Cloud and Virtualization Final

Ace your homework & exams now with Quizwiz!

Assume a device manufacturer tests 100 devices. The first device fails at 100 hours. The last device fails at 200 hours. What is the device mean time between failure (MTBF)? 100 20,000 15,000 10,000

10,000

Which of the following is a global principle that should be remembered when designing a secure cloud infrastructure? Data needs to be protected only while in transit. Configuration of machines needs to be automated. Access to all resources should not allow for auditing. Access to all resources must be controlled.

Access to all resources must be controlled.

Common components of a service-level agreement (SLA) include which of the following? None of these is correct. Mean time between failure (MTBF) All of these are correct. Throughput Uptime percentage

All of These are correct

Beyond traditional phone calls, users use smartphones to do which of the following? Perform GPS-based navigational operations Place face-to-face video calls to phones and computers Browse websites All of these are correct. Exchange text messages with other users

All of these are correct

Common components within a service-level agreement (SLA) include which of the following? Technical support operations (e.g., call-time delay and event response time) System uptime, normally expressed as a percentage, such as 99.9 percent All of these are correct. Run-time monitoring capabilities and event notification Billing policy for various types of resource use (e.g., CPUs, disk space, and databases)

All of these are correct

Items developers must consider for mobile devices include: None of these is correct. download performance. display size. All of these are correct. security.

All of these are correct

Ways to improve the performance of cloud solution include which of the following? Fine-tune disk and database input-output operations. All of these are correct. Reduce the use of graphics on key pages and optimize the graphics file format for all images. Utilize data and application caching. Compress large text blocks before downloading the text to a browser.

All of these are correct

When moving to the cloud, which of the following budget factors should you consider? Current payroll costs for existing site administrators and projections for possible staff reduction opportunities All of these are correct. Power and air conditioning costs Rent Server and data-storage costs

All of these are correct

Which of the following is a consideration when using web services? The solution must be developed and deployed by a reputable company. All of these are correct. The solution cannot be dynamically changed or updated without the company's notification and approval. The solution must be scalable to meet potential demand. The solution must provide secure communications to avoid threats such as a man-in-the-middle attack.

All of these are correct

Which of the following is a key performance measure one should consider for cloud solutions? All of these are correct. Market disruption Time to market Opportunity costs None of these is correct.

All of these are correct

A ___________ is a place where system traffic slows because of lack of resources. None of these is correct. bottleneck sink hole pinch point

Bottleneck

Which of the following enables containers on the same host to communicate? Overlay macvlan Bridge Host

Bridge

____________ describes the policies, procedures, and actions taken by an organization to ensure the availability of critical business functions to employees, customers, and other key stakeholders. Scalability Hypervisor injection None of these is correct. Virtualization Business continuity

Business continuity

______________ are large expenditures, normally for a plant, property, or large equipment. Capital expenses None of these is correct. Chargebacks Economic profits

Capital expenses

In cloud-based architectures, load balancers, origin servers, database servers, and monitoring systems are all provisioned from what? Virtual machines Cloud providers On-site servers Local ISP

Cloud Providers

When you need to specify and accomplish your deployment with a multi-container application in fewer commands, what should you use? Docker build Docker multi-tool Docker utility Docker compose

Docker Compose

________________ is the study of the production, distribution, and consumption of goods and services. Business Mitigation Economics Accounting

Economics

______________ describes the cost savings that a company may experience (up to a point) by expanding. Gates effect Economies of scale Mitigating economics Economic dilution

Economies of scale

True or False? Because IoT devices don't require software, they do not pose a security risk. True False

False

True or False? Cloud developers create applications and host them on software as a service (SaaS) provider sites, which provide an operating environment and hardware. True False

False

True or False? Web services execute faster than equivalent local functional calls. True False

False

In a zero-trust model, it is sufficient for the web server to use an x509 certificate as long as the clients authenticate over HTTP with a username and password. True. The web server is the only resource that requires authentication, and x509 certificates are adequate. False. x509 certifications are not sufficient to provide authentication. False. Access to all resources requires authentication in the zero-trust model. False. Usernames and passwords should never be used in the zero-trust model.

False. Access to all resources requires authentication in the zero-trust model.

In a real production environment, end users should be able to troubleshoot connections to the origin server by accessing it directly through the Docker container host's IP address and port. False. End users normally access the origin server directly. It is not there only for debugging purposes. True. End users need to be able to access the origin server for authentication. False. Docker containers cannot expose ports to the public internet. A reverse proxy is required on the host. False. Allowing end users direct access to an origin server can interfere with caching and other performance improvement methods.

False. Allowing end users direct access to an origin server can interfere with caching and other performance improvement methods.

Even though Docker containers may have different IPs than the host on which they are running, using traditional firewall-based network security on them can be easily maintained. False. The ability to move Docker containers among hosts makes managing firewall rules more complex. False. Firewall rules on the host cannot be used to manage network traffic to the containers. True. Most firewalls automatically propagate appropriate rules to the Docker containers. True. Part of the Docker infrastructure includes a firewall engine that automatically adapts to the host rules.

False. The ability to move Docker containers among hosts makes managing firewall rules more complex.

__________ specify what a system does; that is, the specific tasks the system will perform. Processor requirements Functional requirements Cloud requirements Nonfunctional requirements

Functional requirements

_____________ describes environmentally friendly IT operations. Cloud free Clear sky Green computing None of these is correct.

Green computing

Using __________, you can scale out an application by rewriting the application to support multiple CPUs (servers) and possibly multiple databases. horizontal scaling robust scaling demand scaling vertical scaling

Horizontal scaling

_______________ is a subset of corporate governance that includes the policies, procedures, and controls that relate to IT use and deployment, performance, return on investment, and risk mitigation. None of these is correct. IT governance Business continuity Risk mitigation

IT Governance

A _________ is a page that combines several independent pieces of content. cloud burst mashup thunderstorm shower

Mashup

______________ software facilitates the exchange of data between solutions. Middleware Firewall Monitoring Exchange

Middleware

____________ states the number of transistors that can be placed on an integrated circuit doubles every two years. Moore's law The Apple ratio The Google hardware ratio Gates' ratio

Moore's Law

__________ are often called quality requirements and include common factors such as performance, reliability, maintainability, and so forth. Nonfunctional requirements Processor requirements Cloud requirements Functional requirements

Nonfunctional requirements

Which of the following allows containers on different hosts to communicate without requiring changes to the host-level routing? Overlay Bridge ipvlan Host

Overlay

The __________ is also known as the 80/20. scaling principle Pareto principle None of these is correct. economies of scale principle

Pareto Principle

How does the SCAP Workbench connect to target machines to perform scans? SCAP Workbench uses ssh to connect to the target. SCAP Workbench uses http to connect to the target. SCAP Workbench uses a dedicated agent that must be installed on the target. SCAP Workbench uses rsync to connect to the target.

SCAP Workbench uses ssh to connect to the target.

______________ describes an application's ability to add or remove resources dynamically based on user demand. Robustness Processor alignment Capacity Scalability

Scalability

The top-level Docker Compose element that describes the Docker containers that are a part of the application is called what? Networks Application host Volumes Services

Services

Which of the following steps must be performed first to create a running container using a Dockerfile? The container is activated using a single "docker run" command. The container can be started with a specified command to run. The image is built using the steps defined in the Dockerfile. The container is created using an image and additional configuration information.

The image is built using the steps defined in the Dockerfile.

True or False? - An iOS app or an Android app are examples of native-mode solutions. True False

True

True or False? A 99.9 percent uptime means that a system is down 0.1 percent of the time, or 525 minutes each year. True False

True

True or False? A blockchain is a collection of interconnected servers that record transactions within distributed ledgers. True False

True

True or False? A company's profit margin, often simply called the margin, is a ratio of a company's income to revenue. True False

True

True or False? A disaster recovery plan (DRP) identifies risks to a company and ways to mitigate those risks.

True

True or False? A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system passwords.

True

True or False? A key risk of the Internet of Things (IoT) is security. True False

True

True or False? After deploying a cloud-based solution, an IT staff member should periodically audit key processing to confirm that the application is providing correct results. True False

True

True or False? Anticipating user demand is often a "best guess" process. True False

True

True or False? Applications developed specifically for the cloud are called cloud-native applications. True False

True

True or False? As an application's complexity increases, its ability to scale usually decreases. True False

True

True or False? Before deploying a solution to a cloud provider, a manager should be aware of the provider's multitenant use, e-commerce processing, employee screening, and use of encryption. True False

True

True or False? Before moving an application to the cloud and risk facing scaling issues, be sure that you monitor your application to identify its key performance indicators. True False

True

True or False? Before you begin the cloud design process, you must ensure that you have a complete set of system requirements. True False

True

True or False? By moving a solution to the cloud, IT managers shift a great deal of day-to-day management from their in-house department to the cloud-solution provider. True False

True

True or False? Cloud bursting is most common for seasonal demand, or event-driven demand, such as the load on Google Maps when an earthquake or other natural disaster occurs. True False

True

True or False? Cloud use is driven by new applications, which means that developers who create new cloud-based applications or who move existing applications to the cloud are the ones truly driving the cloud's explosive growth. True False

True

True or False? Companies must audit the source of the values they measure and report using internal or external auditors. True False

True

True or False? Creating a cloud-based application is very similar to building a traditional web-based application. Developers normally use a programing language such as PHP, Ruby, Perl, Python, or C#, along with HTML and CSS, and a database. True False

True

True or False? Currently, paints can change color on roads to indicate the presence of ice. In the future, intelligent paint may report driving conditions back to the cloud. True False

True

True or False? Developers often create cloud solutions on their own computers and then use File Transfer Protocol (FTP) to upload the solution to a cloud server. True False

True

True or False? Following the .com crash and corporate scandals such as Enron, Tyco, and WorldCom, pressures emerged from the government, shareholders, and numerous other stakeholders for companies to increase their financial oversight to reduce the opportunity for fraud and to restore confidence in corporate financial reporting. True False

True

True or False? From a technical perspective, an application can be moved to the cloud quickly. True False

True

True or False? Given the cloud's cost-effective ability to deploy solutions, training may be one of the more expensive aspects of a cloud migration. True False

True

True or False? If you ask roomful of cloud computing experts whether the cloud is driving the growth of mobile computing or mobile computing is driving the growth of the cloud, the results will be mixed. True False

True

True or False? If you list inventions that have made the biggest impact on society, from the automobile to airplanes to television and the telephone, the cell phone may (and likely will) eventually top the list. True False

True

True or False? Intelligent fabrics will soon allow intelligence to be built into the fabrics of our clothes, bedding, and furniture. True False

True

True or False? Internal controls allow a company auditor to inspect data values at key stages. True False

True

True or False? Many data centers have diesel-powered generators to produce power in the event of a long-term outage. True False

True

True or False? Rather than simply store a file on one drive, the RAID system stores the data across several drives.

True

True or False? Right-sizing is the process of aligning computing resources (processors, servers, disk capacity, and so on) with user demand and requirements. True False

True

True or False? The cloud's market adoption cycle is similar to that of most new product and service offerings. True False

True

True or False? To reduce the risk of vendor lock-in, many companies seek providers who support "open" solutions, which are built using open-source software such as Linux, PHP, and MySQL. True False

True

True or False? Total cost of ownership (TCO) is the total direct and indirect costs, including capital and operating expenses, of owning a particular piece of equipment or other capital good. True False

True

True or False? Using AWS Lambdas, developers can create cloud solutions that do not require a complete server, which are called serverless solutions. True False

True

True or False? Using a load-balancing model, developers can scale a web-service solution. True False

True

True or False? When developers use HTML to create Web and mobile solutions, a key consideration is screen size. True False

True

True or False? When evaluating a system's nonfunctional requirements, applying the 80/20 rule means that, often, 80 percent of a program's processing takes place within 20 percent of the code. True False

True

True or False? When moving a solution to the cloud, you may find that hiring a consultant saves you money in the long run and helps you to avoid costly mistakes. True False

True

True or False? Within a services-oriented architecture (SOA) application, a program exchanges messages with a web service to call a specific method and then normally waits for the web service to return its result.

True

True or False? Within a services-oriented architecture (SOA), programs make remote-procedure calls to services that reside on servers distributed across the web. True False

True

True or False? You should not expect to use traditional webpages as mobile solutions. You should optimize your web solutions and then optimize your mobile solutions. True False

True

rue or False? A key place to begin the cloud-governance process is with the service-level agreement (SLA). True False

True

____________ occurs when a vendor makes it difficult for a company to switch to another provider, even if the vendor has failed to fulfill the service-level agreement (SLA). Cloud bursting Vendor lock-in Virtual locking None of these is correct.

Vendor lock-in

Within a mobile environment, a _____________ is an HTML-based solution that adjusts its output for mobile device screen sizes. None of these is correct. Web responsive app native-mode app proxy

Web responsive app

_____________ is Microsoft's platform for cloud-based applications. MS Cloud Windows Azure Windows Storm Windows 365

Windows Azure

Which of the following requires credentials to gain access for all cloud-based resources? Anti-trust model Zero-trust model Access management model Dia model

Zero-trust model

When configuring cloud networking for ________, firewalls manage a defined perimeter to protect internal assets, while in ________ all communications are authorized and authenticated. a front-end model; an origin model a virtual network; a zero-trust model a zero-trust model; a virtual network an origin model; a front-end model

a virtual network; a zero-trust model

When an on-site application encounters increased user demand, an application can expand into the cloud through a process called: storming. virtualization. All of these are correct. cloud bursting.

cloud bursting

The process of taking an application to the cloud is known as: storming. cloud bursting. cloud migration. clouding.

cloud migration

A(n) _________ is an environment that consists of living and nonliving things with which one interacts. responsive web application mobile cloud ecosystem None of these is correct.

ecosystem

In frontend-backend web server architecture, the backend server is responsible for ________. generating pages based on user requests authenticating access on the public internet controlling access on the public internet acting as the primary interface for end users

generating pages based on user requests

The _____________ consists of apps and webpages that originate from sites within the cloud from which users download, or with which they interact via a mobile device. mobile cloud 5G cloud iCloud exocloud

mobile cloud

A ______________ occurs when adding additional resources does not improve performance. At that point, you should stop scaling. None of these is correct. scale spike horizontal wall point of diminishing returns

point of diminishing returns

The ______________ is a measure of the financial gain (or return) on an investment, such as a new piece of equipment. return on investment None of these is correct. economic return ratio capital return ratio

return on investment (RoE)

A key component of a _______ is including ways to automatically check the active systems to make sure that the _______ are being followed. cloud-based system; network diagrams secure architecture; policies secure architecture; network diagrams network protocol; policies

secure architecture; policies

To reduce risk, companies may ask a cloud-solution provider to place their site's source code in a: cloud vault. black box. virtual window. source-code escrow.

source-code escrow

True or False? A device's mean time between failure (MTBF) rating provides an estimate of how long the device should last. True False

true

True or False? Database replication creates two live copies of databases on separate servers. If one database fails, the other can immediately take over operations.

true

True or False? The cloud streamlines many expensive and time-consuming development steps, which will allow developers to bring applications to market faster. True False

true

A(n) ___________________ provides users with a few minutes of battery backup power so the users can save their work and shut down their systems in an orderly way. B-Pack uninterruptible power supply (UPS) redundant array of independent (or inexpensive) disks (RAID) None of these is correct.

uninterruptible power supply (UPS)

Using __________, you can scale up an application by moving the application to faster computer resources, such as a faster server or disk drive. vertical scaling demand scaling horizontal scaling robust scaling

vertical scaling


Related study sets

63. JavaScript Object Prototypes

View Set

SIMULATED TEST QUESTIONS - PRACTICE EXAM 3 - (please feel free to submit edits/corrections to Mike!)

View Set

Chapter 10 Use of Life Insurance

View Set

Chapter 5 - Running Water and Groundwater

View Set

National Unit 9 Practice of Real Estate

View Set