Cloud Computing Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

A cloud deployment that is off premises but for the exclusive use of a particular organization

Private

Façade that exposes the business logic implemented in the application to the customers

Service Interface

Which of the following is NOT a cross-cutting component of layered architecture? Communication Services Operational Management Security

Services

Which of the following statements about Microservices Architecture is FALSE? Services do not need to share the same technology stack, libraries, or frameworks Services can be updated without redeploying the entire application Each service is self-contained and should implement a single business capability Services should have tight coupling and low functional cohesion

Services should have tight coupling and low functional cohesion

Which of the following statements are TRUE for SaaS? [Select 2] Software is managed centrally by the cloud vendor Useful for batch computing and workloads that require large amounts of capacity on demand Allows easy upgrades and seamless scalability Provides on-demand and self-service application development

Software is managed centrally by the cloud vendor, Allows easy upgrades and seamless scalability

Using Microsoft Word as a reference application, give two examples of microservices.

Spell-check, grammar check

What is a zone in the context of logical network design?

A logical entity containing one or more tiers, it segregates various parts of the network

Which of the following can be classified as a TECHNICAL risk of cloud computing? [Select 3] API and management interface compromise Forced lock-in with the cloud provider Denial of Service due to misconfiguration or system vulnerabilities Storage of data in multiple jurisdictions along with lack of transparency Incomplete deletion of data

API and management interface compromise Denial of Service due to misconfiguration or system vulnerabilities Incomplete deletion of data

List 3 critical threats to cloud computing security.

Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking Unknown Risk Profile

A subscriber in an Infrastructure as a Service model can be ______ An individual A business unit A team All of the above

All of the above

In SaaS, which component(s) is(are) managed by cloud providers? Applications Storage Middleware All of the above

All of the above

Which of the following is NOT a typical component of an IaaS offering? Storage Self service interfaces Compute Instances Identify and Access Management All of the above are components of IaaS

All of the above are components of IaaS

What is an integration broker? What are the 4 components of its architecture?

An integration broker is used to manage data movement and system integration (integrates in-house applications and SaaS applications). 4 components: Security, Transform, Orchestrate, Route

Which of the following are consumers of PaaS? (Select all that apply) Application Users Application Testers Application Developers Application Administrators Cloud Service Providers Application Deployers

Application Users Application Testers Application Developers Application Administrators Application Deployers

In IaaS, which of the following components is NOT managed by cloud providers? Applications Servers Storage Networking

Applications

A network with higher 9's rating is used when which of the following is very important? Integrity Availability Security Confidentiality

Availability

What type of architecture is best suited if an application involves computationally intensive operations that requires work to be broken down into tasks that can run simultaneously?

Big Compute

List the PaaS application lifecycle.

Build applications Land first release Maintain application Land releases End of life

When is public cloud deployment favorable? Auctioning data center Cost savings Scalability Business Agility

Business Agility

The layer that implements the core functionality of the system by encapsulating business logic

Business Layer

Which of the following consists of components, some of which may expose service interfaces that other callers can use? Presentation Layer Data Layer Business Layer Service Layer

Business Layer

At the cloud provider premises, which of the following is/are a part of the cloud ecosystem? (select 3) Clients that are currently accessing the cloud over a network Clients joining the cloud (initiating access) Service level agreements with clients New hardware

Clients that are currently accessing the cloud over a network, Clients joining the cloud (initiating access), New hardware

____________ is a trusted third-party that can conduct independent assessment of cloud services, performance, and security of the cloud implementation.

Cloud Auditor

In the SaaS model, the public access point to the cloud is the:

Cloud Manager

Which component of IaaS cloud architecture is responsible for user accounts and high-level resource allocation within the overall cloud?

Cloud Manager

Explain cloud bursting in your own words. Illustrate with an example.

Cloud bursting is the process of having a temporary need for more capabilities or resources, borrowing & consuming those resources from another cloud, and releasing them back when done An example of this is a web application receiving high amounts of traffic at a given time, so it decides to provision its server on another cloud in order to handle the current capacity of users.

What is measured service? List some examples of metrics

Cloud systems automatically control and optimize resource use by leveraging a metering capability (examples: storage, bandwidth, processing, active user accounts)

Which of the following is NOT true about the cluster manager? Cluster Manager is responsible for the operation of a collection of computers that are connected via high speed local area networks A Cluster Manager receives resource allocation commands and queries from the Cloud Manager Cluster Manager queries the Computer Managers for the computers in the cluster to determine resource availability, and returns messages to the Cloud Manager on whether part, or all, of a request can be satisfied in a cluster Cluster Manager uses the command interface of its hypervisor to start, stop, suspend, and reconfigure virtual machines, and to set the local virtual network configuration

Cluster Manager uses the command interface of its hypervisor to start, stop, suspend, and reconfigure virtual machines, and to set the local virtual network configuration

A service is ________ if it provides functionality that logically belongs together. Services are ___________ if you can change one service without changing the other.

Cohesive, loosely coupled

A cloud deployment that is off premises but for exclusive use of one or more particular organizations

Community

The public school systems in the greater Chicago region have collectively decided to setup an email system in the cloud for use by their faculty, staff and students. This could be an example of the _______ cloud deployment model.

Community

In IaaS, the _________ uses the command interface of its hypervisor to start, stop, suspend, and reconfigure the virtual machines.

Computer Manager

Which component of IaaS cloud architecture uses command interface of its hypervisor to start, stop or reconfigure virtual machines?

Computer Manager

A Cluster Manager queries the ______________ to determine resource availability, and returns messages to the ______________ on whether part, or all, of a request can be satisfied in a cluster.

Computer Managers, Cloud Manager

List 2 advantages of layered architecture.

Consistency & standardization

Two major advantages of IT Architecture

Consistency and Standardization

Which of the following is/are true for Infrastructure-as-a-Service? (select 2) The consumer manages and controls the underlying cloud infrastructure Consumers can install operating systems compatible with the underlying virtualized hardware Includes delivery of fully featured applications that are targeted at private and business users Has a chargeback (measured service) capability to charge consumers for their resource usage

Consumers can install operating systems compatible with the underlying virtualized hardware, Has a chargeback (measured service) capability to charge consumers for their resource usage

____________ is an isolated workload environment that can be used for deploying and running microservices.

Container

Using an example, explain how Microservices Architecture facilitates continuous delivery practice across development teams.

Continuous Delivery practices encourage incremental additions as part of production. These additional features and capabilities are made possible by the separation and independence of services in a microservice architecture. An example of this is seen in the ability to fix bugs in a microservice architecture. A feature that handles a bug can be independently deployed, and the service can be updated without interrupting the process of continuous delivery (i.e. other service developments are unaffected).

Which capability offered by IaaS enables cloud subscribers to bring in their own set of cloud management tools from another vendor?

Control plane and self-service interfaces

Which of the following is NOT a Principal Component of IT Architecture Model? IT Application Landscape Software Reference Architecture Domain or Capability Model Cross-Functional Processes

Cross-Functional Processes

In PaaS, which of the following components is NOT managed by cloud providers? Data Servers Virtualization Operating System

Data

Data layer consists of: (Select all correct answers) Data Access Components Service Agents Business Workflow Data Helper and Utilities

Data Access Components, Service Agents, Data Helper and Utilities

Failover clustering is typically used with: Application servers Clients Web servers Database servers

Database servers

Local computing capability on or next to a sensor that is network-accessible is an example of __________

Edge Computing

Which of the following components are required for a successful MSA implementation? [Select 3] Effective data and service management tools Decentralized approach to service development Hierarchical organizational structure with interdependent development teams Unique technology stack for each microservice Competency in agile and DevOps practices

Effective data and service management tools Decentralized approach to service development Competency in agile and DevOps practices

Which of the following are common use cases of IaaS? [Select 3] Environment for application development and testing Learning Management System Business Continuity and Disaster Recovery High-Performance Computing Applications for enabling collaboration

Environment for application development and testing, Business Continuity and Disaster Recovery, High-Performance Computing

True or False: All microservices in a Microservices Architecture share one common database for easy data access.

False

True or False: By virtualization you can add more storage space than underlying hardware.

False

True or False: In PaaS, it is the subscriber who maintains a set of development tools and execution environments.

False

True or False: In Platform as a Service, the customer does not manage or control the underlying infrastructure but has control over storage and possibly limited control of networking components.

False

True or False: In cloud infrastructure, there is no way a customer can specify the location (country or region) of the provided resources as part of the service.

False

True or False: Multi-tenancy can only be applied to SaaS applications.

False

True or False: Public zone assets can be managed by an organization.

False

True or False: The number of user accounts requiring direct access to the hypervisor should be MAXIMIZED for increased security and redundancy.

False

True or False: Virtualization is a necessary step for cloud computing.

False

Which of the following process is the first step towards application design? Choose communication protocols for interaction between layers and tiers Define public interface for each layer Focus on the highest level of abstraction and group functionalities into layers Determine how the application will be deployed

Focus on the highest level of abstraction and group functionalities into layers

When designing an application, the first task is to: Determine how the application will be deployed Choose the communication protocols to use for interaction between the layers and tiers of the application Focus on the highest level of abstraction and start by grouping functionality into layers Define the public interface for each layer

Focus on the highest level of abstraction and start by grouping functionality into layers

SaaS would be a good fit:_______________ AND _________________ [Select 2] For undifferentiated solutions that may not confer a competitive advantage When an application's Time to Market is a key pressure for development teams Applications where extremely fast processing of real time data is required Applications that have a significant need for mobile and web access Applications where legislation or other regulation does not permit data being hosted externally

For undifferentiated solutions that may not confer a competitive advantage, Applications that have a significant need for mobile and web access

When you integrate cloud with a traditional on-premise system, which deployment model are you building?

Hybrid

__________ cloud enables data and application portability

Hybrid

Give 1 security recommendation for virtualization.

Hypervisor platforms with hardware assisted virtualization provides greater security assurance. Number of user accounts requiring direct access to hypervisor host should be limited to bare minimum. Place the management interface of the hypervisor in a dedicated virtual network segment. Communication from a given VM to the enterprise (physical) network should be enabled through multiple communication paths (or physical NICs) within the virtualized host.

Which of the following are necessary in designing an enterprise IT architecture? (Select 3) Human resources IT applications Business Model IT infrastructure and products

IT applications Business Model IT infrastructure and products

Which of the following types of PaaS allows developers to have a streamlined deployment of applications while retaining control over the underlying infrastructure? IaaS-centric PaaS SaaS-centric PaaS Generic PaaS None of the above

IaaS-centric PaaS

Which of the following is true for Software-as-a-Service? The consumer manages and controls the underlying cloud infrastructure Manages delivery of disk space, virtual CPUs, and database services Includes delivery of fully featured applications that are targeted at private and business users IT organization builds, deploys, and runs the solution

Includes delivery of fully featured applications that are targeted at private and business users

According to what we discussed in class, which of the following is the greatest benefit of public cloud deployment? Broader Geographic Distribution Cost Savings Increased Business Agility Increased Availability

Increased Business Agility

Which of the following is NOT a benefit of SaaS? Low initial cost Easy upgrades Increased administration Scalability

Increased administration

___________ is the network of dedicated physical objects that contain embedded technology to sense or interact with their internal state or external environment.

Internet of Things

What is sandboxing?

Isolating each guest OS from the others and restricting what resources they can access and what privileges they have

Which of the following statements about Fog Computing are TRUE? [Select 2] It runs specific applications in a fixed logic location and provides a direct transmission service It supports processing of data of different forms acquired through various network communication capabilities Fog computing applications involve real-time interactions rather than batch processing Fog computing is limited to a small number of peripheral devices

It supports processing of data of different forms acquired through various network communication capabilities Fog computing applications involve real-time interactions rather than batch processing

Which of the following are part of the service provider's responsibilities in a PaaS service? (Select 3) Applying security patches to the application as required Updating applications as required Maintaining an inventory of applications Providing execution environments for consumer's applications Providing a set of development tools

Maintaining an inventory of applications Providing execution environments for consumer's applications Providing a set of development tools

In the PaaS service model, the __________ layer is responsible for pushing, starting, and stopping of applications.

Management

The ________________ layer of the PaaS model allows control over the deployed applications and configuration settings of the platform.

Management

If your architecture involves a combination of on-premise systems and cloud components, what technology would you deploy to manage communication between them?

Message Broker

A standard way of translating between software from different vendors is achieved by using:

Middleware

What is the biggest advantage of a layered application architecture?

Modularity: If you want to update something, you only need to change the respective layer.

Which of the following statements is FALSE for PaaS? Provides on-demand and self-service application development Provides standard application framework Portability between PaaS clouds is quick and easy Abstracts infrastructure and other configuration details from application developers

Portability between PaaS clouds is quick and easy

When single instance of a software application and its underlying infrastructure serves multiple user accounts

Multi-tenancy

In a PaaS model, which service stack is hosted and operated by the PaaS vendor and typically co-located to the PaaS environment inside the same infrastructure?

Native services

Which of the following modules are a part of the Integration Broker Pipeline? [Select 3] Orchestrate Governance Infrastructure Transform Security

Orchestrate, Transform, Security

Which of the following types of cloud IaaS is operated by the cloud provider and located at the subscriber's end? External Private Cloud Virtual Private Cloud Outsourced Private Cloud Internal Private Cloud

Outsourced Private Cloud

In the _________ cloud service model, the consumer makes use of the interfaces provided by the service provider and develops, implements, and deploys applications.

PaaS

Which service model does not require consumers to manage or control the underlying cloud infrastructure, but maintain control over the deployed applications and configuration settings for the application hosting environment?

PaaS

Considering IU's enterprise network, name one system for each of the following zones in a zone-based network architecture: Perimeter zone Internal zone

Perimeter Zone: Email Internal Zone: Kuali

Servers, storage, and network components are a part of _________ layer in the cloud infrastructure.

Physical

_____________ focuses on the fidelity of data and applications received from another system and whether they are useable or not.

Portability

An enterprise would like to leverage cloud solution for managing highly classified data. Which of the following cloud deployment models would be most suitable? Public Cloud Private Cloud Community Cloud Hybrid Cloud

Private Cloud

The cloud infrastructure which is provisioned for exclusive use by a single organization comprising multiple consumers (i.e. business units)

Private Cloud

If you need more capacity, cloud enables you to add more machines or storage and when you stop consuming it, that excess capacity is released back into the resource pool. This can be depicted by which characteristic of cloud computing?

Rapid Elasticity

Which of the following is not one of the characteristics of cloud computing? Resource pooling On demand self service Rapid virtualization Broad access

Rapid virtualization

Solutions based on big data architecture typically involve one or more of the following types of workload: (Select all correct answers) Real-time processing of data Batch processing of data Simulations or massive number crunching Store and process data in finite volumes

Real-time processing of data, Batch processing of data

If you deploy failover clusters in your architecture, your application is built for:

Reliability

Which of the following is NOT a benefit of using IaaS? Improves disaster recovery and business continuity Requires precise capacity planning Lowers up-front cost Faster time to market

Requires precise capacity planning

Which of the following is NOT a benefit of cloud computing? Easy to change resources and cost effective as compared to hardware solutions Helps manage software upgrades and installations Requires you to provision capacity by guessing theoretical maximum peaks No need to have an IT support organization to manage applications

Requires you to provision capacity by guessing theoretical maximum peaks

Which characteristic of cloud computing enables the multi-tenant model of computing resources, storage and memory?

Resource Pooling

Gmail is an example of which cloud service offering?

SaaS

Isolating guest Operating Systems from each other and limiting their capabilities (restricting access/privileges)

Sandboxing

If you divide your users into application-defined logical roles and grant access to them based on their role, your application is built for ________________

Security

Which of the following is a cross-cutting capability in the layered architecture we discussed in class? Security Service agents Data helpers/utilities Services layer

Security

What is the function of the data layer?

The data layer provides access to data hosted within the boundaries of the system, and data exposed by other networked systems. It exposes generic interfaces that the components in the business layer can consume.

What is a Service Level Agreement?

The parameters and definitions of what service a company will provide to customers

Which of the following statements are true about Private Cloud? [Select 2] The underlying infrastructure cannot be shared with others It can only exist on premises Provides an organization greater control over security and assurance over data location It is the cheapest deployment model

The underlying infrastructure cannot be shared with others, Provides an organization greater control over security and assurance over data location

Which of the following are components of Hybrid Cloud IT Operating Model? [Select 3] Traditional IT Management Group IT Service Broker Group User Management Control IT Quality Assurance Group Cloud Management Group

Traditional IT Management Group, IT Service Broker Group, Cloud Management Group

True or False: A Private Cloud can be located at a service provider's data center .

True

True or False: A load balanced cluster is a design for scalable infrastructure tier that accounts for changes in load while maintaining an acceptable level of performance.

True

True or False: In SaaS, consumers have limited admin control and full user level control over applications.

True

True or False: In application design, when moving from logical layers to physical tiers, it is possible to have ALL layers on a SINGLE tier.

True

True or False: In application design, when moving from logical layers to physical tiers, it is possible to have ONE layer on MULTIPLE tiers.

True

True or False: Mist computing is NOT a required sub-component of Fog Computing.

True

True or False: Platform as a Service model enables an abstraction of middleware, infrastructure and configuration details, thus helping reduce complexity.

True

True or False: Private Cloud can be deployed on as well as off premises.

True

True or False: User specific application configuration settings can be applied to a SaaS solution although it is limited.

True

True or False: When you move from traditional data center into cloud computing, you are shifting from a capital expense (CapEx) to an operational expense (OpEx)

True

True or False: With software-as-a-service, it is the vendor who builds, deploys, and runs the solution.

True

Look at the quiz screen and identify: 1) UI component and 2) the presentation logic underlying that UI component

UI Component -could be buttons, textbox, etc. Logic - What happens when you click buttons/controls

Which of the following is NOT true with respect to the characteristics of SaaS? Web access to commercial software Software delivered in a "one to many" model - multitenancy Users are required to handle software upgrades and patches Software is managed from a central location

Users are required to handle software upgrades and patches

Which of the following can be considered a potential issue pertaining to IaaS? (Select all that apply) Upfront costs Flexibility Virtual Machine sprawl Network dependence Browser based risks

Virtual Machine sprawl Network dependence Browser based risks

In IaaS, which of the following components is NOT managed by subscribers? Applications Middleware Virtualization Operating System

Virtualization

Which of the following is NOT a type of PaaS? SaaS-centric PaaS Generic PaaS IaaS-centric PaaS Virtualized PaaS All of the above are types of PaaS

Virtualized PaaS


Conjuntos de estudio relacionados

Chapter 01: The Nurse's Role in Health Assessment

View Set

Orion Ch 8: Reporting and Analyzing Receivables

View Set

Physics- Newton's 2nd and 3rd Laws

View Set

chapter 38 medication administration and safety for infants and children

View Set

Television, Cable, and Mobile Video

View Set