Cloud Computing Quiz 2 Study Guide
4. __________ is the term used when a cloud-based storage device overwrites (wipes) a file's contents when a file is deleted. A. Sponging B. Data wiping C. RAID erase D. None of the above
B. Data wiping
2. True or false? Google Talk is Google's cloud-based collaboration tool.
Answer: False
8. True or false? HyperWindows is Microsoft's desktop virtualization solution.
Answer: False
9. True or false? A DDoS attack employs a single dedicated computer to attack a target site.
Answer: False
10. True or false? The most difficult challenge for a company to defend itself against is a malicious employee.
Answer: True
10. True or false? Within a virtual server, to support the execution of multiple operating systems, each operating system is actually installed on top of special software called the hypervisor. The hypervisor, in turn, essentially manages each operating system's execution and resource use.
Answer: True
2. True or false? Because of their financial advantage, cloud-based solution providers may be better positioned to recruit and hire trained system specialists. A small company that tries to handle its own IT, on the other hand, may have a one-person IT staff—and that employee may have a steep learning curve.
Answer: True
2. True or false? Server computers originally required their own chassis, disk, power supply, and fan. Servers consumed considerable power, took up considerable space, and generated considerable heat within the data center.
Answer: True
6. True or false? The best defense against a packet sniffing attack is to use secure (encrypted) connections.
Answer: True
6. True or false? The cloud provides team members with a variety of tools with which they can collaborate.
Answer: True
6. True or false? Using virtualization, we can make one server appear to be many, a desktop computer appear to be running multiple operating systems simultaneously, a network connection appear to exist, or a vast amount of disk space or a vast number of drives to be available.
Answer: True
7. True or false? By using colocated, replicated hardware and software, cloud solution providers reduce many threats to IT resources.
Answer: True
7. True or false? Most web-based collaboration applications today support computer-based and handheld devices.
Answer: True
7. True or false? Virtualization is not a new idea. IBM, more than 30 years ago, had a virtual operating system that allowed a mainframe computer to run multiple copies of the same or different operating systems.
Answer: True
8. True or false? Most cloud service providers have state-of-the-art data centers; they normally have fire suppression systems, backup power generators, and strong physical security measures in place.
Answer: True
8. True or false? The IM text-based interaction provided one of the web's early forms of collaboration.
Answer: True
1. ______________ is the process of two or more people working together to achieve a result (a goal). A. Colocation B. Project scalability C. Collaboration D. Planning
C. Collaboration
9. Advantages of blade computers include all of the following except: A. Consume less physical space (footprint) B. Consume less power C. Use of blade computers is mandated by the Green Computing Initiative D. Generate less heat and are easier to cool E. Easy to install and configure
C. Use of blade computers is mandated by the Green Computing Initiative
1. ______________ uses hardware and software to create the illusion that two or more entities are present, when there is only one physical entity in existence. A. Colocation B. Scalability C. Virtualization D. None of the above
C. Virtualization
5. A ___________________ is a hacker attack on a site, the goal of which is to consume system resources, so that the site's users cannot use the resources. A. man-in-the-middle attack B. packet-sniffing attack C. denial-of-service attack D. None of the above
C. denial-of-service attack
10. Advantages of cloud-based calendar management systems include: A. No software other than a web browser is required B. Calendars are accessible through most devices C. Many cloud-based calendars will sync with other applications D. All of the above E. None of the above
D. All of the above
4. Advantages of desktop virtualization include: A. A single desktop computer can simultaneously run multiple operating systems B. There is reduced need for duplicate hardware C. Less power is consumed D. All of the above
D. All of the above
5. The advantages to using a social media tool for collaboration include the following: A. Users can exchange project information from anywhere, anytime, with any device B. Groups can keep team content secure C. Most users are already familiar with the social media user interface D. All of the above E. None of the above
D. All of the above
9. Which of the following is an advantage of cloud-based virtual meetings: A. Streaming video that allows face-to-face interaction B. Shared whiteboards that presenters can use to easily control the presentation of PowerPoint, Word, Excel, or related documents C. Accessibility to users, in most cases, through a myriad of devices D. All of the above E. None of the above
D. All of the above
3. Which of the following is not an advantage of virtual memory: A. A running program (process) appears to have unlimited memory B. The operating system can easily manage several different programs, running at the same time, and keep each program's data and instructions secure C. The operating system can take advantage of disk storage, which is considerably less expensive than RAM D. Using virtual memory is faster than using physical RAM
D. Using virtual memory is faster than using physical RAM
1. Which of the following is a security advantage of a cloud-based provider: A. Immediate deployment of software patches B. Extended human-relations reach C. Hardware and software redundancy D. Timeliness of incident response E. All of the above
E. All of the above
3. Questions one should ask about collaboration tools include which of the following: A. Can the solution scale to meet the organization's future needs? B. Is the solution secure? C. What are the solution's start-up and operational costs? D. How will the solution impact the company's IT staffing and resource requirements? E. All of the above
E. All of the above
3. Which of the following pose a security risk to cloud-based providers: A. Multitenant risks B. Malicious insiders C. Vendor lock in D. The cloud-based provider failing E. All of the above
E. All of the above
5. General guidelines for "green computing" include which of the following: A. Power off devices when they are not in use and power up energy-intensive devices, such as laser printers, only when needed B. Use notebooks when possible instead of desktop computers C. Use the computer's built-in power management features D. Dispose of e-waste (devices, ink cartridges, monitors, and so on) in compliance with government regulations E. All of the above
E. All of the above
4. Which of the following is not an advantage of Wikis for collaboration: A. Any member of the team can add or edit content B. Most users quickly learn how to edit content within the Wiki C. Team members who edit the wiki content can reside anywhere D. The edits to wiki content are immediate E. Because any member can edit the content, wikis sometimes contain errors
E. Because any member can edit the content, wikis sometimes contain errors