Description : All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. a) propagation b) latency c) noise d) all of the mentioned
Last Answer : latency
Description : .All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity a) Propagation b) Latency c) Noise d) All of these
Last Answer : Latency
Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.
Last Answer : It enables users to access systems regardless of their location.
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : Applications that work with cloud computing that have low margins and usually low risk are _____________ a) high touch b) low touch c) moderate touch d) all of the mentioned
Last Answer : low touch
Description : Point out the wrong statement. a) Cloud Computing has two distinct sets of models b) Amazonhas built a worldwide network of datacenters to service its search engine c) Azure enables .NET Framework applications to run over the Internet d) None of the mentioned
Last Answer : Amazon
Description : Point out the wrong statement. a) All applications benefit from deployment in the cloud b) With cloud computing, you can start very small and become big very fast c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary d) None of the mentioned View
Last Answer : All applications benefit from deployment in the cloud
Description : Point out the wrong statement. a) Internet consumes roughly 1 percent of the world's total power b) The cost advantages of cloud computing have enabled new software vendors to create ... resources without the need for interaction with cloud service provider personnel d) None of the mentioned
Last Answer : Internet consumes roughly 1 percent of the world’s total power
Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned
Last Answer : Data centers have been sited to optimize the overall system latency
Description : The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER. a) CLOUD b) CostCLOUD c) CCLOUD d) All of the mentioned
Last Answer : CostCLOUD
Description : Cloud computing is a _______ system and it is necessarily unidirectional in nature. a) stateless b) stateful c) reliable d) all of the mentioned
Last Answer : stateless
Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud
Last Answer : hybrid cloud
Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned
Last Answer : OpEx
Description : _________ computing refers to applications and services that run on a distributed network using virtualized resources. a) Distributed b) Cloud c) Soft d) Parallel View Answer
Last Answer : Cloud
Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.
Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic
Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks
Last Answer : middleware software stacks
Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing.
Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.
Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.
Last Answer : Illegal access to private data stored by applications in the cloud.
Description : A cloud provider offers an environment for building applications that will run from the customer's environment. Which cloud computing delivery model are they using? A. Platform as a Service B. Software as a Service C. Development as a Service D. Infrastructure as a Service
Last Answer : Platform as a Service
Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing
Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.
Last Answer : Access to critical data is better controlled in a private cloud environment
Last Answer : virtual machines
Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above
Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.
Description : Which of the following is true about cloud computing? A. Cloud computing is platform dependent B. Cloud Computing makes our business applications mobile and collaborative. C. Cloud Computing provides us means of accessing the applications as utilities over computer only. D. All of the above
Last Answer : Cloud Computing makes our business applications mobile and collaborative.
Description : Which of the following is true about cloud computing? a) Cloud computing is platform dependent b) Cloud Computing makes our business applications mobile and collaborative c) Cloud Computing provides us means of accessing the applications as utilities over computer only d) All of the above
Last Answer : Cloud Computing makes our business applications mobile and collaborative
Description : The typical three-layer switching topology will not create latency within a cloud network. A. True B. False
Last Answer : False
Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Last Answer : Breaks compliance regulations
Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Last Answer : All of the mentioned
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : client
Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned
Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : cloud
Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned
Last Answer : None of the mentioned
Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned
Last Answer : platform
Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned
Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems
Description : Which of the following is one of the properties that differentiates cloud computing? a) scalability b) virtualization c) composability d) all of the mentioned
Last Answer : composability
Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned
Last Answer : operating
Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned
Last Answer : high
Description : The reputation for cloud computing services for the quality of those services is shared by _________ a) replicas b) shards c) tenantsd) all of the mentioned
Last Answer : tenants