Which of the following is specified parameter of SLA?
 a) Response times
 b) Responsibilities of
each party
 c) Warranties
 d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : What is the need for virtualization? A. To reduce the complexity. B. To decrease the utilization of information. C. To build homogeneous infrastructure. D. To delay in SLA response times.

Last Answer : To reduce the complexity.

Description : A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider. a) Service b) Application c) Deployment d) All of the mentioned

Last Answer : Service

Description : The expansion of SLA is _______________. A. Server level agreement. B. Service local agreement. C. Server local agreement. D. Service level agreement

Last Answer : Service level agreement

Description : This step includes selecting a cloud provider on basis of Service Level Agreement (SLA), which defines the level of service the provider will meet. A. Maintenance and Technical Service B. Selecting Cloud Computing Provider C. Both A and B D. None of the above

Last Answer : B. Selecting Cloud Computing Provider

Description : An implementation of an SLA should specify, a) Purpose. b) Restrictions. c) Scope. d) All the above.

Last Answer : All the above.

Description : An implementation of an SLA should specify, a) Purpose. b) Restrictions. c) Scope. d) All the above.

Last Answer : All the above.

Description : The ____________ acts as a market maker for bringing together service producers and consumers. a) Cloud Exchange (CEx) b) QoS c) Navigation d) SLA

Last Answer : HDFS

Description : Annotation added as an input parameter to the handler method. a) @PathVariable b) @Path c) @PathLocale d) None of the mentioned

Last Answer : @PathVariable

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Taken as a unit, Request => Process => Response is not an atomic transaction b) A coherent transaction either succeeds and is enacted, or ... transaction commitment in a multiuser application, durability requires correcting the condition d) None of the mentioned

Last Answer : Taken as a unit, “Request => Process => Response” is not an atomic transaction

Description : General-purpose class that allows a response to be rendered using a marshaller. a) MarshallingView b) Marshalling c) View d) All of the mentioned

Last Answer : MarshallingView

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : To publish a REST service with Spring. a) publishing an application’s data as a REST service b) accessing data from third-party REST services c) none of the mentioned d) all of the mentioned

Last Answer : all of the mentioned

Description : REST service end point comprises an address. a) starts with http:// and ends with ? b) starts with http:// and ends with & c) no certain URL is specified d) depends upon the platform used

Last Answer : starts with http:// and ends with ?

Description : Point out the correct statement. a) To determine whether your application will port successfully, you should perform a functionality mapping exercise b) Cloud computing supports some application features better ... directs traffic to the cloud during times of high traffic d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) To determine whether your application will port successfully, you should perform a functionality mapping exercise b) Cloud computing supports some application features better ... directs traffic to the cloud during times of high traffic d) All of the mentioned

Last Answer : All of the mentioned

Description : What are the values that can be specified for OPTIMIZER_GOAL parameter of the ALTER SESSION Command ? )

Last Answer : CHOOSE,ALL_ROWS,FIRST_ROWS and RULE.

Description : What are the values that can be specified for OPTIMIZER MODE Parameter ?

Last Answer : COST and RULE.

Description : Which parameter specified in the DEFAULT STORAGE clause of CREATE TABLESPACE cannot be altered after creating the tablespace?

Last Answer : All the default storage parameters defined for the tablespace can be changed using the ALTER TABLESPACE command. When objects are created their INITIAL and MINEXTENS values cannot be changed.

Description : Which parameter specified in the DEFAULT STORAGE clause of CREATE TABLESPACE cannot be altered after creating the tablespace?

Last Answer : All the default storage parameters defined for the tablespace can be changed using the ALTER TABLESPACE command. When objects are created their INITIAL and MINEXTENS values cannot be changed.

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : The Hadoop MapReduce framework spawns one map task for each __________ generated by the InputFormat for the job. a) OutputSplit b) InputSplit c) InputSplitStream d) All of the mentioned

Last Answer : ) InputSplit

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is correct? a) Layers are not strongly coupled to the layers above them b) Each layer is strongly coupled only to the layer immediately below it c) Overall Layered-style architectures are loosely coupled d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : What is Relaxed Layered Style? a) Each layer can be constrained to use only the layer directly below it b) Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it c) All of the mentioned d) None of the mentioned

Last Answer : Sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Functional system testing is: a) testing that the system functions with other systems b) testing that the components that comprise the system function together c) testing the end to end functionality of the system as a whole d) testing the system performs functions within specified response times

Last Answer : c) testing the end to end functionality of the system as a whole

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : _______ is an XML request/response language that is used to integrate and interoperate service provisioning requests. A. XACML B. FIDM C. SPML D. SSP

Last Answer : SPML

Description : A Responsibility Assignment Matrix (RAM) can be used to: a. define the terms of reference of the project manager. b. define the limits of the project sponsor's responsibilities. c ... response activities to project personnel. d. allocate work packages to those responsible for project work.

Last Answer : d. allocate work packages to those responsible for project work.

Description : A Responsibility Assignment Matrix (RAM) can be used to:  a. define the terms of reference of the project manager.  b. define the limits of the project sponsor's responsibilities.  ... response activities to project personnel.  d. allocate work packages to those responsible for project work.

Last Answer : d. allocate work packages to those responsible for project work.

Description : Warranties. How many times must I say no?

Last Answer : chyna I’m not as nice as you. I’ve only said no twice. They get the point after the first one usually.

Description : What parameter of light detector determines the range or system length that can be achieved for a given wavelength? ∙ a. Transit time ∙ b. Spectral response ∙ c. Dark current ∙ d. Responsitivity

Last Answer : ∙ b. Spectral response

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI