Which of the following model type is not
trusted in terms of security?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

1 Answer

Answer :

Private/Community

Related questions

Description : Which of the following service model is owned in terms of infrastructure by both vendor and customer? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Hybrid

Description : Which of the following is the deployment model? a) public b) private c) hybrid d) all of the mentioned

Last Answer : all of the mentioned

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : Which of the following cloud does not require mapping? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Public

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Which of the following is not a type of cloud? a) Private b) Public c) Protected d) Hybrid

Last Answer : Protected

Description : Which of the following is owned by an organization selling cloud services? a) Public b) Private c) Community d) Hybrid

Last Answer : Public

Description : A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit. a) Public b) Private c) Community d) Hybrid

Last Answer : Hybrid

Description : The __________ allows systems and services to be accessible within an organization. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud

Last Answer : A. Private cloud

Description : The ____________ allows systems and services to be accessible by a group of organizations. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud

Last Answer : C. Community cloud

Description : A company is using Google Cloud Service for hosting its data / application. This use by the company of Google cloud can be classified as. a) Public Cloud b) Private Cloud c) Hybrid Cloud d) Community Cloud

Last Answer : Public Cloud

Description : The ____________ allows systems and services to be accessible by a group of organizations. a) Private cloud b) Public cloud c) Community cloud d) Hybrid cloud

Last Answer : Community cloud

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned

Last Answer : OpenID

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : PaaS

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : __________ cloud is one where the cloud has been organized to serve a common function or purpose. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Community

Description : The ________ cloud infrastructure is operated for the exclusive use of an organization. a) Public b) Private c) Community d) All of the mentioned

Last Answer : Private

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Cloud computing networks are designed to support only private or hybrid clouds. A. True B. False

Last Answer : False

Description : Cloud computing networks are designed to support only private or hybrid clouds. A. True B. False

Last Answer : False

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentioned

Last Answer : all of the mentioned

Description : Which of the following component is required for both online and local data access in hybrid application? a) local b) cloud c) both local and cloud d) none of the mentioned

Last Answer : both local and cloud

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned

Last Answer : All of the mentioned

Description : How many types of virtual private server instances are partitioned in an IaaS stack? a) One b) Two c) Three d) All of The Mentioned

Last Answer : Three

Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned

Last Answer : All of the

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : middleware software stacks

Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks

Last Answer : virtual machines

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Which of the following service provider provides the least amount of built in security? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : IaaS

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct