Insider threats are particularly challenging to defend against because:
- Insiders are less likely to cause harm
- Insiders are less motivated to attack
- Insiders can be easily detected
- Insiders have better knowledge of the system
Insider threats are challenging to defend against because insiders have intimate knowledge of the system, making it harder to detect and prevent their activities. They may know weaknesses that external hackers wouldn't.
A tech company has a monolithic application that suffers from long deployment times and scalability issues. They want to transition to a more modular and scalable architecture. What architectural style would you recommend?
- Event-Driven
- Microservices
- Monolithic
- Service-Oriented
The recommendation is to transition to Microservices, which breaks down the monolith into smaller, more manageable, and scalable components.
Cloud monitoring tools often provide ________ capabilities, which allow for the setting of specific conditions that, when met, trigger notifications or actions.
- Alerting
- Debugging
- Indexing
- Profiling
Cloud monitoring tools offer alerting capabilities. These allow administrators to set specific conditions, like high CPU usage or downtime, triggering notifications or actions for proactive management.
Which of the following is a primary benefit of virtualization?
- Cost Savings
- Faster Processing
- Improved Security
- Reduced Complexity
A primary benefit of virtualization is cost savings. It reduces hardware costs, energy consumption, and maintenance expenses by consolidating multiple VMs on a single physical machine.
Google Cloud Functions are stateless, meaning they do not ________ state between invocations.
- Preserve
- Reset
- Retain
- Share
Google Cloud Functions are stateless, which means they don't retain state between invocations. Each invocation starts with a clean slate.
If a company is interested in using a managed NoSQL database service, which AWS service would be the best fit?
- Amazon DynamoDB
- Amazon RDS
- Amazon Redshift
- Amazon S3
Amazon DynamoDB is a managed NoSQL database service that is designed for scalability and high availability, making it a suitable choice for NoSQL data storage.
The ________ migration strategy is also known as the "rehosting" approach.
- Re-architecting
- Re-engineering
- Re-hosting
- Re-platforming
The "rehosting" strategy, often referred to as the "lift-and-shift" approach, involves moving applications to the cloud without major modifications.
Middleware that provides a set of services to authenticate, authorize, and account users is known as ________.
- Communication Middleware
- Identity Middleware
- Security Middleware
- Transaction Middleware
Identity Middleware is responsible for authenticating users, authorizing their access, and accounting for their activities. It ensures secure user management.
Which of the following is a primary benefit of using SaaS?
- Complex software development
- Cost-effectiveness and scalability.
- High hardware maintenance cost
- Latency in accessing software.
A primary benefit of SaaS is cost-effectiveness and scalability. Users avoid high upfront costs and can easily scale their usage as needed.
Account hijacking can lead to which of the following unauthorized actions?
- Enhanced User Experience
- Improved Application Performance
- Increased Cloud Storage
- Unauthorized Data Access
Account hijacking can lead to unauthorized access to data, which can result in data breaches and loss of sensitive information.