Cloud Management - INFOU796 - Quiz # 1 mine
_______ model attempts to categorize a cloud network based on four-dimensional factors. Cloud Square Cloud Service Cloud Cube All of the mentioned
Cloud Cube
The reliability of a system with n redundant components and reliability of r is : 1-(1-r)n 1-(1+r)n 1+(1-r)n All of the mentioned
1-(1-r)n
How many laws exist for Cloudonomics by Weinman? 4 5 10 15
10
How many types of security boundary values exist in the Cloud Cube model? 1 2 3 None of the mentioned
2
For a server with a four-year lifetime, you would, therefore, need to include an overhead roughly equal to ________ percent of the system's acquisition
25%
How many types of service model are mainly present in the Cloud? 1 2 3 4
3
How many types of dimensions exist in Cloud Cube Model? 1 2 3 4
4
Point out the correct statement: A deployment model defines the purpose of the cloud and the nature of how the cloud is located Service model defines the purpose of the cloud and the nature of how the cloud is located Cloud Square Model is meant to show is that the traditional notion of a network boundary being the network's firewall no longer applies in cloud computing All of the mentioned
A deployment model defines the purpose of the cloud and the nature of how the cloud is located
Which of the following is Cloud Platform by Amazon? Azure AWS Cloudera All of the mentioned
AWS
Point out the wrong statement: Everything from the application down to the infrastructure is the vendor's responsibility In the deployment model, different cloud types are an expression of the manner in which infrastructure is deployed AaaS provides virtual machines, operating systems, applications, services, development frameworks, transactions, and control structures All of the mentioned
AaaS provides virtual machines, operating systems, applications, services, development frameworks, transactions, and control structures
Which of the following is an essential concept related to Cloud? Reliability Productivity Abstraction All of the mentioned
Abstraction
Which of the following subject area deals with pay-as-you-go usage model? Accounting Management Compliance Data Privacy All of the mentioned
Accounting Management
Point out the wrong statement: All applications benefit from deployment in the cloud With cloud computing, you can start very small and become big very fast Cloud computing is revolutionary, even if the technology it is built on is evolutionary None of the mentioned
All applications benefit from deployment in the cloud
Point out the correct statement: A standard machine instance (virtual computer) might cost $0.10 or less an hour A typical storage charge might be $0.10 per GB/month Outsourcing shifts the burden of capital expenditures onto the service provider All of the mentioned
All of the mentioned
Which of the following is one of the unique attributes of Cloud Computing? Utility type of delivery Elasticity Low barrier to entry All of the mentioned
All of the mentioned
Which of the following is the best-known service model? SaaS IaaS PaaS All of the mentioned
All of the mentioned
Which of the following is the deployment model? Public Private Hybrid All of the mentioned
All of the mentioned
Which of the following was one of the top 5 cloud applications in 2010? Cloud backup Web applications Business applications All of the mentioned
All of the mentioned
__________is a measure of whether the operation is inside or outside the security boundary or network firewall. Per P Pre All of the mentioned
All of the mentioned
Point out the wrong statement: Cloud Computing has two distinct sets of models Amazon has built a worldwide network of data centers to service its search engine Azure enables .NET Framework applications to run over the Internet None of the mentioned
Amazon has built a worldwide network of data centers to service its search engine
The most commonly used set of protocols uses ______ as the messaging format. XML JSON BSON All of the mentioned
XML (Extensible Markup Language)
Which of the following language is used to manage transactions? WSDL XML SOAP All of the mentioned
XML (Extensible Markup Language)
Weinman argues that a large cloud's size has the ability to repel ______ and DDoS attacks better than smaller systems do. Sniffers Botnets Trojan horse All of the mentioned
Botnets
________ is surely an impediment to established businesses starting new enterprises. Proposition Capitalization Globalization None of the mentioned
Capitalization
Which of the following service is used for backing up a licensed computer? CarbonT Karbonite Carbonite None of the mentioned
Carbonite
Which of the architectural layer is used as back end in cloud computing? Client Cloud Soft All of the mentioned
Cloud
_________ computing refers to applications and services that run on a distributed network using virtualized resources. Distributed Cloud Soft Parallel
Cloud
A service that concentrates on hardware follows the _________ as a Service model. IaaS CaaS PaaS All of the mentioned
IaaS (Infrastructure as a Service)
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets IaaS SaaS PaaS All of the mentioned
IaaS (Infrastructure as a Service)
________ has many of the characteristics of what is now being called cloud computing. Internet Software Web Service All of the mentioned
Internet
A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit. Public Private Community Hybrid
Hybrid
The overhead associated with ____ staff is a major cost. Data Center IT Non IT All of the mentioned
IT
Point out the correct statement: The use of the word "cloud" makes reference to the two essential concepts Cloud computing abstracts systems by pooling and sharing resources Cloud computing is nothing more than the Internet All of the mentioned
Cloud computing abstracts systems by pooling and sharing resources
Point out the correct statement: Service Level Agreements (SLAs) is small aspect of cloud computing Cloud computing does not have impact on software licensing Cloud computing presents new opportunities to users and developers All of the mentioned
Cloud computing presents new opportunities to users and developers
Point out the correct statement: Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user Cloud computing vendors run very reliable networks The low barrier to entry cannot be accompanied by a low barrier to provisioning All of the mentioned
Cloud computing vendors run very reliable networks
Point out the correct statement: Cloud resource pricing doesn't always scale linearly based on performance Depending upon the service model type, other resources add additional unit costs Typical efficiency in data centers are between 10 and 55 percent All of the mentioned
Cloud resource pricing doesn't always scale linearly based on performance
CaaS stands for _____________ as service. Compliance Computer Community Communication
Communication
Which of the following is one of the property that differentiates cloud computing? Scalability Virtualization Composability All of the mentioned
Composability
A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts. Reliable Scalable Composable None of the mentioned
Composable
A ________ cloud requires virtualized storage to support the staging and storage of data. Soft Compute Local None of the mentioned
Compute
________ as a utility is a dream that dates from the beginning of the computing industry itself. Model Computing Software All of the mentioned
Computing
The costs associated with resources in the cloud computing model _______ can be unbundled to a greater extent than the costs associated with CostDATACENTER. CLOUD CostCLOUD CCLOUD All of the mentioned
CostCLOUD
The cost of a cloud computing deployment is roughly estimated to be: CostCLOUD = Σ(UnitCostCLOUD / (Revenue - CostCLOUD)) CostCLOUD = Σ(UnitCostCLOUD x (Revenue + CostCLOUD)) CostCLOUD = Σ(UnitCostCLOUD x (Revenue - CostCLOUD)) All of the mentioned
CostCLOUD = Σ(UnitCostCLOUD x (Revenue - CostCLOUD))
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. CostDATACENTER = 1nΣ(UnitCostDATACENTER / (Revenue -(CostDATACENTER/Utilization))SYSTEMn CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue -(CostDATACENTER/Utilization))SYSTEMn CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue +(CostDATACENTER/Utilization))SYSTEMn All of the mentioned
CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue -(CostDATACENTER/Utilization))SYSTEMn
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area Accounting Management Compliance Data Privacy All of the mentioned
Data Privacy
Point out the correct statement: Google's cloud includes perhaps some 10 data centers worldwide Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate peak traffic Data centers have been sited to optimize the overall system latency All of the mentioned
Data centers have been sited to optimize the overall system latency
________ refers to the location and management of the cloud's infrastructure. Service Deployment Application None of the mentioned
Deployment
Which of the following is the IaaS service provider? EC2 EC1 EC10 Hybrid
EC2
When you purchase shrink-wrapped software, you are using that software based on a licensing agreement called ________ EULA EUL ELA All of the mentioned
EULA (End User License Agreement)
_______ feature allows you to optimize your system and capture all possible transactions. Scalability Reliability Elasticity None of the mentioned
Elasticity
A _____ is a facility that is a self-contained semiconductor assembly line. Fab Ttouch Rep All of the mentioned
Fab
Cutting latency in half requires ______ times the number of nodes in a system. Two Three Four All of the mentioned
Four
The peak of the sum is never ________ than the sum of the peaks. Smaller Greater Equal to None of the mentioned
Greater
A __________ site is one that is environmentally friendly: locations that are on a network backbone. Greenfield Redfield Greenful None of the mentioned
Greenfield
Which of the following can be identified as cloud? Web Applications Intranet Hadoop All of the mentioned
Hadoop
Cloud computing is also a good option when the cost of infrastructure and management is ______ Low High Moderate None of the mentioned
High
Point out the wrong statement: Internet consumes roughly 1 percent of the world's total power The cost advantages of cloud computing have enabled new software vendors to create productivity applications A client can provision computer resources without the need for interaction with cloud service provider personnel None of the mentioned
Internet consumes roughly 1 percent of the world's total power
Network bottlenecks occur when ______ data sets must be transferred. Large Small Big All of the mentioned
Large
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. Propagation Latency Noise All of the mentioned
Latency
Applications that work with cloud computing that have low margins and usually low risk are: High touch Low touch Moderate touch All of the mentioned
Low touch
The __________ model originally did not require a cloud to use virtualization to pool resources. NEFT NIST NIT All of the mentioned
NIST
Point out the wrong statement : Virtual appliances are becoming a very important standard cloud computing deployment object Cloud computing requires some standard protocols Cloud computing relies on a set of protocols needed to manage interprocess communications None of the mentioned
None of the mentioned
Point out the wrong statement: A PaaS service adds integration features, middleware, and other orchestration and choreography services to the IaaS model XaaS or 'anything as a service' is the delivery of IT as a Service through hybrid Cloud computing Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud jigsaw None of the mentioned
None of the mentioned
Point out the wrong statement: TCO must account for the real costs of items, but frequently they do not A system consumes resources such as space in a data center or portion of your site, power, cooling, and management Microsoft maintains an economics page for its Windows Azure Platform None of the mentioned
None of the mentioned
________ dimension corresponds to two different states in the eight possible cloud forms. The physical location of data Ownership Security boundary None of the mentioned
None of the mentioned
Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? On-demand self-service Broad network access Resource pooling: All of the mentioned
On-demand self-service
Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. Dex OpEx Pex All of the mentioned
OpEx
Cloud computing shifts capital expenditures into ________ expenditures. Operating Service Local None of the mentioned
Operating
Which of the following is provided by the ownership dimension of Cloud Cube Model? Proprietary Owner P All of the mentioned
Owner
Which of the following is the most refined and restrictive service model? IaaS CaaS PaaS All of the mentioned
PaaS (Platform as a Service)
Which of the following dimension is related to an organization's boundaries? Physical location of data Ownership Security boundary All of the mentioned
Physical location of data
A _________ is a cloud computing service that is both hardware and software. Service Platform Model All of the mentioned
Platform
________ captive requires that the cloud accommodate multiple compliance regimes. Licensed Policy-based Variable All of the mentioned
Policy-based
_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand. Leading Pooling Virtualization All of the mentioned
Pooling
You can't count on a cloud provider maintaining your _____ in the face of government actions. Scalability Reliability Privacy None of the mentioned
Privacy
The ________ cloud infrastructure is operated for the exclusive use of an organization. Public Private Community All of the mentioned
Private
Point out the wrong statement : Data center operates under average loads A private cloud doesn't pooling of resources that a cloud computing provider can achieve Private cloud doesn't employ the same level of virtualization None of the mentioned
Private cloud doesn't employ the same level of virtualization
Which of the following is owned by an organization selling cloud services? Public Private Community Hybrid
Public
Point out the wrong statement: Public cloud may be managed by the constituent organization(s) or by a third party A community cloud may be managed by the constituent organization(s) or by a third party Private clouds may be either on- or off-premises None of the mentioned
Public cloud may be managed by the constituent organization(s) or by a third party
The _____ is something that you can obtain under contract from your vendor. PoS QoS SoS All of the mentioned
QoS (Quality of Service)
______-sizing is possible when the system load is cyclical or in some cases when there are predictable bursts or spikes in the load. Left Right Top All of the mentioned
Right
Cloud ________ are standardized in order to appeal to the majority of its audience. SVAs SLAs SALs None of the mentioned
SLAs
The three different service models are together known as the _____ model of cloud computing. SPI SIP CPI All of the mentioned
SPI
When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. SaaS PaaS IaaS All of the mentioned
SaaS (Software as a Service)
_______ is a complete operating environment with applications, management, and the user interface. IaaS SaaS PaaS All of the mentioned
SaaS (Software as a Service)
_______ enables batch processing, which greatly speeds up high-processing applications. Scalability Reliability Elasticity Utility
Scalability
Which of the following is most important area of concern in cloud computing? Security Storage Scalability All of the mentioned
Security
A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider. Service Application Deployment All of the mentioned
Service
_________ model consists of the particular types of services that you can access on a cloud computing platform. Service Deployment Application None of the mentioned
Service
Which of the following architectural standards is working with the cloud computing industry? Service-oriented architecture Standardized Web services Web-application frameworks All of the mentioned
Service-oriented architecture
Which of the following is related to service provided by Cloud? Sourcing Ownership Reliability AaaS
Sourcing
_____ is a financial estimate for the costs of the use of a product or service over its lifetime. TCO TOC COT All of the mentioned
TCO
The reputation for cloud computing services for the quality of those services is shared by _________ Replicas Shards Tenants All of the mentioned
Tenants
Point out the wrong statement: A cloud is defined as the combination of the infrastructure of a data center with the ability to provision hardware and software High touch applications are best done on-premises The Google App Engine follows IaaS None of the mentioned
The Google App Engine follows IaaS
Point out the wrong statement : Google App Engine allows a developer to scale an application immediately The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering A cloud computing provider can become a hub master at the center of many ISVs offerings None of the mentioned
The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering
_______ is a pay-as-you-go model matches resources to need on an ongoing basis. Utility Elasticity Low barrier to entry All of the mentioned
Utility
Which of the following captive area deals with monitoring? Licensed Variable but under control Low All of the mentioned
Variable but under control
___________ is a function of the particular enterprise and application in an on-premises deployment. Vendor lock Vendor lock-in Vendor lock-ins None of the mentioned
Vendor lock-in
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. Real Virtual Cloud None of the mentioned
Virtual
Which of the following cloud concept is related to pooling and sharing of resources? Polymorphism Abstraction Virtualization None of the mentioned
Virtualization