Which of the following services that need
to be negotiated in Service Level
Agreements?
a) Logging
b) Auditingc) Regulatory compliance
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : Which of the following is one of the most actively developing and important areas of cloud computing technology? a) Logging b) Auditing c) Regulatory compliance d) None of the mentioned

Last Answer : Regulatory compliance

Description : A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider. a) Service b) Application c) Deployment d) All of the mentioned

Last Answer : Service

Description : Point out the correct statement. a) Service Level Agreements (SLAs) is small aspect of cloud computing b) Cloud computing does not have impact on software licensing c) Cloud computing presents new opportunities to users and developers d) All of the mentioned

Last Answer : Cloud computing presents new opportunities to users and developers

Description : Point out the correct statement. a) Service Level Agreements (SLAs) is small aspect of cloud computing b) Cloud computing does not have impact on software licensing c) Cloud computing presents new opportunities to users and developers d) All of the mentioned

Last Answer : Cloud computing presents new opportunities to users and developers

Description : Which of the following was one of the weaker aspects of early cloud computing service offerings? a) Logging b) Integrity checking c) Consistency checking d) None of the mentioned

Last Answer : Logging

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : What facet of cloud computing helps to guard against downtime and determines costs? A. Service-level agreements B. Application programming interfaces C. Virtual private networks D. Bandwidth fees

Last Answer : Service-level agreements

Description : How Cloud Federation provides benefits to Cloud providers? a) allows providers to earn revenue from computing resources that would otherwise be idle or underutilized b) enables cloud providers to expand their ... -level agreements (SLAs) into their partner provider's data centers. d) All the above

Last Answer : All the above

Description : Which of the following is not a characteristic of Private Cloud? a) Secured b) Central Controlc) Scalable d) Weak Service Level Agreements (SLAs)

Last Answer : Scalable

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : Which of the following subject area deals with pay-as-you-go usage model? a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Accounting Management

Description : Which of the following is a compliance standard? a) PCI-DSS b) HIPPA c) GLBA d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned

Last Answer : All of the mentioned

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : ________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Software

Description : CaaS stands for _____________ as service. a) Compliance b) Computer c) Community d) Communication

Last Answer : Communication

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to ______________ a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : PaaS

Description : Which of the following architectural standards is working with cloud computing industry? a) Service-oriented architecture b) Standardized Web services c) Web-application frameworks d) All of the mentioned

Last Answer : Service-oriented architecture

Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned

Last Answer : Service

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function? a) Amazon Elastic Compute Cloud b) Amazon Associates Web Services c) Alexa Web Information Service d) All of the mentioned

Last Answer : Amazon Associates Web Services

Description : A web service contract is described using :- a) Web Services Description Language b) Web Services Description c) All of the mentioned d) None of the mentioned

Last Answer : Web Services Description Language

Description : To publish a REST service with Spring. a) publishing an application’s data as a REST service b) accessing data from third-party REST services c) none of the mentioned d) all of the mentioned

Last Answer : all of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following architectural standards is working with cloud computing industry? a) Service-oriented architecture b) Standardized Web services c) Web-application frameworks d) All of the mentioned

Last Answer : Service-oriented architecture

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following architectural standards is working with cloud computing industry? a) Service-oriented architecture b) Standardized Web services c) Web-application frameworks d) All of the mentioned

Last Answer : Service-oriented architecture

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : Which of the following service provider provides the highest level of service? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : The firm should establish a system of quality control designed to provide it with reasonable assurance regarding: a. Compliance with professional standards b. Compliance with regulatory and legal requirements c. Appropriateness of reports issued by the firm or engagement partners d. All of the above

Last Answer : All of the above

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Which of the following operating system support operating system virtualization? A. Windows NT B. Sun Solaris C. Windows XP D. Compliance

Last Answer : Sun Solaris

Description : Which of the following operating system support operating system virtualization? a) Windows NT b) Sun Solaris c) Windows XP d) Compliance

Last Answer : Sun Solaris

Description : .Which of the following operating system support operating system virtualization? a) Windows NT b) Sun Solaris c) Windows XP d) Compliance

Last Answer : Sun Solaris

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Communication between services is done widely using _______ protocol. a) REST b) SOAP c) RESTful d) None of the mentioned

Last Answer : SOAP

Description : A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts. a) reliable b) scalable c) composable d) none of the mentioned

Last Answer : composable

Description : The reputation for cloud computing services for the quality of those services is shared by _________ a) replicas b) shards c) tenantsd) all of the mentioned

Last Answer : tenants

Description : Which of the following IM client allow their users to connect to the different major IM services? a) Pidgin b) Miranda IM c) Trillian d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : 10. Amazon Web Services supports ________ Type II Audits. a) SAS70 b) SAS20 c) SAS702 d) None of the mentioned

Last Answer : SAS70

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications