________ is a strategy where applications are moved to the cloud in their existing form, with the intention of making modifications at a later stage.

  • Re-architecting
  • Re-factoring
  • Re-hosting
  • Re-platforming
In the "re-hosting" strategy, applications are migrated as-is to the cloud, with modifications planned for a later phase.

Which practice can potentially lead to account hijacking if not managed properly?

  • Regular system backups
  • Regular system updates
  • Strong encryption practices
  • Weak or reused passwords
Weak or reused passwords can potentially lead to account hijacking when not managed properly, as attackers can easily guess or obtain such passwords. Proper management is crucial for security.

Which of the following is NOT a major cloud service provider (CSP)?

  • Azure
  • IBM Cloud
  • Open Source Cloud
  • Oracle Cloud
IBM, Azure, and Oracle Cloud are major cloud service providers, but "Open Source Cloud" is not a CSP.

Docker is primarily used for:

  • Containerization
  • Hypervisor
  • Orchestration
  • Virtualization
Docker is primarily used for containerization, which is the process of packaging and running applications and their dependencies in isolated containers.

An organization is considering using a managed data warehouse solution in the cloud. They are evaluating AWS and Google Cloud. Which respective services from these providers should they compare?

  • Amazon Web Services (AWS) - Redshift
  • Google Cloud Platform (GCP) - BigQuery
  • IBM Cloud - Db2 Warehouse on Cloud
  • Microsoft Azure - Azure Synapse Analytics
They should compare AWS Redshift and Google BigQuery. AWS Redshift is a managed data warehousing service by AWS, while Google BigQuery is a similar offering by Google Cloud.

Which Google Cloud service is designed to execute your code in response to events without requiring server management?

  • Google App Engine
  • Google Cloud Functions
  • Google Compute Engine
  • Google Kubernetes Engine
Google Cloud Functions is designed to execute your code in response to events without needing to manage servers. It's an event-driven serverless compute service.

CRM systems can be especially beneficial for what type of business function?

  • Employee Payroll
  • Inventory Tracking
  • Managing Customer Interactions
  • Supply Chain Management
CRM systems are particularly beneficial for managing customer interactions. They help businesses improve customer service, sales, and marketing by centralizing customer data and providing tools for better engagement, making them a valuable asset in building strong customer relationships.

Storage virtualization involves:

  • Abstracting physical storage
  • Emulating hardware
  • Enhancing software performance
  • Running multiple OSes
Storage virtualization abstracts physical storage devices to create a logical pool, simplifying management and improving utilization.

A company is looking to securely store sensitive data in the cloud. They want to ensure that even if someone gains access to the data, it would be unreadable. Which technology would you recommend they implement?

  • Access Control Lists (ACL)
  • Digital Signatures
  • Encryption
  • Intrusion Detection System (IDS)
Encryption is the best technology to ensure data security in the cloud. It renders data unreadable to unauthorized users even if they gain access to it.

________ is a cloud computing service where the cloud vendor provides the hardware and software tools needed for application development to users over the internet.

  • Database as a Service (DBaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
Platform as a Service (PaaS) offers users the hardware, software, and tools needed for application development. It simplifies the development process by providing a platform for building, testing, and deploying applications without the complexity of managing infrastructure.