
Q61
Q61 A virtual machine in your cloud environment is experiencing slow performance. What could be a likely cause?
Insufficient CPU allocation
Network failure
Disk corruption
Over-provisioned RAM
Q62
Q62 A containerized application in a virtualized environment is not able to access the host network. What could be the issue?
Misconfigured network bridge
Container not started
Disk space issue
Insufficient permissions
Q63
Q63 A company using virtual machines is experiencing resource contention between the VMs. What could be the solution?
Add more physical servers
Use better storage
Optimize VM resource allocation
Install security patches
Q64
Q64 Which of the following is an example of object storage in the cloud?
Google Cloud Storage
Amazon RDS
Microsoft Azure Blob Storage
Amazon S3
Q65
Q65 What is the main advantage of using cloud storage over traditional on-premise storage?
Higher security
Faster access
Scalability
More control
Q66
Q66 Which type of cloud storage is best suited for storing frequently accessed data?
Cold storage
Archival storage
Object storage
Block storage
Q67
Q67 Which of the following cloud storage services is primarily designed for structured data?
Amazon S3
Google Cloud Storage
Amazon DynamoDB
Azure Blob Storage
Q68
Q68 What is a common use case for block storage in cloud computing?
Large data archives
Databases and boot volumes
Backup of infrequent data
Image hosting
Q69
Q69 Which cloud storage technology allows for high availability and automatic replication across multiple regions?
Object storage
File storage
Block storage
Distributed storage
Q70
Q70 Which command is used in AWS CLI to upload a file to an S3 bucket?
aws s3 upload
aws s3 cp
aws s3 put
aws s3 send
Q71
Q71 In Google Cloud Storage, which command is used to list objects in a bucket?
gsutil ls
gsutil list
gcloud storage list
gcloud storage ls
Q72
Q72 How would you create a new storage bucket in AWS using the CLI?
aws s3 create-bucket
aws s3 mb bucket
aws s3 cp bucket
aws s3 make-bucket
Q73
Q73 What is the correct command to copy a file from an Azure Blob Storage container to your local machine using the Azure CLI?
az storage blob download
az storage cp
az storage blob get
az storage blob copy
Q74
Q74 A user is unable to access a file stored in Amazon S3. What could be the likely cause?
Incorrect bucket permissions
File is corrupt
The bucket is deleted
Invalid file format
Q75
Q75 A company is experiencing slow retrieval times when accessing data stored in cold cloud storage. What could be the issue?
Bandwidth issues
Cold storage retrieval latency
Overloaded cloud servers
Low disk space
Q76
Q76 A cloud storage solution is reporting out-of-space errors even though it should have auto-scaling. What could be the problem?
Quota limits on storage
Network issues
Permission issues
Data corruption
Q77
Q77 What is the most common security risk in cloud computing?
Data breaches
Natural disasters
Increased latency
Hardware failures
Q78
Q78 Which of the following is a security feature commonly provided by cloud service providers?
Automated scaling
Firewall protection
Network acceleration
Reduced storage costs
Q79
Q79 What is a key role of encryption in cloud security?
Increase storage
Enhance user experience
Protect data at rest and in transit
Reduce latency
Q80
Q80 Which of the following is a shared responsibility between the cloud provider and the customer?
Securing physical infrastructure
Data encryption
Firewall configuration
Network hardware maintenance
Q81
Q81 In cloud environments, what is the purpose of identity and access management (IAM)?
Controlling user access to resources
Reducing latency
Managing storage
Controlling physical security
Q82
Q82 Which of the following cloud security models ensures that data is protected while being processed?
Encryption at rest
Data masking
Homomorphic encryption
Symmetric encryption
Q83
Q83 Which AWS service can be used to enable encryption for data stored in Amazon S3?
AWS Shield
AWS CloudTrail
AWS KMS
AWS EC2
Q84
Q84 Which command would you use in AWS CLI to enable server-side encryption on an S3 bucket?
aws s3 enable-encryption
aws s3api put-bucket-encryption
aws s3api set-encryption
aws s3 secure-bucket
Q85
Q85 What command would you use to retrieve the IAM policy for an AWS user using the AWS CLI?
aws iam get-user-policy
aws iam describe-policy
aws iam list-users
aws iam get-user
Q86
Q86 A cloud user is unable to access resources they previously had access to. What is the likely issue?
Incorrect IAM policy
Network failure
Hardware malfunction
Server downtime
Q87
Q87 A company notices unusual login activities in their cloud environment. What is the most immediate security action to take?
Disable all user accounts
Reset all passwords
Enable multi-factor authentication
Shut down all services
Q88
Q88 A company is facing a data breach in their cloud infrastructure. What is the first step in mitigating the breach?
Shut down the entire cloud system
Notify customers
Isolate the affected system
Update software patches
Q89
Q89 What is the primary purpose of Identity and Access Management (IAM) in cloud computing?
Manage cloud costs
Control access to resources
Increase network speed
Enhance data storage
Q90
Q90 Which of the following is a core feature of IAM?
Network management
Encryption
User authentication
Data storage


