1. Which of the following characteristics is improved by designing and building applications in cloud environments?
    1. Scalability
    2. Security Cost Efficiency Availability Productivity
    3. Control
    4. Availability
  2. IaC means:
    1. Infrastructure as Code
  3. When choosing cloud services, the price plan can be:
    1. Dynamic
    2. Fixed
    3. Tiered
    4. Transaction-based
  4. Which are the main cloud deployment models?
    1. Private
    2. Public
    3. Community
    4. Hybrid
  5. The 12 Factor App is a(n):
    1. Methodology for building scalable and maintainable software
    2. Authentication application
    3. Framework for building microservices
  6. Which of the following components are not managed by the cloud provider in an Infrastructure as a Service model?
    1. Operating system
    2. Application
    3. Data
    4. Storage - yes
    5. Network - yes
  7. Infrastructure as a Service is best used for:
    1. first migration stages (lift and shift)
    2. when ultra-high performance is a must
    3. when you don't want to be in control (when you want to be in control)
    4. when you need vendor lock-in (when you don’t need vendor lock-in)
  8. The host is:
    1. the machine on which the VMs will be running.
  9. The guest is:
    1. the virtualized machine
  10. The role of the hypervisor is to:
    1. translate and limit instructions
    2. create and manage guest machines
    3. manage users
    4. encrypt disk
  11. Virtual CPUs (vCPUs) might be:
    1. timeshares of real CPU core
    2. first thread of each core
    3. logical core
    4. physical core
  12. VMs configuration:
    1. General purpose
    2. CPU heavy
    3. Memory heavy
    4. GPU
  13. VMs remote access:
    1. SSH
    2. RDP
    3. bastion hosts
  14. VMs monitoring
    1. CPU Usage
    2. Disk Usage
    3. Network Traffic (inbound/outbound)
    4. Memory
  15. Monitoring of the virtual host VMs is useful to ensure:
    1. knowing when to scale (up/down, in/out)
    2. if the provider respects contracts (SLA)
    3. knowing the size of the database
    4. knowing your current price to pay
  16. Packet mirroring in a cloud network can be useful for:
    1. security analysis
    2. anomaly detection
    3. bug testing
    4. boosting traffic performance
  17. Cloud network security can be enforced by:
    1. firewalls
    2. network access control lists
    3. domain name server
    4. gateways
  18. Which of the following are protocols used by the internet?
    1. OSPF
    2. BGP
    3. IP
    4. RIP
  19. Virtual Private Cloud (VPC):
    1. logical (isolated) network slice where we can deploy resources
    2. components: Network interfaces, Route tables, Gateways: Internet, carrier, egress-only Internet, NAT, DNS
  20. Peering:
    1. allows traffic between different networks