Which of the following is not a type of
cloud?
a) Private
b) Public
c) Protected
d) Hybrid

1 Answer

Answer :

Protected

Related questions

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : Which of the following is owned by an organization selling cloud services? a) Public b) Private c) Community d) Hybrid

Last Answer : Public

Description : A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit. a) Public b) Private c) Community d) Hybrid

Last Answer : Hybrid

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : The __________ allows systems and services to be accessible within an organization. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud

Last Answer : A. Private cloud

Description : The ____________ allows systems and services to be accessible by a group of organizations. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud

Last Answer : C. Community cloud

Description : Which of the following cloud does not require mapping? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Public

Description : A company is using Google Cloud Service for hosting its data / application. This use by the company of Google cloud can be classified as. a) Public Cloud b) Private Cloud c) Hybrid Cloud d) Community Cloud

Last Answer : Public Cloud

Description : The ____________ allows systems and services to be accessible by a group of organizations. a) Private cloud b) Public cloud c) Community cloud d) Hybrid cloud

Last Answer : Community cloud

Description : Cloud computing networks are designed to support only private or hybrid clouds. A. True B. False

Last Answer : False

Description : Cloud computing networks are designed to support only private or hybrid clouds. A. True B. False

Last Answer : False

Description : Which of the following model type is not trusted in terms of security? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Private/Community

Description : Which of the following service model is owned in terms of infrastructure by both vendor and customer? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Hybrid

Description : Which of the following is the deployment model? a) public b) private c) hybrid d) all of the mentioned

Last Answer : all of the mentioned

Description : __________ cloud is one where the cloud has been organized to serve a common function or purpose. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Community

Description : The ________ cloud infrastructure is operated for the exclusive use of an organization. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Private

Description : Point out the wrong statement. a) Public cloud may be managed by the constituent organization(s) or by a third party b) A community cloud may be managed by the constituent organization(s) or by a third party c) Private clouds may be either on- or off-premises d) None of the

Last Answer : Public cloud may be managed by the constituent organization(s) or by a third party

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : Which of the following component is required for both online and local data access in hybrid application? a) local b) cloud c) both local and cloud d) none of the mentioned

Last Answer : both local and cloud

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : What facet of cloud computing helps to guard against downtime and determines costs? A. Service-level agreements B. Application programming interfaces C. Virtual private networks D. Bandwidth fees

Last Answer : Service-level agreements

Description : What is private cloud? A. A standard cloud service offered via the Internet B. A cloud architecture maintained within an enterprise data center. C. A cloud service inaccessible to anyone but the cultural elite

Last Answer : A cloud architecture maintained within an enterprise data center.

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing

Last Answer : Cloud Computing

Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing

Last Answer : Cloud Computing

Description : Which of the following is not a characteristic of Private Cloud? a) Secured b) Central Controlc) Scalable d) Weak Service Level Agreements (SLAs)

Last Answer : Scalable

Description : What’s the most popular use case for public cloud computing today? A. Test and development B. Website hosting C. Disaster recovery D. Business analytics

Last Answer : Test and development

Description : What’s the most popular use case for public cloud computing today? A. Test and development B. Website hosting C. Disaster recovery D. Business analytics

Last Answer : Test and development

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online

Description : Which is an example of a public Cloud? a) Google App Engine b) Amazon EC2 c) IBM Smart Cloud d) All of these

Last Answer : All of these

Description : Difference between Public, Private, Default and Protected ?

Last Answer : Ans. Private - Not accessible outside object scope. Public - Accessible from anywhere. Default - Accessible from anywhere within same package. Protected - Accessible from object and the sub class objects.

Description : Describe PRIVATE, PROTECTED and PUBLIC – the differences and give examples.

Last Answer : class Point2D{ int x; int y; public int color; protected bool pinned; public Point2D() : x(0) , y(0) {} //default (no argument) constructor }; Point2D MyPoint; You cannot directly ... .pinned = true; // Compiler will issue a compile ERROR bool isPinned = MyPoint.pinned; // no problem

Description : What is public, protected, private?

Last Answer : Public, protected and private are three access specifier in C++. Public data members and member functions are accessible outside the class. Protected data members and member functions are only available to derived classes. Private data members and ... *b) { int t; t = *a; *a = *b; *b = t; }

Description : In Java, when we implement an interface method, it must be declared as: (A) Private (B) Protected (C) Public (D) Friend

Last Answer : (C) Public

Description : When the inheritance is private, the private methods in base class are.................. in the derived class (in C++). (A) inaccessible (B) accessible (C) protected (D) public

Last Answer : (A) inaccessible

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is the IaaS service provider? a) EC2 b) EC1 c) EC10 d) Hybrid

Last Answer : EC2

Description : Which of the following is application and infrastructure management software for hybrid multi-clouds? a) VMware Hyperic b) Webmetrics c) Univa UD d) Tapinsystems

Last Answer : Univa UD

Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentione

Last Answer : all of the mentione

Description : Which of the following is the IaaS service provider? a) EC2 b) EC1 c) EC10 d) Hybrid

Last Answer : EC2

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and