1. D. A SaaS provider offers software for use and
maintains all aspects of it. You may be allowed to
customize parts of the software configuration, but
typically you are not allowed to change anything
regarding how the software functions.
2. B. IoT is heavily reliant on sensors detecting and
responding to events in real time. The edge
computing model allows for centralized control of
IoT sensors and real-time response because
computing capabilities are closer to the sensor.
3. A, C. Containers differ from virtual machines in
that they are lighter (fewer resources used in
storage), and they can start as fast as an
application (500 ms), whereas a virtual machine
requires the guest operating system to boot so
takes more time to start.
4. A. Serverless deployment is great for applications
that process data periodically but not designed
for continuous use.
5. D. The second way of DevOps is the feedback
loop for continuous improvement.
6. C. Continuous integration refers to the merging
of development work with a shared code base to
facilitate automatic testing and software building.
7. D. Docker natively uses the union file system for
container construction.
8. C. To launch an nginx container on port 80, you
run the command docker container run -p
80:80 -d nginx.
CHAPTER 14
1. B. A vulnerability is a weakness or gap in
protection efforts. It can be exploited by threats
to gain unauthorized access to an asset.
2. B, D. A man-in-the-middle attack allows devices
to receive traffic as it flows in the network; a