a change in the environment
  • Rewriting the entire codebase
Refactoring/re-architecting typically involves making code modifications and restructuring to align the application with cloud requirements, improving its performance and scalability.

The ability of a single hypervisor to manage multiple virtual machines simultaneously is due to:

  • Cloud-based architecture
  • Network segmentation
  • Resource virtualization
  • VM cloning and snapshot capabilities
Resource virtualization is the fundamental capability that enables a hypervisor to manage multiple virtual machines concurrently. It abstracts and allocates physical resources efficiently.

Which virtualization method involves creating virtual versions of network resources, such as virtual switches or routers?

  • Network Virtualization
  • Desktop Virtualization
  • Server Virtualization
  • Containerization
The correct option is 'Network Virtualization.' Network virtualization involves creating virtual versions of network resources, such as switches, routers, and firewalls. These virtual network components can be managed and configured independently, allowing for flexible and isolated networking in a virtualized environment. Desktop virtualization is about virtualizing desktop environments, server virtualization focuses on virtualizing server hardware, and containerization deals with application-level virtualization.

Organizations that want to maintain sensitive data on their on-premises infrastructure while utilizing public cloud for non-sensitive operations often opt for a ________ model.

  • Hybrid Cloud
  • Multi-Cloud
  • Private Cloud
  • Public Cloud
In a Hybrid Cloud model, organizations can balance their need for security (private) with the flexibility of the public cloud. Sensitive data remains on-premises, while less sensitive operations can utilize the public cloud.

A software development team needs to test their application on multiple operating systems without investing in multiple physical machines. How can virtualization assist in this scenario?

  • Virtualization allows for OS isolation
  • Virtualization enables VM snapshots
  • Virtualization provides enhanced security
  • Virtualization reduces power consumption
Virtualization assists by allowing developers to create snapshots of VMs, making it easy to test applications on multiple OSs without the need for physical hardware. This enhances testing efficiency.

A company is developing a stock trading platform where real-time data and quick response times are crucial. They need a middleware solution that can handle high-speed messaging and ensure data integrity. Which middleware type would be most appropriate?

  • Message Queues
  • Publish-Subscribe
  • Remote Procedure Calls
  • WebSockets
In this context, WebSockets would be most appropriate for real-time, high-speed messaging in stock trading due to their low overhead and bidirectional communication.

Which security measure is essential in preventing account hijacking in cloud environments?

  • Encryption
  • Intrusion Detection
  • Multi-Factor Authentication (MFA)
  • Network Segmentation
Multi-Factor Authentication (MFA) is a crucial security measure that requires users to provide multiple forms of verification, significantly reducing the risk of account hijacking. It enhances security beyond passwords.

AWS stands for:

  • Advanced Web Server
  • All Web Solutions
  • Amazon Web Services
  • Automated Web Service
AWS stands for Amazon Web Services. It offers a wide range of cloud computing services and is a leader in the industry.