Geographic distribution of data across a cloud provider’s network is a problem for many enterprises
because it:
A. Breaks compliance regulations
B. Adds latency
C. Raises security concerns
D. Makes data recovery harder

1 Answer

Answer :

Breaks compliance regulations

Related questions

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : How Cloud Federation provides benefits to Cloud providers? a) allows providers to earn revenue from computing resources that would otherwise be idle or underutilized b) enables cloud providers to expand their ... -level agreements (SLAs) into their partner provider's data centers. d) All the above

Last Answer : All the above

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : The management model that facilitates effective and efficient security management and operations in the cloud environment so that an enterprise’s business targets are achieved is a) Cloud security b) Trust model c) Security model d) Cloud security governance

Last Answer : Cloud security governance

Description : “Enterprises should mandate that security investments, services, and projects in the cloud are executed to achieve established business goals” is a key objective of _____________ a) Strategic Alignment b) Value Delivery c) Risk Mitigation d) Sustained Performance

Last Answer : Strategic Alignment

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : The typical three-layer switching topology will not create latency within a cloud network. A. True B. False

Last Answer : False

Description : The typical three-layer switching topology will not create latency within a cloud network. A. True B. False

Last Answer : False

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : .In computing, ________ improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. a) Virtual machine b) Virtual computing c) Virtual cloud d) Load balancer

Last Answer : Load balancer

Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned

Last Answer : Data centers have been sited to optimize the overall system latency

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned

Last Answer : All of the mentioned

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. a) propagation b) latency c) noise d) all of the mentioned

Last Answer : latency

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. a) propagation b) latency c) noise d) all of the mentioned

Last Answer : latency

Description : .All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity a) Propagation b) Latency c) Noise d) All of these

Last Answer : Latency

Description : Which vendor recently launched a cloud-based test and development service for enterprises? A. HP B. Cisco C. IBM D. Oracle

Last Answer : IBM

Description : Which vendor recently launched a cloud-based test and development service for enterprises? A. HP B. Cisco C. IBM D. Oracle

Last Answer : IBM

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing

Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : ________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Software

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : Which of the following is one of the most actively developing and important areas of cloud computing technology? a) Logging b) Auditing c) Regulatory compliance d) None of the mentioned

Last Answer : Regulatory compliance

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : Point out the correct statement. a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user b) Cloud computing vendors run very reliable ... barrier to entry cannot be accompanied by a low barrier to provisioning d) All of the mentioned

Last Answer : Cloud computing vendors run very reliable networks

Description : Which of the following is not a cloud stakeholder? a) Cloud providers b) Clients c) End users d) Cloud users

Last Answer : Clients

Description : Cloud providers provide cloud services to the cloud users. a) True b) False

Last Answer : True

Description : .Interconnecting the cloud computing environments of two or more service providers is called as a) Cloud Federation b) Intra Cloud c) Cloud Provisioning d) Cloud Connecting

Last Answer : Conceptual Level

Description : For whom Cloud Infrastructure performance is the primary concern a) Software Vendors b) IT Administrator c) Cloud Providers d) Cloud Users

Last Answer : Cloud Providers

Description : What’s the most popular use case for public cloud computing today? A. Test and development B. Website hosting C. Disaster recovery D. Business analytics

Last Answer : Test and development

Description : What’s the most popular use case for public cloud computing today? A. Test and development B. Website hosting C. Disaster recovery D. Business analytics

Last Answer : Test and development

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Which of the following subject area deals with pay-as-you-go usage model? a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Accounting Management

Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service

Last Answer : . Quality of service