What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics

1 Answer

Answer :

Test and development

Related questions

Description : What’s the most popular use case for public cloud computing today? A. Test and development B. Website hosting C. Disaster recovery D. Business analytics

Last Answer : Test and development

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : Which of the following does not belong to type of competency area in cloud business analytics? A. Business intelligence and performance management. B. Analytics and optimization. C. Content management system . D. Information Hierarchy.

Last Answer : Information Hierarchy.

Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service

Last Answer : . Quality of service

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : Which of the following is a step of Deployment Phase? A. Transformation Plan Development B. IT Architecture Development C. Business Architecture Development D. Selecting Cloud Computing Provider

Last Answer : D. Selecting Cloud Computing Provider

Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above

Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.

Description : In ________, a strategy document is prepared according to the conditions a customer might face when applying cloud computing mode. A. Cloud Computing Value Proposition B. Cloud Computing Strategy Planning C. Planning Phase D. Business Architecture Development

Last Answer : B. Cloud Computing Strategy Planning

Description : . In Strategy Phase, Which of the following are correct step to perform this analysis? A. Cloud Computing Value Proposition B. Cloud Computing Strategy Planning C. Both A and B D. Business Architecture Development

Last Answer : C. Both A and B

Description : ________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Software

Description : Point out the correct statement. a) Amazon Elastic Cloud is a system for creating virtual disks(volume) b) SimpleDB interoperates with both Amazon EC2 and Amazon S3 c) EC3 is an Analytics as a Service provider d) None of the mentioned

Last Answer : SimpleDB interoperates with both Amazon EC2 and Amazon S3

Description : The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a ________ as a Service model. a) Software b) Platform c) Analytics d) None of the mentioned

Last Answer : Software

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online

Description : Which of the following qualifies as best DR (Disaster Recovery) site? a) DR site in the same campus b) DR site in the same city c) DR site in the same country d) DR site in a different country

Last Answer : DR site in a different country

Description : . Which of the following qualifies as best DR (Disaster Recovery) site? a) DR site in the same campus b) DR site in the same city c) DR site in the same countryd) DR site in a different country

Last Answer : DR site in a different country

Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned

Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering

Description : A cloud provider offers an environment for building applications that will run from the customer's environment. Which cloud computing delivery model are they using? A. Platform as a Service B. Software as a Service C. Development as a Service D. Infrastructure as a Service

Last Answer : Platform as a Service

Description : Which of the following is true about cloud computing? A. Cloud computing is platform dependent B. Cloud Computing makes our business applications mobile and collaborative. C. Cloud Computing provides us means of accessing the applications as utilities over computer only. D. All of the above

Last Answer : Cloud Computing makes our business applications mobile and collaborative.

Description : Which is not a benefit of cloud computing? a) Streamline business processes b) Pervasive accessibility c) Economic of scale d) Program debugging

Last Answer : Program debugging

Description : Which of the following is true about cloud computing? a) Cloud computing is platform dependent b) Cloud Computing makes our business applications mobile and collaborative c) Cloud Computing provides us means of accessing the applications as utilities over computer only d) All of the above

Last Answer : Cloud Computing makes our business applications mobile and collaborative

Description : A company is using Google Cloud Service for hosting its data / application. This use by the company of Google cloud can be classified as. a) Public Cloud b) Private Cloud c) Hybrid Cloud d) Community Cloud

Last Answer : Public Cloud

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : .Which technology allows use of read/write web, blogs & interactive web application etc. ? a) Mobile Computing b) Grid Computing c) Cloud Computing d) Web 2.0

Last Answer : Web 2.0

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following is the most complete cloud computing service model? a) PaaS b) IaaS c) CaaS d) SaaS

Last Answer : SaaS

Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : client

Description : Which of the following is the highest degree of integration in cloud computing? a) CaaS b) AaaS c) PaaS d) SaaS

Last Answer : SaaS

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned

Last Answer : cloud

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned

Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems

Description : Which of the following is one of the properties that differentiates cloud computing? a) scalability b) virtualization c) composability d) all of the mentioned

Last Answer : composability

Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned

Last Answer : operating

Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned

Last Answer : high

Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned

Last Answer : OpEx

Description : The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER. a) CLOUD b) CostCLOUD c) CCLOUD d) All of the mentioned

Last Answer : CostCLOUD