AZ-900 1.3: Cloud Service Types Flashcards
What is a common issue with the “as a service” branding of cloud products?
a) It clearly defines responsibilities between the customer and vendor.
b) It is always consistent across different vendors.
c) It can be confusing due to marketing hype, making it hard to understand the different cloud service categories.
d) It simplifies the understanding of cloud services.
c) It can be confusing due to marketing hype, making it hard to understand the different cloud service categories.
1.3.1
What are the three core cloud service types discussed?
a) Identity as a Service, Desktop as a Service, Disaster Recovery as a Service
b) IaaS, PaaS, SaaS
c) Hardware as a Service, Software as a Service, Platform as a Service
d) Cloud, On-Premise, Hybrid
b) IaaS, PaaS, SaaS
1.3.1
Which cloud service type provides the greatest amount of control and customization?
a) SaaS
b) PaaS
c) IaaS
d) All of them provide the same level of control.
c) IaaS
1.3.1
Which of the following best describes Infrastructure as a Service (IaaS)?
a) Ready-to-use applications for end-users.
b) Prepackaged solutions for application deployment.
c) Basic computing infrastructure, such as virtual machines.
d) Fully managed software applications.
c) Basic computing infrastructure, such as virtual machines.
1.3.1
What is the primary focus of Software as a Service (SaaS)?
a) Providing maximum customization and control over the infrastructure.
b) Offering prepackaged solutions for application development.
c) The end-user experience.
d) Providing hardware.
c) The end-user experience.
1.3.1
Which cloud service type has the least amount of management overhead required by the customer?
a) IaaS
b) PaaS
c) SaaS
d) All require the same amount of management.
c) SaaS
1.3.1
Which service type involves the cloud vendor managing operating systems and software licensing?
a) IaaS
b) PaaS
c) SaaS
d) All service types include this.
b) PaaS
1.3.1
What is the main factor determining which cloud service type a customer should choose?
a) The cloud vendor.
b) The shared responsibility model.
c) The customer’s need for responsibility and flexibility.
d) The price of the services.
c) The customer’s need for responsibility and flexibility.
1.3.1
How is the pricing model generally structured for SaaS?
a) Pay for what you allocate.
b) Pay for what you use.
c) Pay for what you subscribe to.
d) Pay for each function.
c) Pay for what you subscribe to.
1.3.1
What does IaaS typically provide in terms of computing infrastructure?
a) Pre-built applications.
b) Virtual machines.
c) Development tools.
d) Business analytics.
b) Virtual machines.
1.3.1
What is the core concept of Infrastructure as a Service (IaaS)?
a) Managed applications
b) Managed IT infrastructure
c) Software development platform
d) Data storage solutions
b) Managed IT infrastructure
1.3.2
What is the fundamental building block of IaaS?
a) Containers
b) Virtual Machines (VMs)
c) Physical servers
d) Network switches
b) Virtual Machines (VMs)
1.3.2
What is a virtual machine (VM)?
a) A physical computer
b) A virtual version of a physical computer
c) A software application
d) A network device
b) A virtual version of a physical computer
1.3.2
What is a hypervisor?
a) A virtual machine
b) A physical server that hosts multiple virtual machines
c) A network firewall
d) An operating system
b) A physical server that hosts multiple virtual machines
1.3.2
Which of the following is a common hypervisor software?
a) Microsoft Word
b) Hyper-V
c) Adobe Photoshop
d) Google Chrome
b) Hyper-V
1.3.2
In the IaaS model, who manages the physical data center, network and servers?
a) The customer
b) The cloud vendor
c) A third-party contractor
d) No one
b) The cloud vendor
1.3.2
What is a customer primarily responsible for in IaaS?
a) Physical server maintenance
b) Data center security
c) Managing the VM operating system and software
d) Network cabling
c) Managing the VM operating system and software
1.3.2
What is a key characteristic of VMs hosted on the same hypervisor?
a) They share the same operating system
b) They are interconnected and communicate with each other
c) They are completely isolated from each other
d) They are all managed by the same customer
c) They are completely isolated from each other
1.3.2
What is a primary benefit of using VMs?
a) Physical access to the computer
b) Limited software compatibility
c) Ability to run any software that a physical computer can run
d) Slower performance
c) Ability to run any software that a physical computer can run
1.3.2
Which cloud service type offers the most customization and control?
a) Software as a Service (SaaS)
b) Platform as a Service (PaaS)
c) Infrastructure as a Service (IaaS)
d) Function as a Service (FaaS)
c) Infrastructure as a Service (IaaS)
1.3.2
What is the key characteristic of Platform as a Service (PaaS)?
a) Full control over infrastructure
b) Managed development and deployment services
c) Direct access to physical servers
d) Software as a fully functioning application
b) Managed development and deployment services
1.3.3
What does the term “managed” or “fully managed” indicate when discussing PaaS?
a) The customer is responsible for all aspects of the service.
b) The cloud vendor manages many of the underlying aspects of the service
c) There is no management involved.
d) The services are for end-users and not developers.
b) The cloud vendor manages many of the underlying aspects of the service
1.3.3
Which of the following is NOT a typical example of PaaS cloud services?
a) Managed databases
b) Software development tools
c) Virtual machines
d) Web app deployment services
c) Virtual machines
1.3.3
In the shared responsibility model for PaaS, who typically manages the operating system?
a) The customer
b) The cloud vendor
c) Both the customer and the cloud vendor equally
d) It varies based on cloud provider.
b) The cloud vendor
1.3.3
What is a key advantage of using PaaS over Infrastructure as a Service (IaaS)?
a) More control over the underlying infrastructure
b) Less management overhead
c) Greater flexibility in customization
d) Lower cost for services
b) Less management overhead
1.3.3
What is a characteristic of serverless computing?
a) It requires some management of resources.
b) All resource management is abstracted away from the customer
c) It is always more expensive than PaaS.
d) The customer needs to install runtime environments.
b) All resource management is abstracted away from the customer
1.3.3
What is a major tradeoff of using PaaS compared to IaaS?
a) Higher management overhead
b) Less control and flexibility
c) More compatibility issues
d) More expensive than IaaS
b) Less control and flexibility
1.3.3
Which of these is considered an “extreme” version of PaaS?
a) Managed databases
b) Serverless computing
c) Software development tools
d) Web app deployment services
b) Serverless computing
1.3.3
Which of the following is NOT something a cloud vendor manages in PaaS?
a) The underlying operating system
b) Software Licenses
c) Specific application code
d) Database Software
c) Specific application code
1.3.3
What is the main focus when using PaaS?
a) Managing the underlying infrastructure
b) Managing virtual machines
c) Developing applications and solutions
d) Setting up databases
c) Developing applications and solutions
1.3.3
What is the core definition of Software as a Service (SaaS)?
a) A type of hardware infrastructure.
b) A cloud-based application.
c) A set of development tools.
d) A network control system.
b) A cloud-based application.
1.3.4
In the shared responsibility model for SaaS, who manages the physical aspects of the application?
a) The customer.
b) The cloud vendor.
c) A third-party provider.
d) The end user.
b) The cloud vendor.
1.3.4
Which of the following is NOT a customer responsibility when using SaaS?
a) Managing user accounts and identities.
b) Ensuring devices accessing the SaaS have up-to-date security.
c) Hosting the application itself.
d) Protecting the data within the SaaS application.
c) Hosting the application itself.
1.3.4
SaaS applications are typically hosted on what type of cloud service?
a) Directly on physical servers.
b) On customer-managed networks.
c) Infrastructure and Platform as a Service (IaaS and PaaS).
d) On peer-to-peer networks.
c) Infrastructure and Platform as a Service (IaaS and PaaS).
1.3.4
What is a typical pricing model for SaaS products?
a) One-time purchase.
b) Subscription-based.
c) Pay-per-use.
d) Free to use.
b) Subscription-based.
1.3.4
Which of the following is an example of a SaaS product?
a) A physical server.
b) A development operating system.
c) Microsoft 365.
d) A network router.
c) Microsoft 365.
1.3.4
What is a key benefit of using SaaS in terms of management overhead?
a) High management overhead for the customer.
b) Low management overhead for the customer.
c) Shared management overhead.
d) No management overhead at all.
b) Low management overhead for the customer.
1.3.4
Compared to IaaS and PaaS, where does SaaS fall on the spectrum of flexibility and management overhead?
a) Highest flexibility and highest management overhead.
b) Lowest flexibility and lowest management overhead.
c) Lowest flexibility and highest management overhead.
d) Highest flexibility and lowest management overhead.
b) Lowest flexibility and lowest management overhead.
1.3.4
What is a limitation of the SaaS subscription model?
a) It’s difficult to scale.
b) It requires constant software updates.
c) You don’t own the software.
d) It’s difficult to use.
c) You don’t own the software.
1.3.4
Which aspect of SaaS is “ready to go right out of the box”?
a) Configuration
b) Complete Software Solution
c) Licensing
d) User accounts
b) Complete Software Solution
1.3.4
What is the primary objective of defense in depth?
a) To make systems more complex
b) To protect information and data from unauthorized access
c) To increase network traffic
d) To confuse attackers
b) To protect information and data from unauthorized access
1.3.5
Defense in depth employs a multi-layered approach to security. Why is this beneficial?
a) It makes the system faster
b) It is cheaper than single-layer security
c) It provides multiple obstacles to an attacker and ensures that even if one layer is breached, others can still stop an attack
d) It is easier to manage than single-layer security
c) It provides multiple obstacles to an attacker and ensures that even if one layer is breached, others can still stop an attack
1.3.5
In the context of the medieval castle analogy, what does the king represent?
a) The castle walls
b) The attackers
c) The data being protected
d) The physical security layer
c) The data being protected
1.3.5
Which of the following is considered the first line of defense in the seven layers of defense in depth?
a) Identity and access
b) Perimeter
c) Physical security
d) Data
c) Physical security
1.3.5
Which of these layers is focused on securing the identities or the users on the network?
a) Physical security
b) Identity and access
c) Perimeter
d) Network
b) Identity and access
1.3.5
What is the primary function of the perimeter layer of defense?
a) Securing virtual machines
b) Managing user identities
c) Protecting from network-based attacks from the public internet
d) Controlling access to data
c) Protecting from network-based attacks from the public internet
1.3.5
The network layer is focused on:
a) Securing individual virtual machines
b) Limiting network connectivity within the network and across resources
c) Protecting against DDoS attacks
d) Managing the physical assets
b) Limiting network connectivity within the network and across resources
1.3.5
What does the compute layer primarily focus on?
a) Securing network connectivity
b) Securing virtual machines, including keeping operating systems and software up to date
c) Protecting access to data
d) Securing user identities
b) Securing virtual machines, including keeping operating systems and software up to date
1.3.5
What is the focus of the application layer?
a) Securing the physical hardware
b) Protecting the network perimeter
c) Managing user identities
d) Resolving vulnerabilities within the applications themselves
d) Resolving vulnerabilities within the applications themselves
1.3.5
Which layer is considered the last and most important layer?
a) Perimeter
b) Network
c) Compute
d) Data
d) Data
1.3.5
Which cloud service type is best described as managed infrastructure, often synonymous with virtual machines?
a) Software as a Service (SaaS)
b) Platform as a Service (PaaS)
c) Infrastructure as a Service (IaaS)
d) Serverless
c) Infrastructure as a Service (IaaS)
1.3.6
What is a key characteristic of Infrastructure as a Service (IaaS)?
a) It is a fully managed cloud solution.
b) It provides the most amount of control and flexibility.
c) It is ready-to-go cloud based software.
d) It requires no management of virtual machines.
b) It provides the most amount of control and flexibility.
1.3.6
What does managing virtual machines involve in an IaaS model?
a) Only software updates.
b) Only managing access.
c) Managing the operating system, software updates, and access.
d) Nothing; the cloud vendor manages everything.
c) Managing the operating system, software updates, and access.
1.3.6
Which cloud service type is defined as a fully managed cloud solution, where the vendor handles the underlying infrastructure?
a) Software as a Service (SaaS)
b) Platform as a Service (PaaS)
c) Infrastructure as a Service (IaaS)
d) Serverless
b) Platform as a Service (PaaS)
1.3.6
What does the cloud vendor manage in a PaaS model?
a) Only the software.
b) The underlying infrastructure, including virtual machines and operating system updates.
c) Only the network components.
d) None of the above.
b) The underlying infrastructure, including virtual machines and operating system updates.
1.3.6
What is a key benefit of using Platform as a Service (PaaS)?
a) Maximum control over the infrastructure.
b) No management responsibilities at all.
c) Ability to focus on developing solutions and applications.
d) Direct physical access to virtual machines.
c) Ability to focus on developing solutions and applications.
1.3.6
Which of the following is considered an extreme version of PaaS, where there is no resource or infrastructure management?
a) Infrastructure as a Service (IaaS)
b) Software as a Service (SaaS)
c) Serverless
d) Managed Databases
c) Serverless
1.3.6
Which cloud service type is described as ready-to-go cloud-based software?
a) Software as a Service (SaaS)
b) Platform as a Service (PaaS)
c) Infrastructure as a Service (IaaS)
d) Serverless
a) Software as a Service (SaaS)
1.3.6
What is the typical pricing model for Software as a Service (SaaS) applications?
a) Pay-per-use.
b) One-time purchase.
c) Subscription model (monthly or yearly).
d) Based on resource consumption.
c) Subscription model (monthly or yearly).
1.3.6
In the context of “defense in depth,” who is always responsible for handling the physical security of a cloud environment?
a) The customer.
b) The cloud vendor.
c) Both the customer and vendor equally.
d) It depends on the cloud service being used.
b) The cloud vendor.
1.3.6