Which of the following service is used for backing up a licensed computer?
 a) CarbonT
 b)
Karbonite
 c) Carbonite
d) None of the mentioned

1 Answer

Answer :

Carbonite

Related questions

Description : Which of the following captive area deals with monitoring? a) Licensed b) Variable but under control c) Low d) All of the mentioned

Last Answer : Variable but under

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Point out the correct statement. a) A standard machine instance (virtual computer) might cost $0.10 or less an hour b) A typical storage charge might be $0.10 per GB/month c) Outsourcing shifts the burden of capital expenditures onto the service provider d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Internet consumes roughly 1 percent of the world's total power b) The cost advantages of cloud computing have enabled new software vendors to create ... resources without the need for interaction with cloud service provider personnel d) None of the mentioned

Last Answer : Internet consumes roughly 1 percent of the world’s total power

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Which of the following is a man-in-the-middle type of service? a) CaaS b) IaaS c) AaaS d) All of the mentioned

Last Answer : CaaS

Description : The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service. a) Higgins b) Hughes c) Hinges d) All of the mentioned

Last Answer : Higgins

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Which of the following is provided by Identity as a Service? a) Identity governance b) Provisioning c) Risk and event monitoring d) All of the mentioned

Last Answer : All of the mentioned

Description : __________ authentication requires the outside use of a network security or trust service. a) SSO b) Singlefactor c) Multi Factor d) All of the mentioned

Last Answer : Multi Factor

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which of the following is a SaaS characteristic? a) The typical license is subscription-based or usage-based and is billed on a recurring basis b) The software is available over the Internet ... The software and the service are monitored and maintained by the vendor d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following aspect of the service is abstracted away? a) Data escrow b) User Interaction c) Adoption drivers d) None of the mentioned

Last Answer : User

Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned

Last Answer : All of the mentioned

Description : Rackspace Cloud Service is an example of _____________ a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to ______________ a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : PaaS

Description : __________ is the most refined and restrictive service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : PaaS

Description : Which of the following is a classic example of an IaaS service model? a) AWS b) Azure c) Cloudera d) All of the mentioned

Last Answer : AWS

Description : Which of the following lets a Web service advertise itself in terms of a collection of endpoints? a) WSDL b) VMc c) SOAP d) All of the mentioned

Last Answer : WSDL

Description : Point out the correct statement. a) JumpIt is an open-source virtual appliance installation and management service b) Converting a virtual appliance from one platform to another is easy proposition c ... vendors support OVF, notably VMware, Microsoft, Oracle, and Citrix d) All of the mentioned

Last Answer : Nearly all major virtualization platform vendors support OVF, notably VMware, Microsoft, Oracle, and Citrix

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Which of the following benefit is provided by the PaaS service provider? a) A larger pool of qualified developers b) More reliable operation c) A logical design methodology d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : A _______ service provider gets the same benefits from a composable system that a user does. a) CaaS b) AaaS c) PaaS d) All of the mentioned

Last Answer : PaaS

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned

Last Answer : operating

Description : A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider. a) Service b) Application c) Deployment d) All of the mentioned

Last Answer : Service

Description : _____ is a financial estimate for the costs of the use of a product or service over its lifetime. a) TCO b) TOC c) COT d) All of the mentioned

Last Answer : TCO

Description : When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : A service that concentrates on hardware follows the _________ as a Service model. a) IaaS b) CaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : Which of the following architectural standards is working with cloud computing industry? a) Service-oriented architecture b) Standardized Web services c) Web-application frameworks d) All of the mentioned

Last Answer : Service-oriented architecture

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : The three different service models are together known as the _____ model of cloud computing. a) SPI b) SIP c) CPI d) All of the mentioned

Last Answer : SIP

Description : _______ model attempts to categorize a cloud network based on four dimensional factors. a) Cloud Square b) Cloud Service c) Cloud Cube d) All of the mentioned

Last Answer : Cloud Cube

Description : Point out the wrong statement. a) Cloud Computing has two distinct sets of models b) Amazonhas built a worldwide network of datacenters to service its search engine c) Azure enables .NET Framework applications to run over the Internet d) None of the mentioned

Last Answer : Amazon

Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned

Last Answer : Service

Description : ________ has many of the characteristics of what is now being called cloud computing. a) Internet b) Softwares c) Web Service d) All of the mentioned

Last Answer : Internet

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is a good example of an SMS service organized into a social network and blog? a) Twitter b) Facebook c) Instagram d) None of the mentioned

Last Answer : Twitter

Description : Which of the following is also referred to as Short Message Service? a) Mini-blogs b) Micro-blogs c) Nano-blogs d) None of the mentioned

Last Answer : Micro-blogs

Description : Point out the correct statement. a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model b) Applications built using PaaS tools need to ... , the data and transaction management conforms to the business rules you create d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online

Description : Which of the following service model is owned in terms of infrastructure by both vendor and customer? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Hybrid

Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned

Last Answer : SaaS

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned