.Which of the following feature make cloud-based storage systems highly
reliable?
a) Redundant networks
b) Redundant name servers
c) Replication
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Unmanaged storage is reliable b) Managed storage is relatively cheap to use c) Most of the user-based applications that work with cloud storage are of unmanaged type d) None of the mentioned

Last Answer : Managed storage is relatively cheap to use

Description : Point out the correct statement. a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user b) Cloud computing vendors run very reliable ... barrier to entry cannot be accompanied by a low barrier to provisioning d) All of the mentioned

Last Answer : Cloud computing vendors run very reliable networks

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : The reliability of a system with n redundant components and a reliability of r is ____________ a) 1-(1-r)n b) 1-(1+r)n c) 1+(1-r)n d) All of the mentioned

Last Answer : 1-(1-r)n

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Cloud computing is a _______ system and it is necessarily unidirectional in nature. a) stateless b) stateful c) reliable d) all of the mentioned

Last Answer : stateless

Description : Cloud computing is a _______ system and it is necessarily unidirectional in nature. a) stateless b) stateful c) reliable d) all of the mentioned

Last Answer : stateless

Description : Balancing the workload by transferring the under performing servers is a feature of ___________. A. High availability. B. Operational automation. C. Dynamic resource. D. Live Migration

Last Answer : Live Migration

Description : What is the name of Rackspace’s cloud service? A. Cloud On-Demand B. Cloud Servers C. EC2

Last Answer : Cloud Servers

Description : What is the name of Rackspace’s cloud service? A. Cloud On-DemandB. Cloud Servers C. EC2

Last Answer : Cloud Servers

Description : What is the name of the Rackspace cloud service? A. Cloud On-Demand. B. Cloud Servers. C. EC2. D. SimpleDB.

Last Answer : Cloud Servers.

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : _______ allows servers and storage devices to increasingly share and utilize applications by easy migration from one server to another a) Grid Computing b) Artificial Intelligence c) Virtualization d) Web 3.0

Last Answer : Virtualization

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned

Last Answer : compute

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : An application that needed _______ storage alone might not benefit from a cloud deployment at all. a) online b) offline c) virtual d) all of the mentioned

Last Answer : offline

Description : How many categories of storage devices broadly exist in cloud? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is the simplest unmanaged cloud storage device? a) file transfer utility b) antivirus utility c) online image utility d) none of the mentioned

Last Answer : none of the mentioned

Description : Which of the following is the form of unmanaged cloud storage? a) XDrive b) OmniDrive c) iDrive d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud storage may be broadly categorized into four major classes of storage b) In unmanaged storage, the storage service provider makes storage capacity available ... , the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : In unmanaged storage, the storage service provider makes storage capacity available to users

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : An application that needed _______ storage alone might not benefit from a cloud deployment at all. a) online b) offlinec) virtual d) all of the mentioned

Last Answer : offline

Description : Point out the correct statement. a) Cloud storage may be broadly categorized into four major classes of storage b) In unmanaged storage, the storage service provider makes storage capacity ... storage, the storage service provider makes storage capacity available to usersd) All of the mentioned

Last Answer : In unmanaged storage, the storage service provider makes storage capacity available to users

Description : Which of the following cloud storage is mainly meant for developers and to support applications built using Web services? a) Managed b) Unmanaged c) Disk d) All of the mentioned

Last Answer : Managed

Description : How many categories of storage devices broadly exist in cloud? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a ________ as a Service model. a) Software b) Platform c) Analytics d) None of the mentioned

Last Answer : Software

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and