CompTIA Cloud Essentials

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A few security benefits in using the cloud are:

-24/7 staffing and monitoring -Increased availability and improved disaster recovery through redundancy and multiple locations

What makes up the CIA Triad?

-Confidentiality -Availability -Integrity

Indications that your organization may not be ready for the cloud are:

-Your organization owns large data centers that often have enough scale to be as flexible and efficient as cloud computing providers -Legal and security (compliance) reasons can require an organization to know more details about the location of its data and servers than a cloud computing provider is able to provide -Predictable and fixed workloads can typically make optimal use of their hardware and do not need scaling

Why is there less maintenance effort using SaaS when managing the operating system?

Because the service provider manages the operating system in SaaS

The _______________ identifies customer requirements and makes sure that the cloud service provider meets the requirements before agreeing to deliver the service

Business Relationship Manager (BRM)

How might an organization successfully implement a SaaS strategy?

By managing the risks that are associated with bringing in external providers

CBN stands for:

Cloud-Based Networking

CEN stands for:

Cloud-Enabled Networking

Being able to create websites and web services quickly is an example of which of the following?

PaaS

PaaS stands for?

Platform as a Service

When computing services or infrastructure is maintained on the private network:

Private clouds

SaaS stands for?

Software as a Service

An application for internal-use only, on company-owned assets, would be best described as a private SaaS.

True

When using the ITIL standard the first step when considering when a company needs to implement a cloud network is to

assess what the business needs are

When utilizing cloud technologies, one of the biggest benefits is using ________, which allows things to take place in cloud loads without much user intervention.

automation

Network ___________ is the amount of data that can be sent across a network link within a given time.

bandwidth

When using cloud computing, you will shift _________ cost to _______ cost.

capital cost to variable cost

A ________ cloud, also known as cloud federation, is the deployment and management of multiple external and internal cloud computing services to match business needs. A federation is the union of several smaller parts that perform a common action.

federated

Cloud computing allows business to move away from the need to have _______ capital expenditures related to computer hardware by utilizing the cloud instead.

large

You company's data could become compromised by

-phishing -social engineering -poor physical security

Cloud computing improves business flexibility by...

-providing easier access to users outside of the organization -rapidly growing and shrinking capacity -allowing for the faster deployment of applications

A few possible security risks when using the cloud:

- Data loss- Data exposure- Shared technology

Some forms of encapsulation being used in VPNs are:

- GRE- VXLAN- VLAN

Which of the following assets have risks related to a cloud provider going out of business?

- Not using hybrid cloud federations to keep your data synced with multiple providers- Data stored at the provider

Some of the ways to mitigate risks when using cloud data integration:

- Understand the application design when moving to the cloud- Keep the applications, data, and the users as close as possible

It does not matter what portions of your current data center or infrastructure could be a possible security risk when moving that data to the cloud.

False

Virtualization technology is not an important skill for IT when adopting an IaaS strategy.

False

You can only use virtual servers in private clouds or traditional data centers.

False. All forms of cloud computing make use of virtual servers.

There are not legal risks when moving to the cloud.

False. Moving your data to the cloud created several legal questions that need to be addressed by your company's legal teams, especially if your company operates internationally.

Making use of cloud computing often slows down application development and architectural design.

False. Using cloud computing and making use of services that are distributed and already available for your development teams speeds up the time to market strategy for almost all new development projects.

Which of the following is a differentiating characteristic of private cloud solutions compared to public cloud solutions?

Private cloud solutions are dedicated for use by a single organization.

When computing services or infrastructure is maintained on the public network:

Public clouds

Which of the following applies only to public cloud computing as opposed to outsourcing?

Public clouds have no upfront CAPEX costs for hardware

Which of the following is BEST used when setting up security for services being used within a public cloud?

SSL

G Suite (formerly known as Google Apps, and different than Google Cloud Platform) is a set of online applications allowing users to create and share documents. This best describes which cloud type?

SaaS

Which of the following characteristics of cloud computing describes the ability to grow easily in response to an increase in demand?

Scalability

Which of the following is a typical concern for business and IT leaders, when adopting cloud computing?

Security of current IT solutions

_____________ allows the users/tenants of a cloud to do tasks themselves

Self-Service

ITIL and cloud management is broken down in to: Service Strategy, Service Design, and ________

Service Transition

As part of a critical SaaS application, one of the contractual statements by the cloud provider is a requirement to perform scheduled maintenance. This has a direct impact on which of the following?

Service operation

When the services and infrastructure are provided off-site, over the Internet:

Software as a Service

Hardware independence is:

The abstraction of your server OS from the server hardware and then packaging it into virtual machines

Which of the following is the MOST important service management consequence of elastic capacity?

The need for good performance monitoring and management

Which of the following do IT outsourcing and cloud computing typically have in common?

The possibility for vendor lock-in

The MOST important business continuity risk when selecting cloud service providers is:

The provider going out of business

What consequences does outsourcing IT and cloud computing have in common?

The use of external staffing

Which consequences do outsourcing IT, as well as cloud computing, have in common?

The use of external staffing

The following reduces your company's ________: Because cloud computing greatly reduces this, on-demand, scalable, and elastic services, allow the company to get products out quicker.

Time to market

A data centre is a facility used to house computer systems and associated components, such as telecommunications and storage systems.

True

Applications that are easy to migrate and have some business value are great options when first piloting or doing a POC for migrating to the cloud.

True

Cloud computing delivers IT capabilities that scale with demand, which is a huge benefit to organizations that want to quickly start out.

True

Cloud computing is typically based on open Internet technology

True

Data integration is complex in private data centers and is even more so when it comes to the cloud.

True

Federation is really a form of hybrid cloud technologies

True

If you do not already know the processes behind your current IT infrastructure, then making changes such as moving to the cloud can be detrimental.

True

It is important to use standardization on things such as data formats, virtual machine sizes, etc. because it helps facilitate, when the needs arises, to move from one cloud provider to another.

True

It is possible that data can be lost or stolen when migrating to the cloud.

True

Multitenancy allows system resources to be fully utilized before another server is brought online, further reducing the operating costs and data centre cooling that is required along with it.

True

Often times when using third party management tools for the cloud there is risk because of the possibility vendor lock-in.

True

Server virtualization allows the underlying physical server hardware to be shared.

True

The goal of ITSM is to ensure that IT functions efficiently and that its processes are also in alignment with the needs of the business.

True

The management requirements of cloud computing become much more complex when you need to manage private, public, and traditional data centers all together. You'll need to add capabilities for federating these environments.

True

Virtual machines can be secured at the VM-level by using access control list and firewalls.

True

Virtualization software separates physical infrastructures to create various dedicated resources.

True

Web email is considered an early example of cloud adoption

True

Within cloud environments, the purpose of the Business Relationship Management process is extended to form and uphold the cloud service provider and the customer-business relationship

True

You should be aware of which portions of your current data center or infrastructure can be a possible security risk when moving that data to the cloud.

True

A _____ allows one network from a single geographical data center to communicate securely with a data center in a different locale.

VPN

Which of the following must be implemented by a cloud provider to ensure that different entities can authenticate and share basic user account information?

Virtualization

You access a PaaS cloud by what means?

Web services

Which of the following questions should be considered before selecting a cloud computing vendor?

What cloud computing product will fit the business needs?

Examples of _____ Area Networks are the Internet and VPN tunnels.

Wide

Cloud computing allows for you to use _________ because you only pay based on your usage.

opex

A cloud's network must be _________ and ___________.

resilient and redundant

Some examples of using hardware standardization are:

-Using the same architecture, such as X86 -Taking advantage of tier-based virtualization cloud technologies -VM sizes are pre-defined sizes, often known as flavors

Common technologies used to mitigate security concerns are:

-Virtual firewalls -Virtual private networks

Cloud computing is what?

-A kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand -A model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources such as networks, servers, storage, applications and services

When your organization has a compliance audit, which of the following might be included as part of the audit?

-Assessing what is used as identity management -Audit of the the access control list

Which terms best describe the following scenario? When the load on your web site goes up, the load balancer adds additional compute web servers to carry the load and then removes these servers when the load goes back down.

-Automation -Elasticity

A few cloud services that can be consumed are?

-Email accounts -Websites -Data storage

Which of the following are ways of managing risk management?

-Identify what the organizations assets are -Identify threats and vulnerabilities -Address the identified risk -Monitor risks

Cloud computing characteristics:

-Managed by the provider -Managed through self-service on demand -Network accessible -Sustainable

Cloud providers and cloud software include:

-Microsoft Azure -OpenStack -Amazon Web Services -Google Cloud Platform

Which of the following are cloud providers or cloud software?

-OpenStack -Microsoft Azure -Google Compute Engine -Amazon Web Services

Which of the following organizations is MOST likely to consider confidentiality requirements before implementing a backup and disaster recovery cloud solution?

-Organizations with legal or regulatory constraints -Government or emergency response

What are some of the major differences between a private cloud and a public cloud?

-Private clouds are for use in a single organization -A public cloud is typically offered over the Internet

The three major cloud forms are:

-Public -Private -Hybrid

As stated by the National Institute of Standards and Technology, cloud characteristics include:

-Rapid elasticity -Broad network accessibility

Variable cost business models are focused on:

-Responsiveness -Removing the need for hardware completely -Allowing for smaller operating expenses (OPEX) over time, instead of large initial capital expenditures (CAPEX) -Operating efficiencies that do not work anymore

What are the three primary scalability levels?

-Server Scalability -Scaling of the Network -Scaling of the Platform

Some of important steps in the evolution from virtualization to the cloud are:

-Server virtualization -Distributed data centers -Private data centers -Hybrid data clouds and public clouds

Cloud scalability means?

-The ability of a particular system to fit a problem as the scope of that problem increases -The ability of an application to be scaled up to meet demand through replication and distribution of requests across a pool or farm of servers

Indications that your organization may be ready for the cloud are:

-Tied-up capital -Costly excess capacity -Running out of capacity

Which of the following is a reason for business users to be interested in cloud computing?

Desire for improved user experience

Which of the following steps BEST lead to successful adoption of a cloud service?

Gather stakeholder requirements, select potentially suitable cloud providers, perform a pilot, and then select the most appropriate provider.

When computing services or infrastructure is maintained on both private and public clouds:

Hybrid clouds

Differing from more technology-oriented IT management approaches like network management and IT systems management, __________ is characterized by adopting a process approach towards management, focusing on customer needs and IT services for customers rather than IT systems, and stressing continual improvement.

IT Service Management (ITSM)

Which of the following cloud services would be used to pay for hardware when it is being used for computing, network space, and storage over the Internet?

IaaS

Which of the following is a good case for IT outsourcing, as well as cloud computing?

Improving the overall cost structure

IaaS stands for?

Infrastructure as a Service


Set pelajaran terkait

Ch 3: Medication Administration and the Nursing Process of Drug Therapy

View Set

Finance Chapter 7 Book Questions

View Set

Brunner Chpt 41: Musculoskeletal Care Modalities

View Set

Chronic Past Questions (Final Study)

View Set

AP Psychology AP classroom questions

View Set