0% found this document useful (0 votes)
42 views10 pages

DTDM 1

The document consists of multiple-choice questions related to cloud computing concepts, including definitions, benefits, service models, and security practices. It covers topics such as hypervisors, cloud service providers, cloud architecture, and the relationship between DevOps and cloud. The questions aim to assess knowledge on various aspects of cloud technology and its applications.

Uploaded by

namchuoi2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views10 pages

DTDM 1

The document consists of multiple-choice questions related to cloud computing concepts, including definitions, benefits, service models, and security practices. It covers topics such as hypervisors, cloud service providers, cloud architecture, and the relationship between DevOps and cloud. The questions aim to assess knowledge on various aspects of cloud technology and its applications.

Uploaded by

namchuoi2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

According to the US National Institute of Standards and Technology (NIST) definition of

“cloud computing,” what is the meaning of the statement “a shared pool of configurable
computing resources”?

A. Networks, servers, storage, applications, and services.


B. Five essential characteristics, three deployment, and three service models.
C. Leveraging cloud services over the open internet on hardware owned by the cloud
provider.
D. Data security associated with data loss or unavailability causing business disruption.

What tasks do hypervisors accomplish?

A. Enable multiple operating systems to run alongside each other and separate
VMs logically
B. Scale on demand to support fluctuating workloads
C. Facilitate access to mainframes for multiple users to access the same data storage
layer
D. Fluctuates workloads and facilitates access to mainframes

Which key considerations drive an organization's selection of cloud computing when


considering expenditure for o -the-shelf software and investments in upgrades?

A. Risk exposure
B. Software as a service and development platforms
C. Speed and productivity
D. Infrastructure and workloads

Which of the following statements describes a benefit of cloud computing?

A. Data security associated with loss or unavailability of data


B. Lack of standardization in how the constantly evolving technologies integrate
C. Business continuity
D. Hardware failures do not result in data loss because of backups maintained on
the network

Which service provider provides one of the largest cloud-based data management
platforms?

A. Salesforce
B. Alibaba Cloud
C. Oracle Cloud
D. Amazon Web Services
Which service provider uses its cloud platform internally for their end-user products, such
as Search and app engines that automatically allocate and de-allocate resources to handle
demand?

A. Google Cloud Platform (GCP)


B. Microsoft Azure
C. Oracle Cloud
D. SAP

According to the International Data Corporation (IDC), what is that crucial ability that will
make cloud computing essential for businesses to succeed, sustain, and compete in
today’s markets?

A. Multi-cloud infrastructures
B. Cognitively enabled workflows
C. Applied exponential technologies such as AI, Automation, IoT, and Blockchain
D. Data-driven decisions

Why did American Airlines require a new technology platform?

A. Establishment of a scalable hosting platform for low-latency delivery


B. Removal of barriers to innovation
C. Acceleration of growth
D. Requirement for better customer service

Select the answer that best describes how does Cloud Computing helps IoT devices?

A. Stores data on an encrypted physical drive


B. Draws insights from data collected from the IoT devices and users
C. Provides the resources to store and process the data produced by IoT devices
and users.
D. Provides a fixed physical location for the data collected from IoT devices

Which of the following denotes the relationship between Blockchain, AI, and cloud?

A. Blockchain provides the distributed computing resources, AI powers the analytics,


and the cloud records the data
B. Blockchain lends trust and transparency to AI by recording the data and variables
that go into a decision made in an AI algorithm, and the cloud provides an immutable
network
C. Blockchain provides an immutable network, AI provides distributed computing
resources and cloud powers decision-making
D. Blockchain provides a decentralized source of truth, AI powers analytics and
decision-making, and the cloud provides globally distributed computing
resources

In which cloud service model does the service provider manage the application data along
with the infrastructure and platform resources?

A. IaaS
B. SaaS
C. CaaS
D. PaaS

In which IaaS cloud environment can the customers deploy their middleware and install
applications?

A. Virtual Machines
B. AI
C. IoT
D. Blockchain

What is one of the concerns in cloud infrastructure configuration and management?

A. Business continuity and disaster recovery


B. Solving complex problems involving millions of variables and calculations
C. Dependency on a third party for workload availability and performance
D. Scaling infrastructure up and down as demand fluctuates

What is the responsibility of a user in the PaaS model?

A. Business process management systems


B. Application code and its maintenance
C. Database management systems
D. Workload management

Which capability in the PaaS model eliminates the need for the integration of disparate
components?

A. Rapid deployment mechanisms


B. APIs for services
C. Runtime environment
D. Business analytics services

Which is a characteristic of the SaaS model?


A. Applications reside on a remote cloud network
B. Services are free for the users on the SaaS cloud
C. Users can see only their own application
D. Infrastructure and code are maintained by the users

What is the users’ role in a public cloud?

A. Users maintain the platform that runs their application


B. Users don’t own the servers their applications run on
C. Users can manage the operations of the servers
D. Users own the storage their data consumes

What is a feature of a private cloud?

A. Uncontrolled access
B. Application portability
C. Use of external computing resources
D. Limited security

If an organization needs to run a highly sensitive and mission-critical application with


unpredictable performance and capacity requirements, which of the following models
would best meet its requirements?

A. Hybrid Cloud
B. Private Cloud
C. Public Cloud
D. On-premise Data Centers

What do you mean by “cloud bursting”?

A. You can spin-up environments using pay-as-you-go in the public cloud


B. You can leverage public cloud instances for a period of time but return to the
private cloud when the surge is met
C. You can move applications and data between on-premises and cloud systems
D. You can incrementally modernize your core business systems

Each Cloud Region can have multiple Availability Zones. What are Zones?

A. Single shared point of failure


B. Unique physical locations with one or more data centers
C. Geographic area or region where the cloud provider’s infrastructure is clustered
D. Standardized containers of computing resources

Which of the following is a benefit of virtualization?


A. Is secure
B. Cost savings
C. Increases your downtime
D. Runs a single operating system

Which of the following types of Virtual Machine (VM) guarantees resources for future
deployments?

A. Shared or Public Cloud VMs


B. Reserved virtual servers
C. Dedicated hosts
D. Transient or Spot VMs

Which of the following is a feature of bare metal servers?

A. Rapidly provisioned
B. High performance and secure
C. Low cost to use
D. Multiple tenants

Subnets are the main area where security is implemented in the cloud. Which of the
following is used to provide security at the virtual instance level in subnets?

A. Load Balancers
B. Security Groups or SGs
C. Public Gateways
D. Virtual Private Cloud or VPC

Which of the following is a benefit of isolation of applications in containers?

A. Preventing malicious code in one container from impacting other containers


B. Abstraction from the host operating system
C. Open-sourced runtime engine
D. Repackaged into containers or containerized microservices

Which of the following storage types are ephemeral or non-persistent?

A. Direct Attached storage


B. Block storage
C. Object storage
D. File storage

What makes File storage an ideal solution for scenarios where shared storage is required?
A. File storage can be mounted from remote storage appliances
B. File storage can be mounted on multiple compute nodes at the same time
C. File Storage is mounted to compute nodes via an ethernet network
D. Fast accessibility of file storage over the network

Which of the following scenarios is best suited for Block Storage?

A. Where workloads do not require fast connectivity to storage


B. Workloads that need disk sharing between compute nodes
C. Low cost is a consideration
D. Applications that need consistent fast access to the disk, such as databases

Which of the following is a feature of Object storage?

A. Object Storage can be mounted on multiple compute nodes via an ethernet network
B. You can directly use Object Storage without attaching it to a compute node
C. Used where fast read and write speeds are necessary
D. Storage is attached to compute nodes using a fiber network

Which of the following options describes a development principle, or action, for cloud native
applications?

A. Bring the various single-function components of an application into one huge piece
of software.
B. Combine applications to create microservices with multiple functions.
C. Containerize the microservices for maximum flexibility, scalability, and
portability.
D. Tightly coupling the di erent functions of the application so that they can work
together as a whole.

Which of the following statements describes the DevOps approach and process?

A. Eliminates the need to monitor performance and availability.


B. A collaborative approach where business owners and development, operations,
and quality assurance teams collaborate to deliver software continuously.
C. Eliminates the need to provision servers, build middleware, and install application
code.
D. Allows teams to freely build, deploy, and manage cloud native applications
according to an informal, loosely defined set of guidelines.

Which of the provided options encapsulates the complete application modernization


journey?
A. The journey from monolithic and service-oriented architecture to microservices
architecture.
B. The journey from the waterfall and agile development methodologies to DevOps.
C. The journey from physical servers and VMs to cloud infrastructure
D. The journey from monolithic and service-oriented architecture to microservices
architecture, from physical servers and VMs to cloud infrastructure, and from
the waterfall and agile methodology to DevOps.

How would a global flower delivery company leverage the Hybrid Multicloud architecture to
meet its requirement of varying capacity demands across di erent geographies?

A. By scaling up their on-premises architecture


B. By using the automatic provisioning and de-provisioning of resources that the cloud
o ers.
C. By distributing their delivery service application across multiple cloud
environments and providers spread across multiple geographies.

Which of the following statements describes the DevOps approach and process?

A. An approach that utilizes cloud applications to monitor systems.


B. Eliminates the need to monitor performance and availability.
C. DevOps process is a collaborative approach that defines how people build,
deploy, and manage applications in a cloud-native environment to deliver
software continuously.
D. Eliminates the need to provision servers, build middleware, and install application
code.

Which of these scenarios is NOT a good use case for serverless architecture?

A. Microservices that can be built as stateless functions


B. Supporting microservices architecture
C. Workloads characterized by long-running processes
D. Stream processing workloads

How can the microservices architecture approach be characterized ?

A. Impact on the entire application when one microservice ceases to function.


B. Requirement to build every new functionality in a microservice from the ground up.
C. Decomposition of large applications into core functions to construct a
comprehensive and functional application.
D. Compulsion to bundle all microservices for a specific task into a single container.
Fill in the blank. Microservices architecture is an approach in which a ______________
comprises many loosely coupled and independently deployable smaller components or
services.

A. Single application
B. Repository application
C. Server
D. Cloud service

What does a cloud native application consist of?

A. Executable containers
B. Executable files
C. Microservices
D. Application containers

DevOps and Cloud share a _________ relationship.

A. Customer
B. General partnership
C. Symbiotic
D. Vendor

Fill in the blank. _____________ is a key part of an enterprise’s digital transformation strategy.

A. Databases
B. Cloud computing
C. Local storage devices
D. Encryption

Which of the following are some best practices organizations must follow to protect their
cloud resources and systems?

A. Distribute tasks, workloads, and network tra ic


B. Adopt a shared responsibility model of active monitoring for security and
compliance
C. Run security monitoring tools periodically to ensure security threats and breaches
are flagged
D. Distribute tasks, workloads, and monitoring software

Which of the following are key Identity and Access Management (IAM) components?

A. Embedding security through the life cycle of an application


B. Protecting data while it is at rest, in motion, and in use
C. Cloud Directory Services, Audits, and Compliance
D. Encryption security practices

Which of these statements is true of cloud encryption?

A. Encryption ensures that only authorized users have access to sensitive data.

B. When encrypted data is intercepted without authorization, it is unreadable and


meaningless?

C. Encryption protects data when it is at rest, in transit, and in use in memo.

D. Encryption eliminates data security risks.

A. A, B, and D only
B. A, B, C, and D
C. A and C only
D. A, B, and C only

Identify some of the standard cloud monitoring best practices from the provided options.

A. Encrypt data on a physical storage device.


B. Encrypt data before it is sent to the cloud.
C. Authenticate users attempting to access their cloud resources.
D. Leverage end-user experience monitoring solutions to capture the performance
of an application from the point of view of its end users and track the usage and
cost of your cloud resources and services.

What are some of the monitoring tools that help you to gain insights about your posture,
compliance, and threats?

A. Flow logs from the network and security events


B. Data encryption
C. Flow logs and hypervisors
D. Hypervisors

What are some of the benefits of using access groups?

A. The use of access groups helps to reduce the number of policies in an account.
Access groups provide a more streamlined way to assign access rights.
B. Access groups create an additional level of authentication for application users.
C. Access groups help increase the number of policies of an account.
D. Access groups define the users, the resources to which access is granted, and the
permission level each user has on these resources.
Identify the two main parts of an encryption system from the provided options.

A. The encryption algorithm and decryption key


B. Server-side encryption
C. Client-side encryption
D. Physical encryption device

What are some of the benefits that cloud monitoring solutions o er?

A. Enhanced security to user accounts


B. Troubleshoot applications and infrastructure
C. Accelerate the diagnosis and resolution of performance incidents and provide
proactive notifications of abnormal or unusual situations.
D. Prevent unauthorized users from accessing the systems

The Weather Company migrated its weather web property to a secure, scalable, and global
architecture in the IBM Cloud. What benefits did they realize as a result of this migration?

A. Faster development and release of new apps and digital self-service tools to
customers
B. Harness local data centers to minimize latency for users and optimize their
systems for elasticity in handling extreme spikes in demand
C. Increase asset availability and overall equipment e ectiveness
D. Increase development and increased latency

You might also like