Cloud and Virtualization Final
Assume a device manufacturer tests 100 devices. The first device fails at 100 hours. The last device fails at 200 hours. What is the device mean time between failure (MTBF)? 100 20,000 15,000 10,000
10,000
Which of the following is a global principle that should be remembered when designing a secure cloud infrastructure? Data needs to be protected only while in transit. Configuration of machines needs to be automated. Access to all resources should not allow for auditing. Access to all resources must be controlled.
Access to all resources must be controlled.
Common components of a service-level agreement (SLA) include which of the following? None of these is correct. Mean time between failure (MTBF) All of these are correct. Throughput Uptime percentage
All of These are correct
Beyond traditional phone calls, users use smartphones to do which of the following? Perform GPS-based navigational operations Place face-to-face video calls to phones and computers Browse websites All of these are correct. Exchange text messages with other users
All of these are correct
Common components within a service-level agreement (SLA) include which of the following? Technical support operations (e.g., call-time delay and event response time) System uptime, normally expressed as a percentage, such as 99.9 percent All of these are correct. Run-time monitoring capabilities and event notification Billing policy for various types of resource use (e.g., CPUs, disk space, and databases)
All of these are correct
Items developers must consider for mobile devices include: None of these is correct. download performance. display size. All of these are correct. security.
All of these are correct
Ways to improve the performance of cloud solution include which of the following? Fine-tune disk and database input-output operations. All of these are correct. Reduce the use of graphics on key pages and optimize the graphics file format for all images. Utilize data and application caching. Compress large text blocks before downloading the text to a browser.
All of these are correct
When moving to the cloud, which of the following budget factors should you consider? Current payroll costs for existing site administrators and projections for possible staff reduction opportunities All of these are correct. Power and air conditioning costs Rent Server and data-storage costs
All of these are correct
Which of the following is a consideration when using web services? The solution must be developed and deployed by a reputable company. All of these are correct. The solution cannot be dynamically changed or updated without the company's notification and approval. The solution must be scalable to meet potential demand. The solution must provide secure communications to avoid threats such as a man-in-the-middle attack.
All of these are correct
Which of the following is a key performance measure one should consider for cloud solutions? All of these are correct. Market disruption Time to market Opportunity costs None of these is correct.
All of these are correct
A ___________ is a place where system traffic slows because of lack of resources. None of these is correct. bottleneck sink hole pinch point
Bottleneck
Which of the following enables containers on the same host to communicate? Overlay macvlan Bridge Host
Bridge
____________ describes the policies, procedures, and actions taken by an organization to ensure the availability of critical business functions to employees, customers, and other key stakeholders. Scalability Hypervisor injection None of these is correct. Virtualization Business continuity
Business continuity
______________ are large expenditures, normally for a plant, property, or large equipment. Capital expenses None of these is correct. Chargebacks Economic profits
Capital expenses
In cloud-based architectures, load balancers, origin servers, database servers, and monitoring systems are all provisioned from what? Virtual machines Cloud providers On-site servers Local ISP
Cloud Providers
When you need to specify and accomplish your deployment with a multi-container application in fewer commands, what should you use? Docker build Docker multi-tool Docker utility Docker compose
Docker Compose
________________ is the study of the production, distribution, and consumption of goods and services. Business Mitigation Economics Accounting
Economics
______________ describes the cost savings that a company may experience (up to a point) by expanding. Gates effect Economies of scale Mitigating economics Economic dilution
Economies of scale
True or False? Because IoT devices don't require software, they do not pose a security risk. True False
False
True or False? Cloud developers create applications and host them on software as a service (SaaS) provider sites, which provide an operating environment and hardware. True False
False
True or False? Web services execute faster than equivalent local functional calls. True False
False
In a zero-trust model, it is sufficient for the web server to use an x509 certificate as long as the clients authenticate over HTTP with a username and password. True. The web server is the only resource that requires authentication, and x509 certificates are adequate. False. x509 certifications are not sufficient to provide authentication. False. Access to all resources requires authentication in the zero-trust model. False. Usernames and passwords should never be used in the zero-trust model.
False. Access to all resources requires authentication in the zero-trust model.
In a real production environment, end users should be able to troubleshoot connections to the origin server by accessing it directly through the Docker container host's IP address and port. False. End users normally access the origin server directly. It is not there only for debugging purposes. True. End users need to be able to access the origin server for authentication. False. Docker containers cannot expose ports to the public internet. A reverse proxy is required on the host. False. Allowing end users direct access to an origin server can interfere with caching and other performance improvement methods.
False. Allowing end users direct access to an origin server can interfere with caching and other performance improvement methods.
Even though Docker containers may have different IPs than the host on which they are running, using traditional firewall-based network security on them can be easily maintained. False. The ability to move Docker containers among hosts makes managing firewall rules more complex. False. Firewall rules on the host cannot be used to manage network traffic to the containers. True. Most firewalls automatically propagate appropriate rules to the Docker containers. True. Part of the Docker infrastructure includes a firewall engine that automatically adapts to the host rules.
False. The ability to move Docker containers among hosts makes managing firewall rules more complex.
__________ specify what a system does; that is, the specific tasks the system will perform. Processor requirements Functional requirements Cloud requirements Nonfunctional requirements
Functional requirements
_____________ describes environmentally friendly IT operations. Cloud free Clear sky Green computing None of these is correct.
Green computing
Using __________, you can scale out an application by rewriting the application to support multiple CPUs (servers) and possibly multiple databases. horizontal scaling robust scaling demand scaling vertical scaling
Horizontal scaling
_______________ is a subset of corporate governance that includes the policies, procedures, and controls that relate to IT use and deployment, performance, return on investment, and risk mitigation. None of these is correct. IT governance Business continuity Risk mitigation
IT Governance
A _________ is a page that combines several independent pieces of content. cloud burst mashup thunderstorm shower
Mashup
______________ software facilitates the exchange of data between solutions. Middleware Firewall Monitoring Exchange
Middleware
____________ states the number of transistors that can be placed on an integrated circuit doubles every two years. Moore's law The Apple ratio The Google hardware ratio Gates' ratio
Moore's Law
__________ are often called quality requirements and include common factors such as performance, reliability, maintainability, and so forth. Nonfunctional requirements Processor requirements Cloud requirements Functional requirements
Nonfunctional requirements
Which of the following allows containers on different hosts to communicate without requiring changes to the host-level routing? Overlay Bridge ipvlan Host
Overlay
The __________ is also known as the 80/20. scaling principle Pareto principle None of these is correct. economies of scale principle
Pareto Principle
How does the SCAP Workbench connect to target machines to perform scans? SCAP Workbench uses ssh to connect to the target. SCAP Workbench uses http to connect to the target. SCAP Workbench uses a dedicated agent that must be installed on the target. SCAP Workbench uses rsync to connect to the target.
SCAP Workbench uses ssh to connect to the target.
______________ describes an application's ability to add or remove resources dynamically based on user demand. Robustness Processor alignment Capacity Scalability
Scalability
The top-level Docker Compose element that describes the Docker containers that are a part of the application is called what? Networks Application host Volumes Services
Services
Which of the following steps must be performed first to create a running container using a Dockerfile? The container is activated using a single "docker run" command. The container can be started with a specified command to run. The image is built using the steps defined in the Dockerfile. The container is created using an image and additional configuration information.
The image is built using the steps defined in the Dockerfile.
True or False? - An iOS app or an Android app are examples of native-mode solutions. True False
True
True or False? A 99.9 percent uptime means that a system is down 0.1 percent of the time, or 525 minutes each year. True False
True
True or False? A blockchain is a collection of interconnected servers that record transactions within distributed ledgers. True False
True
True or False? A company's profit margin, often simply called the margin, is a ratio of a company's income to revenue. True False
True
True or False? A disaster recovery plan (DRP) identifies risks to a company and ways to mitigate those risks.
True
True or False? A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system passwords.
True
True or False? A key risk of the Internet of Things (IoT) is security. True False
True
True or False? After deploying a cloud-based solution, an IT staff member should periodically audit key processing to confirm that the application is providing correct results. True False
True
True or False? Anticipating user demand is often a "best guess" process. True False
True
True or False? Applications developed specifically for the cloud are called cloud-native applications. True False
True
True or False? As an application's complexity increases, its ability to scale usually decreases. True False
True
True or False? Before deploying a solution to a cloud provider, a manager should be aware of the provider's multitenant use, e-commerce processing, employee screening, and use of encryption. True False
True
True or False? Before moving an application to the cloud and risk facing scaling issues, be sure that you monitor your application to identify its key performance indicators. True False
True
True or False? Before you begin the cloud design process, you must ensure that you have a complete set of system requirements. True False
True
True or False? By moving a solution to the cloud, IT managers shift a great deal of day-to-day management from their in-house department to the cloud-solution provider. True False
True
True or False? Cloud bursting is most common for seasonal demand, or event-driven demand, such as the load on Google Maps when an earthquake or other natural disaster occurs. True False
True
True or False? Cloud use is driven by new applications, which means that developers who create new cloud-based applications or who move existing applications to the cloud are the ones truly driving the cloud's explosive growth. True False
True
True or False? Companies must audit the source of the values they measure and report using internal or external auditors. True False
True
True or False? Creating a cloud-based application is very similar to building a traditional web-based application. Developers normally use a programing language such as PHP, Ruby, Perl, Python, or C#, along with HTML and CSS, and a database. True False
True
True or False? Currently, paints can change color on roads to indicate the presence of ice. In the future, intelligent paint may report driving conditions back to the cloud. True False
True
True or False? Developers often create cloud solutions on their own computers and then use File Transfer Protocol (FTP) to upload the solution to a cloud server. True False
True
True or False? Following the .com crash and corporate scandals such as Enron, Tyco, and WorldCom, pressures emerged from the government, shareholders, and numerous other stakeholders for companies to increase their financial oversight to reduce the opportunity for fraud and to restore confidence in corporate financial reporting. True False
True
True or False? From a technical perspective, an application can be moved to the cloud quickly. True False
True
True or False? Given the cloud's cost-effective ability to deploy solutions, training may be one of the more expensive aspects of a cloud migration. True False
True
True or False? If you ask roomful of cloud computing experts whether the cloud is driving the growth of mobile computing or mobile computing is driving the growth of the cloud, the results will be mixed. True False
True
True or False? If you list inventions that have made the biggest impact on society, from the automobile to airplanes to television and the telephone, the cell phone may (and likely will) eventually top the list. True False
True
True or False? Intelligent fabrics will soon allow intelligence to be built into the fabrics of our clothes, bedding, and furniture. True False
True
True or False? Internal controls allow a company auditor to inspect data values at key stages. True False
True
True or False? Many data centers have diesel-powered generators to produce power in the event of a long-term outage. True False
True
True or False? Rather than simply store a file on one drive, the RAID system stores the data across several drives.
True
True or False? Right-sizing is the process of aligning computing resources (processors, servers, disk capacity, and so on) with user demand and requirements. True False
True
True or False? The cloud's market adoption cycle is similar to that of most new product and service offerings. True False
True
True or False? To reduce the risk of vendor lock-in, many companies seek providers who support "open" solutions, which are built using open-source software such as Linux, PHP, and MySQL. True False
True
True or False? Total cost of ownership (TCO) is the total direct and indirect costs, including capital and operating expenses, of owning a particular piece of equipment or other capital good. True False
True
True or False? Using AWS Lambdas, developers can create cloud solutions that do not require a complete server, which are called serverless solutions. True False
True
True or False? Using a load-balancing model, developers can scale a web-service solution. True False
True
True or False? When developers use HTML to create Web and mobile solutions, a key consideration is screen size. True False
True
True or False? When evaluating a system's nonfunctional requirements, applying the 80/20 rule means that, often, 80 percent of a program's processing takes place within 20 percent of the code. True False
True
True or False? When moving a solution to the cloud, you may find that hiring a consultant saves you money in the long run and helps you to avoid costly mistakes. True False
True
True or False? Within a services-oriented architecture (SOA) application, a program exchanges messages with a web service to call a specific method and then normally waits for the web service to return its result.
True
True or False? Within a services-oriented architecture (SOA), programs make remote-procedure calls to services that reside on servers distributed across the web. True False
True
True or False? You should not expect to use traditional webpages as mobile solutions. You should optimize your web solutions and then optimize your mobile solutions. True False
True
rue or False? A key place to begin the cloud-governance process is with the service-level agreement (SLA). True False
True
____________ occurs when a vendor makes it difficult for a company to switch to another provider, even if the vendor has failed to fulfill the service-level agreement (SLA). Cloud bursting Vendor lock-in Virtual locking None of these is correct.
Vendor lock-in
Within a mobile environment, a _____________ is an HTML-based solution that adjusts its output for mobile device screen sizes. None of these is correct. Web responsive app native-mode app proxy
Web responsive app
_____________ is Microsoft's platform for cloud-based applications. MS Cloud Windows Azure Windows Storm Windows 365
Windows Azure
Which of the following requires credentials to gain access for all cloud-based resources? Anti-trust model Zero-trust model Access management model Dia model
Zero-trust model
When configuring cloud networking for ________, firewalls manage a defined perimeter to protect internal assets, while in ________ all communications are authorized and authenticated. a front-end model; an origin model a virtual network; a zero-trust model a zero-trust model; a virtual network an origin model; a front-end model
a virtual network; a zero-trust model
When an on-site application encounters increased user demand, an application can expand into the cloud through a process called: storming. virtualization. All of these are correct. cloud bursting.
cloud bursting
The process of taking an application to the cloud is known as: storming. cloud bursting. cloud migration. clouding.
cloud migration
A(n) _________ is an environment that consists of living and nonliving things with which one interacts. responsive web application mobile cloud ecosystem None of these is correct.
ecosystem
In frontend-backend web server architecture, the backend server is responsible for ________. generating pages based on user requests authenticating access on the public internet controlling access on the public internet acting as the primary interface for end users
generating pages based on user requests
The _____________ consists of apps and webpages that originate from sites within the cloud from which users download, or with which they interact via a mobile device. mobile cloud 5G cloud iCloud exocloud
mobile cloud
A ______________ occurs when adding additional resources does not improve performance. At that point, you should stop scaling. None of these is correct. scale spike horizontal wall point of diminishing returns
point of diminishing returns
The ______________ is a measure of the financial gain (or return) on an investment, such as a new piece of equipment. return on investment None of these is correct. economic return ratio capital return ratio
return on investment (RoE)
A key component of a _______ is including ways to automatically check the active systems to make sure that the _______ are being followed. cloud-based system; network diagrams secure architecture; policies secure architecture; network diagrams network protocol; policies
secure architecture; policies
To reduce risk, companies may ask a cloud-solution provider to place their site's source code in a: cloud vault. black box. virtual window. source-code escrow.
source-code escrow
True or False? A device's mean time between failure (MTBF) rating provides an estimate of how long the device should last. True False
true
True or False? Database replication creates two live copies of databases on separate servers. If one database fails, the other can immediately take over operations.
true
True or False? The cloud streamlines many expensive and time-consuming development steps, which will allow developers to bring applications to market faster. True False
true
A(n) ___________________ provides users with a few minutes of battery backup power so the users can save their work and shut down their systems in an orderly way. B-Pack uninterruptible power supply (UPS) redundant array of independent (or inexpensive) disks (RAID) None of these is correct.
uninterruptible power supply (UPS)
Using __________, you can scale up an application by moving the application to faster computer resources, such as a faster server or disk drive. vertical scaling demand scaling horizontal scaling robust scaling
vertical scaling