cloud essentials 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

***15. Which of the following is a differentiating characteristic of private cloud solutions compared to public cloud solutions? A. Private cloud solutions are dedicated for use by a single organization. B. Private cloud solutions are never accessible via the public Internet. C. Private cloud solutions do not provide incremental scalability. D. Private cloud solutions save considerably more money than a public cloud solution

A

13. Why do management tools introduce a risk? A. The management tools present a vendor lock-in B. The management tools are indispensable above a specific scale of operation C. The migration may not be successful D. Too many software licenses are needed

A

20. How can an organization successfully implement an IaaS strategy? A. Standardize on a limited set of virtual machines B. Continuously execute performance analytics C. Open up internal databases with Web service access D. Take inventory of the application portfolio and select external suppliers

A

25. Which of the following cloud computing risks is compliance related? A. Access rights that are handled by a cloud provider B. Capacity management that is handled by a cloud provider C. Cross-charging policies that are handled by both clients D. Provider reputation

A

28. Which of the following is a business reason for IT outsourcing and cloud computing? A. Improving cost structure B. Improving customer satisfaction C. Increasing control over IT systems D. Decrease of security issues

A

30. Which of the following aspects of public cloud computing would a company MOST likely need to consider to information security? A. Data integrity B. Server type C. Firewall specifications D. Network hardware

A

35. A private cloud generally has which of the following characteristics? Question 35 options: A. Services are restricted to members of the same organization B. Infrastructure is managed by an independent service provider C. Services are managed by a third-party provider D. Services are accessed by members outside of the organization

A

4. In which of the following ways do IT outsourcing and cloud computing differ? A. Cloud computing services are typically much more scalable. B. Cloud computing is much cheaper. C. Hardware and software assets are typically customizable. D. IT outsourcing promotes innovation

A

40. How can cloud computing help reduce integrity risks? A. Cloud computing makes it easier to have a backup available. B. Cloud computing makes it easier to monitor access and usage of data. C. Cloud computing makes it easier to give people access to data in the cloud. D. Cloud computing makes it easier to have redundancy capabilities.

A

41. Which of the following application types is suitable for a cloud computing pilot? A. Desktop productivity applications B. Marginal applications C. Mission-critical applications D. Legacy applications

A

45. Which of the following describes the amount of data that can be sent across a link in a given time? A. Network bandwidth B. Network QoS C. Network latency D. Network speed

A

46. Which of the following risks occurs when a cloud provider stops serving the company? Question 46 options: A. Continuity risk B. Financial risk C. Legal risk D. Confidentiality risk

A

49. Which of the following only provides configurable physical hardware and network resources used to make up the cloud? A. IaaS B. SaaS C. PaaS D. CaaS

A

53. Which of the following is a benefit of cloud computing? A. Cloud computing delivers IT capabilities that scale with demand. B. Cloud computing delivers a wide range of services that are easily accessible to users C. Cloud computing delivers IT capacity on demand. D. Cloud computing negates the need for a procurement department.

A

57. Which of the following is a characteristic of cloud computing? A. Cloud computing is typically based on open Internet technology B. Cloud computing is typically based on web technology C. Cloud computing is cheaper compared to virtualization D. Cloud computing typically uses XML or JSON technologies

A

59. An organization subscribes to a public cloud. For which of the following does the subscriber NOT depend on the vendor? A. Internet bandwidth and packet latency B. Service Level Agreement C. Data backups D. Infrastructure availability

A

60. Why can cloud computing be a challenge in relation to compliance risks (e.g. compliance with the Sarbanes- Oxley Act)? A. It makes it harder to know where a company's important assets are. B. It is harder to limit the provider's liability in the contract. C. It makes it harder to know where a company's physical assets are. D. Industry regulations change more frequently to ensure compliance.

A

62. Which of the following assets have risks related to a cloud provider going out of business? A. Data stored at the provider B. Cloud management tools housed at the provider C. Investment in servers at the provider D. Machine capacity at the provider

A

7. Which of the following does the server virtualization layer do? A. It allows the underling physical server hardware to be shared B. It allows the virtual machines to be dependent on each other C. It allows the virtual machines to be load balanced D. It prohibits the use of virtual machines by unauthorized users

A

9. A company has hired a third party vendor to provide email and spam/anti-malware filtering services. The type of cloud service provided by the vendor is BEST described as which of the following? A. SaaS B. IaaS C. CaaS D. PaaS

A

22. Why do business users prefer to deal with cloud providers directly, instead of via the IT department? A. It reduces financial risks to the business B. The IT department does not accommodate variable costs C. They can better measure the provider's quality D. They can use their own payment options

B

26. Which of the following cloud services would be used to rent hardware, computing and network space, and storage over the Internet? A. SaaS B. IaaS C. PaaS D. XaaS

B

34. Which of the following risk results if cloud computing providers limit their Service Level Agreement (SLA) liabilities? A. Compliance risk B. Legal risk C. Privacy risk D. Security risk

B

36. Amazon Elastic Cloud Computing (EC2) is a facility for quickly providing virtual servers. This is an example of: A. SaaS B. IaaS C. PaaS D. QoS

B

42. Which of the following characteristics of cloud computing describes the ability to grow easily in response to an increase in demand? A. Hardware independence B. Scalability C. Variability D. Security

B

43. How does using cloud computing help to enhance business value? A. By using cloud computing, businesses are able to realize lower asset utilization for personnel. B. By paying for actual usage, cloud computing allows businesses to convert fixed costs into variable costs. C. By using cloud computing, businesses are able to lower server utilization. D. By paying for actual usage, cloud computing allows businesses to convert variable costs into fixed costs.

B

48. An organization requires that it federates its internal systems and their externally hosted SaaS finance system so a user does not have to re-authenticate. This is an example of which of the following? A. Open authentication B. Single sign-on C. Biometric scanning D. Multifactor authentication

B

50. Why does cloud computing shift capital cost to variable cost? A. Cloud computing is more cost-efficient B. IT assets are not owned by the customer C. Servers are better utilized D. Staff is no longer hired by the custom

B

52. Google Apps is a set of online applications allowing users to create and share documents and spreadsheets. This is an example of: A. PaaS B. SaaS. C. IaaS. D. None of the above.

B

55. Why does hardware and operating system maintenance take less effort with SaaS? A. Maintenance becomes irrelevant B. Cloud provider takes care of it C. Hardware vendor takes care of it D. Operating system vendor takes care of it

B

56. Which of the following applications is MOST suitable for a cloud computing pilot? A. Applications that are currently expensive to maintain because of interconnections B. Applications that are easy to migrate and have some business value C. Applications with high risk and little business value D. Legacy applications that are coupled to specific hardware and systems software

B

61. In cloud computing, the ability to scale resources on demand, benefits the business in which of the following ways? A. Allowing a third party to manage service delivery ensures lower staffing costs. B. It is more cost effective to pay for what is needed rather than pay for peak demand upfront. C. Fewer in-house servers lower the power consumption of the datacenter. D. Shorter contracts and less capital expenses reduce expenditures to the IT budget.

B

8. How do demand management processes change with the introduction of SaaS? A. New vendors have to be accommodated B. Users can procure SaaS solutions themselves C. The number of virtual machines can fluctuate with demand D. Maintenance will become easier

B

11. Which of the following can be deployed by a cloud provider to reduce storage costs? A. Journaling file systems B. Two-factor authentication C. Data de-duplication D. Data encryption

C

12. Web hosting is a service that enables customers to deploy a website quickly. This is an example of: A. IaaS. B. SaaS C. PaaS. D. On-demand software. E. None of the above.

C

14. Which of the following is a limitation of owning servers? A. Inability to deploy new services quickly B. Inability to rapidly change to a different technology C. Capital tied up in hardware that might become obsolete D. Additional resources must be hired to maintain each server

C

23. Which of the following is a typical concern for business and IT leaders when adopting cloud computing? A. Current cost structure of IT B. Quality of web-based user interfaces C. Security of current IT solutions D. Technical maintenance of current IT assets

C

24. Which of the following is the MOST complex security provisioning problem in a cloud environment? A. Handling credit cards for purchasing cloud services B. Keeping track of cloud provider performance C. Managing users and their rights across multiple providers D. Software assets that are introduced and can expire

C

27. Which of the following is a unique characteristic of virtualization? A. Security features B. Federated identities C. Shared hardware D. Sourcing challenges

C

29. Which of the following factors of service must be managed effectively by a SaaS provider in a cloud computing environment? A. Application access levels B. Client background checks C. Availability D. User acceptance

C

3. Which of the following is a negative business impact of cloud computing? A. It lowers the company's overall application processing availability. B. It is difficult to implement problem management. C. It is more difficult to ensure policy compliance. D. It slows down the company's ability to deal with server capacity issues.

C

33. All of the following are important design decisions when deploying SaaS EXCEPT: A. How existing company data is integrated in or migrated to the application. B. How the application will be integrated with other applications. C. The number of users that will access the application simultaneously D. Where or by whom will digital identities be issued for logging on to the application.

C

37. Which of the following correctly identifies a key difference between cloud computing and IT outsourcing? A. Typically, industry definitions state that cloud computing and IT outsourcing are synonymous terms with the same meaning. B. Cloud computing only works when there is satisfactory Internet connectivity whereas outsourcing requires dedicated WAN links. C. Cloud computing generally allows for on-demand utilization, whereas outsourcing is typically defined by contract terms. D. Cloud computing provides only external IT equipment to a company whereas outsourcing involves external only resources managing internal company equipment.

C

38. Which of the following is the difference between cloud computing and IT outsourcing? A. The service levels of cloud computing are much better. B. IT outsourcing is not based on open standards. C. Contracts with cloud providers can be changed much quicker. D. Only IT outsourcing works with external staff.

C

58. Which of the following is the BEST way to mitigate the security and privacy issues associated with cloud computing? A. Allowing only cloud administrators to have access to cloud resources B. Removing firewalls and access control routers from the network C. Implementation and enforcement of a comprehensive security policy D. Removing virtualized hardware from the organization

C

64. Which of the following is a definition of virtualization? A. Virtualization is a method to organize servers in a more efficient manner to double the number of accessible users B. Virtualization is a set of techniques for hiding software resources behind hardware abstractions. C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions. D. Virtualization is a method to structure data in a more efficient manner with less cost to the user.

C

65. Which of the following business benefits do cloud computing and IT outsourcing have in common? A. Clarity and budgeting ease of upfront costs B. Improvement of employee skills sets C. Reduction of capital expenditures D. Flexible contracts

C

39. Which of the following confidentiality risks is introduced by cloud computing? A. Company information can be transmitted electronically B. Digitizing information makes it easier to copy C. Government regulations require data to be disclosed D. Having files stored on the servers of a cloud provider

D

44. Which of the following refers to providing a combination of servers, networking components. Hosting, provisioning, and basic services needed to run a cloud? A. PaaS B. CaaS C. SaaS D. IaaS

D

47. In order to maintain strategic flexibility and the ability to bring a cloud system back internally, which of the following is the MOST important requirement in the contract? A. Yearly independent audit is performed to measure performance B. Cloud provider has ability to terminate contract C. One week timeframe for termination of service D. Cloud subscriber maintains ownership of their data

D

5. A software development company would like to deploy all of their application development using their own software to the cloud. The type of cloud they will MOST likely choose to implement is which of the following? A. XaaS B. IaaS C. SaaS D. PaaS

D

51. Which of the following is an example of a cloud-related security risk? A. Losing network connectivity B. Not having enough software licenses C. Not knowing what the cloud provider will charge D. Storing customer data at a provider

D

54. How does scalability work with cloud computing? A. Servers and storage can be added quickly. B. Servers and storage can be released quickly. C. Users can be added and removed quickly. D. All of the above is correct.

D

6. Which of the following does IT outsourcing and cloud computing typically have in common? A. Pay as you go agreements B. Short-term financial commitment C. Tailor-made applications based on client needs D. Vendor lock-in potential

D

63. How does cloud computing improve business flexibility? A. Easier access by users outside of the organization B. Faster deployment of applications C. Rapidly growing and shrinking capacity D. All of the above are correct

D

1. Which of the following cloud service characteristics would impact how a current application will adapt in the future according to how quickly a business will grow? A. Time to market B. Scalability C. Hardware independence D. Security

B

16. Which of the following is the business benefit of private PaaS? A. Improve the reuse of internal databases in an organization. B. Improve the speed of the internal development and deployment processes. C. Reduce cost and reliance on internal technical skills. D. Simplify interfaces for specific user groups.

B

17. A specific cloud deployment has been established specifically for financial services companies to consume. Which of the following BEST describes this type of cloud environment? A. Private cloud B. Community cloud C. Hybrid cloud D. Public cloud

B

19. Private clouds are operated solely for _______________ organization(s) A. governmental B. specific C. for-profit D. multiple

B

10. Which of the following is BEST used when setting up security for services being used within a public cloud? A. LDAP B. SFTP C. SNMP D. SSL

D

18. Which of the following organizations are MOST liking to consider confidentiality requirements before implementing a backup and disaster recovery cloud solution? A. An advertising company B. A public library C. A recreational park district D. A hospital and outpatient facility

D

2. Which of the following roles can the IT department play in the selection process of cloud computing providers? A. Help understand and explain the application lifecycle B. Help understand performance parameters C. Help understand provider quality D. All of the above are correct

D

21. Which of the following is an advantage of cloud computing for an organization? A. Increased security of applications and data due to virtualization B. Decreased downtime due to increased control over hosted servers C. Increased internal focus on IT when hosting with proven providers D. Increased scalability to meet usage demands

D

31. Which represents the MOST important business continuity risk? A. Incomplete Service Level Agreements (SLAs) B. Network connectivity interruption C. Privacy laws D. Providers going out of business

D


Set pelajaran terkait

Macroeconomics-Chapter 9-Long Run Economic Growth

View Set

Med-Surg: Adaptive Quizzing: Chapter 11

View Set

Ch 4 - Attitudes, Emotions, and Ethics

View Set

Principles of Management, Chapter 3

View Set

FINC 3310 - Chapter 12 SmartBook

View Set

Ch 21 Respiratory Care Modalities- Med Surg

View Set

методика англійської

View Set

CH 1 LESSON 3 -Computer Programming Languages

View Set