Cloud Computing Quizzes 1-6

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following are Cloud Computing Myths? [Choose Three] A company can safely ignore the cloud. Data stored in the cloud is not secure. Cloud adoption eliminates all internal IT. There are various strategic options for cloud adoption. Public cloud providers are audited by third parties on a recurring basis. Cloud providers have the expertise and resources to provide better security than most private organizations do.

A company can safely ignore the cloud. Data stored in the cloud is not secure. Cloud adoption eliminates all internal IT.

Which types of applications would be good cloud pilot candidates? [Choose Two] Custom line-of-business software requiring high availability. An employee knowledge base application with unpredictable peak loads. Spreadsheets requiring multiple simultaneous user updates. Payroll application that stores data in a proprietary format.

An employee knowledge base application with unpredictable peak loads. Spreadsheets requiring multiple simultaneous user updates.

Which of the following defines how quickly data can be moved over a wired or wireless connection? [Choose Two] Bandwidth Latency Load balancing Cloud based storage Firewalls and access control

Bandwidth Latency

All forms of cloud computing depend on networking. Which of the following are the key considerations of network design as they relate to cloud computing? [Choose Three] Bandwidth Latency Access control Hyperthreading Solid State Storage (SSD) Fiber optic cabling

Bandwidth Latency Access control

Which one of the terms below best matches this description [Choose One]: "Services are available from any type of computing device such as a smartphone, table, laptop, or desktop computer over the Internet." Broad network access Elasticity On-demand Pooled computing resources Monitored and measured service usage

Broad network access

Application development with cloud computing can change all these layers. [Choose Three] Building blocks Target platform Service-oriented architecture Storage access speed Automation Data formats

Building blocks Target platform Service-oriented architecture

Which one of the terms below best matches this description [Choose One]: "A way to improve the performance and speed of web-based services by relocating content. A typical web site is composed of an HTML file containing references to the content of the site, for example, a number of pictures. These pictures can be served from cloud data centers much closer to the web browsers." CDN Virtualization IaaS PaaS

CDN

Which of the following are the typical cloud adoption steps? [Choose Three] Choose a low-risk application for a cloud pilot. Determine possible changes to organizational roles and skills. Perform a risk assessment. Choose a mission-critical (high-risk) application for a cloud pilot. Hire a Cloud Administrator to oversee the transition. Buy insurance to mitigate (lower) the risk of migrating to the cloud.

Choose a low-risk application for a cloud pilot. Determine possible changes to organizational roles and skills. Perform a risk assessment.

Which of the following terms best matches this statement: Ability of authorized persons to access centrally stored data from anywhere to facilitate collaboration. Cloud Data Storage Risk Management Compliance Network Security Social Engineering

Cloud Data Storage

In cloud adoption what opportunities does cloud computing provide for business continuity and high availability?

Cloud computing allows a business to get a head start over others choosing a traditional route because they don't have to invest in hardware or someone to manage that hardware, and can get started with business right away. Often, cloud computing offers high availability with an average downtime of less than an hour a year. Applications are deployed quickly through the cloud and the services are available through a web server anywhere with Internet access.

Which of the following is not a consideration when planning IaaS adoption? [Choose One] Cloud provider application development tools. Reduced time to deploy new servers. OPEX versus CAPEX. Ability to remove unneeded servers.

Cloud provider application development tools.

Which of the following are reasons for outsourcing computer infrastructure needs? [Choose Two] Cloud providers have a lower cost per server because of their economies of scale. Managing an Email server might not be considered a core competence, and an external provider that focuses on this may achieve a higher availability. Already have a large internal datacenter and IT team. Companies with regulatory requirements for data privacy and security

Cloud providers have a lower cost per server because of their economies of scale. Managing an Email server might not be considered a core competence, and an external provider that focuses on this may achieve a higher availability.

Which of the following are types of resilience and redundancy for cloud computing? [Choose Three] Clustering Load balancing Cloud storage Hyperthreading Solid State Storage (SSD) Microsoft Windows Server

Clustering Load balancing Cloud storage

Which one of the terms below best matches this description [Choose One]: " Pool computing resources and make them available to several organizations with common needs, such as very quick access time to an application or adherence to strict security and audit guidelines.: multi-tenancy." Community cloud Private cloud Public cloud Hybrid cloud Personal cloud

Community cloud

Which of the following terms best matches this statement: Adherence to legal rules, and industry specific regulations. Risk Management Network Security Social Engineering Audits Compliance

Compliance

Organizations adopting the cloud should select providers that perform the right amount of standardization on the types of services that are used. Which of the following are examples of standards you should look for? [Choose Three] Data formats Data storage API Solid State Storage (SSD) 10 Gigabit Ethernet Intel CPUs

Data formats Data storage API

Which one of the terms below best matches this description [Choose One]: "You can add or remove services/users quickly. This allows an organization to grow or shrink on demand as there are spikes in business activity." Elasticity On-demand Monitored and measured service usage Broad network access Pooled computing resources

Elasticity

Which of the following are cloud computing services attributes identified by the National Institute of Standards and Technology (NIST)? [Choose Three] Elasticity Pooled resources Broad network access IoT devices Firewall appliance Optical storage media

Elasticity Pooled resources Broad network access

Which of the following are types of computing resources a client could consume? [Choose Three] Email accounts Data storage Servers (virtual machines) Firewall appliances IoT devices Text messaging

Email accounts Data storage Servers (virtual machines)

Public cloud computing is a good choice for a business with predictable and fixed workloads. [TRUE/FALSE] True False

False

Public cloud computing is a good choice for organizations that own large data centers. [TRUE/FALSE] True False

False

Public cloud computing is a good choice for organizations with legal and security needs. [TRUE/FALSE] True False

False

Virtual servers are used only in public clouds. [TRUE/FALSE] True False

False

Access to information systems is granted through digital identities that might come in the form of a username and password or Public Key Infrastructure (PKI) certificates. When multiple services from different providers are used, it becomes desirable to separate identity management from applications. This is done through one or more identity providers. The use of one or more identity providers across multiple applications is called what? [Choose one] Federation IaaS PaaS SaaS Redistribution

Federation

When evaluating the migration of one of your applications to the cloud, you discover complexities that may make migration impossible. In this case, what strategy might you employ? [Choose One] Find a functionally equivalent cloud application. Migrate the application to the cloud anyway. Export application data, provision a new virtual machine in the cloud, and then import application data to the new virtual machine. Export application data, provision a new physical machine in the cloud, and then import application data to the new physical machine.

Find a functionally equivalent cloud application.

Which of the following are examples of Software as a Service? [Choose Two] Google Docs Facebook Windows 10 Mac OS Android OS

Google Docs Facebook

Which of the following is NOT considered a cloud computing risk? [Choose One] Host-based firewalls Loss of network connectivity Data stored in the cloud Network latency

Host-based firewalls

The traditional IT performance and cost problems that are minimized with proper capacity planning. Which one of the terms below best matches this description [Choose One]: "Computing resources, such as CPU and storage, can be added (provisioned) and released rapidly." IaaS SaaS PaaS VaaS None of these

IaaS

Which one of the terms below is a service that most resembles the components that can be found in a modern data center? [Choose One]: IaaS SaaS PaaS VaaS

IaaS

Which one of the terms below best matches this description [Choose One]: "includes the self-provisioning of servers, storage, and so on, via a web-based portal. This service model includes the creation of cloud servers, cloud-based storage, and backup. Examples include Rackspace and Amazon S3 Storage." Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) None of these

Infrastructure as a Service (IaaS)

Cloud computing and outsourcing are similar, they share some common traits. Which of the following conveys three business reasons you should consider when adopting either one? [Choose Three] Lack of internal skillset Provider-owned assets Vendor lock-in potential Knowing the number of people that work for the cloud provider and what are their roles and responsibilities. Specific details about outsources hardware and building floor plans.

Lack of internal skillset Provider-owned assets Vendor lock-in potential

What would be the result of another cloud customer misusing the cloud infrastructure (for example, by sending spam emails) which resulted in the cloud provider network (which includes your organization) being blacklisted. All cloud resources would be destroyed by the cloud provider. Your organizations cloud resources would have to be sanitized with auditing tools. Your organization would face law suits and be open to hacking attacks. Legitimate emails from within your organization not reaching their destinations.

Legitimate emails from within your organization not reaching their destinations.

Which one of the terms below best matches this description [Choose One]: "A way to distribute heavy network traffic destined to a specific service among multiple servers across multiple redundant Internet connections." Load balancing High CPU utilization Cloud outsourcing Cloud virtualization Hyperthreading

Load balancing

Companies can adopt various cloud service models for their exclusive use; this defines a private cloud. Match each cloud service model to its business benefit. Making databases that might contain customer or product data, transactions, or statistics available for reuse. By allowing access to a library of functionality on these databases, large organizations can divide responsibility and deploy applications quickly, thus improving time to market. Delivering productivity software to end users over a network. Allows users to work remotely anytime, from anywhere, using any type of device.

Making databases that might contain customer or product data, transactions, or statistics available for reuse. By allowing access to a library of functionality on these databases, large organizations can divide responsibility and deploy applications quickly, thus improving time to market. >>Private PaaS Delivering productivity software to end users over a network. Allows users to work remotely anytime, from anywhere, using any type of device. >>Private SaaS

Which one of the terms below best matches this description [Choose One]: "Paid cloud services often have a monthly recurring subscription fee as well as usage fees. Time using a specific resource, percentage of processing capabilities, amount of disk space used." Monitored and measured service usage Broad network access Pooled computing resources Elasticity On-demand

Monitored and measured service usage

Which of the following terms best matches this statement: Multiple touch points between the organization and the outside world, with multiple distributed firewalls. Risk management Network Security Cloud Data Storage Compliance Social Engineering

Network Security

Confidentiality means that only authorized parties can view particular data. In IT, this is supported by encryption. Which of the following are the two main types of encryption involved in cloud computing? [Choose Two] Network encryption Stored encryption Double-key encryption Single-key encryption Typhoid Mary encryption

Network encryption Stored encryption

Which one of the terms below best matches this description [Choose One]: "You can access the service from anywhere, anytime, often simply using a web browser. The physical location of the software and your data at any given time is not known and may be spread across multiple data centers." On-demand Elasticity Pooled computing resources Monitored and measured service usage Broad network access

On-demand

As a developer for a software company, you have decided to build and test your web applications in a cloud environment. Which type of cloud service best meets your needs? [Choose One] PaaS SaaS IaaS None of these

PaaS

The traditional IT performance and cost problems that are minimized with proper capacity planning. Which one of the terms below best matches this description [Choose One]: "Application libraries are easily reused, which speeds up application development." PaaS IaaS SaaS VaaS None of these

PaaS

A cloud provider is the person, organization, or entity responsible for making a service available to interested parties: the consumers. This involves owning or contracting all hardware and software assets necessary for delivering the service. Match each component for their service with the correct definition. PaaS providers maintain these for reuse by other applications. Essential for IaaS, PaaS, and SaaS. Self-service web portals for provisioning and de-provisioning virtual machines. SaaS is delivered as a service and optimized for remote use by a variety of devices. For automating the running of the cloud and provisioning virtual machines. This could be developed by the cloud provider, or it could be third-party software. Find and potentially negotiate the best relationship and SLA between the cloud customer and cloud provider.

PaaS providers maintain these for reuse by other applications. >>Software libraries Essential for IaaS, PaaS, and SaaS. Self-service web portals for provisioning and de-provisioning virtual machines. >>Virtualization software components SaaS is delivered as a service and optimized for remote use by a variety of devices. >>Software packages For automating the running of the cloud and provisioning virtual machines. This could be developed by the cloud provider, or it could be third-party software. >>Management software Find and potentially negotiate the best relationship and SLA between the cloud customer and cloud provider. >>Broker

Which one of the terms below best matches this description [Choose One]: "This service model allows rapid development of new applications and websites. Servers, networking, storage, databases, and so on, are made available by the cloud provider. Vendor-specific tools may present the issue of vendor lock-in." Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) None of these

Platform as a Service (PaaS)

Which one of the terms below best matches this description [Choose One]: "Clouds that are provisioned for exclusive use by a single organization." Private cloud Public cloud Hybrid cloud Amazon S3 cloud Microsoft Azure cloud

Private cloud

Which one of the terms below best matches this description [Choose One]: "Companies using their own hardware and software assets to deliver web services are said to be using a private cloud. This solution will usually use virtualization and may offer a web portal that allows managers to provision services for their users." Private cloud Community cloud Public cloud Hybrid cloud Personal cloud

Private cloud

Which one of the terms below best matches this illustration (a picture of two phones connected over a private network to a firewall)? [Choose One]: Private cloud Public cloud Hybrid cloud Mobile devices Firewall appliances

Private cloud

Which one of the terms below best matches this description [Choose One]: "Offer computing services to all Internet users. This is what most people think of when they think of cloud computing. Some cloud offerings are free, and some require that customers pay a subscription and usage fee for services delivered via their Internet connection." Public cloud Private cloud Community cloud Hybrid cloud Personal cloud

Public cloud

Hybrid clouds are a combination of which two types of clouds? [Choose Two] Public cloud Private cloud Community cloud Personal cloud Cirrus clouds

Public cloud Private cloud

Which of the following are reasons that companies adopt cloud solutions? [Choose two] Quickly provision temporary computing capacity. Alleviate regulatory compliance concerns. To avoid vendor lock in. To facilitate innovation. To increase complexity.

Quickly provision temporary computing capacity. To facilitate innovation.

Which of the following are new issues related to governance introduced by cloud computing? [Choose one] Regulatory compliance Availability Performance High availability

Regulatory compliance

Which of the following are possible approaches to data synchronization for data replication? [Choose Two] Replicate a master copy of the data to all applications hosted by all providers. Synchronize all data changes in all directions when changes occur. Keep frequent backups at off-site locations in case of data loss. Implement RAID 6 and all SSD hard-drives for better reliability. Use Windows Server Data Duplicator to create and manage duplicate copies of data.

Replicate a master copy of the data to all applications hosted by all providers. Synchronize all data changes in all directions when changes occur.

There will always be some type of risk, although reduced, even after performing a risk assessment and applying the best solution. What is this type of risk called?

Residual risk

Which of the following terms best matches this statement: The proactive identification, analysis, and control of things that can threaten the assets or earning capacity of an enterprise. Risk Management Social Engineering Audits Compliance Network Security

Risk Management

What is the purpose of governance in cloud computing". [Choose two] Risks are mitigated. Growth is unimpeded by the SLA. Capacity is adequate for elasticity. Availability and resilience are prioritized. Investments generate value.

Risks are mitigated. Investments generate value.

Virtualization and cloud computing can overcome the following problems? [Choose Three] Running out of capacity Costly excess capacity Tied-up capital Performance Reliability Security

Running out of capacity Costly excess capacity Tied-up capital

The traditional IT performance and cost problems that are minimized with proper capacity planning. Which one of the terms below best matches this description [Choose One]: "Users can be added and removed on short notice with few penalties.." SaaS PaaS IaaS VaaS None of these

SaaS

Which of the following are reasons for outsourcing computer infrastructure needs? [Choose Two] Server procurement and provisioning consumes time and delays the time to market for important products. Not owning large data centers full of servers reduces capital expenditures. Already have a large internal datacenter and IT team. Companies with regulatory requirements for data privacy and security.

Server procurement and provisioning consumes time and delays the time to market for important products. Not owning large data centers full of servers reduces capital expenditures.

The configuration management database (CMDB) stores data related to IT processes. Which of the following are things the CMDB would store data about? [Choose Four] Service Provisioning Software Distribution Software Patching Server Installation Hardware Cost and Pricing Time to Implement Service Management Processes

Service Provisioning Software Distribution Software Patching Server Installation

The ITIL life cycle consists of four common IT service management phases we will correlate to cloud computing. Sequence each phase in order from first to last. Service Strategy Service Operation Service Transition Service Design

Service Strategy >>1 Service Operation >>3 Service Transition >>4 Service Design >>2

The ITIL life cycle consists of four common IT service management phases we will correlate to cloud computing. Match each of the statements below with the service management phase it belongs. Service level agreements (SLA) with providers. New IT services that can be rapidly provisioned using self-service web portals. Eliminates a long wait for hardware to be installed—but other parts of the process remain manual and take a long time. CMDB is a repository of IT services and the underlying components and processes used to deliver them. It connects configuration items to the value they provide to customers.

Service level agreements (SLA) with providers. >>Service Strategy New IT services that can be rapidly provisioned using self-service web portals. >>Service Design Eliminates a long wait for hardware to be installed—but other parts of the process remain manual and take a long time. >>Service Operation CMDB is a repository of IT services and the underlying components and processes used to deliver them. It connects configuration items to the value they provide to customers. >>Service Transition

Which of the following terms best matches this statement: The act of manipulating people to disclose some kind of confidential information. Network Security Risk Management Social Engineering Cloud Data Storage Compliance

Social Engineering

Which one of the terms below best matches this description [Choose One]: "A user account allows access to software that is accessible anytime from anywhere using a web browser. Data is stored in the cloud and thus facilitates collaboration. Examples include: Gmail." Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) None of these

Software as a Service (SaaS)

In a cloud environment, what is the most likely culprit that will affect application performance? [Choose one] The network link separating cloud clients and cloud servers. The hard drives being used: SSD vs traditional spinning platter. The complexity of the URLs used, shorter URL is faster. Server operating system used: Windows vs Linux. How often backups are done and where they are stored.

The network link separating cloud clients and cloud servers.

Private clouds mean that IT must ensure the appropriate cloud fabric is in place to allow self-provisioning. Adopting the appropriate level of cloud computing requires a number of steps to be undertaken. Put in order of first, Second, Third,... the following steps that are the critical success factors. The results of these steps must be regularly evaluated, and this evaluation must be acted upon. The vision embodied in the operating model must be executed. The organization must develop a vision of the way cloud benefits are realized. The appropriate operating model for the vision must be designed.

The results of these steps must be regularly evaluated, and this evaluation must be acted upon. >>4 The vision embodied in the operating model must be executed. >>3 The organization must develop a vision of the way cloud benefits are realized. >>1 The appropriate operating model for the vision must be designed. >>2

Cloud computing is relevant for companies of all sizes, but it does not affect all groups of users and departments equally. Match each User/Group with the way they are affected by Cloud Computing. These users interact directly with applications delivered to them over the network. The ability to store documents in the cloud facilitates collaboration. Workers will configure, monitor, and maintain security and cloud service usage policies, as well as being involved in negotiating service level agreements. Provide elastic, self-provisioned, and on-demand computing infrastructure that characterizes a cloud.

These users interact directly with applications delivered to them over the network. The ability to store documents in the cloud facilitates collaboration. >>Office Workers Workers will configure, monitor, and maintain security and cloud service usage policies, as well as being involved in negotiating service level agreements. >>Internal IT Departments Provide elastic, self-provisioned, and on-demand computing infrastructure that characterizes a cloud. >>IT Service Providers

Cloud storage is not nearly as fast as local disks can be. [TRUE/FALSE] True False

True

On the client side, cloud computing does not require significant CPU processing power. [TRUE/FALSE] True False

True

Public cloud computing is a good choice for businesses that grow or shrink rapidly. [TRUE/FALSE] True False

True

The major risk with external service providers and technology providers is the dependency on them. [True / False] True False

True

Which one of the terms below best matches this description [Choose One]: "Migrate local data to the cloud." Upload Download Sideload Data integrity

Upload

Public cloud services are available from any device anytime from anywhere in the world where you have an Internet connection. What technology facilitated secure connections like these for many years before there were cloud services? [Choose One] Virtual private networks Magnetoshere Hyperthreading Provisioned services

Virtual private networks

Which one of the terms below best matches this description [Choose One]: "Allows multiple operating systems to share the same hardware." Virtualization Hyperthreading Uninterruptible Power (UPS) Solid State Storage (SSD)

Virtualization

Developers build these components in the cloud. [Choose One] Web services SaaS user mailboxes Cloud load balancers Federation identity providers

Web services

In cloud adoption how does the end-to-end process of setting strategic and operational targets change? How does chargeback change?

When adopting a cloud model, your internal IT staff shift their focus from maintaining hardware on-site to managing their scalable cloud service, company costs shifts capital expenses to operational expenses, it allows companies to focus on fast business opportunities, and your data becomes available and easily collaborated with once in the cloud. Services can be quickly provisioned, the cloud provider does software maintenance and patching, and internal IT staff's skills are utilized to monitor how the cloud service is being used to ensure best performance and SLA.

Cloud apps connect to each other using web standards to exchange data, Which of the following is a common web standard for data exchanges between cloud apps? [Choose One] XML PDF JPEG HTTPS

XML

Which one of the terms below best matches this description [Choose One]: "The capacity to be changed in size or scale for a growing amount of work by adding resources to the system." scalability reliability usability maintainability availability

scalability


Conjuntos de estudio relacionados

Finn 1003 - Exam 2 Study Material (Ch.5-9)

View Set

ITM- Chapter 13- Simple Linear Regression

View Set