Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned
Last Answer : None of the mentioned
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned
Last Answer : 2
Description : _______ model attempts to categorize a cloud network based on four dimensional factors. a) Cloud Square b) Cloud Service c) Cloud Cube d) All of the mentioned
Last Answer : Cloud Cube
Description : Which of the following is related to the service provided by Cloud? a) Sourcing b) Ownership c) Reliability d) AaaS
Last Answer : Sourcing
Description : Which of the following is related to the service provided by Cloud? A. Sourcing B. Ownership C. Reliability D. PaaS
Description : Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost? a) CCE b) OCCI c) SMI d) All of the mentioned
Last Answer : SMI
Description : How many types of dimensions exists in Cloud Cube Model? a) 1 b) 2 c) 3 d) 4
Last Answer : 4
Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks
Last Answer : middleware software stacks
Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.
Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Last Answer : virtual machines
Description : Which is the model have to develop in order to protect e-commerce and online shopping provided by e-logistic vendors a) Cloud model b) API model c) Security model d) Trust model
Last Answer : Trust model
Description : What are two important benefits of using cloud computing? A. Deployment of single tenant application. B. Enhanced Web V2.0 interfaces for user interactions. C. Lower total cost of ownership and improved asset utilization. D. Provides better availability than a standard computing environment.
Last Answer : Lower total cost of ownership and improved asset utilization.
Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned
Last Answer : platform
Description : The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER. a) CLOUD b) CostCLOUD c) CCLOUD d) All of the mentioned
Last Answer : CostCLOUD
Description : The three different service models are together known as the _____ model of cloud computing. a) SPI b) SIP c) CPI d) All of the mentioned
Last Answer : SIP
Description : The __________ model originally did not require a cloud to use virtualization to pool resources. a) NEFT b) NIST c) NIT d) All of the mentioned
Last Answer : NIST
Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned
Last Answer : All of the mentioned
Description : Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model? a) CAS b) CSA c) SAC d) All of the mentioned
Last Answer : CSA
Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned
Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Description : Which model originally did not require a cloud to use virtualization to pool resources a) NEFT b) NIST c) NIT d) All of the mentioned
Description : The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a ________ as a Service model. a) Software b) Platform c) Analytics d) None of the mentioned
Last Answer : Software
Description : Open-system ___________ tends to evolve more quickly than proprietary systems. A. hardware B. software C. hardware and software D. None of the above
Last Answer : hardware and software
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned
Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned
Last Answer : Higgins
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned
Description : Rackspace Cloud Service is an example of _____________ a) IaaS b) SaaS c) PaaS d) All of the mentioned
Last Answer : IaaS
Description : _________ is designed specifically to run connected to the cloud as a dedicated cloud client. a) Harvera Tablet OS b) Fedora Netbook OS c) Jolicloud Netbook OS d) None of the mentioned
Last Answer : Jolicloud Netbook OS
Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned
Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned
Last Answer : Virtual machines are containers that are assigned specific resources
Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : client
Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned
Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned
Last Answer : compute
Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : cloud
Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned
Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned
Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems
Description : Which of the following is one of the properties that differentiates cloud computing? a) scalability b) virtualization c) composability d) all of the mentioned
Last Answer : composability
Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned
Last Answer : operating
Description : The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a cloud deployment on Windows Azure in an attractive report format. a) AWS b) EC2 c) Azure d) All of the mentioned
Last Answer : Azure
Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned
Last Answer : high
Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned
Last Answer : OpEx
Description : Cloud ________ are standardized in order to appeal to the majority of its audience. a) SVAs b) SLAs c) SALs d) None of the mentioned
Last Answer : SLAs