The following flowchart is intended to
evaluate __________ in any cloud.
a) risk
b) errors
c) inconsistencies
d) none of the mentioned

1 Answer

Answer :

risk

Related questions

Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned

Last Answer : OpEx

Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned

Last Answer : low touch

Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned

Last Answer : low touch

Description : An auditor is required to obtain a basic understanding of the client's internal control to plan the audit. The auditor may then decide to perform tests of controls on all internal control ... to be strengths for which the auditor desires further reduction in the assessed level of control risk.

Last Answer : Considered to be strengths for which the auditor desires further reduction in the assessed level of control risk.

Description : __________ cloud is one where the cloud has been organized to serve a common function or purpose. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Community

Description : The __________ model originally did not require a cloud to use virtualization to pool resources. a) NEFT b) NIST c) NIT d) All of the mentioned

Last Answer : NIST

Description : After studying and evaluating a client's existing internal control, an auditor has concluded that the policies and procedures are well-designed and functioning as intended. Under these circumstances, the ... risk at a lower level than would be set under conditions of weak internal control.

Last Answer : Set detection risk at a higher level than would be set under conditions of weak internal control.

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : “Enterprises should mandate that security investments, services, and projects in the cloud are executed to achieve established business goals” is a key objective of _____________ a) Strategic Alignment b) Value Delivery c) Risk Mitigation d) Sustained Performance

Last Answer : Strategic Alignment

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned

Last Answer : All of the mentioned

Description : Rackspace Cloud Service is an example of _____________ a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : _________ is designed specifically to run connected to the cloud as a dedicated cloud client. a) Harvera Tablet OS b) Fedora Netbook OS c) Jolicloud Netbook OS d) None of the mentioned

Last Answer : Jolicloud Netbook OS

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned

Last Answer : compute

Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : cloud

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned

Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems

Description : Which of the following is one of the properties that differentiates cloud computing? a) scalability b) virtualization c) composability d) all of the mentioned

Last Answer : composability

Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned

Last Answer : operating

Description : The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a cloud deployment on Windows Azure in an attractive report format. a) AWS b) EC2 c) Azure d) All of the mentioned

Last Answer : Azure

Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned

Last Answer : high

Description : The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER. a) CLOUD b) CostCLOUD c) CCLOUD d) All of the mentioned

Last Answer : CostCLOUD

Description : Cloud ________ are standardized in order to appeal to the majority of its audience. a) SVAs b) SLAs c) SALs d) None of the mentioned

Last Answer : SLAs

Description : The reputation for cloud computing services for the quality of those services is shared by _________ a) replicas b) shards c) tenantsd) all of the mentioned

Last Answer : tenants

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : Point out the correct statement. a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user b) Cloud computing vendors run very reliable ... barrier to entry cannot be accompanied by a low barrier to provisioning d) All of the mentioned

Last Answer : Cloud computing vendors run very reliable networks

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on-premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : Which of the following is one of the unique attributes of Cloud Computing? a) utility type of delivery b) elasticity c) low barrier to entry d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following architectural standards is working with cloud computing industry? a) Service-oriented architecture b) Standardized Web services c) Web-application frameworks d) All of the mentioned

Last Answer : Service-oriented architecture

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Cloud computing is a _______ system and it is necessarily unidirectional in nature. a) stateless b) stateful c) reliable d) all of the mentioned

Last Answer : stateless

Description : All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. a) propagation b) latency c) noise d) all of the mentioned

Last Answer : latency

Description : Which of the following was one of the top 5 cloud applications in 2010? a) Cloud backup b) Web applications c) Business applications d) All of the mentioned

Last Answer : All of the mentioned