Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above
Last Answer : The OpenID and CardSpace specifications support the authentication type of data object
Description : Which of the following was one of the weaker aspects of early cloud computing service offerings? a) Logging b) Integrity checking c) Consistency checking d) None of the mentioned
Last Answer : Logging
Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned
Last Answer : All of the mentioned
Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration
Last Answer : Live VM Migration
Description : A good cloud computing network can be adjusted to provide bandwidth on demand. A. True B. False
Last Answer : True
Description : What facet of cloud computing helps to guard against downtime and determines costs? A. Service-level agreements B. Application programming interfaces C. Virtual private networks D. Bandwidth fees
Last Answer : Service-level agreements
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.
Last Answer : Illegal access to private data stored by applications in the cloud.
Description : The goal of corporate governance and business ethics education is to: A. Teach students their professional accountability and to uphold their personal B. Integrity to society. C. Change ... standards by which corporate professionals must operate. E. Increase the workload for accounting students
Last Answer : C. Change the way in which ethics is taught to students.
Description : The goal of corporate governance and business ethics education is to: A. Teach students their professional accountability and to uphold their personal Integrity to society. B. Change ... standards by which corporate professionals must operate. D. Increase the workload for accounting students.
Last Answer : C. Create more ethics standards by which corporate professionals must operate.
Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned
Last Answer : Security
Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance
Last Answer : Cloud Security Alliance
Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working. B. Cloud Security Alliance. C. Cloud Security WatchDog. D. Security in the Cloud Alliance.
Last Answer : Cloud Security Alliance.
Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct
Last Answer : 1,2,3 are correct
Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance
Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.
Last Answer : Access to critical data is better controlled in a private cloud environment
Description : __________ is an in-built back end component of cloud computing. A. Service B. Application C. Storage D. Security
Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability
Last Answer : Work Without Internet
Description : Which of the following is true about cloud computing? A. Cloud computing is platform dependent B. Cloud Computing makes our business applications mobile and collaborative. C. Cloud Computing provides us means of accessing the applications as utilities over computer only. D. All of the above
Last Answer : Cloud Computing makes our business applications mobile and collaborative.
Description : .Which technology allows use of read/write web, blogs & interactive web application etc. ? a) Mobile Computing b) Grid Computing c) Cloud Computing d) Web 2.0
Last Answer : Web 2.0
Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing
Last Answer : Mobile computing
Description : Which of the following is true about cloud computing? a) Cloud computing is platform dependent b) Cloud Computing makes our business applications mobile and collaborative c) Cloud Computing provides us means of accessing the applications as utilities over computer only d) All of the above
Last Answer : Cloud Computing makes our business applications mobile and collaborative
Description : Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained? a) Atomicity b) Consistency c) Isolation d) Durability
Last Answer : Consistency
Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned
Last Answer : C. Elastic application
Description : Very large sustainable reading and writing bandwidth, mostly continuous accessing instead of random accessing. The programming interface is similar to that of the POSIX file system accessing interface. This is ... : Google File System c) HDFS: Hadoop Distributes File System d) None of the above
Last Answer : GFS: Google File System
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance
Last Answer : Platform
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned
Last Answer : Identity protection
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Which of the following is the most complete cloud computing service model? a) PaaS b) IaaS c) CaaS d) SaaS
Last Answer : SaaS
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : client
Description : Which of the following is the highest degree of integration in cloud computing? a) CaaS b) AaaS c) PaaS d) SaaS
Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned
Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : cloud
Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned
Last Answer : None of the mentioned
Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned
Last Answer : platform
Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned
Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems
Description : Which of the following is one of the properties that differentiates cloud computing? a) scalability b) virtualization c) composability d) all of the mentioned
Last Answer : composability
Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned
Last Answer : operating