CompTIA Cloud+ set 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

VXLAN provides virtual ______ layer connections across ______ layer networks? A) Data-link, Network B) Physical, Data-Link C) Transport, Physical D) Network, Transport

A

What are some examples of utility value provided by a cloud-based service? A) Access from anywhere B) Higher availability C) Better security D) Business continuity

A

What characteristic of cloud computing reduces administrative costs? A) Self-service or automated resource management B) Placing the cloud data center farther away from local administrators C) Limitation of platform/application development selection (in PaaS environments) D) Paying only for resources actually consumed

A

Community Cloud

A *community cloud* is similar to a public cloud except that its access is limited to a specific community of cloud consumers. The community cloud may be jointly owned by the community members or by a third-party cloud provider that provisions a public cloud with limited access. The member cloud consumers of the community typically share the responsibility for defining and evolving the community cloud. Membership in the community does not necessarily guarantee access to or control of all the cloud's IT resources. Parties outside the community are generally not granted access unless allowed by the community.

Hybrid Cloud

A *hybrid cloud* is a cloud environment comprised of two or more different cloud deployment models. Hybrid deployment architectures can be complex and challenging to create and maintain due to the potential disparity in cloud environments and the fact that management responsibilities are typically split between the private cloud provider organization and the public cloud provider.

Private Cloud

A *private cloud* is owned by a single organization. Private clouds enable an organization to use cloud computing technology as a means of centralizing access to IT resources by different parts, locations, or departments of the organization. When a private cloud exists as a controlled environment, the problems described in the Risks and Challenges section do not tend to apply. The use of a private cloud can change how organizational and trust boundaries are defined and applied. The actual administration of a private cloud environment may be carried out by internal or outsourced staff.

True or false? Application life cycle management in the cloud is slightly more complex than in traditional development models due to the addition of remote resources. A) True B) False

B

True or false? Big data applications are perfect candidates for cloud-based applications A) True B) False

B

True or false? Cloud computing is inherently an ecologically green technology A) True B) False

B

True or false? Cloud computing is the same as virtualized computing A) True B) False

B

True or false? Government agencies must always notify a data owner when they compel disclosure of information from a cloud service provider as part of lawful access A) True B) False

B

True or false? ITIL is a collections of tools used to manage an IT infrastructure. A) True B) False

B

True or false? If the cloud service provider has a strong information security management system (ISMS), the customer does not have to have one as well. A) True B) False

B

True or false? Organizations with a workforce that is distributed geographically would not benefit from public cloud services A) True B) False

B

True or false? The United States and the European Union have compatible data privacy laws A) True B) False

B

True or false? There are no significant security benefits to using cloud services A) True B) False

B

True or false? Vendor lock-in concerns relate only to PaaS cloud implementations A) True B) False

B

True or false? vendor lock-in concerns relate only to Platform as a Service cloud implementations A) True B) False

B

What is the process of verifying a user's identity? A) Authorization B) Authentication C) Logging in D) Access control

B

Which of the following is not an appropriate mitigation technique against data exposure? A) Audit B) Recovery C) Data isolation D) Encryption

B

MDF

Main Distribution Facility

How can cloud-related financial risks be managed? A. Credit cards must be used for handling transactions B. Eliminating legacy IT systems C. Making sure that cloud assets are generating revenue D. Renegotiating license agreements

Making sure that cloud assets are generating revenue

How can an organization successfully implement a SAAS strategy? A. Manage the risks associated with bringing in external providers B. Continuously execute performance analytics to monitor providers C. Open up internal databases with Web service access for easier access D. Standardize on a limited set of virtual machines to increase security

Manage the risks associated with bringing in external providers

Which of the following is the function of orchestration services? A. Assemble functional requirements for application development B. Configure application clusters with Web services C. Enable and disable load balancers D. Manage the starting and stopping of application server clusters

Manage the starting and stopping of application server clusters

MSP

Managed Service Provider

Which of the following is the most complex security provisioning problem in a cloud environment? A. Handling credit cards for purchasing cloud services B. Keeping track of cloud provider performance C. Managing users and their rights across multiple providers D. Software assets that are introduced and can expire

Managing users and their rights across multiple providers

MAC

Mandatory Access Control

Which of the following are strategic exit options? A. Change the system applications B. Change the cloud provider C. Re-host in-house D. All of the above

Re-host in-house

RPO

Recovery Point Objective

RTO

Recovery Time Objectives

There is evidence to suggest that there is a type of fluid that exists in the tunnel of Corti and in the spaces between the hair cells. This fluid is known as

cortilymph

German measles is a common name for this viral infection: _____________________________ .

Rubella

True or false? Dynamic scaling of resources in the cloud may lead to noncompliance with software licenses A) True B) False

A

Ubiquitous access

*Ubiquitous Access represents the ability for a cloud service to be widely accessible*. Establishing ubiquitous access for a cloud service can require support for a range of devices, transport protocols, interfaces, and security technologies. To enable this level of access generally requires that the cloud service architecture be tailored to the particular needs of different cloud service consumers.

Which of the following statements represents the correct definition of the terms 'cost allocation' and 'chargeback'? A. 'Cost allocation' focuses on recovering costs from consumers of cloud-delivered services whereas 'chargeback' relates to identifying costs and assigning them to specific cost categories. B. 'Cost allocation' and 'chargeback' are synonymous terms that relate to allocating costs of cloud services and ensuring that billing occurs for the services being delivered. C. 'Cost allocation' relates to identifying costs and assigning them to specific cost categories. 'Chargeback' is focused on recovering costs from consumers of the cloud-delivered services. D. 'Cost allocation' and 'chargeback' relate to ensuring that cloud computing delivery services are a profit center instead of a cost center. This leads to a positive return on investment for both cloud provider and cloud consumer.

'Cost allocation' relates to identifying costs and assigning them to specific cost categories. 'Chargeback' is focused on recovering costs from consumers of the cloud-delivered services.

Roles and boundaries

(BOS ==> TO SCAP SC) Boundaries - *T*rust Boundary - *O*rganizational Boundary Roles (Organization) - Cloud *S*ervice Owner - Cloud *C*onsumer - Cloud Resource *A*dministrator - Cloud *P*rovider Roles (Software) - *S*ervice Consumer - *C*loud Service Consumer

Business Drivers

(COC) 1. *Capacity Planning*: Planning for capacity can be challenging because it requires estimating usage load fluctuations. There is a constant need to balance peak usage requirements without unnecessary over-expenditure on infrastructure. An example is outfitting IT infrastructure to accommodate maximum usage loads which can impose unreasonable financial investments. In such cases, moderating investments can result in under-provisioning, leading to transaction losses and other usage limitations from lowered usage thresholds. 2. *Organizational Agility*: An IT enterprise often needs to respond to business change by scaling its IT resources beyond the scope of what was previously predicted or planned for. For example, infrastructure may be subject to limitations that prevent the organization from responding to usage fluctuations-even when anticipated-if previous capacity planning efforts were restricted by inadequate budgets. 3. *Cost Reduction & Operating Overhead Reduction*: A direct alignment between IT costs and business performance can be difficult to maintain. The growth of IT environments often corresponds to the assessment of their maximum usage requirements. This can make the support of new and expanded business automations an ever-increasing investment.

(True/False) Cloud Computing must either be introduced completely or not at all to be beneficial to a company

(False) It is important to note that cloud computing can be incorporated to different measures and extents - an IT enterprise can put some all 0r none of its IT resources in a cloud.

(True/False) Every IT resource is directly available (remotely accessible) to consumers.

(False) Not every IT resource that resides inside a cloud needs to be made directly available to consumers. A *cloud-based IT resource* can be remotely accessed or *it can support the remote access of other cloud-based IT resources*.

What technology innovation lead to Cloud Computing?

(GriCluVir) 1. Grid Computing Technology 2. Clustering Technology 3. Virtualization Technology

Give some examples of how service agents are called

(HILF) Depending on the development platform you are working with, service agents may be called "handlers", "interceptors", "listeners", "filters", etc.

Delivery Models

(IPS) - *IaaS*: Infrastructure as a Service - *PaaS*: Platform as a Service - *SaaS*: Software as a Service

cloud characteristics

(OMUMER) - on-demand usage - multitenancy (& Resource Pooling) - ubiquitous access - measured usage - elasticity - resilient computing

SLA Characteristics

(PARSR) - *Performance*: capacity, response time, and delivery time guarantees - *Availability*: up-time, outages, service duration - *Reliability*: minimum time between failures, guaranteed rate of successful responses - *scalability*: capacity fluctuation and responsiveness guarantees - *resilience*: mean-time to switchover and recovery

SAML

Security Assertion Markup Language

Service quality metric characteristics

(QREC) - *Quantifiable* — The unit of measure is clearly set, absolute, and appropriate so that the metric can be based on quantitative measurements. - *Repeatable* — The methods of measuring the metric need to yield identical results when repeated under identical conditions. - *Easily Obtainable* — The metric needs to be based on a non-proprietary, common form of measurement that can be easily obtained and understood by cloud consumers. - *Comparable* — The units of measure used by a metric need to be standardized and comparable. For example, a service quality metric cannot measure smaller quantities of data in bits and larger quantities in bytes.

Challenges of Cloud Computing

(SPOM) - increased security vulnerabilities - limited portability between cloud providers - reduced operational governance control - multi-regional compliance and legal issues

Business Cost Metrics

(U O SILC sounds like "You owe Silk") Common types of metrics used to evaluate the estimated costs and business value of leasing cloud-based IT resources when compared to the purchase of on-premise IT resources: - *u*p-front costs - *o*n-going costs - *s*unk costs - *i*ntegration costs - *l*ocked-in costs - cost of *c*apital

Common functions performed by Service Agents

(VaLoRoSec) - validation - logging - routing - security-related processing

Explain difference "on-premise" and "cloud-based"

(don't really understand this :s ) It is important to use the terms *"on-premise"* and *"cloud-based"* correctly within the context of a private cloud. Even though the private cloud may physically reside on the organization's premises, IT resources it hosts are still considered "cloud-based" as long as they are made remotely accessible to cloud consumers. IT resources hosted outside of the private cloud by the departments acting as cloud consumers are therefore considered "on-premise" in relation to the private cloud-based IT resources.

cloud

*A cloud refers to a distinct IT environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. * The term originated as a metaphor for the Internet which is, in essence, a network of networks providing remote access to a set of decentralized IT resources. Prior to cloud computing becoming its own formalized IT industry segment, the symbol of a cloud was commonly used to represent the Internet in a variety of specifications and mainstream documentation of Web-based architectures. This same symbol is now used to specifically represent the boundary of a cloud environment.

cloud service

*A cloud service is any IT resource that is made remotely accessible via a cloud*. Unlike other IT fields that fall under the service technology umbrella - such as service-oriented architecture - the term "service" within the context of cloud computing is especially broad. A cloud service can exist as a simple Web-based software program with a technical interface invoked via the use of a messaging protocol, or as a remote access point for administrative tools or larger environments and other IT resources. The driving motivation behind cloud computing is to provide IT resources as services that encapsulate other IT resources, while offering functions for clients to use and leverage remotely. A multitude of models for generic types of cloud services have emerged, most of which are labeled with the "as-a-service" suffix.

active service agent

*Active service agents* perform an action upon intercepting and reading the contents of a message. The action typically requires making changes to the message contents (most commonly message header data and less commonly the body content) or changes to the message path itself

IT Resource

*An IT resource* is a *physical or virtual IT-related artifact* that can be either software based, such as a virtual server or a custom software program, or hardware-based, such as a physical server or a network device.

Elasticity

*Elasticity is the automated ability of a cloud to gracefully and transparently scale IT resources*, as required in response to runtime conditions or as pre-determined by the cloud consumer or cloud provider. Elasticity is often considered a core justification for the adoption of cloud computing, primarily due to the fact that it is closely associated with the Reduced Investment and Proportional Costs benefit. Cloud providers with vast IT resources can offer the greatest range of elasticity.

passive service agent

*Passive service agents* do not change message contents. Instead, they read the message and may then capture certain parts of its contents, usually for monitoring, logging, or reporting purposes.

service agent

*Service agents are event-driven programs designed to intercept messages at runtime.* There are active and passive service agents, both of which are common in cloud environments. Cloud-based environments rely heavily on the use of system-level and custom service agents to perform much of the runtime monitoring and measuring required to ensure that features, such as elastic scaling and pay-for-use billing, can be carried out instantaneously.

Multitenancy

*The characteristic of a software program that enables an instance of the program to serve different consumers (tenants) whereby each is isolated from the other, is referred to as multitenancy*. A cloud provider pools its IT resources to serve multiple cloud service consumers by using multitenancy models that frequently rely on the use of virtualization technologies. Through the use of multitenancy technology, IT resources can be dynamically assigned and reassigned, according to cloud service consumer demands. *Resource pooling allows cloud providers to pool large-scale IT resources to serve multiple cloud consumers.* Different physical and virtual IT resources are dynamically assigned and reassigned according to cloud consumer demand, typically followed by execution through statistical multiplexing. Resource pooling is commonly achieved through multitenancy technology, and therefore encompassed by this multitenancy characteristic.

Cloud Provider

*The organization that provides cloud-based IT resources is the cloud provider.* When assuming the role of cloud provider, an organization is responsible for making cloud services available to cloud consumers, as per agreed upon SLA guarantees. The cloud provider is further tasked with any required management and administrative duties to ensure the on-going operation of the overall cloud infrastructure.

Public Cloud

- A *public cloud* is a publicly accessible cloud environment owned by a third-party cloud provider. - The IT resources on public clouds are usually provisioned via the previously described cloud delivery models and are generally offered to cloud consumers at a cost or are commercialized via other avenues (such as advertisement). The cloud provider is responsible for the creation and on-going maintenance of the public cloud and its IT resources.

Cloud Resource Administrator

- A cloud resource administrator is the *person or organization responsible for administering a cloud-based IT resource* (including cloud services). - The cloud resource administrator can be (or belong to) the cloud consumer or cloud provider of the cloud within which the cloud service resides. - Alternatively, it can be (or belong to) a third-party organization contracted to administer the cloud-based IT resource.

Organizational boundary

- An *organizational boundary* represents the *physical perimeter that surrounds a set of IT resources that are owned and governed by an organization*. - The organizational boundary does not represent the boundary of an actual organization, only an organizational set of IT assets and IT resources. Similarly, clouds have an organizational boundary.

technology innovation - Web/Clustering

- Because Web applications were commonly made available to a wide, public user-base, they often became demand-driven and tended to be "spiky" in their usage loads. - The back-end technology architectures that evolved in support of Web-based applications therefore introduced the need for: ...- load balancing ...- server farms ...- clustered servers ...- clustered databases - These technology advances became relevant to the manner in which clouds provide IT resources.

Business Drivers - *Cost Reduction & Operating Overhead Reduction*

- Beyond the initial investment required to establish needed IT infrastructure, the actual cost of ownership needs to be considered. - For organizations with fluctuating or unpredictable usage requirements it can be overly expensive to own and operate IT infrastructure that can accommodate usage peaks. but is, for the most part, underutilized. - Overtime, the administration demands can unnecessarily increase operating costs, making the IT department itself more of a burden upon the organization.

Business Drivers - *Capacity Planning*

- Capacity planning is an unavoidable responsibility for most IT enterprises. requiring that future demands on IT infrastructure be planned for and accommodated. - Capacity planning can be very challenging because it can require estimating usage load fluctuations. - There is a constant need to balance peak usage requirements without unnecessarily over-spending on IT infrastructure. - To accommodate maximum usage loads may require too high of an investment. To moderate the investment may result in lost transactions and other usage limitations due to lower usage thresholds.

Business Cost Metrics - locked-in costs

- Cloud environments can impose portability limitations. - When performing a metrics analysis over a longer period of time, it may be necessary to take into consideration the possibility of having to *move from one cloud provider to another*. - Due to the fact that cloud service consumers can become dependent on proprietary characteristics of a cloud environment, there are locked-in costs associated with this type of move. - Locked-in costs can further *decrease the long-term business value of leasing cloud-based IT resources*.

Challenges of Cloud Computing - limited portability between cloud providers

- Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly *proprietary* to various extents. - For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be *challenging to move from one cloud provider to another*.

technology innovation - *Grid Computing*

- Grid computing emerged in the 90's to introduce the concept of "computing as a networked utility." - With a grid you could plug into a pool of shared computing power the same way you would plug an appliance into a shared power grid. - this concept led to the notion of "pay-as-you-go" computing and further formed the basis of "elasticity" - both of which establish fundamental characteristics of a cloud (as explained later in the Characteristics of a Cloud section). - Note the use at grid computing specifically within cloud platforms is still classified as on "emerging technology." as explained in Module 2: Cloud Technology Concepts.

Goals & Benefits Cloud Computing - Increased Scalability

- IT resources can be *flexibly acquired* from a cloud provider, almost instantaneously and at a wide variety of usage levels. - By scaling with cloud-based IT resources, cloud consumers can leverage this flexibility to *increase their responsiveness* to foreseen changes and unforeseen changes. - This holds true for when a cloud consumer needs to *scale* IT resources, based on current requirements.

Business Drivers - *Organizational Agility*

- Organizational agility represents the responsiveness of an organization in the face at business change. - In many cases. an IT enterprise needs to respond to business change by being able to scale its IT resources beyond what may have been previously predicted or planned for. - In other cases. changing business needs or priorities may require that IT resources be more available and/or reliable than they previously have been. - The ability for an IT enterprise to be responsive to these and other types of changes helps enable it to increase an organization's overall agility.

What are common IT Resources?

- Physical Server - Virtual Server - Software Program - Service - Storage Device - Network Device

Resilient computing

- Resilient computing is *a form of failover that distributes redundant implementations of IT resources across physical locations*. - IT resources can be pre-configured so that if one becomes deficient, processing is automatically handed over to another redundant implementation. - Within cloud computing, the characteristic of resiliency can refer to redundant IT resources within the same cloud (but in different physical locations) or across multiple clouds. - Cloud consumers can increase both the reliability and availability of their applications by leveraging the resiliency of cloud-based IT resources.

Challenges of Cloud Computing - increased security vulnerabilities

- Responsibility over data security becomes shared with the cloud provider - Cloud provider's privileged access to cloud consumer data; The extent to which the data is secure is now limited to the security controls and policies applied by both the cloud consumer and cloud provider - Attack surface is bigger - The remote usage of IT resources requires an expansion of trust boundaries by the cloud consumer to include an external cloud. - Unless the cloud consumer and cloud provider support the same or compatible security technologies. it can be difficult to establish a security architecture that spans the trust boundary without introducing vulnerabilities. - Furthermore. because cloud-based IT resources can be shared. there can be overlapping trust boundaries from different cloud consumers (as illustrated on the following page).

What are the fundamental concepts of cloud computing?

- Service - Cloud Service - IT Resource - Service Agent (Active/Passive) - Virtualization - On-Premise - Cloud - Scaling (horizontal/vertical)

IaaS: Infrastructure as a Service

- The IaaS delivery model represents a self-contained IT environment comprised of infrastructure-centric IT resources that can be accessed and managed via cloud service-based interfaces and tools. - This environment can include hardware, network, connectivity, operating systems, and other "raw" IT resources. - In contrast to traditional hosting or outsourcing environments, with IaaS, IT resources are typically virtualized and packaged into bundles that simplify up-front runtime scaling and customization of the infrastructure.

SLA Characteristics - Performance

- The maximum performance of an IT resource represents the capacity up to which the IT resource is able to perform its functions. - The determination of this capacity (the performance rating) of a given IT resource depends on its type and purpose. - For example, a Web service's performance rating could be specified in calls per seconds and the response time for each call. - A development environment, on the other hand, may measure capacity in the maximum number of concurrent users that can be supported.

Measured usage

- The measured usage characteristic represents *the ability of a cloud platform to keep track of the usage of its IT resources*, primarily by cloud consumers. - Based on what is measured, the cloud provider can charge a cloud consumer only for the IT resources actually used and/or for the timeframe during which access to the IT resources was granted. In this context, measured usage is closely related to the on-demand characteristic. - Measured usage is not limited to tracking statistics for billing purposes. It also encompasses the general monitoring of IT resources and related usage reporting (for both cloud provider and cloud consumers). - Therefore, measured usage is also relevant to clouds that do not charge for usage (which may be applicable to the private cloud deployment model described in the upcoming Cloud Deployment Models section).

Challenges of Cloud Computing - multi-regional compliance and legal issues

- Third-party cloud providers will frequently establish data centers in affordable or convenient geographical locations. - Cloud consumers will often not be aware of the physical location of their IT resources and data when hosted by public clouds. For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies. For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom (pke: this is a real good joke: GCHQ scans everything and then shares it with the NSA anyway :D). Most regulatory frameworks recognize that cloud consumer organizations are ultimately responsible for the security, integrity, and storage of their own data, even when it is held by an external cloud provider.

technology innovation - Virtualization

- Virtualization is an established technology that has enabled hardware owners to repeatedly leverage physical servers for wide, concurrent usage. - Virtualization further helped realise the notion of "server elasticity," by allowing one physical server to host a variable number of "virtual" servers. - Virtualization is a key technology in modern cloud computing environments and is introduced in the upcoming Fundamental Terminology and Concepts section.

What is an SLA

- a Service Level Agreement (SLA) is a document that describes *quality-of-service features, behaviors, and limitations (QuBeLi)* of a service. - it is a *human-readable* part of a service contract that extends the technical service contract

Give some example of operational governance issues related to loss of control over it

- network latency due to distance to region of cloud provider - cloud provider goes out of business - cloud provider is bought - unannounced incompatible software upgrade (only unreliable cloud providers do this) - unreliable network between reliable networks of the cloud provider and cloud consumer

Give some examples of *up-front costs*

- on-premise environments: hardware, software and labor required for deployment - cloud-base environments: labor costs required to assess and set up a cloud environment

Give some examples of *on-going costs*

- on-premise: licensing fees, electricity, insurance, and labor - cloud-based: virtual hardware leasing fees, bandwidth usage fees, licensing fees and labor

Business Cost Metrics - integration costs

-Integration testing is a form of testing required to measure the effort required to make IT resources compatible and interoperable within a foreign environment, such as a new cloud platform. -Depending on the cloud deployment model and cloud delivery model being considered by an organization, there may be the need to further *allocate funds to carry out integration testing and additional labor related to enable interoperability* between cloud service consumers and cloud services. - These expenses are referred to as *integration costs*. - High integration costs can make the option of *leasing cloud-based IT resources less appealing*.

The lowest intensity of sound that a typical human without hearing loss can hear:

0 decibels

The incidence of bacterial meningitis is about _____________________ live births.

1 in 2,500

Which of the following is a reason why an IT manager understanding business cost allocations would recommend implementing a cloud infrastructure? select two A. The cloud can be used to increase revenue. B. The cloud can be used to help cut unnecessary spending on IT. C. The cloud can be used to increase system downtime. D. The cloud can be used to reduce payroll costs of IT staff E. The cloud can be used to increase customer base.

1. The cloud can be used to help cut unnecessary spending on IT. 2. The cloud can be used to reduce payroll costs of IT staff.

True or false? An organization contracting a vendor to provide IaaS on a public cloud is responsible for maintaining the operating system used by the virtual machines hosted in the IaaS environment A) True B) False

A

The speed of sound is approximately

1100 m/s

The highest frequency of sound that a typical human without hearing loss can hear:

20,000 Hz

The adult ear canal is approximately this many millimeters in length:

25mm

How many muscles hold the pinna in place?

3

The ear drum is comprised (made up of) how many layers?

3

The length of the cochlea is about this many millimeters?

35mm

What percentage of babies born with the Herpes Simplex virus will survive and be free of any types of impairment?

5%

Normal conversational speech is typically conducted at this many decibels at a distance of three feet:

60

Approximately what percentage of babies born with the Herpes Simplex virus will die?

85%

The semicircular canals of the inner ear are situated at _______________ degree angles to one another.

90

On-demand usage

A cloud consumer can unilaterally access cloud-based IT resources giving the cloud consumer the freedom to self-provision these IT resources. Once configured, usage of the self-provisioned IT resources can be automated, requiring no further human involvement by the cloud consumer or cloud provider. This results in an *on-demand usage* environment. Also known as "on-demand self-service usage," this characteristic enables the service-based and usage-driven features found in mainstream clouds.

Cloud Consumer

A cloud consumer is an organization (or a human) that has a formal contract or arrangement with a cloud provider to use IT resources made available by the cloud provider.

True or false? Adoption of public cloud services requires an organization to first implement server virtualization and private and hybrid clouds A) True B) False

B

Which of the following organizations are most liking to consider confidentiality requirements before implementing a backup and disaster recovery cloud solution? A. An advertising company B. A public library C. A recreational park district D. A hospital and outpatient facility

A hospital and outpatient facility

In which of the following scenarios would a hybrid cloud be the best choice for an organization to use? A. A security organization that performs a large percentage of penetration testing. B. A financial organization that must keep all data under their control. C. A retail organization that needs to maintain all processing in their own datacenter. D. A large development firm that creates applications for the customer to host on their cloud.

A large development firm that creates applications for the customer to host on their cloud.

SaaS: Software as a Service

A software program positioned as a shared cloud service and made available as a "product" or generic utility represents the typical profile of a SaaS offering. The SaaS delivery model is typically used to make a reusable cloud service widely available (often commercially) to a range of cloud consumers. An entire marketplace exists around SaaS products that can be leased and used for different purposes and via different terms. A cloud consumer is generally granted very limited administrative control over a SaaS implementation. It is most often provisioned by the cloud provider, but it can be legally owned by whichever entity assumes the cloud service owner role. For example, an organization acting as a cloud consumer while using and working with a PaaS environment can build a cloud service that it decides to deploy in that same environment as a SaaS offering. The same organization then effectively assumes the cloud provider role as the SaaS-based cloud service is made available to other organizations that act as cloud consumers when using that cloud service.

Common cloud resources in your deployment that may saturate over time include which of the following? (Choose three.) A.RAM B.Power C.CPU D.Storage E.Monitoring F.IaaS

A, C, D. Resources such as the amount of RAM needed, CPU cycles, and storage capacity are common systems that may become saturated as your cloud compute requirements grow.

Trust boundary

A trust boundary establishes a *logical perimeter* wherein IT resources are trusted from a security perspective. When an organization assumes the role of cloud consumer to access cloud-based IT resources, it needs to extend its trust beyond the physical boundary of the organization to include parts of the cloud environment. A *trust boundary* is a logical perimeter that typically spans beyond physical boundaries to represent the extent to which IT resources are trusted. When analyzing cloud environments, the trust boundary is most frequently associated with the trust issued by the organization acting as the cloud consumer.

Digital identities for logging onto SAAS solutions should be issued by all the following except: A. A third-party identity provider. B. The customer organization. C. The SaaS provider. D. A user.

A user.

Virtual Server

A virtual server is a form of virtualization software that emulates a physical computer (a physical server). Each physical server can host multiple virtual servers. To a cloud consumer, a virtual server appears as an independent physical server.

What are the main advantages of using a web-based distributed applications? Choose two A) Availability B) Scalability C) Security D) Reliability

A, B

Which of the following are important factors that must be negotiated with a SaaS vendor? (Choose all that apply) A) Contract renewals B) Data ownership C) Programming language D) Server operating system

A, B

Which of the following elements must be defined to ensure that an organization is well prepared for incident management for cloud based services? (Choose all that apply) A) Service description B) Service level agreement C) Support agreement D) Contract renewal agreement

A, B, C

What are the three basic logical tiers of a distributed application? (Choose three.) A) Presentation B) Application C) Network D) Data E) Internet

A, B, D

Ichika is preparing a change management plan to increase the processing abilities of one of her middleware servers. What components can she upgrade to increase server performance? (Choose three.) A.CPU B.SLA C.RAM D.Network I/O E.ACL F.DNS

A, C, D. Server performance can be increased by adding CPU processing, memory, and network capacity. SLA, ACL, and DNS are not related to increasing server capacity.

Joe is in the planning stages to make sure that an upcoming company promotion during a major sporting event will not overwhelm his company's cloud-based e-commerce site. He needs to determine his options to add capacity to the web server farm so it can process the anticipated additional workload. You are brought in to consult with him on his options. What do you recommend as possible solutions? (Choose three.) A.Vertical scaling B.Horizontal scaling C.Edge cache D.Cloud bursting E.Core elasticity

A, B, D. Cloud computing operates with a utility business model that charges you only for the resources you consume. This model enables you to scale your cloud fleet to meet its current workload and be able to add and remove capacity as needed. There are many options to use elasticity to scale cloud operations including vertical and horizontal scaling and bursting.

Jane is a Cloud+ architect working on a physical-to-virtual migration to the public cloud. She has matched VM performance levels to her established baselines. She knows that her organization may need to adjust hardware resources in the future. What cloud characteristics can she use to match cloud capacity with future growth? (Choose three.) A.Elasticity B.On-demand computing C.Availability zones D.Resiliency virtualization E.Pay-as-you grow F.Resource pooling

A, B, E. Elasticity, on-demand computing, and pay-as-you-grow are all examples of being able to expand cloud compute resources as your needs require.

Which of the following are important factors to consider when transitioning from an on-premises application to an SaaS application? Choose all that apply A) Internet bandwidth B) Processor architecture C) WAN design D) Programming language

A, C

Which of the following organizational skills are important skills to have when moving applications to the cloud? (Choose all that apply) A) Vendor management B) Desktop security C) Data integration D) Customer management

A, C

What are the five volumes in ITIL (Choose five) A) Service Design B) Service development C) Service Strategy D) Service Transition E) Service Operation F) Service Analysis G) Continual Process Improvement

A, C, D, E, G

Patesh is becoming familiar with the interfaces available for his operations team to use to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces you would explain to Patesh? (Choose three.) A.Web console B.SNMP C.API D.PaaS E.CLI

A, C, E. Application programmable interfaces, command-line interfaces, and GUI-based interfaces are all commonly used tools to migrate, monitor, manage, and troubleshoot cloud-based resources.

Cloud services depend on highly automated operations. What are common automation systems that are used for patch management? (Choose three.) A.Chef B.Cloud-patch C.Ansible D.DevOps E.Puppet F.Cloud Deploy

A, C, E. Common patch management offerings are Chef, Puppet, and Ansible.

Capacity and utilization reporting often contains data on which of the following objects? (Choose three.) A.CPU B.OS version C.Volume tier D.RAM E.Network

A, D, E. CPU, RAM, and network utilization are all important objects to manage for capacity and utilization tracking. Storage volume tiers and OS versions do not apply to this scenario.

A technician needs to configure a virtual NIC on a Class A IP address network. Which of the following is the default subnet mask for this network? A. /8 B. /16 C. /24 D. /28

A. /8

True or false? All distributed applications are web applications A) True B) False

B

Jane has found a table merge issue in her SQL database hosted in a private cloud. While reviewing the log files, the vendor requested she install a software change that is designed for rapid deployment that corrects a specific and critical issue. What are they referring to? A.Hotfix B.Patch C.Version update D.Rollout

A. A hotfix is a software update type that is intended to fix an immediate and specific problem.

A company that provides a cloud-based storage solution for consumers needs to ensure that users' data is encrypted while it is stored on its premises. Which of the following should be used to accomplish this task? A. SSL B. HMAC C. SHA D. RC4

A. SSL

A cloud administrator configures a new web server for the site. The administrator installs a wildcard SSL certificate for *.companyname.com. When users attempt to access the site, a certificate error is received. Which of the following is the MOST likely cause of the error? A. Certificate misconfigured B. Certificate expired C. Certificate revoked D. Certificate not signed

A. Certificate misconfigured

Jonathan is architecting his client's global public cloud presence for an upcoming e-commerce deployment. You have been brought on to help design the network; he asks about providing local connections in Singapore and Malaysia. What would you suggest he investigate? A.Regions B.Auto-scaling groups C.Availability zones D.Global DNS affinity

A. Cloud operators segment their operations into regions for customer proximity, regulatory compliance, resiliency, and survivability.

A company is implementing a SaaS solution with a large user base. SaaS solution licensing is user based, and user management is critical to keep the cost in check. Which of the following is the MOST efficient way to meet this requirement? A. Have the administrator of the SaaS solution keep track of user activities. B. Have a nightly upload to the SaaS provider of the current user base based on API call. C. Have users remove their SaaS accounts when they no longer need the service. D. Have a weekly user management script maintain the SaaS user base.

A. Have the administrator of the SaaS solution keep track of user activities.

What type of scaling includes adding servers to a pool? A.Horizontal B.Round robin C.Elasticity D.Auto-scale E.Vertical

A. Horizontal scaling is the process of adding servers to a pool for increased capacity. Round robin is a load-balancing metric and does not apply. Elasticity is the ability to add and remove resources, auto-scaling is the automated process of adding and removing capacity, and vertical scaling is expanding a server.

A cloud administrator is analyzing usage trends for a website housed within an IaaS cloud platform. The administrator notices that traffic and visitors to the site quadrupled from the normal baseline during the holiday season. The environment has a load balancer that uses standardized VMs to host the applications. Given this scenario, which of the following would be the MOST efficient, provide no downtime, and address the temporary spike in traffic? A. Implement an upward vertical scaling solution. B. Implement a downward vertical scaling solution. C. Implement an inward horizontal scaling solution. D. Implement an outward horizontal scaling solution

A. Implement an upward vertical scaling solution.

Liza is a new Cloud+ architect for BigCo Inc. She is investigating cloud services that provide server hardware, but the operating system is not included. What cloud service is she using? A.IaaS B.PaaS C.SaaS D.CaaS

A. Infrastructure as a Service offers computing hardware, storage, and networking but not the operating systems or applications.

True or false? An organization contracting a vendor to provide PaaS on a public cloud is responsible for deciding what programming language to use when developing cloud based applications A) True B) False

B

Company users are complaining that they cannot log in to a cloud-based collaboration system. The operations centre has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting? A.Authentication B.Authorization C.Federation D.Kerberos

A. Logging into systems is referred to as authentication. Also, the question references multifactor authentication (MFA) as part of the system.

Which of the following cloud services would MOST likely be selected by a software development company that needs a cloud in which to develop software and does not have infrastructure requirements? A. PaaS B. SaaS C. IaaS D. XaaS

A. PaaS

Object tracking should be aligned with which of the following? A. SLA B. VPC C. RDP D. JSON

A. SLA

After monthly patching, a large number of users who are logged onto the network report that application links from a company's intranet site, which previously opened directly into the website, are now prompting for login information. Application administrators confirm that the websites in question are working properly. Which of the following is the MOST likely cause of the new behaviour? A. SSO issues B. Password expiration C. Account lockout D. Certificate expiration

A. SSO issues

An engineer is configuring the monitoring for a new application server. During the day, the CPU on the server is baselined at approximately 30% utilization. At midnight, a batch job is scheduled to run that will drive the CPU utilization up to 75% for approximately an hour. Any time the CPU utilization is at 40% or higher for longer than ten minutes, administrators will receive an alert. Which of the following is the BEST method to ensure administrators do not experience message fatigue due to false alerts? A. Set a different threshold during the batch peak time. B. Increase the alert time threshold to 65 minutes. C. Increase the alert utilization threshold to 80%. D. Manually disable monitoring during the batch job.

A. Set a different threshold during the batch peak time.

Will is testing his backup DR site and using his DNS configuration to load balance the primary and backup sites. He wants to verify that the database in the DR facility is updated in real time and remains current with the production replica in the primary data centre. What type of updates should he define in his primary data centre servers prior to enabling the DNS load balancing? A.Synchronous replication B.Asynchronous replication C.Volume sync D.Mirroring E.RAID 5

A. Synchronous replication offerings write data to both the primary storage system and the replica simultaneously to ensure that the remote data is current with local replicas.

Mark is creating a disaster recovery plan based on directives from his company's executive management team. His company's business is an e-commerce website that sells children's apparel with 85 percent of its revenue received during the holiday season. If there was a severe disruption in operations, the loss of business could put the company's ability to continue as a financially viable operation in peril. Mark is creating a plan that will restore operations in the shortest amount of time possible if there was an outage. What DR model is he implementing? A.Hot site B.Active/active C.Warm site D.Active/passive E.Cold site F.Rollover

A. The hot site model is the most viable option given the requirements. A hot site is a fully functional backup site that can assume operations immediately should the primary location fail or go offline.

Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies? A.Mandatory access control B.Nondiscretionary C.Roles D.Multifactor

A. The mandatory access control approach is implemented in high-security environments where access to sensitive data needs to be highly controlled. Using the mandatory access control approach, a user will authenticate, or log into, a system. Based on the user's identity and security levels of the individual, access rights will be determined by comparing that data against the security properties of the system being accessed.

Emma is unable to reach her Linux-based web server hosted in the Singapore zone of the cloud. She is located in Austin, Texas. What utility can she use to verify the connection path? A.traceroute B.ipconfig C.arp D.netstat E.ping F.tcpdump G.route print

A. The tracert and traceroute utilities are useful for network path troubleshooting. This utility shows the routed path a packet of data takes from source to destination. You can use it to determine whether routing is working as expected or whether there is a route failure in the path. The other options are all incorrect because they do not provide network path data.

True or false? An organization should not be concerned with relying on a single vendor or proprietary technology base. A) True B) False

B

Internal users are reporting high latency when connecting to external servers in the cloud. Which of the following should a network administrator optimize? A. WAN B. SAN C. VLAN D. LAN

A. WAN

What cloud model delivers server hardware with no operating system? A. IaaS B. PaaS C. SaaS D. CaaS

A.IaaS

Which of the following cloud computing risks is compliance related? A. Access rights that are handled by a cloud provider B. Capacity management that is handled by a cloud provider C. Cross-charging policies that are handled by both clients D. Provider reputation

Access rights that are handled by a cloud provider

Which of the following is included in a compliance audit? A. Analyzing chargeback agreements B. Analyzing cloud provider Service Level Agreements (SLAs) C. Analyzing identity management and access controls D. Analyzing the provider release calendar

Analyzing identity management and access controls

How does cloud computing improve business flexibility? A. Easier access by users outside of the organization B. Faster deployment of applications C. Rapidly growing and shrinking capacity D. All of the above are correct

All of the above are correct

Which of the following roles can the IT department play in the selection process of cloud computing providers? A. Help understand and explain the application lifecycle B. Help understand performance parameters C. Help understand provider quality D. All of the above are correct

All of the above are correct

How does scalability work with cloud computing? A. Servers and storage can be added quickly. B. Servers and storage can be released quickly. C. Users can be added and removed quickly. D. All of the above is correct.

All of the above is correct.

The third turn of the cochlea is called the ________________________ turn.

Apical

Virtual Private Cloud

Also known as a "dedicated cloud" or "hosted cloud," this model results in a self-contained cloud environment hosted and managed by a public cloud provider, and made available to a cloud consumer. (from wiki) A *Virtual Private Cloud (VPC)* is an on demand configurable pool of shared computing resources allocated within a public cloud environment, providing certain level of isolation between the different organizations (denoted as users hereafter) using the resources. The isolation between one VPC user and all other users of the same cloud (other VPC users as well as other public cloud users) is achieved normally through allocation of a Private IP Subnet and a virtual communication construct (such as a VLAN or a set of encrypted communication channels) per user.

Which of the following can influence the monthly service fee Company A pays for Company B to host their cloud, such that Company A might pay more per month as their company grows? A. Amount of data stored B. Connectivity speed C. Confidentiality of the data D. Uptime requirements

Amount of data stored

Which of the following is a private SaaS? A. An application for external use only, on company-owned assets. B. An application for external use only, on public cloud-based systems. C. An application for internal use only, on company-owned assets. D. An application for internal use only, on public cloud-based systems.

An application for internal use only, on company-owned assets.

Which of the following would represent a successful implementation of a cloud service strategy? A. An organization has identified services, investments, partners, and delivery channels designed to meet requirements. B. An organization has identified patterns of business activities that use services and manage activities to influence demand. C. An organization has managed the investment portfolio for services available to users of the cloud services. D. An organization has managed budgeting and accounting for cloud services needed for the organization.

An organization has identified services, investments, partners, and delivery channels designed to meet requirements.

Business Cost Metrics - sunk costs

An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premise IT resources is referred to as *sunk costs*. When comparing up-front costs together with significant sunk costs, it can be more difficult to justify the leasing of cloud-based IT resources as an alternative.

Which of the following applications is most suitable for a cloud computing pilot? A. Applications that are currently expensive to maintain because of interconnections B. Applications that are easy to migrate and have some business value C. Applications with high risk and little business value D. Legacy applications that are coupled to specific hardware and systems software

Applications that are easy to migrate and have some business value

Which of the following are the appropriate steps to migrating a backwards compatible application into the cloud? A. Assess, proof of concept, migrate data, migrate application, automation/scaling, and optimizing. B. Migrate the data and rebuild the application using APIs. C. Purchase service from cloud provider, migrate the user accounts, and disable the internal infrastructure. D. Decommission the internal infrastructure, purchase service from the cloud provider, and enable for business users.

Assess, proof of concept, migrate data, migrate application, automation/scaling, and optimizing

The Eustachian tube is also called the ____________________________ tube.

Auditory

The absence of an ear canal is called

Aural Atresia

Which of the following should be implemented to best roll out desktop images from a cloud network? A. Automation and self service B. Backup and recovery C. Federation D. Virtual servers

Automation and self service

Which of the following best describes the properly of cloud computing that enables services to be readily on hand? A. Integrity B. Confidentiality C. Availability D. Scalability

Availability

Which of the following factors of service must be managed effectively by a SaaS provider in a cloud computing environment? A. Application access levels B. Client background checks C. Availability D. User acceptance

Availability

The IT department has migrated company email to a web-based cloud provider. Which of the following dependencies placed on the cloud computing vendor will have the most affect on all company staff? A. Cost of service B. Availability of service C. Maintainability of service D. Location of service

Availability of service

Encryption is not an appropriate mitigation technique for which of the following security risks A) Unauthorized access to confidential data B) Loss of organizational control C) Cleartext password transmission D) Weak data destruction processes

B

Risk is a factor of _______________ A) Threats and vulnerabilities B) Probability and impact C) Vulnerabilities and exploits D) Probability and vulnerability

B

The identity management process of allowing users in different security domains to share services without having identities in each domain is called what? A) Single sign on B) Federated C) Authentication D) Authorization

B

Homer designed an application tier for his company's new e-commerce site. He decided on an IP subnet that uses the /28 IPv4 subnet. He is planning for a maximum of 14 servers. You are brought in as a cloud architect to validate his design. What other devices may be on this subnet other than the servers that would also require IP address assignments? (Choose three.) A.SLA B.Default gateway C.DNS D.NTP E.API F.SNMP

B, C, D. In addition to the web servers, IP addresses may be required for the NTP and DNS services and the default gateway.

Physical resources are virtualized and presented as resources to virtual machines running on hypervisors. What common resources does the hypervisor consume? (Choose three.) A.Bare-metal cores B.Virtual RAM C.SaaS D.Virtual CPUs E.RAID F.Virtual Storage

B, C, E. A hypervisor will virtualize RAM, compute, and storage; the VMs operating on the hypervisor will access these pools.

Leonard is creating disaster recovery documents for his company's online operations. He is documenting metrics for a measurable SLA that outlines when you can expect operations to be back online and how much data loss can be tolerated when recovering from an outage. Which metrics is he documenting? (Choose all that apply.) A.RSO B.RTO C.RPO D.DR E.VxRestore

B, C. The restore point and restore time objectives are the measurements for the amount of data lost and the time needed to get back online after an outage.

Peter is creating a change management document to redeploy applications for a private to public cloud for his employer. When moving to the public cloud, what technologies can he take advantage of to enable cloud operations? (Choose two.) A.Load balancing B.Automation C.Auto-scaling groups D.Virtualization

B, D. One of the prime advantages of cloud-based computing and the automation and virtualization it offers in the background is the ability to leverage the rapid provisioning of virtual resources to allow for on-demand computing.

What options can you offer your user base for MFA tokens? (Choose two.) A.Python app B.Smartphone app C.Automation systems D.Key fob E.Cloud vendor management dashboard

B, D. One-time numerical tokens are generated on key fob hardware devices or smartphone soft-token applications.

After deploying a new public website, your validation steps ask you to check the domain name to IP address mappings. What utility can you use for validation? (Choose two.) A.RDP B.dig C.SSH D.nslookup E.IPsec F.IPS

B, D. The Windows command-line utility nslookup resolves domain names to IP addressing. The Linux equivalent is the dig utility. The other answers offered are not valid for the solution required in the question.

Object tracking can be helpful in identifying which of the following? (Choose three.) A.Resiliency B.Trends C.Metrics D.ACLs E.Peak usage F.Anomalies

B, E, F. Trends, usage, and deficiencies are all management report outputs that can be identified using object tracking.

Giulia posted a new software update to her company's popular smartphone application. After announcing the release, she has been monitoring her dashboard information and has noticed a large spike in activity. What cloud resource should she focus on? A.CPU B.Network bandwidth C.RAM D.API E.Storage

B. A large number of users downloading a new application would cause an increase in network bandwidth usage.

Name the type of software update that is designed to address a known bug and to bring a system up-to-date with previously released fixes? A.Hotfix B.Patch C.Version update D.Rollout

B. A patch is a piece of software that is intended to update an application, operating system, or any other software-based system to fix or improve its operations.

Which of the following is not a risk associated with cloud-based applications? A) Vendor lock-in B) Reliability C) Security D) Lack of development tools

D

Marlene is updating her horizontally scaled Internet-facing web servers to remediate a critical bug. Her manager has agreed to operate under reduced computing capacity during the process but stipulates that there can be no downtime during the process. What upgrade approach should Marlene perform to meet these requirements? A.Orchestration B.Rolling C.Hotfix D.Blue-green

B. A rolling configuration will sequentially upgrade the web servers without causing a complete outage and would meet the requirements outlined in the question.

What virtual machine backup method creates a file-based image of the current state of a VM including the complete operating system and all applications that are stored on it? A.Full backup B.Snapshot C.Clone D.Replicate

B. A snapshot is a file-based image of the current state of a VM including the complete operating systems and all applications that are stored on them. The snapshot will record the data on the disk, its current state, and the VM's configuration at that instant in time.

Jillian is a Cloud+ consultant for an auto parts company based in central Michigan. She is putting together a disaster recovery plan that includes a remote backup site that has a SQL server instance running at that location with asynchronously refreshed data replica. Her plan calls for activating all other services in the event of a hurricane causing an outage at her primary data centre. What model is Jillian going to deploy to meet the requirements? A.Hot site B.Warm site C.Cold site D.Active/passive

B. A warm site approach to recovering from a primary data center outage is when the remote backup of the site is offline except for critical data storage, which is usually a database.

Ahmed is a cloud+ professional researching data replication options for his MySQL database. For redundancy reasons, he decided to create a backup replica in a different availability zone that could become master should the primary zone go offline. For performance reasons, he has decided to update the replica in near real time after the initial write operation on the primary database. What type of solution is this? A.Synchronous B.Asynchronous C.Volume sync D.Remote mirroring E.RAID 5

B. Asynchronous replication is when data is written to the primary first, and then later a copy is written to the remote site on a scheduled arrangement or in near real time.

What is the term used in system virtualization to reflect more than one operating system or instance running on a single host server? A) Heterogeneous servers B) Homogeneous servers C) Multitenancy D) Colocatin

C

A cloud service administrator is consuming PaaS services and is performing baseline configuration tests. Which of the following is part of the PaaS consumer's responsibility with respect to the baseline confirmation tests? A. Application versions B. CPU utilization C. RAM utilization D. Operating system versions

B. CPU utilization

Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud workload during end-of-month processing. What operation is she going to perform? A.Elasticity B.Bursting C.Vertical scaling D.Auto-scaling

B. Cloud bursting allows for adding capacity from another cloud service during times when additional resources are needed.

Which of the following is a benefit of virtualization in a cloud environment? A. Decrease in the scalability of services B. Decrease in the time to implement certain services C. Decrease in the amount of resource pooling for services D. Increase in the time to service for certain services

B. Decrease in the time to implement certain services

Pierre is deploying a solution that allows data for his e-commerce operations hosted in a public cloud to be reached at remote locations worldwide with local points of presence. He wants to reduce the load on his web servers and reduce the network latency of geographically distant customers. What are these facilities called? A.Region B.Edge location C.Availability zone D.Replication

B. Edge locations are not complete cloud data centers. There are cloud connection points located in major cities and offer local caching of data for reduced response times.

What is the term used to reflect the division of a database into smaller data sets for analysis and processing within the cloud? A) Database profiling B) Minimizing C) Sharding D) SUbsetting

C

Hana is monitoring performance metrics on a video server; she sees that the server is utilizing 100 per cent of the available network bandwidth. What action should she take that will most likely address the problem? A.Implement 802.1Q tagging. B.Install a second network adapter. C.Update the network adapter firmware. D.Install a network coprocessor ASIC.

B. If a server is using all of its network bandwidth, then the most logical solution is to increase the network adapters' bandwidth or add a second adapter and create a teaming configuration.

To meet regulatory requirements, a medical records company is required to store customer transaction records for seven years. The records will most likely never be accessed after the second year and can be stored offline to reduce expenses. What type of storage should they implement to achieve her goal? A.File transfer B.Archive C.Replication D.Data store

B. Inactive data moved to a separate storage facility for long-term storage is referred to as archiving.

A company has been migrating a significant number of its on-premises applications to various SaaS providers. The IT department has noticed the following: 1. User account management has become challenging. 2. User account compromises have increased. 3. Accessing various SaaS applications is challenging. Which of the following should the IT security department implement to BEST resolve the issue? (Choose three.) A. Single sign-on B. Multifactor authentication C. Network intrusion prevention system D. Password synchronization E. Federation F. IPSec tunnel to the SaaS providers G. VPN to SaaS providers

B. Multifactor authentication D. Password synchronization E. Federation

A cloud service company is proposing a solution to a major sporting venue. The solution offers 99.999% availability during special events, which is proven through specialized testing. Which of the following techniques should be applied to confirm the high availability claimed by the company? (Choose two.) A. Vulnerability testing B. Penetration testing C. Load testing D. Failover testing E. Integration testing

B. Penetration testing D. Failover testing

Harold is investigating his options to migrate his company's time and attendance application to the cloud. He only wants to be responsible for the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support his application. Harold calls you and asks for assistance in selecting a cloud service model that would meet his requirements. What would you suggest he implement? A.IaaS B.PaaS C.SaaS D.CaaS

B. Platform as a Service offers computing hardware, storage, networking, and the operating systems but not the applications.

SaaS orchestration systems are whose responsibility in the public cloud? A. Customer B. Provider C. Automation vendor D. DevOps

B. Provider

An organization is replacing its internal human resources system with a SaaS-based application. The solution is multi-tenant, and the organization wants to ensure ubiquitous access while preventing password replay attacks. Which of the following would BEST help to mitigate the risk? A. Implement destination resources authentication. B. Require and implement two-factor authentication. C. Remove administrator privileges from users' laptops. D. Combine network authentication and physical security in one card/token.

B. Require and implement two-factor authentication.

When networks are architected for cloud services, which quality addresses the ability to expand to meet variable data requirements? A) Resiliency B) Simplified management C) Scalability D) Throughput

C

Which of the following are types of storage media? (Select two.) A. SCSI B. SSD C. Tape D. SATA E. USB

B. SSD C. Tape

Linda works in the IT security group of her firm and has been tasked to investigate options that will allow customers to securely access their personal records stored on the cloud deployment accessed via tablets. What is the most common in-flight e-commerce security posture on the market? A.MD5 B.SSL/TLS C.IPsec D.VPN

B. SSL/TLS security is the most common remote access encryption technology and is commonly used in browsers and smartphone applications. MD5 is a hash algorithm, and IPsec is a security framework; they do not apply to the question. VPNs are not as common as SSL/TLS for the scenario given.

Janice manages the MySQL database backend that runs on a multi-CPU instance that has reached 100 percent utilization. The database can run on only a single server. What options does she have to support the requirements of this database? A.Horizontal scaling B.Vertical scaling C.Pooling D.Bursting

B. Scaling up, or vertical scaling, will add resources such as CPU instances or more RAM. When you scale up, you are increasing your compute, network, or storage capabilities.

The CASB report indicates several unsanctioned SaaS applications are being used in an organization. Which of the following is the MOST likely cause? A. VPN bypass B. Shadow IT C. Web proxy bypass D. CAB approval

B. Shadow IT

Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. He is implementing the LDAP protocol to enable this service. What type of system are you deploying? A.Token-based 2FA B.SSO C.RSA D.Nondiscretionary

B. Single sign-on allows a user to log in one time and be granted access to multiple systems without having to authenticate to each one individually.

MFA tokens can be obtained where? (Choose two.) A. Python app B. Smartphone app C. Automation systems D. Keyfob E. Cloud vendor management dashboard

B. Smartphone app D. Keyfob

Quentin is a defence contractor investigating server compliance requirements needed to be certified to meet the U.S. Department of Defense security requirements for contractors. What requirement would you recommend he focus on? A.FedRAMP B.DIACAP C.FISMA D.Section 405.13 for DoD rule A286

B. The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is the process for computer systems' IT security. DIACAP compliance is required to be certified to meet the U.S. Department of Defense security requirements for contractors.

Jarleen is a consultant tasked with migrating Heath Med Records Inc. customer records to a cloud-based service offering a long-term archival system. Which U.S. compliance mandate must her company align with? A.SOC 3 B.HIPAA C.MPAA D.ISA 2701

B. The Health Insurance Portability and Accountability Act defines the standards for protecting medical data.

Leanna wants to deploy a public cloud service that allows her to retain responsibility only for her applications and require the cloud provider to maintain the underlying operating system and virtualized hardware. Which service model would you recommend she implement? A.IaaS B.PaaS C.SaaS D.CaaS

B. The Platform as a Service model offers operating system maintenance to be provided by the service provider.

Nicola is deploying a new fleet of IIS web servers on her IaaS e-commerce site. The company has elected to use a hybrid approach and desires graphical connections to the Windows bastion hosts. What traffic must he permit through the external-facing firewall to the host? A.SSH B.RDP C.DNS D.IPS

B. The Windows Remote Desktop Protocol allows for remote connections to a Windows graphical user desktop.

SaaS orchestration systems are whose responsibility in the public cloud? A.Customer B.Provider C.Automation vendor D.DevOps

B. The cloud service provider owns its automation and orchestration systems, and they cannot be directly accessed by the customer.

Jillian is working on a project to interconnect her company's private data center to a cloud company that offers e-mail services and another that can provide burstable compute capacity. What type of cloud delivery model is she creating? A.Public B.Hybrid C.Community D.Private

B. The interconnection of multiple cloud models is referred to as a hybrid cloud.

A cloud customer web server dashboard shows that CPU utilization on a database server has been consistently at more than 80 per cent utilization. The baselines show that 57 percent utilization is normal. What is this called? A.Deviation B.Variance C.Triggers D.Baseline imbalance

B. The measurement of the difference between a current reading and the baseline value is referred to as the variance.

Elena manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating? A.Authentication B.Authorization C.Federation D.SSO

B. The question is asking about being able to access a specific cloud service. This would concern Jill having authorization to access the storage volume. Authentication and SSO are login systems and not rights to services. A federation links user databases.

Company A has a SaaS cloud that hosts their office suite software. Company B has an IaaS cloud that provides all their server hardware, including the server hosting their office suite software. Which of the following is a similarity between both company's clouds? A. Backups synchronize with the hot site B. Servers are on-site C. Software is hosted D. Multiple servers are clustered

Backups synchronize with the hot site

Connie has been directed by her employer's finance department that they cannot afford to lose any more than 30 minutes of data in the case of a database failure or other catastrophic event. Connie has updated her corporate business continuity and disaster recovery plans. What metric did she change? A.RSO B.RPO C.RTO D.DBO

B. The restore point objective is the point in time that data can be recovered.

Cathy is preparing her company's migration plan from a private to a hybrid cloud. She wants to outline firewall and DDoS requirements. What document should she create? A.DIACAP B.Security policy C.Service level agreement D.SOC-2

B. The security policy outlines all aspects of your cloud security posture.

Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. She is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet? A.AES B.SOC-3 C.IPSec D.RC5

B. The security policy outlines all aspects of your cloud security posture.

A cloud administrator updates the Syslog forwarder configuration on a local server in production to use a different port. The development team is no longer receiving the audit logs from that server. However, the security team can retrieve and search the logs for the same server. Which of the following is MOST likely the issue? A. The development team is not looking at the correct server when querying for the logs. B. The security team has greater permissions than the development team. C. The audit logging service has been disabled on the server. D. The development team's Syslog server is configured to listen on the wrong port.

B. The security team has greater permissions than the development team.

Why is an SLA so importance?

Because cloud environments intentionally hide back-end implementation details about cloud services, the guarantees expressed in SLAs become very important to cloud consumers.

Object tracking should be aligned with which of the following? A.VPC B.SLA C.RDP D.JSON

B. Tracking object performance data should match with the guaranteed levels outlined in the service level agreement.

Hank goes to his local bank and inserts his card into the ATM and then enters his PIN on the keypad. What type of authentication is he participating in? A. SSO B. Two-factor C. LDAP D. User based

B. Two-factor

Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using? A.SSO B.Two-factor C.LDAP D.User-based

B. Two-factor authentication includes something that you have and something that you know.

Why is a Cloud Resource Administrator not called a Cloud Service Administrator?

Because the CRA manages Cloud Resources that are not necessarily services.

The top of each inner ear hair cell has a ________________________________ plate that covers almost the entire top of the hair cell except for a small pore.

cuticular

You are involved in a large-scale migration project that requires moving a Windows OS running on a dual-slot, eight-core server with no hypervisor in a data centre to a VMware-based server in the public cloud. What type of migration is this? A.vMotion B.P2V C.Private to public D.V2V E.Synchronous replication

B. When migrating a server that is running on bare metal to a hypervisor-based system, you would be performing a physical-to-virtual migration.

Margo is reviewing the maintenance responsibilities between her company and its public cloud service provider. She notices that the cloud provider takes responsibility for the operating system, and her company assumes responsibility for all applications and services running on the operating system. What type of service model is she operating under? A.IaaS B.PaaS C.SaaS D.XaaS

B. With the PaaS model, the cloud provider will maintain the operating system and all supporting infrastructure.

How do you correctly abbreviate the term "decibels"

dB

Which of the following is the first item of consideration when a company wants to implement a cloud network by following the ITIL standard? A. Cost of implementation B. Current productivity C. Use of current skills D. Business needs

Business needs

Which of the following is the risk when an IT department restricts itself to solely being an infrastructure provider? A. Business users will bypass the IT department B. Cloud providers will take over the role of the IT department C. Service providers will bypass the IT department D. All of the above are correct

Business users will bypass the IT department

How can the internal IT department successfully react to cloud computing? A. By becoming an external cloud provider B. By becoming an internal cloud provider C. By outsourcing all IT services D. By solely focusing on security issues

By becoming an internal cloud provider

How does using cloud computing help to enhance business value? A. By using cloud computing, businesses are able to realize lower asset utilization for personnel. B. By paying for actual usage, cloud computing allows businesses to convert fixed costs into variable costs. C. By using cloud computing, businesses are able to lower server utilization. D. By paying for actual usage, cloud computing allows businesses to convert variable costs into fixed costs.

By paying for actual usage, cloud computing allows businesses to convert fixed costs into variable costs.

Authentication to multiple services in the cloud can be streamlined by adopting which of the following identity management mechanisms? A) Kerberos B) Integrated Windows authentication C) Single sign-on D) Authorization

C

Regarding information security management systems, in what phase of the Plan-Do-Check-Act cycle does metrics analysis occur? A) Plan B) DO C) Check D) Act

C

Which ITIL volume provides guidance on the deployment of services into a production environment? A) Service Strategy B) Service Design C) Service Transition D) Service Operation

C

Which NIST "as a Service" model is best suited to full customization for an organization's services? A) Software as a Service B) Platform as a Service C) Infrastructure as a Service D) Everything as a Service

C

Which benefit of cloud automation eases Christmas data center support in particular, compared to traditional data centers? A) Hidden complexity B) Standardization C) Availability D) Resource utilization

C

Which is the following services requires a broader capacity of technical skills owned by the organization contracting a cloud service vendor? A) SaaS B) PaaS C) IaaS

C

Which level of the cloud service model pyramid allows the greatest flexibility for application development? A) Software as a Service B) Platform as a service C) Infrastructure as a Service D) Hardware as a Service

C

Which of the following does not impact data confidentiality? A) Man in the middle (MitM) B) Cross-site scripting (XSS) C) Denial of Service (DoS) D) Password theft

C

Which of the following is not a legal risk associated with cloud computing? A) Data isolation B) Jurisdiction C) Cost D) Electronic discovery

C

Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage did he implement? (Choose all that apply.) A.Durable B.RAID C.Ephemeral D.Nondurable E.Block F.Object

C, D. Temporary storage volumes that are only in existence when the VM is deployed are referred to as ephemeral or nondurable storage.

Mergie is documenting different methods that her remote operations centre can use to access the Perth fleet of servers operating in a community cloud. Which of the following are not viable methods? (Choose two.) A.RDP B.Telnet C.IDSD/IPS D.Terminal server E.DNS F.HTTP

C, E. Common remote access tools include RDP, SSH, and terminal servers. IDSs/IPSs are for intrusion detection, and DNS is for domain name to IP address mappings and is not a utility for remote access.

What is a visual representation of current cloud operations? A.Operational matrix B.Management console C.Dashboard

C. A dashboard is a configurable graphical representation of current operational data.

Jillian works in the operations centre and is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations? A.Puppet automation B.Gemalto system C.Dashboard D.Vendor-based security appliance

C. A dashboard is a graphical portal that provides updates and an overview of operations.

As a new Cloud+ professional you have been hired by a company that operates its own data centre; however, the company is calling it a cloud. What delivery model are you working with? A.Hybrid B.Public C.Private D.Community

C. A private cloud is used exclusively by a single organization.

Vasile is working a support ticket that shows the connection between the Ames field office and the Kansas City cloud edge location has dropped. She confirms it is a secure Internet-based access solution. What type of connection is this? A.Direct peering B.IDS C.VPN D.AES-256 E.RDP

C. A secure Internet-based connection would be a VPN.

An administrator is tasked with the virtualization of all database management applications. Which of the following should the administrator do FIRST to ensure that database performance will be optimal? A. Follow the recommendations of the database management application vendor. B. Design a physical to virtual migration plan of the application. C. Adhere to the recommendations of the virtualization software vendor. D. Develop a migration plan to the new environment, ensuring maximum uptime.

C. Adhere to the recommendations of the virtualization software vendor.

Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data? A.3DES B.RSA C.AES-256 D.Rivest Cipher 5

C. Advanced Encryption Standard is a symmetrical block cypher that has options to use three lengths, including 128, 192, and 256 bits. AES 256 is a very secure standard, and it would take an extremely long time and a lot of processing power to even come close to breaking the code.

Mindy has been tasked to develop a new QA test logging application but is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements? A.Python B.XML C.API D.SNMP E.TLS

C. An application programming interface (API) offers programmatic access, control, and configuration of a device between different and discrete software components.

Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard? A.DMA B.BIOS C.CPU D.IPsec E.I/O

C. Applying security applications on a virtual server will cause an increase in CPU usage.

Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process he completed at login? A.Authorization B.Accounting C.Authentication D.Federation E.Identity access

C. Authentication is the term used to describe the process of determining the identity of a user or device.

What technology was instrumental in the growth of cloud services? A.XML B.Python C.Automation D.Authentication E.Scripting F.Workflow services G.Encryption

C. Automation of cloud deployments was instrumental in the growth of cloud-based services.

Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, Siri notices a link to download a Java-based application to monitor and configure the IPS application. What kind of automation system is this? A.CLI B.GIU C.Vendor-based D.API E.RESTful

C. Based on the information given, the description is for a vendor-based management application.

Your employer has developed a mission-critical application for the medical industry, and there can be no downtime during maintenance. You have designed a web architecture to take this into account and that allows you to have an exact copy of your production fleet that can be brought online to replace your existing deployment for patching and maintenance. What type of model did you implement? A.Cluster B.DevOps C.Blue-green D.Rolling

C. Blue-green is a software deployment methodology that uses two configurations for production that are identical to each other. These deployments can alternate between each other, with one being active and the other being inactive.

Which of the following contributes to increased read access performance on a fibre channel SAN? A. Zoning B. Clustered storage C. Caching D. QoS

C. Caching

Harold will modify a NACL to modify remote access to a cloud-based HR application. He will be submitting a detailed plan that outlines all details of the planned change. What process is he following? A.Cloud automation B.Change advisory C.Change management D.Rollout

C. Change management includes recording the change, planning for the change, testing the documentation, getting approvals, evaluating and validating, writing instructions for backing out the change if needed, and doing post-change review if desired.

What VM backup method can be used to create a master image to be used as a template to create additional systems? A.Full backup B.Snapshot C.Clone D.Replicate

C. Cloning takes the master image and clones it to be used as another separate and independent VM. Important components of a server are changed to prevent address conflicts; these include the UUID and MAC addresses of the cloned server.

The ability to dynamically add additional resources on demand such as storage, CPUs, memory, and even servers is referred to as what? A.Bursting B.Pooling C.Elasticity E.Orchestration

C. Cloud automation systems offer the ability to dynamically add and remove resources as needed; this is referred to as elasticity.

Larken is reviewing the SLA and statement of responsibility with their community cloud provider PaaS. Who does the responsibility for stored data integrity in the cloud belong to? A. Cloud provider B. Compliance agency C. Cloud customer D. Shared responsibility

C. Cloud customer

Which of the following typically provides a FASTER access speed in a network storage implementation? A. NFS B. SAN C. DAS D. SATA

C. DAS

Maria has noticed an increase in the response time of the NoSQL application she runs in her IaaS cloud deployment. When comparing current results against her baseline measurements that she recorded when the database was originally deployed, she verified that there has been a steady increase in the number of read requests. You have been asked to evaluate the baseline variances. Where should you focus your troubleshooting efforts? A.Memory B.CPU C.Storage D.Networking

C. Databases read and write requests utilize storage I/O and should be the focus for troubleshooting.

Derek is monitoring storage volume utilization and is preparing a company change request to add storage capacity. He has decided to automate the volume allocation size. What cloud feature can he take advantage of? A.SaaS B.API C.Elasticity D.OpenStack

C. Elasticity allows for cloud services to expand and contract based on actual usage and would be applicable to increasing storage capacity.

Jill is performing a Tuesday night backup of a Tier 2 storage volume that she has already completed a full backup of on Sunday night. She only wants to back up files based on changes of the source data since the last backup. What type of backup is she performing? A.Full B.Differential C.Incremental D.Online

C. Incremental backups are operations based on changes of the source data since the last incremental backup was performed.

The cloud data centre is in a large industrial park with no company signage, extensive video cameras in the parking lot, high-security fences, and biometrics at the guard shack. What type of security is the provider implementing? A.Building B.Device C.Infrastructure D.Tunneling

C. Infrastructure security is the hardening of the facility and includes the steps outlined in the question including nondescript facilities, video surveillance, and biometric access.

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy? A.DMZ B.IDS C.IPS D.RAID E.HIDS

C. Intrusion prevention systems will monitor for malicious activity and actively take countermeasures to eliminate or reduce the effects of the intrusion.

What type of application commonly uses batch processing? A.DNS B.NTP C.Databases D.Middleware

C. It is common for batch processing to be performed on database applications.

A cloud administrator is securing access to a VM using an IaaS cloud platform. The administrator must perform this task using an automated method, allow administrators to perform any method and expose any property of the VM, deny access for everyone else, and allow only read-only access to everyone else. Given this scenario, which of the following should the administrator use to BEST meet these requirements? A. jQuery B. JavaScript C. Java D. JSON

C. Java

Scott is planning his company's upload of stored data to the cloud. What are two common storage migration types? (Choose two.) A. Physical to virtual B. Block to object C. Online D. Offline E. Synchronous F. Asynchronous

C. Online D. Offline

Ronald is a Cloud+ student studying systems that abstract and hide much of the complexity of modern cloud systems. What is he learning about? A.Runbooks B.Workflow C.Orchestration D.REST/API

C. Orchestration systems enable large-scale cloud deployments by automating operations.

Carl is learning about how cloud service providers allocate physical resources into a group. These resources are then dynamically associated with cloud services as demand requires. What virtualization technology is this? A.On-demand virtualization B.Dynamic scaling C.Resource pooling D.Elasticity

C. Resource pooling is the allocation of compute resources into a group, or pool, and then these pools are made available to a multitenant cloud environment.

Emma is modifying a publicly accessible IP subnet on her company's e-commerce site hosted in a hybrid cloud. After performing address changes for all of his public-facing web servers, she validated the change by connecting from a bastion host located offshore. She was unable to connect to the web servers. What does she need to modify to allow the remote site to connect to the web server? A.NTP B.STP C.DNS D.API

C. The Domain Name System records need to be changed to reflect the new IP address mapped to the domain name.

Dawn is investigating the various cloud service models; she is interested in selecting a community cloud provider that offers a specialized financial reporting application. You are brought in to assist. What type of cloud model would you recommend Dawn investigate to meet her requirements? A.IaaS B.PaaS C.SaaS D.CaaS

C. Software as a Service offers cloud-managed applications as well as the underlying platform and infrastructure support.

Martha is studying SAN technologies that use the Fibre Channel protocol and is asking about disk configuration in the remote storage array. She asks you which type of storage she can use on her Linux servers. What storage type can she deploy? (Choose the best answer.) A.Meta B.Object C.Block D.File

C. Storage area networks support block-based storage.

To increase TipoftheHat.com's security posture, Alice is reviewing user accounts that access the community cloud resources. Alice notices that the summer interns have left to go back to school, but their accounts are still active. She knows they will return over the winter break. What would you suggest Alice do with these accounts? A.Do nothing B.Delete the accounts C.Disable the accounts D.Change the resource access definitions E.Modify the confederation settings F.Change the access control

C. The ability to disable an account can be helpful in situations where the account will need to be reactivated at a future date and does not need to be deleted.

A popular e-commerce site is hosting its public-facing front-end web server fleet in a public cloud. You have been tasked with determining what the normal day-to-day web hit count is so that capacity plans for the upcoming holiday selling season can be assessed. You want to track incoming web requests and graph them against delayed and missed connection counts. What type of data set are you producing? A.Metric B.Variance C.Baseline D.Smoothing

C. The establishment of average usage over time is the data that gets collected for a baseline report.

Akari is developing a cross-cloud provider migration plan as part of her company's business continuity plan. As she assesses the feasibility of migrating applications from one public cloud provider to another, what does she find is the service model that has the most lock-ins and is the most complex to migrate? A.IaaS B.PaaS C.SaaS D.XaaS

C. The higher up the services stack you go, from IaaS to PaaS to SaaS, the more difficult it will be to migrate. With IaaS, most of the cloud operations are under your direct control, which gives you the most flexibility to migrate. However, if the cloud provider controls the application, you may not have many migration options.

William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. He has defined the required tasks and then puts users, groups, and servers into this task-based implementation. What type of access control should William deploy? A.Mandatory access control B.Nondiscretionary C.Roles D.Multifactor

C. The question outlines the function of a role-based access control approach.

Melinda is updating her firm's disaster recovery plans, and after receiving direction for his company's board of directors, she has been instructed to create a plan that restores operations within 48 hours of a disaster. What part of the plan should she update with the new requirements? A.RSO B.RPO C.RTO D.DBO

C. The recovery time objective is the amount of time a system can be offline during a disaster; it is the amount of time it takes to get a service online and available after a failure.

Carol is a cloud customer that your consulting company is assisting with their migration. She is asking you about the demarcation point of operations for her public PaaS service. What model defines what you are responsible for and the responsibility of the provider? A.Availability zones B.Community C.Shared responsibility D.Baselines

C. The shared responsibility model outlines what services and portions of the cloud operations the cloud consumer and provider are responsible for.

Martina is troubleshooting a networking problem and needs to capture network frames being sent and received from the server's network adapter. What utility would she use to collect the traces? A.dig B.netstat C.tcpdump D.nslookup

C. The tcpdump utility allows a Linux system to capture live network traffic and is useful in monitoring and troubleshooting. Think of tcpdump as a command-line network analyzer. dig and nslookup show DNS resolution but do not display the actual packets going across the wire. netstat shows connection information and is not DNS related.

Larken is reviewing the SLA and statement of responsibility with their community cloud provider PaaS. Who does the responsibility for stored data integrity in the cloud belong to? A.Cloud provider B.Compliance agency C.Cloud customer D.Shared responsibility

C. Ultimately the responsibility for data in the cloud belongs to the organization that owns the data.

What application tracks a process from start to finish? A.API B.NTP C.Workflow D.Orchestration

C. Workflow applications track a process from start to finish and sequence the applications that are required to complete the process.

What application tracks a process from start to finish? A. API B. NTP C. Workflow D. Orchestration

C. Workflow

Which of the following is the most important impact of cloud computing on managing service levels? A. Capacity can be more elastic. B. External providers can deny a capacity increase when required. C. Providers measure their own performance. D. Scarcity of resources can occur if not monitored

Capacity can be more elastic.

Which of the following IT processes is likely to become more important due to the adoption of cloud computing? A. Capacity management B. Troubleshooting management C. Project management D. Request fulfillment management

Capacity management

Which of the following is a limitation of owning servers? A. Inability to deploy new services quickly B. Inability to rapidly change to a different technology C. Capital tied up in hardware that might become obsolete D. Additional resources must be hired to maintain each server

Capital tied up in hardware that might become obsolete

Another more common name for perichondrial hematoma is

Cauliflower

Tiny hair cells at the base of the cupola are called

Cilia

Which of the following is a benefit of cloud computing? A. Cloud computing delivers IT capabilities that scale with demand. B. Cloud computing delivers a wide range of services that are easily accessible to users C. Cloud computing delivers IT capacity on demand. D. Cloud computing negates the need for a procurement department.

Cloud computing delivers IT capabilities that scale with demand.

Which of the following correctly identifies a key difference between cloud computing and IT outsourcing? A. Typically, industry definitions state that cloud computing and IT outsourcing are synonymous terms with the same meaning. B. Cloud computing only works when there is satisfactory Internet connectivity whereas outsourcing requires dedicated WAN links. C. Cloud computing generally allows for on-demand utilization, whereas outsourcing is typically defined by contract terms. D. Cloud computing provides only external IT equipment to a company whereas outsourcing involves external only resources managing internal company equipment.

Cloud computing generally allows for on-demand utilization, whereas outsourcing is typically defined by contract terms.

Define Cloud Computing

Cloud computing is a specialized form of distributed computing that introduces utilization models for *remotely provisioning scalable and measured IT resources.*

Which of the following is a characteristic of cloud computing? A. Cloud computing is typically based on open Internet technology B. Cloud computing is typically based on web technology C. Cloud computing is cheaper compared to virtualization D. Cloud computing typically uses XML or JSON technologies

Cloud computing is typically based on open Internet technology

How can cloud computing help reduce integrity risks? A. Cloud computing makes it easier to have a backup available. B. Cloud computing makes it easier to monitor access and usage of data. C. Cloud computing makes it easier to give people access to data in the cloud. D. Cloud computing makes it easier to have redundancy capabilities.

Cloud computing makes it easier to have a backup available.

Which of the following is a difference between cloud computing and visualization when implementing IaaS? A. All hardware is maintained on-site by current IT staff and managers. B. Both a cloud and a virtual solution will provide additional programmers for application development. C. Boxed, retail versions of office suite software must be used for consistent licensing. D. Cloud computing may use visualization, while visualization does not require cloud services.

Cloud computing may use visualization, while visualization does not require cloud services

In which of the following ways do IT outsourcing and cloud computing differ? A. Cloud computing services are typically much more scalable. B. Cloud computing is much cheaper. C. Hardware and software assets are typically customizable. D. IT outsourcing promotes innovation.

Cloud computing services are typically much more scalable.

Challenges of Cloud Computing - reduced operational governance control

Cloud consumers are usually allotted a level of governance control that is lower than that over on-premise IT resources. This reduced level of governance control can introduce risks associated with how the cloud provider operates its cloud, as well as the external connections that are required for communicate between the cloud and the cloud consumer. Consider the following examples: - An unreliable cloud provider may not maintain the guarantees it makes in the SLAs that were published for its cloud services. This can jeopardize the quality of the cloud consumer solutions that rely on these cloud services. - Longer geographic distances between the cloud consumer and cloud provider can require additional network hops that introduce fluctuating latency and potential bandwidth constraints.

Why does hardware and operating system maintenance take less effort with SaaS? A. Maintenance becomes irrelevant B. Cloud provider takes care of it C. Hardware vendor takes care of it D. Operating system vendor takes care of it

Cloud provider takes care of it

In order to maintain strategic flexibility and the ability to bring a cloud system back internally, which of the following is the most important requirement in the contract? A. Yearly independent audit is performed to measure performance B. Cloud provider has ability to terminate contract C. One week timeframe for termination of service D. Cloud subscriber maintains ownership of their data

Cloud subscriber maintains ownership of their data

The business benefits of mobile computing are enhanced most by which of the following cloud service characteristics? A. Hardware independence B. Security C. Distribution over the Internet D. Time to market

Distribution over the Internet

Part of the inner ear is comprised (made up of) a snail-shaped organ called the

Cochlea

The "C" in the "ABCDs" of melanoma stands for

Color

What kind of cloud consumers typically need PaaS?

Common reasons a cloud consumer would use and invest in a PaaS environment include: - The cloud consumer wants to extend on-premise environments into the cloud for scalability and economic purposes. - The cloud consumer uses the ready-made environment to entirely substitute an on-premise environment. - The cloud consumer wants to become a cloud provider and deploys its own cloud services to be made available to other external cloud consumers

A specific cloud deployment has been established specifically for financial services companies to consume. Which of the following best describes this type of cloud environment? A. Private cloud B. Community cloud C. Hybrid cloud D. Public cloud

Community cloud

A company is implementing a system replacement which has application components that are internally hosted and multiple application components that are hosted as software as a service by different cloud providers. Which of the following represents the challenge of this architecture? A. Complexity B. Time to market C. Cost saving D. Elasticity

Complexity

The middle ear cavity can be thought of as a four-walled room with a floor and a ceiling.

True

Which of the following would be a method to ensure ongoing benefits of a cloud agreement? A. Confirm a continual assurance framework is in place to measure the cloud provider's performance in line with organizational objectives. B. Have independent security testing performed against the cloud provider to ensure that the business's customer data is safe. C. Ask the cloud provider to lower the cost before each contractual renewal so that the business is obtaining value for money. D. Have independent stress and volume testing performed against the cloud provider to measure the availability SLA.

Confirm a continual assurance framework is in place to measure the cloud provider's performance in line with organizational objectives.

Which of the following actions should a company take if a cloud computing provider ceases to uphold their contract? A. Consult the company's exit plan. B. Move the company data to the backup provider that was selected earlier. C. Re-host all critical applications on the company's internal servers. D. Evaluate the company's strategic options for an alternative provider

Consult the company's exit plan.

Which countries could claim jurisdiction over data in the cloud? A) The country in which physical servers storing data reside B) The countries that data passes through between the provider's servers C) The country in which the data owner resides D) All of the above

D

Which example of new cloud computing roles will focus more on financial matters than on technical ones? A) Vendor management staff B) Support desk staff C) Cloud architect D) Cloud service manager

D

Which of the following is a benefit of implementing cloud computing via the ITIL guideline? A. Increased costs B. Larger knowledge base C. Increased free hard drive space D. Improved service level

Improved service level

Which of the following risks occurs when a cloud provider stops serving the company? A. Continuity risk B. Financial risk C. Legal risk D. Confidentiality risk

Continuity risk

Which of the following is the difference between cloud computing and IT outsourcing? A. The service levels of cloud computing are much better. B. IT outsourcing is not based on open standards. C. Contracts with cloud providers can be changed much quicker. D. Only IT outsourcing works with external staff.

Contracts with cloud providers can be changed much quicker.

Which of the following actions would not lead to risks related to records retention in the cloud? A) Secure destruction of records on schedule B) Restrictions on archived storage C) Difficulties associating metadata with archived records D) Unauthorized access

D

The middle ear is filled with air.

True

A company is using an Internet-based cloud service provided by a third party. Which of the following can the third party not guarantee when providing cloud resources? A. Capacity B. Scalability C. Network path D. Cost

Cost

Which of the following do business accountants prefer with respect to the cost of cloud computing? A. Budgets to be fixed B. Costs that are related to number of users C. Costs that are related to profits D. Costs to be fixed

Costs that are related to profits

"Toward the head" is

Cranial & Rostral

Which of the following skills is most needed by the cloud vendor to communicate with the subscriber? A. Project management B. Customer service C. Industry best practices D. Visualization

Customer service

"CMV" is a viral disease that in adults results in symptoms similar to the common cold. If transmitted to the fetus, it can result in premature delivery, an abnormally small head, slow growth, eye defects, and sensorineural hearing loss. The acronym, "CMV," refers to this virus:

Cytomegalovirus

An organization can address regulatory compliance risks in the cloud in all the following ways except which one? A) Its own security policies B) Periodic audits C) Service level agreements with cloud providers D) Delegation of full responsibility for compliance to the cloud service provider

D

With regard to security, the service level agreement should clearly outline ______________________ A) The security management responsibilities of the cloud service provider B) The security responsibilities of the customer C) The provider's security incident notification procedures D) All of the above

D

Cloud capacity can be measured by comparing current usage to what? A.Orchestration B.Automation C.NTP D.Baseline E.APIs

D. A baseline measurement is used as a reference to determine cloud capacity increases and decreases.

Sabil works for a company that offers cloud services to the railroad industry. All railroads have a similar set of requirements and access the same applications. BigWest Rail has contacted you about becoming a customer and is asking what applications are shared with other rail operators; they also ask what type of cloud model your company offers. What type of cloud is this? A.Hybrid B.Public C.Private D.Community

D. A community cloud is used by companies with similar needs such as railroad companies.

Zale is working on a collaborative project that requires the implementation of a large-scale NoSQL database that will access three petabytes of historical data. He needs durable block storage in remote flash arrays. You have been tasked to design the storage connectivity from the database to the stored data. What type of network connection would you recommend for NoSQL read/write access to the arrays? A.Block access B.Zoning C.VMFS D.SAN

D. A storage area network (SAN) is a high-speed network dedicated to storage transfers across a shared network. Block access is not a networking technology. Zoning is for restricting LUNs in a SAN, and VMFS is a VMware filesystem.

An organization is converting a physical SQL server into a virtual server. The SQL database has been in use for several years and contains critical data for the organization. Which of the following conversion methods would be MOST appropriate? A. Automated offline B. Manual offline C. Manual online D. Automated online

D. Automated online

Niko is generating baseline reports for her quarterly review meeting. She is interested in a public cloud application server's memory utilization. Where does she generate these reports? A.Hypervisor B.Databases C.Logging servers D.Cloud management and monitoring application

D. Cloud reports are formatted collections of data contained in the management or monitoring applications.

Bob is accessing a self-service portal in the cloud to instantly create additional servers, storage, and database instances for his firms DevOps group. Which of the options offered best describes this operation? A.Bursting B.Pay-as-you-grow C.Multitenancy D.On-demand

D. On-demand cloud computing allows the consumer to dynamically add and change resources with the use of an online portal.

The osseous portions of the inner ear are filled with perilymph.

True

Which of the following is the BEST choice for a clustered host interconnect? A. Infiniband B. 1Gb Ethernet C. 10Gb Ethernet D. Fibre Channel

D. Fibre Channel

A constantly changing six-digit numerical token is used in what type of cloud service? A. XML B. TLS C. SSL D. MFA E. JSON

D. MFA

You have been asked by a new customer what type of authentication systems require something you have and also something you know. What type of authentication technology would you recommend? A.Single sign-on B.Confederations C.Active Directory/LDAP D.Multifactor

D. Multifactor authentication systems use a token generator as something that you have and a PIN/password as something you know.

What does a cloud management system monitor to collect performance metrics? A.Database B.Server C.Hypervisor D.Objects

D. Objects are queried to gather metric data.

(T/F) Google App Engine is a PaaS product

True.

Which cloud characteristic allows you to pay for only the services used? A. Bursting B. Metering C. Chargeback D. Pay-as-you-grow

D. Pay-as-you-grow

Kevin is exploring a durable block storage option that offers high utilization rates. It also needs to support striping that allows a parity bit to be used to reconstruct a volume if a single magnetic disk fails in his array. Which storage type stripes file data and performs a parity check of data over multiple disks that can recover from a single hard disk failure? A.RAID 0 B.RAID 1 C.RAID 3 D.RAID 5

D. RAID 5 uses parity information that is striped across multiple drives that allows the drive array to be rebuilt if a single drive in the array fails. The other options do not have parity data.

Which of the following is a benefit of having a virtual versus physical server environment? A. Improved security B. IPSec tunnel C. Data scraping D. Redundancy

D. Redundancy

(T/F) Saleforce Sales Cloud 2 is a SaaS product

True.

The administrator of virtual infrastructure needs to provision block storage for a virtual machine on which a business critical application will be installed. Considering performance, which of the following describes how the administrator should attach the storage to the VM? A. Using NFS B. Using CIFS C. Using IPv6 D. Using iSCSI

D. Using iSCSI

vNIC

Virtual NIC

VNC

Virtual Network Computing

A company is implementing a launchpad within an existing application that will point to an existing SaaS provider. One of the requirements is the user should not have to log on multiple times. SSO is in place. When the launchpad is used, the user is redirected to SaaS providers as designed but is asked for login credentials. Which of the following is the MOST likely cause of this issue? A. Users do not exist within the SaaS provider. B. Group permissions are incorrect. C. Users do not exist in directory services. D. The federation is failing.

D. The federation is failing.

A new application patch is being validated prior to release to the public. The developers have a release candidate, and the DevOps manager is requesting a report that shows the pass/fail data to verify that the fix does, in fact, resolve the problem. What process is he verifying? A.Rollout B.Orchestration C.Automation D.QA

D. The manager is requesting data on the results of the quality assurance testing on the release.

VPC

Virtual Private Cloud

VPN

Virtual Private Network

WMI

Windows Management Implementation

virtualization

Data centers consist of both physical and virtualized IT resources. The physical IT resource layer refers to the facility infrastructure that houses computing/networking systems and equipment, together with hardware systems and their operating systems (Figure 1). The resource abstraction and control of the virtualization layer is comprised of operational and management tools that are often based on virtualization platforms that abstract the physical computing and networking IT resources as virtualized components that are easier to allocate, operate, release, monitor, and control.

Which of the following can be deployed by a cloud provider to reduce storage costs? A. Journaling file systems B. Two-factor authentication C. Data de-duplication D. Data encryption

Data de-duplication

Which of the following aspects of public cloud computing would a company most likely need to consider to ensure information security? A. Data integrity B. Server type C. Firewall specifications D. Network hardware

Data integrity

Which of the following assets have risks related to a cloud provider going out of business? A. Data stored at the provider B. Cloud management tools housed at the provider C. Investment in servers at the provider D. Machine capacity at the provider

Data stored at the provider

An external cloud service provider has been chosen by a financial company to deliver some capabilities that used to be performed in-house. Which of the following would provide the best amount of coverage to the financial company by way of continually asserting that there is an acceptable security posture being achieved by the service provider? A. Define required security service levels, agree on security evaluation criteria, and perform regular compliance checks based on the service levels and evaluation criteria. B. Perform a penetration test every 6 to 12 months and mandate that any unacceptably high issues or risks are mitigated. C. Perform a risk assessment annually and mandate that any unacceptably high risks are mitigated. D. Ensure that the service provider aligns to an industry standard, such as ISO 27000 series or another regulatory compliance framework and request that they self-monitor annually.

Define required security service levels, agree on security evaluation criteria, and perform regular compliance checks based on the service levels and evaluation criteria.

An existing capability is being migrated into the cloud. Capacity management issues have been noticed in the past and an exercise is being performed to calculate current and future volumes. In which of the following lifecycle phases is this likely to be performed? A. Operation B. Design C. Transition D. Strategy

Design

Which of the following is a reason for business users to be interested in cloud computing? A. Desire for vendor lock-in reduction B. Desire for improved security C. Desire for improved user experience D. Desire for reducing compliance issues

Desire for improved user experience

Which of the following application types is suitable for a cloud computing pilot? A. Desktop productivity applications B. Marginal applications C. Mission-critical applications D. Legacy applications

Desktop productivity applications

The outer phalangeal cells of the Organ of Corti are also called:

Dieter's cells

Which category of "as a Service" models is not specifically identified by NIST? A) Software as a Service B) Platform as a Service C) Infrastructure as a Service D) Hardware as a Service E) Everything as a Service

E

Pete has been busy updating the disaster recovery procedures for his client's business continuity plan. The DR facility will need to be ready with floor space, power, and cooling and have loading docks to unload server and equipment racks to restore service. What type of DR implementation is Pete planning on deploying? A.Hot site B.Active/active C.Warm site D.Active/passive E.Cold site F.Rollover

E. A cold site is a backup data center provisioned to take over operations in the event of a primary data center failure, but the servers and infrastructure are not deployed or operational until needed.

The remote disaster recovery location follows the warm site model. To configure the network switches, routers, and firewalls remotely, Joyce will need serial port access from her company's operations centre. She has 14 serial ports currently available but needs to be prepared for any unplanned expansion requirements during a disaster recover cutover. What device would you recommend she install at the warm site? A.RDP B.Telnet C.IPsec D.SSH E.Terminal server

E. In a data center, terminal servers are deployed and have several serial ports, each cabled to a console port on a device that is being managed. This allows you to make an SSH or a Telnet connection to the terminal server and then use the serial interfaces to access the console ports on the devices you want to connect to. The other options given do not provide serial port connections.

What type of scaling involves replacing an existing server with another that has more capabilities? A.Horizontal B.Round robin C.Elasticity D.Auto-scale E.Vertical

E. Vertical scaling is the process of upgrading or replacing a server with one that has greater capabilities.

An organization is replacing its core insurance platform. The solution is made up of internally hosted insurance systems and applications hosted in the cloud. Which of the following activities is part of service transition? A. Ensure that as part of the change management process the events are sequenced to include the cloud provider and that they have resources available. B. Ensure that monitoring controls are implemented by the cloud provider to ensures that the system is highly available and that performance can be measured. C. Ensure that the SLA's for availability have been well documented and agreed to as part of the contract arrangement between the two companies. D. Ensure that the capacity and storage is available to meet the current and future demands of the solution of the cloud provider's infrastructure.

Ensure that as part of the change management process the events are sequenced to include the cloud provider and that they have resources available.

When two fluids have differing chemical compositions, they desire to reach __________________________________, where the fluids mix together.

Equilibrium

Which of the following confidentiality risks is introduced by cloud computing? A. Company information can be transmitted electronically B. Digitizing information makes it easier to copy C. Government regulations require data to be disclosed D. Having files stored on the servers of a cloud provider

Having files stored on the servers of a cloud provider

The acronym "EAM" refers to the

External Auditory Meatus

Inside each ampulla of the vestibular system is a structure called the utricle.

False

Outer hair cells resemble a test tube in shape, and they contain ectoplasm.

False

The 10 minute APGAR score is the most important.

False

The middle ear cavity is about the size of a quarter.

False

The presence of otoacoustic emissions usually indicates that a hearing loss is present.

False

The vestibular system contains two semicircular canals.

False

(True/False) A cloud service is either a Web Service or a REST service

False. A cloud service can exist as: 1. a traditional service (WS or Rest) accessed via a published service contract and messaging, or 2. a software program remotely accessed via other means (such as communicating with a software program on a server using a proprietary protocol)

(True/False) a cloud must be web-based

False. A cloud can exist with the use of any remote access protocols that allows for access to its IT resources

(True/False) Virtualization is a requirement for a Cloud

False. Even though the provisioning of virtual IT resources by clouds is very common, it is not an absolute requirement. *A cloud can also provide remote access directly to physical IT resources*.

A software development platform is in the process of being migrated from an in-house framework to a cloud-based PaaS. Which of the following development aspects is likely to be applicable in the PaaS environment? A. PaaS providers do not allow customers with their own software development teams to write new applications on the cloud platform. B. Cloud environments only support agile development. The software development team will need to change from their waterfall SDLC methodology before migrating. C. Familiarization will be required with cloud provider-based APIs, web services, and development frameworks. D. No expected change in software development process when migrating from in-house to PaaS.

Familiarization will be required with cloud provider-based APIs, web services, and development frameworks.

Which of the following is a business reason for IT outsourcing and cloud computing? A. Improving cost structure B. Improving customer satisfaction C. Increasing control over IT systems D. Decrease of security issues

Improving cost structure

Why would one cloud provider lease IT resources from another cloud provider? Give an example.

For example, a cloud consumer may have a legal requirement for data to be physically stored in a specific region (for which the cloud provider needs to contract a different cloud provider).

service

From an implementation perspective, a service is a software program that can be remotely invoked via a published technical interface (or API) referred to as a *service contract*.

How are future downtimes estimated?

Future downtimes are estimated by assigning the event that causes a downtime a probability for its occurrence and the time it would take to bring up the IT resource again. The percentage is calculated as follows: 1. Multiply the probability of downtime by the actual estimated downtime. 2. Divide the value by a measured period of time. 3. Multiply the value by 100. 4. Deduct the value from a 100.

Which of the following steps best leads to successful adoption of a cloud service? A. Gather stakeholder requirements, select potentially suitable cloud providers, perform a pilot, and select the most appropriate provider. B. Choose the most well known cloud provider for the given service and negotiate a short-lived contract with strong penalty clauses. C. Request a list of reference sites from the potential cloud provider and interview a reference from within the same industry sector. If the site reference check is positive, then choose the cloud provider. D. Workshop selection criteria items with company management and choose the service provider based on the strongest formal responses from cloud providers.

Gather stakeholder requirements, select potentially suitable cloud providers, perform a pilot, and select the most appropriate provider.

A university has migrated several services from their internal infrastructure to a third-party cloud provider. Which of the following is most important to the university in order to ensure an appropriate security posture? A. Regular patching applied by the university B. Governance and oversight by the cloud provider C. Antivirus checks performed by the cloud provider D. SLA and metrics requested by the cloud provider

Governance and oversight by the cloud provider

Which of the following technologies are related to Web services? A. HTML, IDM, JSON B. HTML, IDM, XML C. HTML, JSON, XML D. DM, JSON, XML

HTML, JSON, XML

The point at which scala vestibuli turns into scala tympani is called the

Helicotrema

Another name for cycles/second:

Hertz

A military facility is not able to fully embrace cloud computing because of which of the following? A. High degree of confidentiality and operational assurance B. The associates cost and infrastructure needs C. Constantly changing and unpredictable workloads D. Constantly changing data and accessibility needs

High degree of confidentiality and operational assurance

Which of the following can cause user response times to deteriorate? A. High CPU usage and low network bandwidth B. High network latency and high volume of data stored C. Low network bandwidth and high network latency D. Low network bandwidth and high volume of data stored

High network latency and high volume of data stored

Explain complexity of Hybrid Clouds

Hybrid deployment architectures can be complex and challenging to create and maintain due to the potential disparity in cloud environments and the fact that management responsibilities are typically split between the private cloud provider organization and the public cloud provider.

Which of the following is the business benefit of private PaaS? A. Improve the reuse of internal databases in an organization. B. Improve the speed of the internal development and deployment processes. C. Reduce cost and reliance on internal technical skills. D. Simplify interfaces for specific user groups.

Improve the speed of the internal development and deployment processes.

IPSec

IP Security - IPsec establishes a secure channel.

Why does cloud computing shift capital cost to variable cost? A. Cloud computing is more cost-efficient B. IT assets are not owned by the customer C. Servers are better utilized D. Staff is no longer hired by the customer

IT assets are not owned by the customer

Which of the following cloud services would be used to rent hardware, computing and network space, and storage over the Internet? A. SaaS B. IaaS C. PaaS D. XaaS

IaaS

Which of the following only provides configurable physical hardware and network resources used to make up the cloud? A. IaaS B. SaaS C. PaaS D. CaaS

IaaS

What is the big difference between IaaS and Paas on one hand and SaaS on the other?

IaaS and PaaS provide consumers with administrative control over the cloud service or its IT resources, whereas SaaS only gives *usage control* over the cloud service.

Which of the following is the most significant difference between SaaS and IaaS? A. IaaS can test network configurations. B. SaaS is accessible anywhere. C. SaaS is used for only public clouds. D. IaaS can be secured and encrypted.

IaaS can test network configurations.

Which of the following is a relevant component of the cloud ecosystem? A. Hypervisors B. Image factory C. Security procedures D. Trained IT staff

Image factory

Which of the following is the best way to mitigate the security and privacy issues associated with cloud computing? A. Allowing only cloud administrators to have access to cloud resources B. Removing firewalls and access control routers from the network C. Implementation and enforcement of a comprehensive security policy D. Removing virtualized hardware from the organization

Implementation and enforcement of a comprehensive security policy

A new Chief Information Officer (CIO) has been hired to develop competitive advantage strategies for the company, which is falling behind the competition. The CIO is looking at cloud computing to give the company a competitive edge. Which of the following is the CIO most interested in? A. Increasing the company carbon footprint B. Upgrading the company datacenter C. Implementing new IT strategies D. Increasing the MTTR after an incident

Implementing new IT strategies

Explain the difference between "classic hosting" and "IaaS"

In contrast to traditional hosting or outsourcing environments, with IaaS, IT resources are *typically virtualized* and *packaged into bundles that simplify up-front runtime scaling and customization* of the infrastructure.

All of the following are availability risks that are introduced by cloud computing except: A. Dependence on an external provider. B. Dependence on internal IT C. Increase in users who can change data. D. Network connectivity

Increase in users who can change data.

Which of the following is an advantage of cloud computing for an organization? A. Increased security of applications and data due to virtualization B. Decreased downtime due to increased control over hosted servers C. Increased internal focus on IT when hosting with proven providers D. Increased scalability to meet usage demands

Increased scalability to meet usage demands

An organization has just gone to a start-up cloud provider for its entire infrastructure. Which of the following is one of the new organizational roles required at the cloud provider? A. Supply manager B. Commercial manager C. Infrastructure project manager D. Credit risk manager

Infrastructure project manager

IQN

Initiator Qualified Name - iSCSI Qualified Name

Which of the following is one way to mitigate the issue of non-secure communication methods used by cloud providers? A. Insist that the provider switch to secure protocols, such as SSH instead of Telnet. B. Insist that the provider use authentication to connect to the non-secure applications. C. Insist that the provider place firewalls and routers at the border of the cloud environment. D. Insist that the provider implement username/password on all protocols.

Insist that the provider switch to secure protocols, such as SSH instead of Telnet.

Elastic computing is important to businesses as it relates to which of the following cloud characteristics? A. Scalability B. Security C. Integrity D. Distribution

Integrity

ICMP

Internet Control Message Protocol

ISP

Internet Service Provider - A service organization that provides a link between an end user and the Internet via dial-up modems, cable, or digital subscriber lines (DSLs).

iSCSI

Internet Small Computer System Interface - Storage device protocol that facilitates storing and retrieving data from location-independent data storage facilities.

ISNS

Internet Storage Name Service - protocol allows **automated discovery**, management and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network.

An organization subscribes to a public cloud. For which of the following does the subscriber not depend on the vendor? A. Internet bandwidth and packet latency B. Service Level Agreement C. Data backups D. Infrastructure availability

Internet bandwidth and packet latency

Which of the following consequences does IT outsourcing and cloud computing have in common? A. Involvement of external staff B. Improved flexibility C. Reduced expense D. Shorter time to market

Involvement of external staff

Which of the following does the server virtualization layer do? A. It allows the underling physical server hardware to be shared B. It allows the virtual machines to be dependent on each other C. It allows the virtual machines to be load balanced D. It prohibits the use of virtual machines by unauthorized users

It allows the underling physical server hardware to be shared

Why is standardization of data formats important? A. It facilitates movement from one provider to another. B. It helps encourage innovation. C. It leads to a more mature stage of the cloud computing landscape D. It leads to more efficient machine utilization.

It facilitates movement from one provider to another.

SLA Characteristics - Redundancy and Resilience

It is important to note that the availability, reliability and performance of an IT resource can be made more resilient by providing redundant implementations of the IT resource. For example. a web service with an availability rating at 90% that has redundant implementation also with an availability rating at 90% will have a combined reliability rating at nearly 100% because there is a very low probability that both implementations will be unavailable at the same time.

Which of the following is a drawback of direct cost when implementing cloud computing? A. It cannot be applied to IaaS. B. It is complex. C. It is less accurate. D. It only works with SaaS.

It is less accurate.

In cloud computing, the ability to scale resources on demand, benefits the business in which of the following ways? A. Allowing a third party to manage service delivery ensures lower staffing costs. B. It is more cost effective to pay for what is needed rather than pay for peak demand upfront. C. Fewer in-house servers lower the power consumption of the datacenter. D. Shorter contracts and less capital expenses reduce expenditures to the IT budget.

It is more cost effective to pay for what is needed rather than pay for peak demand upfront.

Which of the following is a negative business impact of cloud computing? A. It lowers the company's overall application processing availability. B. It is difficult to implement problem management. C. It is more difficult to ensure policy compliance. D. It slows down the company's ability to deal with server capacity issues.

It is more difficult to ensure policy compliance.

Why can cloud computing be a challenge in relation to compliance risks (e.g. compliance with the Sarbanes-Oxley Act)? A. It makes it harder to know where a company's important assets are. B. It is harder to limit the provider's liability in the contract. C. It makes it harder to know where a company's physical assets are. D. Industry regulations change more frequently to ensure compliance.

It makes it harder to know where a company's important assets are.

A dysfunctional liver can give a yellow appearance to the skin and to the whites of the eyes. This is a medical condition that is referred to as

Jaundice

JBOD

Just a Bunch Of Disks

This capital letter is used as a symbol for potassium: ______

K

An abnormal growth of scar tissue (sometimes caused by getting ear lobes pierced) that can be located behind the pinna and is more common in persons of African descent is called a

Keloid

KVM

Kernel Virtual Machine

KVM

Keyboard Video Mouse

Amazon Elastic Cloud Computing (EC2) is a facility for quickly providing virtual servers. This is an example of: A. SaaS B. IaaS C. PaaS D. QoS.

LaaS

A term that means "an intricate maze of connecting pathways...

Labyrinth

Which of the following is indicated by a high number of variations of different virtual servers? A. Lack of an automated provisioning process of the virtual machines B. Lack of automation of virtual machine image manufacturing C. Lack of manpower to monitor the virtual machines D. Lack of physical servers to accommodate the different virtual servers

Lack of automation of virtual machine image manufacturing

L2TP

Layer 2 Tunneling Protocol

How can you mitigate governance risks and issues?

Legal contracts, when combined with SLAs, technology inspections, and monitoring, can mitigate governance risks and issues. A cloud governance system is established through SLAs, given the "as-a-service" nature of cloud computing. A cloud consumer must keep track of the actual service level being offered and the other warranties that are made by the cloud provider.

Which of the following risk results if cloud computing providers limit their Service Level Agreement (SLA) liabilities? A. Compliance risk B. Legal risk C. Privacy risk D. Security risk

Legal risk

LDAP

Lightweight Directory Access Protocol

LAN

Local Area Network

Which of the following risks are associated with using a customized proprietary cloud application? A. Simplified continuity of operation and disaster recovery plan B. Lack of internal control over function and design of applications C. Locking into the cloud provider and increasing costs over the long term D. Reassignment of roles and responsibilities would be necessary

Locking into the cloud provider and increasing costs over the long term

LUN

Logical Unit Number

LTS

Long Term Support

ML

Machine Learning - an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.

MBR

Master Boot Record

MTU

Maximum Transmission Unit

MTBF

Mean Time Between Failure

MTTF

Mean Time To Failure - The average amount of time before a system component fails for the first time.

MTTR

Mean Time To Repair

Which of the following is a service level management tool aimed at quantifying a cloud offerings' performance? A. Mean Time to Recovery B. Risk Assessment C. Business Impact Analysis D. Request for Proposal

Mean Time to Recovery

Goals & Benefits Cloud Computing - Proportional Costs

Measured Usage characteristic represents a feature-set that allows measured operational expenditures (directly related to business performance) to replace anticipated capital expenditures. A cloud's Measured Usage characteristic represents a feature-set that allows measured operational expenditures (directly related to business performance) to replace anticipated capital expenditures. This is also referred to as proportional costs.

Which of the following types of organizations would not benefit from cloud computing due to legal requirements? A. Online library B. Social media sites C. Large marketing agencies D. Medical facility

Medical facility

The very dangerous form of skin cancer that can form on the pinna is called a

Melanoma

This term is used to refer to a baby that is born with an abnormally small head:

Microcephaly

When an organization moves to a cloud service for IaaS the cost model changes. Which of the following illustrates that cost model? A. Move from an ongoing OPEX model for infrastructure to an ongoing service charge for the life of the infrastructure B. Move from a depreciation model of infrastructure to a leasing model of infrastructure with bundled support and maintenance. C. Move from a CAPEX model for infrastructure to an ongoing OPEX charge with bundled support and ongoing maintenance. D. Move from an OPEX model for infrastructure to an ongoing CAPEX charge with bundled support and ongoing maintenance.

Move from a CAPEX model for infrastructure to an ongoing OPEX charge with bundled support and ongoing maintenance.

MFA

Multi-Factor Authentication

MPIO

MultiPath I/O

MPLS

Multiprotocol Label Switching

Outer hair cells that stick up through the tectorial membrane have a characteristic pattern shaped like this letter of the alphabet:

NOT 'o"

The pinna is attached to the head at an angle of _____ degrees in most people.

NOT 15

NVMe-oF

NVMe over Fabrics

NPIV

N_Port ID Virtualization

NAC

Network Access Control

NAT

Network Address Translation

NAS

Network Attached Storage

NFS

Network File System

NIS

Network Information Service

NIC

Network Interface Controller

NOC

Network Operations Center

NTP

Network Time Protocol

NTS

Network Time Security

Which of the following describes the amount of data that can be sent across a link in a given time? A. Network bandwidth B. Network QoS C. Network latency D. Network speed

Network bandwidth

Which of the following capabilities must a vendor be able to fulfill in order to provide a successful IaaS solution? select two A. Network maintenance B. Application development C. Web-based application maintenance D. Application configuration settings E. Physical security

Network maintenance and Physical security

NTFS

New Technology File System

NVMe

Non-Volatile Memory Express

Eucalyptus is open-source software for quickly provisioning virtual servers. This is an example of: A. PaaS B. IaaS C. SaaS. D. On-demand software. E. None of the above.

None of the above.

Why doesn't the role "Cloud Resource Owner" exist?

Of course there is an owner of cloud resources: the cloud provider. However, a cloud service can be owner by either the cloud provider or a cloud consumer.

A cloud subscriber may come under certain security constraints when hosting sensitive data in the cloud due to government regulations. Which of the following is the best mitigating control that could be implemented by the cloud provider? A. Offer multi-tenancy software as a service with segregated physical infrastructure. B. Offer a single-tenancy software service with segregated virtualized infrastructure. C. Offer multi-tenancy software as a service with logically segregated infrastructure. D. Offer a single-tenancy software service with monitored intrusion detection systems.

Offer a single-tenancy software service with segregated virtualized infrastructure.

Business Cost Metrics - on-going costs

On-going costs represent the expenses required by an organization to run and maintain IT resources it uses.

ODBC

Open Database Connectivity

OSPF

Open Shortest Path First

How can an organization successfully implement a PaaS strategy? A. Open up internal databases with Web service access. B. Take inventory of the application portfolio and select external suppliers C. Standardize on a limited set of virtual machines. D. Continuously execute performance analytics to monitor providers

Open up internal databases with Web service access.

OS

Operating System

OLA

Operational Level Agreement

Which of the following would be considered in a private cloud? A. Organizational direct attached storage B. Organizational SAN C. Vendor leased co-hosted storage D. Encrypted shared drive

Organizational SAN

Why does request fulfillment become more complicated in a cloud environment? A. All processes must become automated. B. Processes must be redesigned with the user experience in mind. C. The IT service team must be expanded. D. Users should be aware of the benefits before changes to the process are incorporated

Processes must be redesigned with the user experience in mind.

Ears that stick out at too far an angle are referred to as "__________________________________" ears.

Prominent

The bones of the middle ear are collectively called the ___________________________

Ossicles

A middle ear infection is professionally known as

Otitis Media with Effusion

A medical instrument used to look in the ear canal: ________________________

Otoscope

The medical instrument used to look in the ear canal is called an ___________________________ .

Otoscope

Goals & Benefits Cloud Computing - Increased Availability

Outages limit the time an IT resource can be "open for business" for its customers, thereby limiting its usage and revenue generating potential.

A company decides to reduce its IT labor force by hiring an external company to manage various aspects of IT administration, such as software patch management, desktop virtualization, and remote network maintenance. The company will still retain technicians for maintenance and storage administration. Which of the following services has this company implemented? A. Outsourcing B. Virtualization C. PaaS D. IaaS

Outsourcing

Goals & Benefits Cloud Computing

PARIS 1. *Proportional Costs* 2. Increased *Availability* 3. Increased *Reliability* 4. Reduced *Investments* 5. Increased *Scalability*

What is PCI DSS? And what issue does it pose?

PCI DSS stands for: Payment Card Industry Data Security Standard and it requires that cardholder data be stored in separated network segments (pke: separated from what?) Cloud consumers unaware of the location of data or IT resources hosted by cloud providers may not be able to comply with such regulations and policies.

A software development company would like to deploy all of their application development using their own software to the cloud. The type of cloud they will most likely choose to implement is which of the following? A. XaaS B. IaaS C. SaaS D. PaaS

PaaS

Web hosting is a service that enables customers to deploy a website quickly. This is an example of: A. IaaS. B. SaaS C. PaaS. D. On-demand software. E. None of the above.

PaaS

Which of the following is most typically accessed through Web services? A. IaaS B. PaaS C. SaaS D. None of the above

PaaS

A financial services company plans to move its existing CRM system into the cloud. The current system hosts 50 million customers. Which of the following steps should be done first for moving this application into the cloud? A. Perform security testing of the application to ensure that there are no new security vulnerabilities being introduced. B. Perform testing to confirm that all the customer data can be mapped/migrated during the allocated change window. C. Communicate with customers that they will be moving to a new CRM system which will be hosted in the cloud. D. Perform a physical site assessment on where the application is hosted to ensure adequate controls are in place.

Perform security testing of the application to ensure that there are no new security vulnerabilities being introduced.

Which IT process is likely to take more effort with cloud computing? A. Hardware maintenance B. Installing operating system patches C. Performance monitoring D. Server maintenance

Performance monitoring

Which represents the most important business continuity risk? A. Incomplete Service Level Agreements (SLAs) B. Network connectivity interruption C. Privacy laws D. Providers going out of business

Providers going out of business

Which of the following processes should be implemented to validate the application security of the cloud provider's SaaS application? A. Periodic integrity testing B. Periodic penetration testing C. Review of operating system configuration D. Application load testing

Periodic penetration testing

P2P

Physical to Physical

P2V

Physical to Virtual

Choose one of two names used for the surgical procedure to correct ears that stick out too far:

Pinnaplasty

PaaS

Platform as a Service

PIT

Point-in-Time (backup or snapshot)

PPTP

Point-to-point Tunneling Protocol

PAT

Port Address Translation

"K" ions located in the cochlea are called by this common name:

Potassium

PBX

Private (or Public) Branch Exchange

Which of the following services represents an environment where the computing architecture is providing a hosted service to a limited group inside a corporate firewall? A. Public Cloud B. VLAN C. Private Cloud D. VPN

Private Cloud

A company has decided to implement a third-party hosted service so that they have access to as many virtual instances as needed, for exclusive use. Which of the following types of services would this represent? A. VPN B. Public cloud C. Private cloud D. VTP

Private cloud

Which of the following is a differentiating characteristic of private cloud solutions compared to public cloud solutions? A. Private cloud solutions are dedicated for use by a single organization. B. Private cloud solutions are never accessible via the public Internet. C. Private cloud solutions do not provide incremental scalability. D. Private cloud solutions save considerably more money than a public cloud solution.

Private cloud solutions are dedicated for use by a single organization.

Which of the following is an important new skill for an IT organization to develop in the context of cloud computing? A. Provisioning services B. Incident management C. Technology upgrade monitoring D. Security and risk management

Provisioning services

Deployment Models

PuHyPriCo - *Public Cloud* - *Hybrid Cloud* - *Private Cloud* - *Community Cloud* - *Virtual Private Cloud* / *dedicated cloud* / *Hosted Cloud* - *Inter-Cloud*

PKI

Public Key Infrastructure

QA

Quality Assurance

QoS

Quality of Service

Which of the following business benefits do cloud computing and IT outsourcing have in common? A. Clarity and budgeting ease of upfront costs B. Improvement of employee skills sets C. Reduction of capital expenditures D. Flexible contracts

Reduction of capital expenditures

RAID

Redundant Array of Inexpensive Disks

SLA Characteristics - Reliability

Reliability represents the probability that an IT resource performs its intended functions without failure under pre-defined conditions. A common formula for calculating the reliability rating of on IT resource, is to take the number of successful executions of its function(s) and divide that value by the number of attempts made to execute those function(s).

Who is responsible for granting access to a user in federated identity management? A. Identity provider B. Relying party C. SaaS provider D. User

Relying party

RDP

Remote Desktop Protocol

ReFS

Resilient File System

A provider supplies storage, processing, memory, and network bandwidth to multiple tenants, using physical and virtual resources. This is an example of which of the following cloud characteristics? A. On-demand self-service B. Measured service C. Resource pooling D. Rapid elasticity

Resource pooling

Which of the following is improved by choosing cloud computing versus traditional IT infrastructure outsourcing? A. Resource spending B. Legal requirements C. Employee morale D. Controllable response time

Resource spending

Why are traditional chargeback systems not compatible with cloud computing? A. Cloud computing is low cost and does not accommodate charge back fees B. Cloud computing can be more expensive than in-house capacity C. Licensing models can become outdated quickly D. Resources that are used can fluctuate throughout the budget cycle

Resources that are used can fluctuate throughout the budget cycle

A legal hold has been requested on an employee's mailbox by the company's legal office. The company IT group is unable to implement the legal hold since the email system has recently been outsourced to the cloud. Which of the following has the company failed to consider when migrating the email service to the cloud? A. Business continuity plan B. Email restoration process C. Archival procedures D. Retention policy

Retention policy

Goals & Benefits Cloud Computing - Increased Reliability

Runtime failures that are not immediately corrected can have a more significant impact during high-volume usage periods. Not only is the IT resource unable to respond to customer requests, its unexpected failure can decrease overall customer confidence.

Which of the following is best used when setting up security for services being used within a public cloud? A. LDAP B. SFTP C. SNMP D. SSL

SSL

A company decides to subscribe to a new CRM product that will help improve their business processes. Which of the following types of cloud computing would most likely be implemented? A. PaaS B. XaaS C. IaaS D. SaaS

SaaS

A company has hired a third party vendor to provide email and spam/anti-malware filtering services. The type of cloud service provided by the vendor is best described as which of the following? A. SaaS B. IaaS C. CaaS D. PaaS

SaaS

Twitter is a service that allows users to exchange short text messages. This is an example of: A. PaaS B. SaaS C. IaaS D. QoS

SaaS

Which of the following is an effect of cloud computing on application development? A. SaaS allows for open-source application development. B. SaaS delays the time to market for most applications. C. SaaS inhibits vendor interoperability on application platforms. D. SaaS allows for a shorter time to market for some applications.

SaaS inhibits vendor interoperability on application platforms.

Google Apps is a set of online applications allowing users to create and share documents and spreadsheets. This is an example of: A. PaaS B. SaaS. C. IaaS. D. None of the above.

SaaS.

Which of the following scala terminates at the round window?

Scala tympani

Which of the following best describes the properly of cloud computing that allows changes in transaction volume without major changes to the system? A. Scalability B. Reliability C. Integrity D. Availability

Scalability

Which of the following characteristics of cloud computing describes the ability to grow easily in response to an increase in demand? A. Hardware independence B. Scalability C. Variability D. Security

Scalability

Which of the following cloud service characteristics would impact how a current application will adapt in the future according to how quickly a business will grow? A. Time to market B. Scalability C. Hardware independence D. Security

Scalability

Which of the following is an advantage of cloud computing that can enhance business value? A. Hardware dependence B. Scalability C. Fixed costs D. Security

Scalability

scaling

Scaling, from an IT resource perspective, represents the ability of the IT resource to *handle increased or decreased usage demands*. The following are types of scaling: 1. *Horizontal Scaling* - scaling out and scaling in 2. *Vertical Scaling* - scaling up and scaling down

SFTP

Secure FTP

SHA

Secure Hash Algorithm

SSH

Secure Shell

SSL

Secure Sockets Layer

Which of the following is a typical concern for business and IT leaders when adopting cloud computing? A. Current cost structure of IT B. Quality of web-based user interfaces C. Security of current IT solutions D. Technical maintenance of current IT assets

Security of current IT solutions

Which of the following are essential steps to take when creating a virtual server? A. Select a machine image to run, select an application set to run, select security credentials. B. Select a machine image to run, select an application set to run, select the size of the virtual machine. C. Select a machine image to run, select security credentials, select the size of the virtual machine. D. Select an application set to run, select security credentials, select the size of the virtual machine.

Select a machine image to run, select security credentials, select the size of the virtual machine.

Which of the following is an essential step in the start-up process of a virtual server? A. Identify the location of the physical machine B. Select identity providers C. Select security credentials D. Select the application set that will run on it

Select security credentials

SATA

Serial Advanced Technology Attachment

SAS

Serial Attached SCSI

SMB

Server Message Block

Since the implementation of a cloud infrastructure, a senior level network administrator's job description has changed from being responsible for maintaining the hardware of the network infrastructure to more of a management position, ensuring the cloud vendor is providing the services specified in the contract with the company. Which of the following has been impacted the most by the change in job responsibility? A. Service Transition B. Service Design C. Service Operation D. Service Strategy

Service Design

SLA

Service Level Agreement

A company's IT department currently spends several hours a day maintaining the hardware of the database server. The company migrates the server to the cloud. Which of the following job responsibilities of the IT department has been most impacted by this change? A. Service Strategy B. Service Operation C. Service Design D. Service Transition

Service Operation

Which of the following would help an organization's IT department set their objectives and expectations for a cloud computing solution? A. Service Transition B. Service Operation C. Service Strategy D. Service Design

Service Strategy

Why are Service Agents important for Cloud Computing?

Service agents ore important to cloud computing. Especially for providing runtime monitoring and Load balancing functions. Examples: 1. The automated scaling listener 2. The pay-per-use monitor

As part of a critical SaaS application, one of the contractual statements by the cloud provider is a requirement to perform scheduled maintenance. This has a direct impact on which of the following? A. Service strategy B. Service transition C. Service operation D. Service design

Service operation

Which of the following early examples of cloud computing was used for software engineering purposes in the form of web-based applications and required interoperability between different systems? A. Distributed Computing B. Service-Oriented Architecture (SOA) C. Virtual Private Networks (VPNs) D. Desktop Virtualization

Service-Oriented Architecture (SOA)

A private cloud generally has which of the following characteristics? A. Services are restricted to members of the same organization B. Infrastructure is managed by an independent service provider C. Services are managed by a third-party provider D. Services are accessed by members outside of the organization

Services are restricted to members of the same organization

SCP

Session Control Protocol

SIP

Session Initiation Protocol

STD refers to

Sexually Transmitted Diseases

Which of the following is a unique characteristic of virtualization? A. Security features B. Federated identities C. Shared hardware D. Sourcing challenges

Shared hardware

SNMP

Simple Network Management Protocol

SMT

Simultaneous Multi-Threading

SSO

Single Sign-On

Why do business users prefer to deal with cloud providers directly, instead of via the IT department? A. It reduces financial risks to the business B. The IT department does not accommodate variable costs C. They can better measure the provider's quality D. They can use their own payment options

The IT department does not accommodate variable costs

An organization requires that it federates its internal systems and their externally hosted SaaS finance system so a user does not have to re-authenticate. This is an example of which of the following? A. Open authentication B. Single sign-on C. Biometric scanning D. Multifactor authentication

Single sign-on

SR-IOV

Single-Root Input/ Output Virtualization

SCSI

Small Computer System Interface

SDLC

Software Development Life Cycle

SaaS

Software as a Service

Which of the following processes needs to be changed to better handle Change Management in the cloud? A. Financial chargeback B. Security management C. Hardware maintenance D. Software distribution

Software distribution

SDN

Software-Defined Network

SDS

Software-Defined Storage

SSD

Solid State Disk

The periodic firing of the nerve fibers in the absence of stimulation to the cochlea is called

Spontaneous discharge

How can an organization successfully implement an IaaS strategy? A. Standardize on a limited set of virtual machines B. Continuously execute performance analytics C. Open up internal databases with Web service access D. Take inventory of the application portfolio and select external suppliers

Standardize on a limited set of virtual machines

SAN

Storage Area Network

Which of the following is an example of a cloud-related security risk? A. Losing network connectivity B. Not having enough software licenses C. Not knowing what the cloud provider will charge D. Storing customer data at a provider

Storing customer data at a provider

A company is trying to understand the IT service management impacts of adopting cloud computing as the delivery vehicle for a new service. Which of the following lifecycle phases would be likely to see these impacts evaluated? A. Strategy B. Operation C. Design D. Transition

Strategy

The "O" in the acronym "TORCH" refers to "Other bacterial infections," particularly this venereal disease that is spread through contact with an infected person:

Syphilis

PaaS: Platform as a Service

The PaaS delivery model represents a pre-defined "ready-to-use" environment typically comprised of already deployed and configured IT resources. Specifically, *PaaS relies on (and is primarily defined by) the usage of a ready-made environment that establishes a set of pre-packaged products and tools* used to support the entire delivery lifecycle of custom applications.

TKIP

Temporal Key Integrity Protocol

Inter-Cloud

The *Inter-Cloud* model is based on an architecture comprised of two or more inter-connected clouds.

cloud service consumer

The *cloud service consumer* is a temporary runtime role assumed by a software program when it accesses a cloud service.

Cloud Service Consumer

The *cloud service consumer* is a temporary runtime role assumed by a software program when it accesses a cloud service. The *cloud consumer* uses a *cloud service consumer* to access a cloud service. The cloud service consumer is a service consumer that accesses a cloud service.

A company is adopting a public SaaS cloud based computing system to migrate a mission critical application. Which of the following capabilities will be most likely lost? A. Centralized management of user access to the application. B. Aversion of the software that will be accessed in the cloud. C. The ability to perform fine grained customizations to the software. D. The ability to access the application from the internal company network.

The ability to perform fine grained customizations to the software.

Horizontal Scaling

The allocating or releasing of IT resources that are of the same type is referred to as horizontal scaling (Figure 1). The horizontal allocation of resources is referred to as *scaling out* and the horizontal releasing of resources is referred to as *scaling in*. Horizontal scaling is a common form of scaling within cloud environments.

SLA Characteristics - Availability

The availability of an IT resource is the probability that it will be accessible. The probability value is generally expressed with a percentage representing the amount of time that the IT resource is accessible during a given period. The percentage is calculated as follows: 1. Divide the amount of hours the IT resource was unavailable (within a measured period) by the total amount of hours within the measured period. 2. Multiply the value by 100. 3. Deduct the value from 100.

A technology manager is explaining the company's latest move toward cloud computing. Which of the following statements would not be an example of cloud computing? A. The company is moving their email to a third party web application. B. The company is consolidating their 10 web servers to one physical server located in the datacenter. C. The company is going to leverage hosted servers to handle any additional processing power needed for the application developers. D. The employees will now access their hosted finance application via their web browser.

The company is consolidating their 10 web servers to one physical server located in the datacenter.

Which of the following is the best example of a cloud vendor's monthly hosting fee changing based on cost allocations? A. The company's fee varies based on the projected quarterly revenue of the client's company. B. The company's fee varies based on the number of their IT staff required to support the infrastructure. C. The company's fee varies based on the number of servers needed to house data in the datacenter. D. The company's fee varies based on the energy consumption of each server in the datacenter.

The company's fee varies based on the number of servers needed to house data in the datacenter.

Business Cost Metrics - cost of capital

The cost of capital is a value that represents the cost incurred by raising required funds. For example, it will generally be more expensive to raise an initial investment of $150,000 than it will be to raise this amount over a period of three years. The relevancy of this cost depends on how the organization goes about gathering the funds it requires. If the cost of capital for an initial investment is high, then it further helps justify the leasing of cloud-based IT resources.

What is the driving motivation behind cloud computing?

The driving motivation behind cloud computing is to provide IT resources as services that encapsulate other IT resources, while offering functions for clients to use and leverage remotely. A multitude of models for generic types of cloud services have emerged, most of which are labeled with the "as-a-service" suffix.

Which of the following critical success factors would likely persuade a company to use a SaaS service? A. The elimination of company driven application maintenance and backups B. The lowering of thin client management costs C. The decrease of company-owned physical system downtime D. The increase of web presence

The elimination of company driven application maintenance and backups

What kind of cloud consumers typically need IaaS?

The general purpose of an IaaS environment is to provide cloud *consumers with a high level of control and responsibility over its configuration and utilization*. The IT resources provided by IaaS are generally not pre-configured, placing the administrative responsibility directly upon the cloud consumer. This model is therefore *used by cloud consumers that require a high level of control* over the cloud-based environment they intend to create.

Why do management tools introduce a risk? A. The management tools present a vendor lock-in B. The management tools are indispensible above a specific scale of operation C. The migration may not be successful D. Too many software licenses are needed

The management tools present a vendor lock-in

Goals & Benefits Cloud Computing - Reduced Investments

The most common economic rationale for investing in cloud-based IT resources is in the reduction or outright elimination of up-front IT investments, namely hardware and software purchases and ownership costs.

Which of the following is the most important service management consequence of elastic capacity? A. The need for better application development B. The need for better security management C. The need for good performance monitoring and management D. The need to improve the fulfillment and provisioning process

The need for good performance monitoring and management

All of the following are important design decisions when deploying SaaS except: A. How existing company data is integrated in or migrated to the application. B. How the application will be integrated with other applications. C. The number of users that will access the application simultaneously D. Where or by whom will digital identities be issued for logging on to the application.

The number of users that will access the application simultaneously

In order for an organization to have a successful cloud implementation, which of the following must be true? A. The organization must perform and successfully complete a cloud readiness assessment. B. The organization must have used virtualization technology in the past. C. The organization must have an unlimited budget for allocation of cloud resources. D. The organization must have an in-house IT department.

The organization must perform and successfully complete a cloud readiness assessment.

Cloud Service Owner

The person or organization that legally owns a cloud service is called a cloud service owner. The cloud service owner can be the cloud consumer, or the cloud provider that owns the cloud within which the cloud service resides.

How does cloud computing influence service operations? A. Cloud computing is more cost effective B. The provisioning of servers and services is quicker or ceases to be an issue C. The provisioning of servers and services can be much slower D. The security level will increase

The provisioning of servers and services is quicker or ceases to be an issue

What does "On-Premise" mean

The term on-premise (or "on-premises") is used to qualify an IT resource that is not remotely accessible via a cloud, but instead resides within an internal IT enterprise environment.

Which of the following applies only to public cloud computing as opposed to outsourcing? A. Contracts are in years as opposed to days or months B. Internal IT staff move from one organization to another C. There are no upfront CAPEX costs for hardware D. Infrastructure is stored within a datacenter

There are no upfront CAPEX costs for hardware

Why is it important to consider the cloud ecosystem when developing applications? A. Cloud providers will do application development. B. The development process needs to change. C. The role of the IT department will change. D. This can speed up the development process.

This can speed up the development process.

How to mitigate the "limited portability between cloud providers" challenge?

This challenge can be mitigated if cloud consumers can build solutions based on industry standards and if cloud providers support these industry standards.

TTL

Time to Live

What's the issue with accommodating for maximum usage loads?

To accommodate maximum usage loads may require too high of an investment.

What's the issue with moderating the usage loads investments?

To moderate the investment may result in lost transactions and other usage limitations due to lower usage thresholds.

TCO

Total Cost of Operations

TCP

Transmission Control Protocol

TLS

Transport Layer Security

Endogenous hearing losses have a genetic basis.

True

Inner and outer hair cells are stimulated by movements of the basilar membrane.

True

The Eustachian tube connects the middle ear to the back of the throat.

True

The auditory system is the only sensory system in the body that plays an active part in improving its own sensitivity.

True

The carotid artery provides blood to the brain.

True

(True/False) A cloud resource administrator is a role assumed by a (group of) human(s), not a software program

True. In diagrams, when we show the workstation symbol remotely accessing an IT resource (such as the virtual server in the diagram to the right), we refer to this as the "cloud resource administrator". However, it is implied that the workstation being used by the human to perform the administration task is using a software program that technically is acting as a cloud service consumer.

(True/false) Vertical scaling is less common in cloud environments + explain why or why not.

True. Vertical scaling is less common in cloud environments due to the downtime required while the replacement is taking place.

(T/F) on-going costs for cloud-based IT resources often exceed on-going costs of on-premise IT resources

True. especially over a longer period of time

TPM

Trusted Platform Module

An organization is in the process of selecting a SaaS provider to replace its current internal customer relationship management system. The business expects better functionality than what is provided with the internal system. Which of the following is the best reason for moving to a SaaS cloud service? A. Understand who the most experienced IaaS cloud providers are so that a recommendation can be made to the business based on what other industry vendors are doing. B. Understand the current SLA's of the cloud providers to ensure that they can exceed the current expected business SLA's. C. Understand current functional and non-functional requirements of the system in order to ensure the new system can meet and provide value add to current business needs. D. Understand the cost model of the hosted infrastructure and whether the current system can be hosted on cloud provided infrastructure.

Understand current functional and non-functional requirements of the system in order to ensure the new system can meet and provide value add to current business needs.

UDP

Universal Datagram Protocol

UPS

Universal Power Supply

Business Cost Metrics - up-front costs

Up-front costs are associated with the initial investments that organizations need to make in order to fund the IT resources they intend to use. This includes both the costs associated with obtaining the IT resources, as well as expenses required to deploy and administer them.

UAT

User Acceptance Testing

Cloud computing has the greatest benefit for which of the following user populations? A. User populations which steadily increase in size. B. User populations that vary and are unpredictable. C. User populations that are of fixed size. D. User populations that vary in size on a seasonal basis.

User populations that vary and are unpredictable.

How do demand management processes change with the introduction of SaaS? A. New vendors have to be accommodated B. Users can procure SaaS solutions themselves C. The number of virtual machines can fluctuate with demand D. Maintenance will become easier

Users can procure SaaS solutions themselves

Cloud computing can best reduce costs for a business by: A. Utilizing services as needed. B. Increasing available data storage. C. Utilizing local resources. D. Increasing sales potential.

Utilizing services as needed.

Which of the following is an important factor for maintaining strategic flexibility? A. Return on investment B. Integrity C. Elasticity D. Vendor lock-in

Vendor lock-in

Which of the following does IT outsourcing and cloud computing typically have in common? A. Pay as you go agreements B. Short-term financial commitment C. Tailor-made applications based on client needs D. Vendor lock-in potential

Vendor lock-in potential

This term is used to refer to anatomical structures that no longer have any useful function or do anything (like the appendix or tonsils):

Vestigial organs

VAT

Virtual Allocation Table

vCPU

Virtual CPU

VDI

Virtual Desktop Infrastructure

vGPU

Virtual Graphics Processing Unit

VHD

Virtual Hard Disk

VLAN

Virtual LAN

VM

Virtual Machine

VMFS

Virtual Machine File System

vRAM

Virtual RAM

vSAN

Virtual Storage Area Network

vSwitch

Virtual Switch

VTL

Virtual Tape Library

VXLAN

Virtual extensible LAN

Which of the following is important to standardize? A. Information standards and applications B. User names and hardware providers C. Virtual machine images and applications D. Virtual machine images and identity information standards

Virtual machine images and identity information standards

V2P

Virtual to Physical

V2V

Virtual to Virtual

Which of the following must be implemented by a cloud provider to ensure that different entities can authenticate and share basic user accounting information? A. Scalability B. Federation C. Virtualization D. Self service

Virtualization

Which of the following is a definition of virtualization? A. Virtualization is a method to organize servers in a more efficient manner to double the number of accessible users B. Virtualization is a set of techniques for hiding software resources behind hardware abstractions. C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions. D. Virtualization is a method to structure data in a more efficient manner with less cost to the user.

Virtualization is a set of techniques for hiding hardware resources behind software abstractions.

Which of the following is an important skill for an organization wanting to adopt an IaaS strategy? A. Visualization technology B. Application service procurement C. Customer relations D. Security and risk management

Visualization technology

VoIP

Voice over IP

WAF

Web Application Firewall

Which of the following is an example of an early cloud adoption? A. Data center B. Virtualization C. Video streaming D. Web email

Web email

Which of the following is the primary way to access PAAS? A. Web services B. Websites C. Web hosting providers D. Data integrations

Web services

Which of the following characteristics would allow a company to market its product to the public by using cloud computing services? A. Desktop virtualization throughout the company B. Client-server application modules C. Web-based application modules D. Client-based training modules

Web-based application modules

Which of the following questions should be considered before selecting a cloud computing vendor? A. What cloud computing product will fit the business need? B. What is the vendor policy on telecommuting? C. What is the timeline for transition to the vendor? D. What is the datacenter's power consumption?

What cloud computing product will fit the business need?

Service Consumer (Software Role)

When a software program accesses a service it is labeled as a service consumer. A service consumer is therefore a temporary runtime role assumed by a software program. To distinguish between service consumers that access on-premise and cloud-based services, those that access cloud services are further qualified as cloud service consumers.

Vertical Scaling

When an existing IT resource is replaced by another with higher or lower capacity, vertical scaling is considered to have occurred (Figure 2). Specifically, the replacing of an IT resource with another that has a higher capacity is referred to as *scaling up* and the replacing an IT resource with another that has a lower capacity is considered *scaling down*. *Vertical scaling is less common in cloud environments due to the downtime required while the replacement is taking place.*

Which of the following is the best example of maintaining 'strategic flexibility'? A. Cloud provisioning models have a risk of not maintaining flexibility once services have been migrated. B. When choosing services to migrate into the cloud, there should be a focus on ensuring that future migration between different cloud providers can be facilitated. C. Cloud providers need to provide countermeasures to any consequences of not maintaining flexibility of services in a strategic manner. D. When choosing services to migrate into the cloud, it should be ensured that the cloud provider can change underlying hardware platforms in case the customer needs change.

When choosing services to migrate into the cloud, there should be a focus on ensuring that future migration between different cloud providers can be facilitated.

Which of the following is true when mitigating risks in a cloud environment while avoiding impact to performance? A. When securing cloud resources, only the most sensitive data should be secured. B. When securing cloud resources, it is always a best practice to encrypt all data stored in the cloud. C. When securing cloud resources, data security is not an issue. D. When securing cloud resources, it is always a best practice to use the strongest security on the most sensitive data.

When securing cloud resources, only the most sensitive data should be secured.

WAN

Wide Area Network

Even if you have tight legal agreements with a public cloud provider what can still go wrong?

With public clouds, there is always a risk that the cloud provider will be acquired or may go out at business, potentially resulting in an inability to fulfill legal obligations.

Why is virtualization primarily used in Cloud Computing?

Within cloud environments, virtualization technology is primarily utilized to replicate multiple virtual images of the same physical server for remote access by consumers.

Which change in the security processes is introduced by cloud computing? A. Increased security of accessing credit card information B. Regulations need to be updated more frequently C. Storing passwords in the Configuration Management Database (CMDB) D. Working with multiple providers of user identities

Working with multiple providers of user identities

WWNN

World Wide Node Name

WWPN

World Wide Port Name

When air molecules are forced together due to vibrating motion, they are said to be in a state of

compression

ZFS

Z File System

These nerves carry impulses away from the sensory organ:

afferent

The tympanic membrane is held in place by a fibrous band of cartilage called the

annulus

XaaS

anything as a Service

The part of the middle ear cavity that is above the level of the tympanic membrane is called the ___________________ , or the epitympanic recess.

attic

Another name for the "pinna" ___

auricle

When air molecules are forced together due to vibrating motions, they are said to be in a state of

compression

The vestibular system controls your sense of _____________________________ .

balance

Synchronization of updates is ___________ than replicating data across locations because it gives better assurance that data is always ___________ everywhere. A. better, secure B. better, up to date C. worse, secure D. worse, up to date

better, up to date

A byproduct of the breakdown of red blood cells is called unconjugated

bilirubin

Human beings are

bipeds

In the absence of sound, air molecules move in a random manner called

brownian motion

The anterior wall of the middle ear is also called the __________________________ wall, because this artery runs through it:

carotid

The professional term for "ear wax:"

cerumen

The technical term for "ear wax" is ___________________.

cerumen

The small hair cells in the ear canal are called ______________________.

cochlea

Tiny hair cells, called " ____________________________ ," stick up through the tectorial membrane.

cochlea

The technical term for "swelling" is

edema

Every neonate (newborn) in the state of Mississippi is tested for hearing loss prior to discharge (D/C) from the hospital. The test that is used is called otoacoustic

emission

The fluid found in the membranous inner ear is called __________________________

endolymph

Which of the following is NOT rated in determining the APGAR score

eye pupil reaction to light

Males have two X chromosomes (XX).

false

The mother determines the gender of the child.

false

The osseous labyrinth is filled with a fluid called "endolymph."

false

(True/False) The cloud is a modern name for the internet

false. It is important to distinguish the term "cloud" and the cloud symbol from the Internet. As a specific environment used to remotely provision IT resources, a cloud has a finite boundary. There are many individual clouds that are accessible via the Internet. Whereas the Internet provides open access to many Web-based IT resources, a cloud is typically privately owned and offers access to IT resources that is metered.

In denser media like steel or water, sound travels _____________ than it travels through air:

faster

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources. A. commercial B. financial C. legal D. service

financial

A high frequency sound will influence the basilar membrane found in this turn of the cochlea the most:

first

For what kind of delivery models is the Limited Portability especially relevant?

for PaaS and IaaS

The number of cycles occurring in one second is referred to as the

frequency

The number of cycles occurring in one second is referred to as the ________________________.

frequency

On what structure would you find a "cuticle?

hair cell

The ridge of tissue that makes up the outer-most boundary of the pinna is called the

helix

This term means "lowered oxygen:

hypoxia

A bacterial infection that can grow on the pinna caused by staphylococcus aureus or streptococcus pyogenes that creates a crusty, scaly, skin infection, initially caused by a scratch getting infected is called

impetigo

Where is the utricle located?

in the eliptical recess

Privacy is the right of________ to selectively disclose information about _________ and restrict the further use of that information by any party. A. companies, others B. companies, themselves C. individuals, others D. individuals, themselves

individuals, themselves

The movement of the fluid in the semicircular canals tends to lag behind movement of the head because of

inertia

The semicircular canals and the cochlea are located in the _____________________ ear.

inner

Fluid that's found between the cells is called

interstitial

The narrowest part of the external auditory meatus (EAM) is called the

isthmus

This vein is located just below the floor of the middle ear: __________________________

jugular bulb

Which of the following refers to providing a combination of servers, networking components, hosting, provisioning, and basic services needed to run a cloud? A. PaaS B. CaaS C. SaaS D. IaaS

laaS

Which part of the pinna contains no cartilage? ________________________

lobule

Inner hair cells respond to ___________________ sounds.

loud

The longer the period of a sound wave, the ______________ the frequency.

lower

Another word for "cell plasma:"

lymphocyte

The professional term for "cell plasma:"

lymphocyte

The collective membrane that covers the brain and acts as a shock absorber is called the

meninges

The ear drum is officially part of the ______________ ear.

middle

Small structures found in the hair cell cytoplasm that are thought to release neurotransmitter substances are called

mitochondria

The inferior wall of the middle ear is also known as the _________________________________ wall because this vein is found just beneath the floor of the middle ear.

not femoral

The posterior wall of the middle ear is also called the __________________________ wall

not internal

The lateral wall of the middle ear is where the tympanic membrane is located. This wall is also known as the ____________________________________ wall.

not oval window

A branch of the Glossopharyngeal Nerve (Cranial Nerve IX) that is found on the medial wall of the middle ear is called

not the organ of Corti

The bony shelf found in scala media is known as the

osseous spiral lamina

Another name for swimmer's ear is

otitis externa

The cupola in each macula is covered with granules of calcium carbonate called

otoconia

List the three divisions of the ear that we've discussed in class

outer - middle - inner

A painful bacterial infection involving the cartilage of the pinna that is typically caused by staphylococci or streptococci and is often accompanied by redness and swelling is called

perichondritis

The fluid found in the osseous inner ear is called

perilymph

The time required for a sound wave to move through a compression and a rarefaction is called a

period

The symbol for sodium is Na.

true

While the vestibular system controls balance, the cochlea controls hearing.

true

(True/False) AWS EC2 is a form of IaaS

true.

The elbow is located __________________ to the wrist.

proximal

Cloud computing is priced according to ___________ or has ___________, rather than having upfront costs. A. recurring subscription, a yearly contract B. a yearly contract, usage-based charges C. recurring subscription, usage-based charges D. number of users, a yearly contract

recurring subscription, usage-based charges

"Dextral" refers to

right

This plane of reference separates the left and the right sides of a structure:

sagittal

This term means "boat-like ditch" in Latin:

scaphoid fossa

An enlargement of the pinna, usually caused by trauma where serous fluid collects underneath the skin is called a

serum

The word "concha" is a Greek word for

shell like structure

Cloud computing _____________capital cost to variable cost. A. increases B. reduces C. shifts D. equates

shifts

Private clouds are operated solely for _________ organization(s). A. governmental B. specific C. for-profit D. multiple

specific

What condition can result from a neural tube defect?

spina bifida

The professional name for the stirrup:

stapes

The superior wall of the middle ear is also known as the ______________________ wall.

tegmental

Which of the following companies would best benefit from moving to a cloud service? A. A retail company that has a history of peaks and troughs throughout the year with its online shopping application. B. A family business that does not have any IT applications, but runs off manual processes and good customer service. C. A financial services company that is having a number of security issues with its customer internet banking platform. D. An insurance company that has a mature, low cost and efficient IT infrastructure that does not have significant change.

that has a history of peaks and troughs throughout the year with its online shopping application.

Which of the following structures detect angular rotation of the head?

the crista

Which of the following structures contains "otoconia?"

the macula

Which of the following structures detect static movements of the head?

the macula

A bacterial infection that can be contracted through contact with infected cat feces:

toxoplasmosis

The mnemonic device "TORCH" can be used to remember congenital perinatal infections.

true

The professional name for the ear drum:

tympanic membrane

The deepest part of the indentation of the eardrum is called the

umbo

"away from the backbone" is

ventral

The technical term for "dizziness:"

vertigo

Cranial nerve VIII is also known as the __________________________________ nerve.

vestibulocochlear

The distance between successive compressions of air molecules is called the __________________________.

wavelength

The term "pinna" comes from the Latin word for

wing

At what IT infrastructural level are server costs capital expenses rather than operational? A) Traditional B) Private cloud C) Hybrid cloud D) Public cloud

A

Cloud service opportunities should be identified based on what criteria? A) Business needs B) Regulatory requirements C) Cost control D) Security requirements

A

How do you calculate the overall availability of a service composed of two tiers, where each tier is 99.999% available? A) Multiply the availability values B) Average the availability values C) Subtract each value from 100%, add the results and subtract that from 100% D) Add the values, subtract from 200% and subtract that from 100%

A

True or false? A watcher node is responsible for measuring application performance of a cloud service A) True B) False

A

What does a service level agreement guarantee? A) Service availability B) Service security C) Service interoperability D) Service support

A

What is the role of a cross-functional team representing all business elements of an organization in determining readiness for cloud services? A) To participate in the pilot program and identify areas of concern B) TO negotiate costs for services C) To ensure that the SLA benefits the organization more than the provider D) TO manage the cultural change that will occur during and immediately after the transition

A

What type of cloud service is the most common? A) SaaS B) PaaS C) IaaS D) XaaS

A

Which cloud standards body is focused on audit and security standards for cloud computing? A) Cloud Security Alliance (CSA) B) IEEE Standards Association (IEEE-SA) C) National Institute of Standards and Technology (NIST) D) Organization for the Advancement of Structured Information Standards (OASIS)

A

Which factor contributes to network latency primarily because of oversubscription? A) Congestion B) Number of hops C) Node count D) Protocol latency

A

Which fundamental technology provides cloud computing with its ability to split up processes across multiple resource pools? A) Distributed application design B) Resource management automation C) Virtualized computing D) High performance computing

A

Which level of management is provided by all cloud service providers, whether their products are SaaS, PaaS, or IaaS? A) Infrastructure B) Databases C) Applications D) Service oriented architecture

A

Which level of the cloud service model pyramid allows the greatest flexibility for application development? A) IaaS B) SaaS C) PaaS D) XaaS

A

Which of the following is not an appropriate reason for choosing a private cloud solution over a public cloud solution? A) Management directives to retain full control over hardware B) Strict legal requirements for data protection and control C) Significant IT investment already made by the organization D) Limited Internet connectivity

A

Which type of cloud is often used when external mandates require a high degree of data governance? A) Private B) Community C) Partitioned public D) Public

A

With regard to an organization's readiness to adopt cloud services, which of the following is not one of the goals of a pilot program? A) Identification of the type of service provider needed B) Identification of problems with interoperability C) To provide data to a cross-functional team for analysis D) To test the implementation plan in a controlled environment

A

Adding additional memory to a server is an example of what type of scalability? A) Horizontal B) Vertical C) Diagonal D) Load balancing

B

At what NIST "as a Service" model level is the current concern of vendor/proprietary lock-in greatest for custom applications developed for the cloud? A) Software as a Service B) Platform as a Service C) Infrastructure as a Service D) Everything as a Service

B

Decreased time to market is facilitated by which of the following cloud computing benefits? A) Economies of scale B) Pay as you go billing C) Mobility D) Disaster recovery

B

Of the following activities involved in cloud services adoption, which should be performed first? A) Implement a pilot program B) Identify business processes and their dependencies C) Identify and compare vendors D) Identify the appropriate services and deployment models

B

True or false? All cloud services fall into only one of the NIST models: SaaS, PaaS, IaaS A) True B) False

B

True or false? An organization contracting a vendor to provide a SaaS application must have the necessary technical skills to maintain and operate the application being hosted on the cloud A) True B) False

B

True or false? Application life cycle management in the cloud is slightly more complex than in traditional development models due to the addition of remote resources A) True B) False

B

What characteristic of cloud computing reduces data center costs? A) Using energy efficient technologies in cloud data centers B) Flexibility and sustainability of cloud service models C) Allowing services to be automatically migrated between data center locations as required D) Remote availability for mobile devices

B

What type of application design is preferable for a cloud-based application? A) A design that uses stateful objects B) A design that uses stateless objects C) A design that uses in memory state management D) A design that uses client-based state management

B

What type of client system relies on server-based applications and services to take the place of locally stored resources? A) Thick client B) Thin client C) Desktop D) Mobile device

B

Where does the term cloud come from? A) Environmental threats B) Network diagrams C) Exposed networks D) Legacy term for SOA

B

Which function of cloud storage gateways is intended to improve response time to data requests? A) Backup B) Caching C) Compression D) Encryption

B

Which of the following is not an indicator of the organization's ability to successfully adopt cloud services? A) A successful pilot B) A fully staffed helpdesk C) Identification of regulatory requirements D) Executive management support

B

Which of the following terms refers to the ability to rapidly adapt to market changes? A) Strategic flexibility B) Organizational agility C) Process transformation D) Utility

B

Which type of client lacks storage for applications? A) Thick B) Thin C) Mobile D) Remote

B

Which type of cloud allows an organization to share its local cloud services with its partners? A) Private B) Community C) Public D) Hybrid

B

Which type of cloud computing definitely involves resources in the organizatin's own data center? A) Public B) Private C) Community D) Hybrid

B

Which type of cloud service model allows the cloud level hosting of organizational resources from the operating system to the applications accessed within them? A) PaaS B) IaaS C) Public cloud D) Hybrid cloud

B

_________ cloud services can provide interconnections between cloud functioning, allowing multiple clouds to be managed as a single cloud resource pool A) Hybrid B) Federated C) Layer 2 D) Layer 3

B

Physical computing hardware is an example of what type of expense? A) Operating B) Direct C) Capital D) Indirect

C

The term Web Access Architecture refers to the organization of cloud functions against which model of network communication? A) TCP B) HTTP C) OSI D) SMTP

C

What application can be used to move a service from an on-premises test environment to the public cloud in a hybrid cloud environment using Microsoft System Center and Azure? A) Operations manager B) Configuration manager C) AppController D) Virtual Machine Manager

C

What are synthetic transactions? A) Database transactions B) File system transactions C) Operations that mimic user interactions with a service D) Operations that mimic a cloud service

C

What instrument identifies the roles and responsibilities of both the customer and the cloud service provider? A) Service-level objective B) Web hosting agreement C) Service-level agreement D) Software license agreement

C

What is another term for a flexible pool of computing resources available to network clients and managed by self-service on demand automated tools? A) Server virtualization B) High performance computing C) Cloud computing D) Server consolidation

C

Which model of cloud computing best mirrors the current electrical utility grid? A) Community B) Private C) Public D) Hybrid

C

Which of the following SLA elements should be of high concern to an organization considering putting mission-critical data or services in the cloud? A) Services provided and excluded B) Dispute resolution C) Availability and performance requirements D) Costs for services

C

Which of the following elements should be monitored by a consumer of a PaaS service? A) Network fabric B) Storage fabric C) Virtualizations hosts D) Services on a VM

C

Which of the following is a design pattern of cloud-based applications? A) Predictable volume B) Constant processing C) Unpredictable burst D) Big data

C

Which of the following is an advantage of migrating an application to an IaaS provider? A) No operating system maintenance B) Lower cost than PaaS C) Minimal code change D) Lower cost than SaaS

C

Which of the following is not a critical success factor in selecting a cloud service provider? A) The provider is able to provide the appropriate level of security for the organization's data B) The provider's offerings meet identified organizational requirements C) The provider uses open, Java based standards D) The provider's uptime meets the organization's availability needs

C

Which of the following is not a definition for cloud interoperability? A) The ability to move resources, such as applications, between service providers B) The ability for services running in different clouds to access a common set of data or share information C) The ability to arrange, organize, integrate and manage multiple cloud services D) The ability to use a common set of management tools with services from multiple providers

C

Which of the following is not an appropriate mitigation to protect against malicious insiders? A) Employee background checks B) Security policies C) Timely installation of security patches D) Logging

C

Which of the following risks leads to an increased cost for running a cloud-based application A) Security compliance B) IT organizational changes C) DDOS attacks D) Cloud service maturity

C

Which type of cloud is not specified expressly by NIST? A) Private B) Community C) Partitioned public D) Public

C

Which type of cloud would be best used by an organization that wants to leverage its existing IT infrastructure but has occasional periods of high demand? A) Public B) Private C) Hybrid D) Community

C

Which of the following elements should be monitored by a consumer of a SaaS service? A) Network fabric B) Storage fabric C) Services on VMs D) Connectivity to service

D

Adopting cloud services will impact an organization's financial management due to which of the following changes A) Cost of technical support escalations B) Changes in software licensing C) Shifting technology from a capital to an operational expenditure D) Both B and C

D

All but which one of the following options are advantages of SaaS in the enterprise? A) Application deployment and maintenance is performed by the cloud provider B) Applications do not need to be installed on individual machines C) Data is aggregated across multiple individuals, sites or organizations D) Customized and personalized applications can be developed

D

An organization that blends Google Docs forms and Microsoft's Azure services for data collection and management is using what type of cloud deployment? A) Private B) Community C) Public D) Hybrid

D

Congestion occurs when devices begin to interfere with one another as they compete for available network capacity and can be addressed by expanding the available bandwidth or __________ A) Selecting transport protocols with higher latency B) Selecting transport protocols with lower latency C) Reducing the number of hops between devices D) Segmenting subnetworks to limit collisions

D

Prior to cloud services adoption, technical and business staff must work together to perform what action? A) Identify business processes and their dependencies B) Determine changes to the organization's infrastructure C) Determine the impact to business processes D) Both A and C

D

What is the main limitation of a desktop application? A) Lack of manageability B) Lack of reliability C) Lack of security D) Lack of scalability

D

What type of cloud model would enable cloud bursting? A) Private B) Public C) Community D) Hybrid

D

When a service has been migrated into the cloud, where is it really located? A) In the local data center B) In a partner organization's data center C) At a service provider's virtualized data center D) Almost anywhere

D

Which ITIL volume provides guidance on incident and problem management? A) Service Strategy B) Service Design C) Service Transition D) Service Operation

D

Which capability of cloud service automation allows memory and processing power to be dynamically assigned? A) Provisioning policies B) Data recovery C) Resource limitation D) Resource pooling

D

Which of the following does not describe the relationship between mobile computing and cloud computing? A) Mobile devices serve as data input and presentation interfaces B) Data transmitted occupies the limited bandwidth available to mobile devices C) Cloud services provide functions that could overrun available resources on mobile devices if run locally D) Mobile devices must access cloud services using a mobile web browser

D

Which of the following is not a business driver for cloud computing? A) Cost reduction B) IT staff reduction C) Strategic flexibility D) Increasing capital expenses

D

Which of the following tasks cannot be transferred to a cloud computing provider? A) Software license management B) Backups C) Patch management D) Ensuring compliance

D

Which security measures can be used to secure communications between cloud services and end users A) VPN B) SSL C) Firewall D) Both A and B

D


Ensembles d'études connexes

Meiosis in Life Cycles: Tutorial

View Set

History of Hip Hop (Unit 1,2,3 Glossary)

View Set

Ch38 Computer-Aided Manufacturing

View Set

MGMT 209 Swim Test 2 (Ch. 5, 6, 7)

View Set

Spanish (you) familiar and formal , singular and plur

View Set

UNIT 2 EXAM: CLOTTING Exemplars: Thrombocytopenia, Hemophilia A and B, Venous Thrombosis

View Set