“Enterprises should mandate that security investments, services, and projects in
the cloud are executed to achieve established business goals” is a key objective of
_____________
a) Strategic Alignment
b) Value Delivery
c) Risk Mitigation
d) Sustained Performance

1 Answer

Answer :

Strategic Alignment

Related questions

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : The management model that facilitates effective and efficient security management and operations in the cloud environment so that an enterprise’s business targets are achieved is a) Cloud security b) Trust model c) Security model d) Cloud security governance

Last Answer : Cloud security governance

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Which vendor recently launched a cloud-based test and development service for enterprises? A. HP B. Cisco C. IBM D. Oracle

Last Answer : IBM

Description : Which vendor recently launched a cloud-based test and development service for enterprises? A. HP B. Cisco C. IBM D. Oracle

Last Answer : IBM

Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned

Last Answer : low touch

Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned

Last Answer : low touch

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : What is the first step in developing a risk management plan? Select one: a. Analyze the risks. b. Estimate the likelihood of the risks occurring. c. Identify potential project risks. d. Develop a risk mitigation plan. e. Estimate the potential impact of risk on the project goals.

Last Answer : c. Identify potential project risks.

Description : Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons? a) CloudWatch b) CloudSensor c) CloudMetrics CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : CloudSensor

Description : _______ is used for electronic dealing and reporting of transactions in government securities A. Delivery versus Payment (DvP) B. Negotiated Dealing System (NDS) C. Risk Mitigation D. All of the Above E. None of the Above

Last Answer : B. Negotiated Dealing System (NDS) Explanation: The Negotiated Dealing System (NDS) for electronic dealing and reporting of transactions in government securities was introduced in February ... , bids or applications for primary issuance of Government Securities when auctions are conducted.

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : . ____________ refers to distributed computing, in which a group of computers from multiple locations are connected with each other to achieve a common objective. A. Virtualization B. SOA C. Grid Computing D. Utility Computing Ans : C

Last Answer : . Grid Computing

Description : Which of the following does not belong to type of competency area in cloud business analytics? A. Business intelligence and performance management. B. Analytics and optimization. C. Content management system . D. Information Hierarchy.

Last Answer : Information Hierarchy.

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry d) all of the mentioned

Last Answer : all of the mentioned

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : How many types is Cloud delivery models categorized? A. 2. B. 7. C. 3. D. 4.

Last Answer : 3.

Description : A cloud provider offers an environment for building applications that will run from the customer's environment. Which cloud computing delivery model are they using? A. Platform as a Service B. Software as a Service C. Development as a Service D. Infrastructure as a Service

Last Answer : Platform as a Service

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : Which delivery model is an example of a cloud computing environment that provides users with a web based email service? A. Software as a Service B. Platform as a Service C. Computing as a Service D. Infrastructure as a Service

Last Answer : Software as a Service

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry

Last Answer : all of the mentioned

Description : A ____ of activities that are used to achieve the project’s goals or objectives is known as  the project life cycle.

Last Answer : Ans. Rational order

Description : Which type of PaaS includes on-demand scaling and application security? A. Stand-alone development environments B. Application delivery-only environments C. Open platform as a service D. Add-on development facilities

Last Answer : Application delivery-only environments

Description : People in the marketing department are having difficulty estimating the level of effort needed to achieve advertising goals. This problem is characteristic of the __________ approach to advertising appropriation. A) ... B)match -competition C)arbitrary D)objective -and -task E)percent -of-sales

Last Answer : D)objective -and -task

Description : Rackspace Cloud Service is an example of _____________ a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : For whom Cloud Infrastructure performance is the primary concern a) Software Vendors b) IT Administrator c) Cloud Providers d) Cloud Users

Last Answer : Cloud Providers

Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned

Last Answer : OpEx

Description : The following flowchart is intended to evaluate __________ in any cloud. a) risk b) errors c) inconsistencies d) none of the mentioned

Last Answer : risk

Description : Which of the following is an edge-storage or content-delivery system that caches data in different physical locations? a) Amazon Relational Database Service b) Amazon SimpleDB c) Amazon Cloudfront d) Amazon Associates Web Services

Last Answer : Amazon Cloudfront

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following is the standard for interoperable cloud-based key management? a) KMIP b) PMIK c) AIMK d) None of the mentioned

Last Answer : KMIP

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users