CLOUD COMPUTING

¡Supera tus tareas y exámenes ahora con Quizwiz!

5. Which of the following is classic example of an IaaS service model ? A. AWS B. Azure C. Cloudera D. All of the mentioned

A. AWS AWS has several data centers in which servers run on top of a virtualization platform (Xen).

Which of the following can be considered PaaS offering ? A. Google Maps B. Gmail C. Google Earth D. All of the mentioned

A. Google Maps The vendor of the PaaS solution is in most cases the developer, who is offering a complete solution to the customer.

Which of the following model allows vendor to provide security as part of the Service Level Agreement ? A. SaaS B. PaaS C. IaaS D. None Of these

SaaS Compliance, governance, and liability levels are stipulated under the contract for the entire stack.

Which of the following scenario can be referred to as cloud bursting ? A. Part of the application is on a local system, and part is in the cloud B. Complete part of the application is on local system C. Complete part of the application is on local system D. None of the mentioned

A. Part of the application is on a local system, and part is in the cloud Each cloud platform also has its own set of attributes that need to be mapped.

1.When you add a software stack, such as an operating system & apps to the service, the model shifts to _____ model A. SaaS B. PaaS C. IaaS D. All of the mentioned

A. SaaS

Data stored in __________ domains doesn't require maintenance of a schema. A. SimpleDB B. SQL Server C. Oracle D. RDS

A. SimpleDB To create a high performance "simple" database, the data store created is flat; that is, it is non-relational and joins are not supported.

7. Which of the following is related to service provided by Cloud ? A. Sourcing B. Ownership C. Reliability D. AaaS

A. Sourcing Insourced or Outsourced means whether the service is provided by the customer or the service provider.

_________ allows different operating systems to run in their own memory space. A. VMM B. VMc C. VMM D. All of the mentioned

A. VMM VMM manages I/O for the virtual machines.

A _________ role is a virtual machine instance running Microsoft IIS Web server that can accept and respond to HTTP or HTTPS requests. A. Web B. Server C. Worker D. Client

A. Web Worker roles can communicate with Azure Storage or through direct connections to clients.

Which of the following adds an RSS feed to digital photo frame devices ? A. Windows Live FrameIt B. Windows Live Gallery C. Windows Live Groups D. Windows Live Hotmail

A. Windows Live FrameIt Windows Live Gallery is a collection of developer add-ons for Windows Live products.

4. Cloud computing is a _______ system and it is necessarily unidirectional in nature. A. stateless B. stateful C. reliable D. 4

A. stateless Cloud computing is a stateless system, as is the Internet in general.

Amazon EMR uses Hadoop processing combined with several __________ products. A. AWS B. ASQ C. AMR D. AWES

AWS Amazon Elastic MapReduce (Amazon EMR) is a web service that makes it easy to process large amounts of data efficiently.

Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ? A. CloudWatch B. Amazon Elastic Block Store C. AWS Import/Export D. All of the mentioned

B. Amazon Elastic Block Store The Load Balancing feature can detect when an instance is failing and reroute traffic to a healthy instance, even an instance in other AWS zones.

Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3 ? A. CloudWatch B. Amazon SimpleDB C. Amazon Cloudfront D. All of the mentioned

B. Amazon SimpleDB SimpleDB isn't a full database implementation.

The __________ model originally did not require a cloud to use virtualization to pool resources. A. NEFT B. NIST C. NIT D. All of the mentioned

B. NIST

_______ is a complete operating environment with applications, management, and the user interface. A. IaaS B. SaaS C. PaaS D. All of the mentioned

B. SaaS In the SaaS model, the application is provided to the client through a thin client interface.

Which of the following storage is presented to a user as if it is a ready-to-use disk drive ? A. Managed B. Unmanaged C. Unavailable D. None of the mentioned

B. Unmanaged The user has little control over the nature of how the disk is used.

_______ Live Services can be used in applications that run in the Azure cloud. A. Microsoft B. Windows C. Yahoo D. Ruby

B. Windows Windows Live Services is a collection of services that runs on Windows Live.

1. Which of the following can be used for banking industry ? A. athenahealth B. bankserve C. bankingsol D. All of the mentioned

B. bankserve Athenahealth is used for the medical industry.

Amazon EC2 provides virtual computing environments, known as : A. chunks B. instances C. messages D. None of the mentioned

B. instances

All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. A. propagation B. latency C. noise D. All of the mentioned

B. latency While cloud computing applications excel at large-scale processing tasks, if your application needs large amounts of data transfer, cloud computing may not be the best model for you.

The _________ portion of Azure AppFabric is a claims access control system that provides a token-based trust mechanism for identity management. A. Web Control B. Server Control C. Access Control D. All of the mentioned

C. Access Control The Access Control examines the request, and if it finds it to be valid, it grants a security token to the client.

Which of the following standard is concerned with the exchange and control of identity information ? A. IGK B. IDF C. IGF D. All of the mentioned

C. IGF The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.

2.Which of the following is most refined and restrictive service model? A. IaaS B. CaaS C. PaaS D. All of the mentioned

C. PaaS

_________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build. A. Infrastructure B. Service C. Platform D. All of the mentioned

C. Platform PaaS provides a model that can be used to create or augment complex applications such as Customer Relation Management (CRM) or Enterprise Resource Planning (ERP) systems.

Azure data is replicated ________ times for data protection and writes are checked for consistency. A. one B. two C. three D. All of the mentioned

C. Three SQL Azure eventually will support the Microsoft Sync Framework providing a facility for SQL Azure to synchronize their data with local databases.

Which of the following cloud concept is related to pooling and sharing of resources ? A. Polymorphism B. Abstraction C. Virtualization D. None of the mentioned

C. Virtualization Applications run on physical systems that aren't specified, data is stored in locations that are unknown, administration of systems is outsourced to others, and access by users is ubiquitous.

APIs and Deployment are second level application attributes in accordance with : A. application B. costs C. maintenance D. user interface

C. maintenance Deconstructing an application's critical functionality is only half the process.

How many EC2 service zones or regions exist ? A. 1 B. 2 C. 3 D. 4

D. 4 There are four different EC2 service zones or regions.

5. Which of the following is best known service model ? A. SaaS B. IaaS C. PaaS D. All of the mentioned

D. All of the mentioned

Which of the following factors might offset the cost of offline access in hybrid application ? A. scalability B. costs C. ubiquitous access D. All of the mentioned

D. All of the mentioned

Which of the following way can be used to access Windows Live ? A. By navigating to the service from the command on the navigation bar at the top of Windows Live B. By directly entering the URL of the service C. By selecting the application from the Windows Live Essentials folder on the Start menu D. All of the mentioned

D. All of the mentioned If you haven't signed into Windows Live during your session, Windows Live requests that you do so before allowing you to proceed.

Which of the following is a SaaS characteristic ? A. The typical license is subscription-based or usage-based and is billed on a recurring basis B. The software is available over the Internet globally through a browser on demand C. The software and the service are monitored and maintained by the vendor D. All of the mentioned

D. All of the mentioned There may be executable client-side code, but the user isn't responsible for maintaining that code or its interaction with the service.

Which of the following criteria needs to be met so that key drivers benefit from deployment to the cloud ? A. Are mission critical B. Do have sensitive data to protect C. Do need to be customized D. Are legacy applications with no particular competitive advantage

D. Are legacy applications with no particular competitive advantage Each cloud platform also has its own set of attributes that need to be mapped.

Which of the following is not a second level cloud attribute in relation to Storage ? A. Non-relational B. SQL support C. Replication D. Language and local

D. Language and locale Language and locale attribute is second level attribute in relation to platform feature.

8. ________ dimension corresponds to two different states in the eight possible cloud forms. A. Physical location of data B. Ownership C. Security boundary D. None of the mentioned

D. None of the mentioned

A service provider reselling an ____ may have the option to offer one module to customize the information. A. CaaS B. AaaS C. PaaS D. SaaS

D. SaaS Modifications are generally severely limited.

Which of the following provides access for developers to charge Amazon's customers for their purchases ? A. FWS B. FAS C. FPS D. All of the mentioned

FPS FPS is a payments-transfer infrastructure.

Which of the following system does not provision storage to most users ? A. PaaS B. IaaS C. CaaS D. SaaS

IaaS Cloud storage is storage accessed by a Web service API.

__________ authentication requires the outside use of a network security or trust service A. SSO B. Singlefactor C. Multifactor D. All of the mentioned

Multifactor More secure authentication requires the use of at least two-factor authentication.

________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application. A. Software B. Platform C. Analytics D. Compliance

Software Most of the cloud computing compliance systems to date have been built using private clouds.


Conjuntos de estudio relacionados

ATI Video Case Study: Growth and development

View Set

AWS Certified Solutions Architect - Associate Practice Questions

View Set

Evolutionary bio - Gamble: Ch. 14

View Set

Network+ 8th edition, Chapter 1 review questions

View Set