Which practice can potentially lead to account hijacking if not managed properly?

  • Regular system backups
  • Regular system updates
  • Strong encryption practices
  • Weak or reused passwords
Weak or reused passwords can potentially lead to account hijacking when not managed properly, as attackers can easily guess or obtain such passwords. Proper management is crucial for security.

Which of the following is NOT a major cloud service provider (CSP)?

  • Azure
  • IBM Cloud
  • Open Source Cloud
  • Oracle Cloud
IBM, Azure, and Oracle Cloud are major cloud service providers, but "Open Source Cloud" is not a CSP.

Docker is primarily used for:

  • Containerization
  • Hypervisor
  • Orchestration
  • Virtualization
Docker is primarily used for containerization, which is the process of packaging and running applications and their dependencies in isolated containers.

An organization is considering using a managed data warehouse solution in the cloud. They are evaluating AWS and Google Cloud. Which respective services from these providers should they compare?

  • Amazon Web Services (AWS) - Redshift
  • Google Cloud Platform (GCP) - BigQuery
  • IBM Cloud - Db2 Warehouse on Cloud
  • Microsoft Azure - Azure Synapse Analytics
They should compare AWS Redshift and Google BigQuery. AWS Redshift is a managed data warehousing service by AWS, while Google BigQuery is a similar offering by Google Cloud.

Which Google Cloud service is designed to execute your code in response to events without requiring server management?

  • Google App Engine
  • Google Cloud Functions
  • Google Compute Engine
  • Google Kubernetes Engine
Google Cloud Functions is designed to execute your code in response to events without needing to manage servers. It's an event-driven serverless compute service.

CRM systems can be especially beneficial for what type of business function?

  • Employee Payroll
  • Inventory Tracking
  • Managing Customer Interactions
  • Supply Chain Management
CRM systems are particularly beneficial for managing customer interactions. They help businesses improve customer service, sales, and marketing by centralizing customer data and providing tools for better engagement, making them a valuable asset in building strong customer relationships.

Storage virtualization involves:

  • Abstracting physical storage
  • Emulating hardware
  • Enhancing software performance
  • Running multiple OSes
Storage virtualization abstracts physical storage devices to create a logical pool, simplifying management and improving utilization.

The process where an ML model is initially trained on a large dataset and then fine-tuned for a specific task using a smaller dataset is called ________.

  • Deep Learning
  • Reinforcement Learning
  • Supervised Learning
  • Transfer Learning
Transfer learning involves taking an ML model pretrained on a large dataset and fine-tuning it for a specific task with a smaller dataset. It's a common technique in machine learning.

Azure Functions uses a file named ________ to define the function bindings and triggers.

  • azure.json
  • function.json
  • host.json
  • settings.json
Azure Functions utilize a file named "function.json" to specify the function bindings and triggers, allowing developers to configure how the function operates.

The process of automatically deploying application changes to a production environment, ensuring zero downtime, is referred to as ________.

  • Blue-Green Deployment
  • Canary Deployment
  • Continuous Delivery
  • Continuous Integration
Blue-Green Deployment is a deployment strategy that involves having two identical production environments (blue and green) and switching between them to deploy application changes with zero downtime.