70 question Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

is a detailed project management document that clearly defines all aspects of a given project.

A Statement of Work (SOW)

is a deliberate study of whether cloud technology is being used to its fullest potential.

A gap analysis

model is applicable when some data types must be secured in a private cloud and other data types may be stored in a public or community cloud deployment.

Hybrid

A Hybrid Cloud is a combination of two or more of the private, public, or community models. In scenario D, the organization is using a private and public cloud solution, resulting in a Hybrid Cloud.

Hybrid Cloud

is an extension of the web browsing protocol Hypertext Transfer Protocol (HTTP) and provides encryption for web-based connections?

Hypertext Transfer Protocol Secure (HTTPS)

provides a secure means by which a remote Windows graphical user interface (GUI) can be accessed?

Remote Desktop Protocol (RDP)

migration type is known as "lift, tinker, and shift." This method relies on some modification or optimization of the application to take advantage of cloud benefits.

Replatforming

Which of the following simulates a community cloud hosting solution?

A Cloud Service Provider (CSP) supplies resources to several organizations that have similar needs.

exists to serve a discrete body of consumers who have similar business or security needs. While the organizations have similar needs, the services are autonomous?

A Community Cloud

is sent to potential vendors that outlines the project, budget, and timeline.

A Request for Proposal (RFP)

invites potential vendors to bid on projects and is more heavily focused on cost estimates.

A Request for Quote (RFQ)

includes log files and other record-keeping that is used to track who took certain actions. If a database is deleted, an administrator may review the logs to determine who completed the action.

Auditing

Which of the following can configuration management provide via orchestration, during a virtual machine deployment? (Select all that apply)

Automated installation of the operating system. Automated configuration of a server. Automated installation of applications. Automated migration of data.

Analyze the features of Software-Defined Storage (SDS) and determine which of the following are characteristics of the service. (Select all that apply)

Automated management of storage resources, The ability to view available storage resources.

refers to the elimination of the human role in management tasks. Such automation of routine labor addresses concerns, such as security and routine tasks.

Autonomous environment

An organization uses a Cloud Service Provider (CSP) to host web services. The organization requires the web server to be online 99.99% each year. Compare risk management design aspects and determine which one this requirement represents.

High availability

falls under the support professional services and itemizes and formalizes vendor support. include specific metrics that prove whether the agreed-upon level of service has been satisfied. It will also define penalties if the service levels are not satisfied.

A Service Level Agreement (SLA)

Which of the following scenarios simulates sandboxing?

A test of an application occurs in an isolated environment away from the production environment In sandboxing, applications are tested in an isolated environment that is not connected to the production environment in any way. Such a design keeps any unintended effects from impacting production. Sandboxing is not performed in the production environment. Sandboxing is designed to prevent an impact to production, and testing in an isolated environment provides this protection.

Which of the following simulates an unintentional threat?

A user forgets to lock their system prior to leaving. - Unintentional threats are mistakes made by administrators or by users. A user forgetting to lock their system prior to leaving a workstation is an unintentional threat.

An organization's data center is located 150 miles inland. The nearest coast has a moderate probability of hurricanes. The data center's location has only experienced minor winds and rain in the past from the hurricanes. What is the organization's most likely response to the risk of a hurricane?

Acceptance

implemented to manage the interaction between users and data. User account management, including on-boarding and off-boarding of employees, account creation and modification, and group memberships are all specified.

Access and control policies

An employee wants to determine the organization's stance on Bring Your Own Device (BYOD). Which set of policies should the employee review?

Access and control policy- Access and control policies are implemented to manage the interaction between users and data. Network connectivity, including Bring Your Own Device (BYOD) policies will specify whether personal devices, such as smartphones and tablets, are allowed to connect to the network.

Which of the following is an example of authentication? (Select all that apply)

An employee logs into a system with a smart card. An employee accesses a data center via fingerprint technology. Authentication occurs by an employee proving their identity to a system. Examples of authentication includes an employee using a smart card to access a system. Authentication can be based on what you know (passwords), what you have (smart card), and who you are (biometrics).

Which of the following scenarios simulates an on-premise to cloud migration?

An organization moves internal IT services to the cloud. - The most common cloud migration is the transfer of on-premise resources to the resources contracted from a Cloud Service Provider (CSP). Depending on the results of the cloud assessment and design, the organization may transfer some or all of the applications, services, and servers to the CSP's data center.

An organization performs a risk assessment. They discover that highly sensitive data is too expensive to properly protect in a cloud environment and decide to keep the data on premise. Which response to the risk assessment did the company implement?

Avoidance -The company chose avoidance. Risk avoidance seeks to keep the business out of position to be affected by a given risk.

s the name given to hosting immense quantities of data, to include analyzing that data for information useful for the business.

Big data

A financial institution requires a solution that provides immutable data for transactions. Which of the following is a viable option for the organization?

Blockchain- Blockchain is a technology originally built to manage Bitcoin transactions. Blockchain is a data integrity system that records transactions. The result is immutable data for transactions, such as bank transfers.

The deployment can shift Capital Expenditures (CapEx) to Operational Expenditures (OpEx), but this is not the cause of reduced maintenance costs. Maintenance costs are OpEx and the company will need fewer technicians.

Bonus:

Bonus: A cloud deployment does not shift variable costs to fixed costs. A deployment will move fixed costs to variable costs, which aligns with output.

Bonus: A cloud deployment does not shift OpEx to CapEx. OpEx represents the day-to-day business costs of maintaining services.

Bonus: IaC eliminates the use of interactive configuration tools. Configurations are in machine-readable files. The files are pulled to the servers and the declarative configurations are set on the server.

Bonus: The IaC model falls under Continuous Delivery (CD) as a means of rapidly and consistently deploying configurations.

re used for software, services, or operating systems for which a company already owns the license for.

Bring Your Own License (BYOL) plans

is described as services being available across the network from commonly available clients?

Broad network access

Compare the functions of Continuous Integration/Continuous Delivery (CI/CD) practices. What role does CI play in this practice? (Select all that apply)

CI manages the building of software development. CI manages the testing functions of the software.

represent the costs the business must endure to cover land, buildings and hardware. These costs are usually incurred long term and includes the purchase of servers, routers and switches

Capital Expenditures (CapEx)

An organization uses a Cloud Service Provider (CSP) for a majority of IT support. The organization reviews the bill from the CSP each quarter and determines the cost breakdown for each department. The cost is then taken from each department's budget to cover the CSP bill. Consider cloud expenditures and determine the type of allocation the organization is performing.

Chargebacks

bill business units for the IT services that they have consumed. Metered services allows Cloud Service Providers (CSPs) to track service consumption and provide that information to customers.

Chargebacks

A hospital is preparing to move IT services to a Cloud Service Provider (CSP). The organization is currently examining the legal requirements in terms of Health Insurance Portability and Accountability (HIPAA). What is the hospital performing?

Cloud assessment- A cloud assessment, or feasibility study, is one of the earliest steps in the cloud design process. The assessment is a deliberate and step-by-step examination of the organization's readiness for a cloud migration. The cloud assessment may include identifying unique business requirements.

What will help an organization realize the greatest benefit from a cloud migration?

Cloud-native applications- will help an organization realize the greatest benefit from a cloud migration. Cloud-native applications rely on a series of components and development principles to ensure that they take advantage of cloud characteristics.

govern the use of all communications media, including email, instant messaging, texting, phone calls, and blogging.

Communications policies

model is a good choice when organizations share a similar security need and wish to share cost and operations burdens.

Community

costs represent the use of processor time and Random Access Memory (RAM) utilization allocated to virtual machines. It also includes the cost of licensing, depending on the operating system deployed.

Compute

Which of the following can a Cloud Service Provider (CSP) use to quickly deploy or scale web applications?

Containers

are virtualization at the operating system level such that a single operating system is partitioned and used by multiple applications. The applications are isolated from each other.

Containers

manages the packaging and deployment functions of the life cycle.

Continuous Delivery (CD)

manages the build and test functions of the software development phase.

Continuous Integration (CI)

Analyze the features of Software-defined Networking (SDN) to determine which networking component it removes?

Control plane

This reduces file sizes. This is important for cloud technologies due to the fact that compressed data makes better use of available network bandwidth. It also provides better use of storage capacity.

Data compression

refers to a phenomenon of data growth that is analogous to physical gravity and the attraction between two objects.

Data gravity

in the cloud is a risk of loss of ownership or control of data to the CSP. One example is social media sites that own the data posted to them.

Data ownership

An organization currently has a Cloud Service Provider (CSP) and is considering moving to a new CSP. The data is held in a proprietary format by the current CSP and moving the data will be difficult. Which of the following risks does this simulate?

Data portability- is the transfer of data between two cloud providers. If data is held in a proprietary format, portability may be very difficult.

What is of particular concern for cloud vendors and their customers due to regional configurations, geo-redundancy, and replication?

Data sovereignty- Data is subject to the regulations, laws, and requirements of the country where it is stored. This concept is called data sovereignty. It is of particular concern for cloud vendors and customers, due to regional configurations, geo-redundancy, and replications, which can cause data to be moved all over the world.

An organization notices the bill for data storage is increasing every month. Upper management requests recommendations to reduce storage costs. The Cloud Service Provider (CSP) recommends to delete files with several instances and replace them with a smaller pointer to a single file. What is the CSP recommending?

Deduplication- Data deduplication reduces storage capacity utilization by removing redundant pieces of information. Duplicate blocks of data are deleted and replaced with smaller pointers to a single stored copy of the data. The result can be a very significant reduction in storage requirements, which translates into a reduction in storage costs.

refers to the ability to restore services in the event of a failure.

Disaster recovery

refers to the ability to restore services in the event of a failure. The disaster may be as small as a single server failure or as large as a major natural catastrophe.

Disaster recovery

Evaluate the features of a Content Delivery Network (CDN). Determine which of the following is an accurate representation of a CDN?

Disperses data geographically to serve the data to consumers from the nearest provider.

What is the third step in a risk assessment?

Evaluate risks and mitigations. -The organization will determine the possible outcomes of the risk and how to prevent an occurrence. The second step in a risk assessment is to identify the people possibly harmed. This determines if this hazard is a risk to the organization, business processes, customers, or systems. The fourth step in a risk assessment is to document findings. It is important to document the third step so that changes can be implemented and reviewed. The fifth step is to review regularly. The previously documented risks and mitigations should be reviewed often for any necessary changes and to determine if the risk is still valid.

____ is included in the planning phase. After a cloud assessment is completed, an organization will choose one or more Cloud Service Providers (CSPs). The criteria found in the assessment will be defined in the Request for Information (RFI).

Evaluation

A company uses a Cloud Service Provider (CSP) for web services and a different CSP for virtual machines and data storage. An employee logs into a virtual machine and has instant access to perform website management. What provides this capability?

Federated Identity Management- Federated Identity Management allows users to log in once (Single Sign-On) and have access to multiple services that may be provided by different organizations. The organizations choose to participate and trust the authentication credentials, even if a given site does not directly manage those credentials.

represent the cost of maintaining the IT infrastructure. This will include the maintenance of servers, routers, and switches.

Fixed costs

What represents the costs a business must endure to cover land, buildings, and hardware? (Select all that apply)

Fixed costs, Capital Expenditures (CapEx)

role is for personnel that are concerned with regulatory compliance, security, and business continuity.

Governance

A large international business is migrating all of their data to the cloud. It will be more difficult for this business to migrate the data versus a small business. Which of the following does this simulate?

Gravity- The principle also says that the more data mass that exists, the harder it is to move that data.

refers to a measure of downtime for a given service.

High Availability

The second phase is ___. The cloud deployment implementation is the actual transfer of data, services, and servers to the cloud.

Implementation

an organization that uses a CSP to provide a flexible, scalable server environment for software testing, network services, and forward-facing web servers, is an example of? Infrastructure as a Service?

Infrastructure as a Service

Which cloud service model can administrators use to permit employees to create their own virtual machines by utilizing templates?

Infrastructure as a Service (IaaS)

Which of the following ensures Cloud Service Providers (CSPs), consumers, and governments operate consistently?

International Organization for Standards (ISO)- International standards are defined by the International Organization for Standards (ISO). The standards define specific vocabulary and cloud service models. The goal is to ensure Cloud Service Providers (CSPs), consumers, governments, and regulatory bodies operate from a consistent set of terms

are defined by the International Organization for Standards (ISO).

International standards

Which of the following is a characteristic of Infrastructure as Code (IaC)? (Select all that apply)

It provides more consistent deployments. It eliminates the use of interactive configuration tools.

Many Cloud Service Providers (CSPs) have license management software to help ensure companies remain compliant without overspending for licenses.

License Managers

Which concept refers to the Central Processing Unit (CPU) processing power being brought to the data, rather than the other way around?

Locality

An organization is planning to move IT services to the cloud. The organization wants to ensure that they choose a solution that is the best fit for the company. What should the organization use to make this determination?

Managed Service Provider (MSP)

An organization wants to employ a Cloud Service Provider (CSP) that provides cloud design, migration, and deployment. Which of the following will offer these features?

Managed services- are offered by some Cloud Service Providers (CSPs). Managed services allows an organization to outsource cloud design, migration, deployment, and management solutions.

A company uses a cloud provider for file sharing and storage. The company pays a monthly fee based on the average size of storage used for the previous month. Which of the five characteristics of cloud services does this represent?

Measured service

is the metering of resources being monitored, controlled, and billed.

Measured service

are small, simple, autonomous from each other, and loosely-coupled. Developers architect each microservice independently from the others.

Microservices

What type of cloud expenditure includes routers?

Network- Network costs include expenditures for network hardware (routers, etc), software, maintenance, and redundant Internet connectivity.

Which of the following topics might a security policy include? (Select all that apply)

Objectives Document scope Specific goals Industry regulations The security policy defines how the organization sees and defines its data, what level of risk it will tolerate, and the rules that govern security. The objectives section may include that employees will comply with the use of company IT assets. The document scope will provide what systems the policy covers. This can include all computing devices and Internet services. The specific goals section will outline what the company hopes to achieve with the policy. A company that handles sensitive data may include that they want to prevent exposure of customer data. Industry regulations must also be considered when authoring a security policy. Some industries, such as medical, have strict regulations regarding the use and storage of personal data.

means that consumers can provision resources as needed and automatically?

On-demand self-service

represent the day to day business costs of maintaining services. Examples includes payroll, benefits, supplies, and advertising.

Operating Expenditures (OpEx)

An organization performs a cloud assessment and organizes the stakeholders by role. In which category should the organization align personnel that develop Service Level Agreements (SLAs) and monitors the performance of the Cloud Service Provider (CSP)?

Operations

Which of the following is the final phase of cloud migration?

Optimization and security- The final component of a migration is the optimization of services and processes to ensure they are functioning as efficiently and as cost-effectively as possible.

An organization has a need for a new virtual machine. A system administrator selects a virtual machine template with the appropriate virtual hardware specifications. The virtual machine is automatically configured and available to the users with full functionality. What provides this service?

Orchestration

refers to the complete deployment of a service, beginning with the standing up of virtual machines all the way to the point of the user gaining access to the fully-configured system.

Orchestration

permit software to be used indefinitely. It is a permanent purchase of the right to use the software.

Perpetual licenses

Which of the following topics does an access and control policy include? (Select all that apply)

Personal devices on the Network- One example of a topic found in an access and control policy is network access by personal devices. Organizations may restrict the use of personal devices on the network to protect data. Password management- Password management is another example of an access and control policy. Examples include password complexity rules and how often a password must be changed.

An organization is moving IT services to a Cloud Service Provider (CSP). The organization would like to test logistics and prove the value of the migration. What will the organization perform?

Pilot program- A pilot program is a small-scale project to test logistics, prove the value of the migration, and reveal any weaknesses in the deployment. The cloud assessment will assist an organization with deciding on the specific service or application that should be used for the pilot program.

Which cloud service model do developers and database administrators (DBAs) often use?

Platform as a Service (PaaS)

occurs when an organization hires a CSP to provide a development environment for the company's internal developer team?

Platform as a Service.

An organization would like to transition to a cloud deployment model. The organization works with highly sensitive data that is not appropriate for multi-tenancy data centers. Which model is the best choice for the organization?

Private

provides resources to a single organization. This is typically accomplished by an organization's implementing a complete internal cloud solution?

Private Cloud

confirms that the functionality of the deployment is successful. The resulting data of proof of concept is if the service is functioning.

Proof of concept

establishes whether or not the deployment provides value to the business. Value can be defined as a cost savings, a time savings, extended or additional services that were previously unavailable, or other criteria that has meaning to an organization.

Proof of value

model is appropriate when security requirements for the data do not restrict it to a private cloud. It is also appropriate when regional availability is essential for service.

Public

allocates resources to external, unaffiliated customers. The customers share the public cloud's resources without knowing precisely where their data is in relation to that of any other organization?

Public Cloud model

A business analyst needs to employ a Cloud Service Provider (CSP). The analyst sends out a Request for Information (RFI) to several CSPs. Which of the following will the RFI include? (Select all that apply)

Qualifications for selection, Timeframe

A cloud provider releases resources that adjusts with a customers demand and consumption. Which of the five characteristics of cloud services does this represent?

Rapid elasticity- is described as resources being provisioned and released to adjust for changes in demand and consumption. The process may be automatic or manual.

What specifies a quantity of time between the most recent backup of data and a disaster?

Recovery Point Objective (RPO)-

refers to having more than one resource available in the event of the failure of one resource. Redundancy avoids a single point of failure.

Redundancy

"rip and replace," is a type of migration where an application will be completely re-architected to become cloud ready.

Refactoring

used to ensure that the update does not have an unintended impact on existing functionality after an update. Since the application was presumably tested before the update, the previous tests are run again and are expected to be successful, even after the change.

Regression testing

An organization is migrating an application to the cloud. During the planning phase, the organization found that the application is cloud ready and will not require modification. What type of cloud migration will the organization perform?

Rehost- Rehosting is typically the fastest and easiest migration. This strategy is known as "lift and shift."

is a remote access tool, but is not one of the common types provided by a Cloud Service Provider (CSP)?

Remote Desktop Connection Manager (RDCMan)

An organization stores data in the cloud and moves the data to the most efficient location. What feature is the organization taking advantage of?

Replication- Data replication allows businesses to move data to where it can be utilized most effectively. The cloud may be used as a central storage area, making data available among all business units.

What can a Cloud Service Provider (CSP) use between availability zones to increase redundancy?

Replication- Replication between availability zones increases redundancy. Some industries require data redundancy based on regions and availability zones. Replication also allows organizations to move data to where it is most efficient.

is a standard method of gathering written documentation regarding the services, capabilities, potential costs, support and training services.

Request for Information (RFI)

An organization considers moving IT services to a Cloud Service Provider (CSP). The organization would like to reduce the current IT expenditures and negotiate with a CSP for the best possible contract cost. The organization is stable and knows that they will have a minimum of 200 employees for the next five years. What should the company negotiate with a potential CSP, to further reduce expenses?

Reserved instance- Reserved instances are hardware profiles that an organization commits to, usually for a period of one to three years.

An application that will be kept on-premise in a traditional deployment is known as a ___ migration. An organization may choose to keep some applications hosted in the traditional, on-premise environment.

Retain

An organization wants to verify that a Cloud Service Provider (CSP) is compliant with their industry's regulations. How would the organization verify this information?

Review the CSPs certifications.- Cloud Service Providers (CSPs) allow their infrastructures to be independently audited. Such certification indicates they are compliant with various industry or government requirements. The certifications assure consumers that an independent agency has verified the security claims of the CSP.

method that Cloud Service Providers (CSPs) use to provide efficient services in an on-demand environment. Scale-out and scale-up are the two models for scaling.

Scalability

An organization is growing and has greatly increased the number of visitors to their website. The organization needs to increase the number of web servers to support the additional traffic. This is an example of what?

Scale-out- refers to adding more resources in a distributed environment. The organization requires additional servers, which means the organization will require to scale-out.

means to add more resources to an existing deployment. An example is to add more Random Access Memory (RAM) to a server.

Scale-up

A company uses Unix systems for their operations and has a Cloud Service Provider (CSP). The CSP provides secure remote access via a remote command line. Evaluate the types of remote access that CSPs commonly provide to determine which remote access the CSP is providing for the company?

Secure Shell (SSH)

A business analyst for an organization is reviewing a contract for accuracy prior to finalization. The analyst specifically wants to review the section that includes the uptime, load balancing and response time to issues. Which section of the contract should the analyst review?

Service levels- The service level section of the contract will define service levels to specify the availability of the business's functions. These service levels may include uptime, load balancing, performance, and response times to issues.

elates to hiring vendors to support cloud assessment and understanding the skills their employees can make available to the organization.

Skill availability

An organization selects Microsoft OneDrive for Business for a cloud-based storage solution. Compare the cloud service models and determine which implementation the organization will use.

Software as a Service (SaaS)

uses a policy-based approach to managing storage. Also provides the ability to view available storage resources across all technologies. Provides a standard management interface, usually via an Application Program Interface (API).

Software-Defined Storage (SDS)

are hardware profiles that may be currently unused by one of the CSPs customers and are then made available to another customer at a significant discount.

Spot instances

Which document provides efficient and consistent instructions that minimize mistakes during configurations?

Standard Operating Procedures (SOP)- are specific step-by-step procedures for standard tasks. The goal of SOP documents is to provide efficient and consistent instructions that minimize mistakes during configurations.

included in the Statement of Work (SOW). The SOW is a detailed project management document that clearly defines all aspects of a given project.

Standards and testing

represent the total quantity of storage allocated to a business, to include the type of storage.

Storage

Which licensing model is standard for cloud services?

Subscription- Subscription licensing is the standard for cloud services. Most licenses are pay per month or pay per year. The service allows companies to cancel, which provides the flexibility to change to a different service or application.

What are two examples of the data plane component in networking? (Select all that apply)

Switch, Router

Which groups do Development Operations (DevOps) combine to participate in the entire lifecycle of an application? (Select all that apply)

System administrators Developers Development Operations (DevOps) is a set of practices that combine the development process with the operational support function. Historically, developers and system administrators were isolated from each other. DevOps combines System administrators with developers to participate in the entire lifecycle.

provides the ability to label particular cloud resources in a flexible and customized manner.

Tagging

What can a Cloud Service Provider(CSP) offer a Development Operations (DevOps) team to generate their own test server instances?

Templates- Infrastructure as Code (IaC) templates may be created to simplify deployments. Developers can call these templates to generate their own test server instances. Cloud Service Providers (CSPs) have templates available, or a Development Operations (DevOps) team can create custom templates.

is a catch-all phrase for technology solutions that are moved to the cloud. One example is Database as a Service (DBaaS)? The Anything as a Service (XaaS) model

The Anything as a Service (XaaS) model

A Cloud Service Provider (CSP) offers data deduplication as a storage feature. What does this mean for an organization that employs the services of the CSP?

The CSP will remove duplicate files on the storage medium.

used when a CSP provides only hardware infrastructure to the consumer.The Infrastructure as a Service (IaaS) model?

The Infrastructure as a Service (IaaS) model

consists of the service structure being provided by the CSP while the consumer is responsible for all content.The Platform as a Service (PaaS) model?

The Platform as a Service (PaaS) model

specifies how quickly recovery needs to occur to maintain business continuity. It provides how long the business can continue to function in the event of a disaster.

The Recovery Time Objective (RTO)

provides a secure network connection between two endpoints?

The Secure Shell (SSH)

A company decides to implement a new program that will assist the Human Resources department with new hire documentation. The company hires a third-party to provide the software application along with the hardware and operating system that the software will operate on. The third-party will also be responsible for the installation and patching of the program. Which cloud service model does this simulate?

The Software as a Service (SaaS) model provides the consumer with the direct use of software. Responsibility for the hardware, the operating system upon which it runs, and the installation and patching of the software itself are responsibilities of the Cloud Service Provider (CSP).

An organization reviews the quarterly bill from their Cloud Service Provider (CSP). The company notices that the compute cost has significantly increased. Which scenario will result in this increase? (Select all that apply)

The company's Random Access Memory (RAM) utilization saw a significant increase. The company migrated all of their virtual machines from Linux to a Microsoft Windows deployment.

Which of the following risk assessment findings will result in an organization responding with a mitigation? (Select all that apply)

The risk of an Internet outage has a medium likelihood with a high impact and severity. The risk of a tornado has a high likelihood with a high impact and severity. The risk of a fire has a medium likelihood with a high impact and severity. The risk of an attacker intercepting data has a medium likelihood with a medium impact and severity.

An organization moves a majority of IT services from an internal function to a third-party Cloud Service Provider (CSP). The move of services to the CSP eliminates the need for 90% of the IT maintenance budget. What shift in expenditures does this represent?

The use of cloud services shifts IT expenditures from fixed to variable costs.

Which of the following will result from data compression?

The workload on the processor will increase - Compression puts a workload on the processor, which must be accounted for. The processor must perform intensive calculations to compress the data and also when the data is decompressed.

recognizes the need for flexible, scalable, and agile business decisions. Time to market refers to the quantity of time between when a service or product is imagined and when it is available to the consumer.

Time to market

Which of the following can be a result of capacity on demand? (Select all that apply)

Unexpected Operating Expenditure (OpEx) costs, Capacity will be harder to control.

change based on the amount of output. Examples will include labor and materials.

Variable costs

means that the organization is dependent on the Cloud Service Provider (CSP) and its proprietary service. This would be the risk if the data could not be moved to a new CSP, versus being difficult to move.

Vendor lock-in

means to take no action to mitigate a risk. The risk assessment has shown a low probability or low impact of the risk occurrence.

acceptance

An employee gaining access to a database is an example of ___. This refers to permissions that are used to control access to data based on authenticated identity.

authorization

Cloud Service Provider (CSP)- A CSP is not the best solution to determine the best fit during the assessment phase. The CSP will not be impartial and will focus on their services as the best solution without regard to other CSPs.

bonus

A ___ is included in a Request for Proposal (RFP). The RFP outlines the project, budget, and timeline.

budget

the __ section should explicitly state that the business owns the data and that the data must be returned immediately upon request.

data ownership

The ___ is the portion of a network device that actually moves the data on the network?

data plane

A phase in a cloud assessment is an opportunity for an organization to ensure documentation is current and accurate.

documentation

the ___ should explicitly state that the business's processes and designs belong to it solely, and may not be duplicated by the provider.

intellectual property

applications are tested with a simulated demand to confirm that the application performs acceptably.

load testing

The concept of __ is related to data gravity. It means that processing power is brought to the data, rather than the other way around.

locality

means to take reasonable precautions to prevent a particular risk. Risk can never be completely eliminated, but it can be managed and minimized.

mitigation

The first phase of cloud migration is __. This phase includes cloud assessment, documentation, and ensuring the organization's IT infrastructure is compatible with a cloud migration.

planning

unique to each business and it states the company's security stance. The policy defines how the organization sees and defines its data.

security policy

The __ section includes the provisions that are in place, to ensure that data and services are available to customers at all times.

service availability

This will provide the CSP with information, such as when the service is needed so that the CSP can determine if the resources are available.

timeframe

occurs by transferring the risk to another organization. One common example of this is insurance.

transfer

A __ is a known weakness in a system, service, or application. An operating system vulnerability includes an operating system bug.

vulnerability


संबंधित स्टडी सेट्स

Psychology (2nd semester), Unit 5

View Set

Review 9. Vocab. C. Complete the sentences by changing the form of the word in capitals.

View Set

Ch 3 ;Types of Policies and Riders

View Set