Cloud Computing
_____ is an application that you rent over the open internet. IaaS SaaS PaaS TaaS
SaaS
which type of cloud deployment model uses both public and private clouds, allowing you to run workloads on either cloud deployment models, and having them work seamlessly together? Select an answer: public private remote hybrid
hybrid
Which aspect is the most important for cloud security? Select an answer: monitoring and corrective action redundancy and agility maturity and continuity incident response and recovery
monitoring and corrective action
Which type of cloud deployment model does the organization own the hardware on which the cloud runs? Public private hybrid remote
private
Data analysis provides you with the ability to be _____, which is important to advance cloud security. reactive and resilient active and elastic redundant and secure proactive and predictive
proactive and predictive
The most effective security is _____. Select an answer: redundant security proactive security layered security reactive
proactive security
Why would Infrastructure as a Service (IaaS) be recommended for an organization? It is more secure than other system models, including internal hosting. There is more growth potential due to the increased technology and modularity, while improving on network mobility. A third-party provider hosts the software, hardware, services, and other aspects of the system. The hardware and software components are more efficient and reliable.
A third-party provider hosts the software, hardware, services, and other aspects of the system.
_____ leverages continuous operations and your ability to have feedback loops that go back to the developers, to make sure they are continuously improving these things. NetworkOps SecOps DevOps CloudOps
CloudOps
Why should any student select only the workload that shows success? Working on a difficult task while learning the concepts will significantly help students retain the material. Working on a difficult task while learning new skills will help students retain the material and increase chances of timely completion. Working incrementally will help students test their work thoroughly and focus on more changes rapidly. Working incrementally and understanding basic concepts while learning new skills will help students comprehend the material.
Working incrementally and understanding basic concepts while learning new skills will help students comprehend the material.
The ability to get resources in line as quickly as needed is an example of _____. lifecycle management rapid elasticity redundancy scale-up
rapid elasticity
What is the process of leveraging a new operating system, new memory modes, or new storage systems? re-hosting redeployment re-platforming replacing
re-platforming
Active-active architecture provides _____ in the event one application fails. Select an answer: mirroring redundancy resiliency auto-recovery
redundancy
AWS, Microsoft Azure, and Google Cloud Platform are examples of which type of cloud service? IaaS SaaS TaaS PaaS
IaaS
Why is cloud computing important for an organization? It provides improved security and promotes agile methodologies. It provides improved security and testing. It provides cost efficiency and improved testing. It provides cost efficiency and promotes agile methodologies.
It provides cost efficiency and promotes agile methodologies.
What are the three most important issues to consider when evaluating the criticality of data? security, performance, and network issues security, compliance, and performance issues security, compliance, and network issues compliance, reliability, and performance issues
security, compliance, and performance issues
Which ability allows a system to perceive it is not working properly and, without human intervention, make adjustments to restore normal operations? self-healing auto-configuration auto-repair auto-recovery
self-healing
Which type of cloud deployment model reduces the complexity of building, testing, and deploying applications by keeping the developers inside a well-defined environment, which limits the ability for the developers to make mistakes? Select an answer: Software as a service Process as a service Infrastructure as a service Platform as a service
Platform as a service
What are some best practices for scrutinizing front door access to a system? Review laws and corporate policies for compliance. Implement standards and encryption policies. Review policies, APIs, and repositories. Update technical manuals and software procedures for all stakeholders.
Review policies, APIs, and repositories.
What are some metrics used for Total Cost of Ownership (TCO)? the value of the product or service as it compares to its influence on the target audience the weight assigned to values, including agility, productivity, scalability, and revenue an overall goal reached by a certain duration of time the tangible and intangible costs needed to produce a product or service
the weight assigned to values, including agility, productivity, scalability, and revenue
In a _____ model, a third-party provider hosts application software on behalf of the end user. Select an answer: Infrastructure as a service Process as a service Software as a service Platform as a service
Software as a service
What comprises an Infrastructure as a Service (IaaS) model? increased speed and virtualization for an organization third-party improvements with software and hardware, which are difficult to offer when hosted internally third-party provider that hosts, services, and maintains all aspects of the system on behalf of the end user increased help on logic and coding issues for an organization's proprietary system
third-party provider that hosts, services, and maintains all aspects of the system on behalf of the end user
Why is redundancy core to good cloud operations? Select an answer: to increase mobile computing and access to the network to take advantage of volume software licenses to improve on network flexibility and system scalability to become very familiar with a certain process and improve on it
to become very familiar with a certain process and improve on it
The cost of migrating from existing traditional systems on-premise in the public Cloud-based system is referred to as what? transitional cost residual cost total cost of ownership return on investment
transitional cost
Where should a business put its top priority when considering a security system? product compatibility availability responsiveness deployment history cost
availability responsiveness
Maintaining _____ is essential to ensuring that we have an understanding of what is happening with cloud-based storage and retrieval. redundant systems APIs centralized logs consistency across systems
centralized logs
Which skillset for cloud professionals is generally the most difficult to find? cloud network specialist cloud architects cloud developers cloud governance specialists
cloud architects