Description : The ________ cloud infrastructure is operated for the exclusive use of an organization. a) Public b) Private c) Community d) All of the mentioned
Last Answer : Private
Description : The __________ allows systems and services to be accessible within an organization. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud
Last Answer : A. Private cloud
Description : Which of the following is owned by an organization selling cloud services? a) Public b) Private c) Community d) Hybrid
Last Answer : Public
Description : A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit. a) Public b) Private c) Community d) Hybrid
Last Answer : Hybrid
Description : Point out the wrong statement. a) Public cloud may be managed by the constituent organization(s) or by a third party b) A community cloud may be managed by the constituent organization(s) or by a third party c) Private clouds may be either on- or off-premises d) None of the
Last Answer : Public cloud may be managed by the constituent organization(s) or by a third party
Description : The ____________ allows systems and services to be accessible by a group of organizations. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud
Last Answer : C. Community cloud
Description : A company is using Google Cloud Service for hosting its data / application. This use by the company of Google cloud can be classified as. a) Public Cloud b) Private Cloud c) Hybrid Cloud d) Community Cloud
Last Answer : Public Cloud
Description : The ____________ allows systems and services to be accessible by a group of organizations. a) Private cloud b) Public cloud c) Community cloud d) Hybrid cloud
Last Answer : Community cloud
Description : Which of the following cloud does not require mapping? a) Public b) Private c) Hybrid d) None of the mentioned
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned
Last Answer : A network backbone is a very low-capacity network connection
Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud
Last Answer : Multi-Cloud
Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud
Last Answer : hybrid cloud
Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.
Last Answer : Access to critical data is better controlled in a private cloud environment
Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud
Last Answer : private cloud
Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud
Last Answer : Virtual Private Cloud
Description : Which of the following is not a type of cloud? a) Private b) Public c) Protected d) Hybrid
Last Answer : Protected
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.
Last Answer : Illegal access to private data stored by applications in the cloud.
Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Description : Which of the following model type is not trusted in terms of security? a) Public b) Private c) Hybrid d) None of the mentioned
Last Answer : Private/Community
Description : Which of the following service model is owned in terms of infrastructure by both vendor and customer? a) Public b) Private c) Hybrid d) None of the mentioned
Description : Which of the following is the deployment model? a) public b) private c) hybrid d) all of the mentioned
Last Answer : all of the mentioned
Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned
Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online
Description : Which of the following is a good example of an SMS service organized into a social network and blog? a) Twitter b) Facebook c) Instagram d) None of the mentioned
Last Answer : Twitter
Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned
Last Answer : Data Privacy
Description : The __________ model originally did not require a cloud to use virtualization to pool resources. a) NEFT b) NIST c) NIT d) All of the mentioned
Last Answer : NIST
Description : The following flowchart is intended to evaluate __________ in any cloud. a) risk b) errors c) inconsistencies d) none of the mentioned
Last Answer : risk
Description : Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function? a) Amazon Elastic Compute Cloud b) Amazon Associates Web Services c) Alexa Web Information Service d) All of the mentioned
Last Answer : Amazon Associates Web Services
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned
Last Answer : Data centers have been sited to optimize the overall system latency
Description : Cloud computing networks are designed to support only private or hybrid clouds. A. True B. False
Last Answer : False
Description : What facet of cloud computing helps to guard against downtime and determines costs? A. Service-level agreements B. Application programming interfaces C. Virtual private networks D. Bandwidth fees
Last Answer : Service-level agreements
Description : What is private cloud? A. A standard cloud service offered via the Internet B. A cloud architecture maintained within an enterprise data center. C. A cloud service inaccessible to anyone but the cultural elite
Last Answer : A cloud architecture maintained within an enterprise data center.
Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks
Last Answer : middleware software stacks
Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.
Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.
Last Answer : virtual machines
Description : ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. a) Remote Sensing b) Remote Invocation c) Cloud Computing d) Private Computing
Last Answer : Cloud Computing
Description : Which of the following is not a characteristic of Private Cloud? a) Secured b) Central Controlc) Scalable d) Weak Service Level Agreements (SLAs)
Last Answer : Scalable
Description : Which of the following is not provided by “Deep Web”? a) Database generated Web pages b) Private or limited access Web pages c) Pages without links d) All of the mentioned
Last Answer : All of the mentioned
Description : How many types of virtual private server instances are partitioned in an IaaS stack? a) One b) Two c) Three d) All of The Mentioned
Last Answer : Three
Last Answer : All of the
Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned
Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable