Coursera week 1 Quiz
TOTAL POINTS 10
1.In the US National Institute of Standards and Technology (NIST) definition of “cloud computing”, what does the statement “shared pool of configurable computing resources” include?
Data security, associated with loss or unavailability of data causing business disruption
Five essential characteristics, three deployment models, three service models
Networks, servers, storage, applications, and services
Leverage cloud services over the open internet on hardware owned by the cloud provider
2.What tasks do hypervisors accomplish? Select two.
Separates VMs logically and assigns each a share of the underlying computing power, memory, and storage.
Scale on demand to support fluctuating workloads.
Enable multiple operating systems to run alongside each other, sharing the same physical computing resources.
Facilitate access to mainframes for multiple users to access the same data storage layer.
3.What are some of the cloud benefits that make it lower-risk for enterprises to adopt cloud? Select two.
Diversity of standardization in how the constantly evolving technologies integrate and interoperate.
The speed with which applications can be up and running on the cloud versus months on traditional platforms, means enterprises can experiment, fail fast, learn, and course correct without setting them back significantly.
Data security associated with loss or unavailability of data causing business disruption
The pay-as-you-go model allows enterprises to experiment with technologies as opposed to making long-term decisions based on little or no trial.
4.Which of these are full-service cloud platforms?
A. IBM Cloud
B. Amazon Web Services
C. Google Cloud Platform
D. Microsoft Azure
A, B, and C only
A, B, C, and D
A and B only
5.An IBM Institute for Business Value study says that more than three-quarters of enterprises today are using cloud computing to expand into new industries. What additional benefits do organizations find when adopting the cloud:
Improve customer experience and create enhanced products and services
Continue making expensive decisions because it often worked in the past
Avoid having to fail at all
Lengthen product lifecycles to ensure higher quality offerings
6.What are some of the results companies like Bitly, American Airlines, UBank, and ActivTrades achieve with cloud adoption?
A. Better customer service
B. Remove barriers to innovation
C. Demand for enterprise scale
D. Accelerating growth
A, B, C, and D
A and B only
B and D only
C and D only
7.IoT, AI, Blockchain, and Analytics are emerging technologies enabled by the cloud. What are some of the attributes of cloud computing that enable these technologies? Select two.
Cloud offers on-demand computing
Computing resources can be accessed via internet connection
Cloud resources are offered in a single-tenant model
The power and scale of cloud resources
8.What is the three-way symbiotic relationship between IoT, AI, and Cloud?
IoT delivers the data, AI powers the insights, and both emerging technologies leverage cloud’s scalability and processing power
AI consumes the data produced by IoT devices
Making sense of the endless streams of data from IoT devices
Power, scale, dynamic nature, and economics of the cloud resources
9.What is the three-way relationship between blockchain, AI, and the Cloud?
Globally distributed, scalable, and cost-efficient computing resources.
Blockchain provides the trusted, decentralized source of truth, AI powers the analytics and decisions made from the collected data, and cloud provides the globally distributed, scalable, and cost-efficient computing resources to support both technologies.
Blockchain provides an immutable network allowing members to view only those transactions that are relevant to them.
Lends trust and transparency to AI by recording the data and variables that go into a decision made in an AI algorithm.
10.Which of these are essential characteristics of the Cloud? Select two.
TOTAL POINTS 10
1.Which of the following does NOT represent one of the three main Cloud Service Models referred to in the course?
2.Which one of the provided options is true for Infrastructure-as-a-Service?
Cloud provider manages the physical resources, operating systems, development tools, databases, and business analytics
Cloud provider configures the infrastructure which is managed and maintained by the user/customer organization
Cloud provider owns, manages, and maintains the physical resources
Cloud provider manages the physical resources, the platform resources, applications, and data
3.Which are some of the key components of cloud Infrastructure-as-a-Service? Select two.
IaaS providers manage the hypervisors and end-users provision the virtual instances
IaaS providers manage large data centers that contain the physical machines required to power the various layers of abstraction on top of them
IaaS providers deploy the middleware and install required applications on the virtual machines
IaaS providers manage the hypervisors and provision virtual instances
4.Which of the following are essential characteristics of Platform-as-a-Service? Select two.
In a PaaS model, the provider also takes responsibility for the application code and its maintenance
Organizations who opt for PaaS still need to configure supporting technologies such as load balancers and databases
PaaS clouds provide services and APIs that help developers deliver elastically scalable and highly available cloud applications
PaaS offerings support middleware capabilities that assists developers by reducing the amount of code that must be written to expand the application’s functional capabilities
5.Which one of the following is a key characteristic of Software-as-a-Service?
Security, compliance, and maintenance of the software are the responsibilities of the user
Single tenant architecture
SaaS services do not provide options for user customization
Ensure every user has access to the same, centrally located, infrastructure and application code
6.Which of these statements is a characteristic of Public Clouds?
A public cloud provides a dedicated pool of resources to each of its multiple users
A public cloud is a virtualized multi-tenant architecture
Resources are assigned as per estimated need decided at the time of subscribing for the service
The cloud provider provisions the resources and services as needed by individual users
7.Which of the following statements is NOT a correct statement about Private clouds?
Private Clouds can be implemented internally or externally
VPC is an example of a type of Private Cloud
Private clouds can only be deployed on-premise, in an organization’s own datacenter
Private Clouds are suitable for workloads that require maximum control and security
8.Which of these statements are true of Virtual Private Clouds (VPCs)? Select two.
VPCs are provisioned in a logically isolated part of a shared public cloud
VPC allows all users of the shared public cloud to access resources in the VPC on need basis; it also allows users of the VPC to access resources of the public cloud
The VPC infrastructure is owned, managed, and operated by the public cloud service provider
VPCs may be provisioned over a cloud service provider’s infrastructure, but the infrastructure is owned, managed, and operated by the enterprise
9.If an organization needs to run a highly sensitive and mission critical application with unpredictable performance and capacity requirements, which of the following models would best meet its requirements?
On-premise Data Centers
10.Which of the following statements about Hybrid Cloud is NOT correct?
Hybrid clouds can prevent lock-in to a single Cloud Provider
Hybrid Clouds allow organizations to leverage the additional public cloud capacity when a workload running on the private cloud has a spike in demand
Hybrid cloud is a computing environment that connects an organization’s on-premise private cloud and third-party public cloud into a single flexible infrastructure
Hybrid clouds are only suitable for workloads involving Infrastructure-as-a-Service
TOTAL POINTS 10
1.Each Cloud Region can have multiple Zones (also known as Availability Zones). What are Zones?
Standardized containers of computing resources
Geographic area or region where cloud provider’s infrastructure is clustered
Unique physical locations with one or more data centers
Single shared point of failure
2.Is it possible to run completely different operating systems on Virtual Machines (VMs) that are on a single host? If yes, what makes this possible?
Yes, Virtualization makes it possible— to have VMs, running different operating systems, on a single host.
Yes, Containerization makes it possible—to have VMs that are unique physical entities, so you can have completely different Operating Systems on them.
No, it is not possible—A single host can only work as one single virtual environment, and can, therefore, have only one environment.
No, it is not possible—VMs are software-based versions of a single host. They cannot have different environments from one another.
3.Which of the following are examples of single-tenant compute environments in the Cloud? Select two.
Bare Metal servers
Transient virtual servers
Reserved virtual server
4.Which of these scenarios is ideal for the use of bare metal servers, as opposed to virtual servers? Select two.
Workloads that require limited throughput and performance
Huge performance and strict security and compliance requirements
Low cost to use
CPU and I/O intensive workloads
5.What are some key differences between Containers and Virtual Machines? Select two.
Containers can use the same OS as the host, while a virtual machine needs its own copy of the OS, which can also be different from the host OS
Containers are more lightweight as compared to virtual machines
Containers are executable units of software while each virtual machine is a distinct physical entity
Even though each container uses the same OS as the host OS, it still needs to have its own copy of the OS, while a virtual machine leverages the resources of the host OS
6.There are four types of cloud storage available. Which storage type is ephemeral or non-persistent?
Direct Attached storage
7.What makes File storage an ideal solution for scenarios where shared storage is needed?
File storage can be mounted on multiple compute nodes at the same time
Its consistently high speed
File Storage is mounted to compute nodes via an ethernet network
Mounted from remote storage appliances
8.Which of these scenarios are best suited for Block Storage? Select two.
Low cost is a consideration
Workloads that need disk sharing between compute nodes
Applications that need consistent fast access to disk, such as databases
Workloads that need low-latency storage
9.Which of these are features of Object Storage? Select two.
You can directly use Object Storage without attaching it to a compute node
Object storage is effectively infinite
Object Storage can be mounted on multiple compute nodes via an ethernet network
Storage is attached to compute nodes using a fibre network
10.What is the main benefit of a Content Delivery Network (CDN)?
Speed, it makes your website faster by serving files from a location closer to the user.
Distribute tasks, workloads, and network traffic
Enhanced control over network traffic by routing traffic to specified resources
TOTAL POINTS 10
1.What are the key elements of a Hybrid Multicloud strategy? Select two.
Connects an organization’s on-premise private cloud and third-party public cloud into a single infrastructure
Allows you to leverage the best of cloud models and services across different cloud providers so that your applications and workloads work seamlessly across multiple clouds
For seamless working, it is recommended that if you’re subscribed to the infrastructure services of a cloud provider, you should subscribe to the application services provided by the same vendor.
Embraces a mix of cloud models and services as long as they are from the same cloud service provider
2.What are some of the benefits of using microservices architecture? Select two.
Each line of code for a microservice needs to be written from scratch
Application components can be developed and updated independently of each other
Components facing varied amounts of load can be scaled independently
Each microservice of an application needs to use the same stack and runtime environment
3.Serverless might not be the best fit for all applications or scenarios. Which of these attributes qualify an application for a serverless architecture?
Microservices that can be built as functions that are stateless
Workloads and applications that may be spread across multiple cloud environments and cloud vendors
Workloads characterized by long-running processes
4.What are the characteristics of a cloud native application?
Collection of microservices with tightly coupled UI, business logic layer, and data layer
Collection of microservices that need to be scaled and updated in relation to each other
Collection of microservices that are built as one huge piece of software
Collection of microservices working together as a whole to comprise an application
5.DevOps’ tools, practices, and processes are helping tackle some of the complexities and challenges posed by the cloud. Identify two ways in which DevOps is mitigating these challenges.
By fully automating the infrastructure installation process in a way that is documented, repeatable, verifiable, and traceable
DevOps best practices eliminate the need to provision servers, build middleware, and install application code
DevOps processes outline the development principles that need to be followed to modernize monolithic applications to cloud native applications
By creating an automated deployment pipeline
6.Cloud adoption is an integral part of application modernization. What are the other two important components of modernization?
VMs and Agile Methodology
Microservices and DevOps
Monolithic Architectures and Physical Servers
Service Oriented Architecture and Waterfall Methodology
7.One of the key characteristics of Hybrid Multicloud is portability. What does portability mean in the context of Hybrid Cloud?
Distributing a single application across multiple providers allowing you to move application components across cloud services and vendors as needed
The public and private cloud services can understand each other’s APIs, data formats, forms of authentication and authorization
The flexibility to move applications and data between systems and cloud service providers
A workload running on the private cloud can leverage the additional public cloud capacity when there is a spike in demand
8.What is an attribute that distinguishes serverless computing from other compute models?
The serverless model requires no provisioning of servers, installation of application stacks, or operation of the infrastructure by the users/developers
In the serverless computing environment, resources cannot be scaled up or down
Serverless computing does not require any underlying servers for executing workloads
End users pay for resources as long as they are running, even if idle
9.Which one of these statements is NOT true of a microservices architecture approach?
When one of the microservices of an application stops to function, it disrupts the functioning of the complete application
Microservices find one another using service discovery, which creates a roadmap for microservices to communicate
Microservices breakdown large applications into their core functions to create a fully functional application
Developers can leverage the vast amounts of code already available as the base of an application, eliminating the need to develop code from scratch
10.Which one of the following statements does NOT describe the DevOps approach and process?
A collaborative approach where business owners and development, operations, and quality assurance teams collaborate to deliver software continuously
Defines how people work together to build, deploy, and manage applications in a cloud native environment
Eliminates the need to provision servers, build middleware, and install application code
Uses automated tools to monitor the performance and availability of their applications
TOTAL POINTS 5
1.What are some best practices organizations need to follow in order to protect their cloud resources and systems? Select two.
Run security monitoring tools on a periodic basis to ensure security threats and breaches are flagged
Active monitoring for security and compliance
Distribute tasks, workloads, and network traffic
Adopt a shared responsibility model
2.Which of the following are key components of Identity and Access Management (IAM)? Select two.
Protecting data while it is at rest, in motion, and in use
Cloud Directory Services
Embedding security through the life cycle of an application
Audit and Compliance
3.Which of these statements are true of cloud encryption
A. Encryption ensures only authorized users have access to sensitive dat
B. When encrypted data is intercepted without authorization, it is unreadable and meaningles
C. Encryption protects data when it is at rest, in transit, and in use in memo
D. Encryption eliminates data security risk
A, B, and C only
A, B, and D only
A and C only
A, B, C, and D
4.Identify some of the standard cloud monitoring best practices from the provided options. Select two.
Encrypt data before it is sent to the cloud
Authenticate users attempting to access their cloud resources
Leverage end-user experience monitoring solutions to capture the performance of an application from the point of view of its end users
Track usage and cost of your cloud resources and services
5.Which job role requires the following skills?
· Collaboration with development and operations teams
· Containerization expertise
· Creating custom automation tools
· Building and maintaining configuration and deployment frameworks
· Monitoring security and measuring performance
Cloud Data Engineers
Cloud Integration Specialists
Cloud DevOps Engineer
Cloud Solutions Architects