Cloud Computing Quiz
A cloud deployment that is off premises but for the exclusive use of a particular organization
Private
Façade that exposes the business logic implemented in the application to the customers
Service Interface
Which of the following is NOT a cross-cutting component of layered architecture? Communication Services Operational Management Security
Services
Which of the following statements about Microservices Architecture is FALSE? Services do not need to share the same technology stack, libraries, or frameworks Services can be updated without redeploying the entire application Each service is self-contained and should implement a single business capability Services should have tight coupling and low functional cohesion
Services should have tight coupling and low functional cohesion
Which of the following statements are TRUE for SaaS? [Select 2] Software is managed centrally by the cloud vendor Useful for batch computing and workloads that require large amounts of capacity on demand Allows easy upgrades and seamless scalability Provides on-demand and self-service application development
Software is managed centrally by the cloud vendor, Allows easy upgrades and seamless scalability
Using Microsoft Word as a reference application, give two examples of microservices.
Spell-check, grammar check
What is a zone in the context of logical network design?
A logical entity containing one or more tiers, it segregates various parts of the network
Which of the following can be classified as a TECHNICAL risk of cloud computing? [Select 3] API and management interface compromise Forced lock-in with the cloud provider Denial of Service due to misconfiguration or system vulnerabilities Storage of data in multiple jurisdictions along with lack of transparency Incomplete deletion of data
API and management interface compromise Denial of Service due to misconfiguration or system vulnerabilities Incomplete deletion of data
List 3 critical threats to cloud computing security.
Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss/Leakage Account, Service & Traffic Hijacking Unknown Risk Profile
A subscriber in an Infrastructure as a Service model can be ______ An individual A business unit A team All of the above
All of the above
In SaaS, which component(s) is(are) managed by cloud providers? Applications Storage Middleware All of the above
All of the above
Which of the following is NOT a typical component of an IaaS offering? Storage Self service interfaces Compute Instances Identify and Access Management All of the above are components of IaaS
All of the above are components of IaaS
What is an integration broker? What are the 4 components of its architecture?
An integration broker is used to manage data movement and system integration (integrates in-house applications and SaaS applications). 4 components: Security, Transform, Orchestrate, Route
Which of the following are consumers of PaaS? (Select all that apply) Application Users Application Testers Application Developers Application Administrators Cloud Service Providers Application Deployers
Application Users Application Testers Application Developers Application Administrators Application Deployers
In IaaS, which of the following components is NOT managed by cloud providers? Applications Servers Storage Networking
Applications
A network with higher 9's rating is used when which of the following is very important? Integrity Availability Security Confidentiality
Availability
What type of architecture is best suited if an application involves computationally intensive operations that requires work to be broken down into tasks that can run simultaneously?
Big Compute
List the PaaS application lifecycle.
Build applications Land first release Maintain application Land releases End of life
When is public cloud deployment favorable? Auctioning data center Cost savings Scalability Business Agility
Business Agility
The layer that implements the core functionality of the system by encapsulating business logic
Business Layer
Which of the following consists of components, some of which may expose service interfaces that other callers can use? Presentation Layer Data Layer Business Layer Service Layer
Business Layer
At the cloud provider premises, which of the following is/are a part of the cloud ecosystem? (select 3) Clients that are currently accessing the cloud over a network Clients joining the cloud (initiating access) Service level agreements with clients New hardware
Clients that are currently accessing the cloud over a network, Clients joining the cloud (initiating access), New hardware
____________ is a trusted third-party that can conduct independent assessment of cloud services, performance, and security of the cloud implementation.
Cloud Auditor
In the SaaS model, the public access point to the cloud is the:
Cloud Manager
Which component of IaaS cloud architecture is responsible for user accounts and high-level resource allocation within the overall cloud?
Cloud Manager
Explain cloud bursting in your own words. Illustrate with an example.
Cloud bursting is the process of having a temporary need for more capabilities or resources, borrowing & consuming those resources from another cloud, and releasing them back when done An example of this is a web application receiving high amounts of traffic at a given time, so it decides to provision its server on another cloud in order to handle the current capacity of users.
What is measured service? List some examples of metrics
Cloud systems automatically control and optimize resource use by leveraging a metering capability (examples: storage, bandwidth, processing, active user accounts)
Which of the following is NOT true about the cluster manager? Cluster Manager is responsible for the operation of a collection of computers that are connected via high speed local area networks A Cluster Manager receives resource allocation commands and queries from the Cloud Manager Cluster Manager queries the Computer Managers for the computers in the cluster to determine resource availability, and returns messages to the Cloud Manager on whether part, or all, of a request can be satisfied in a cluster Cluster Manager uses the command interface of its hypervisor to start, stop, suspend, and reconfigure virtual machines, and to set the local virtual network configuration
Cluster Manager uses the command interface of its hypervisor to start, stop, suspend, and reconfigure virtual machines, and to set the local virtual network configuration
A service is ________ if it provides functionality that logically belongs together. Services are ___________ if you can change one service without changing the other.
Cohesive, loosely coupled
A cloud deployment that is off premises but for exclusive use of one or more particular organizations
Community
The public school systems in the greater Chicago region have collectively decided to setup an email system in the cloud for use by their faculty, staff and students. This could be an example of the _______ cloud deployment model.
Community
In IaaS, the _________ uses the command interface of its hypervisor to start, stop, suspend, and reconfigure the virtual machines.
Computer Manager
Which component of IaaS cloud architecture uses command interface of its hypervisor to start, stop or reconfigure virtual machines?
Computer Manager
A Cluster Manager queries the ______________ to determine resource availability, and returns messages to the ______________ on whether part, or all, of a request can be satisfied in a cluster.
Computer Managers, Cloud Manager
List 2 advantages of layered architecture.
Consistency & standardization
Two major advantages of IT Architecture
Consistency and Standardization
Which of the following is/are true for Infrastructure-as-a-Service? (select 2) The consumer manages and controls the underlying cloud infrastructure Consumers can install operating systems compatible with the underlying virtualized hardware Includes delivery of fully featured applications that are targeted at private and business users Has a chargeback (measured service) capability to charge consumers for their resource usage
Consumers can install operating systems compatible with the underlying virtualized hardware, Has a chargeback (measured service) capability to charge consumers for their resource usage
____________ is an isolated workload environment that can be used for deploying and running microservices.
Container
Using an example, explain how Microservices Architecture facilitates continuous delivery practice across development teams.
Continuous Delivery practices encourage incremental additions as part of production. These additional features and capabilities are made possible by the separation and independence of services in a microservice architecture. An example of this is seen in the ability to fix bugs in a microservice architecture. A feature that handles a bug can be independently deployed, and the service can be updated without interrupting the process of continuous delivery (i.e. other service developments are unaffected).
Which capability offered by IaaS enables cloud subscribers to bring in their own set of cloud management tools from another vendor?
Control plane and self-service interfaces
Which of the following is NOT a Principal Component of IT Architecture Model? IT Application Landscape Software Reference Architecture Domain or Capability Model Cross-Functional Processes
Cross-Functional Processes
In PaaS, which of the following components is NOT managed by cloud providers? Data Servers Virtualization Operating System
Data
Data layer consists of: (Select all correct answers) Data Access Components Service Agents Business Workflow Data Helper and Utilities
Data Access Components, Service Agents, Data Helper and Utilities
Failover clustering is typically used with: Application servers Clients Web servers Database servers
Database servers
Local computing capability on or next to a sensor that is network-accessible is an example of __________
Edge Computing
Which of the following components are required for a successful MSA implementation? [Select 3] Effective data and service management tools Decentralized approach to service development Hierarchical organizational structure with interdependent development teams Unique technology stack for each microservice Competency in agile and DevOps practices
Effective data and service management tools Decentralized approach to service development Competency in agile and DevOps practices
Which of the following are common use cases of IaaS? [Select 3] Environment for application development and testing Learning Management System Business Continuity and Disaster Recovery High-Performance Computing Applications for enabling collaboration
Environment for application development and testing, Business Continuity and Disaster Recovery, High-Performance Computing
True or False: All microservices in a Microservices Architecture share one common database for easy data access.
False
True or False: By virtualization you can add more storage space than underlying hardware.
False
True or False: In PaaS, it is the subscriber who maintains a set of development tools and execution environments.
False
True or False: In Platform as a Service, the customer does not manage or control the underlying infrastructure but has control over storage and possibly limited control of networking components.
False
True or False: In cloud infrastructure, there is no way a customer can specify the location (country or region) of the provided resources as part of the service.
False
True or False: Multi-tenancy can only be applied to SaaS applications.
False
True or False: Public zone assets can be managed by an organization.
False
True or False: The number of user accounts requiring direct access to the hypervisor should be MAXIMIZED for increased security and redundancy.
False
True or False: Virtualization is a necessary step for cloud computing.
False
Which of the following process is the first step towards application design? Choose communication protocols for interaction between layers and tiers Define public interface for each layer Focus on the highest level of abstraction and group functionalities into layers Determine how the application will be deployed
Focus on the highest level of abstraction and group functionalities into layers
When designing an application, the first task is to: Determine how the application will be deployed Choose the communication protocols to use for interaction between the layers and tiers of the application Focus on the highest level of abstraction and start by grouping functionality into layers Define the public interface for each layer
Focus on the highest level of abstraction and start by grouping functionality into layers
SaaS would be a good fit:_______________ AND _________________ [Select 2] For undifferentiated solutions that may not confer a competitive advantage When an application's Time to Market is a key pressure for development teams Applications where extremely fast processing of real time data is required Applications that have a significant need for mobile and web access Applications where legislation or other regulation does not permit data being hosted externally
For undifferentiated solutions that may not confer a competitive advantage, Applications that have a significant need for mobile and web access
When you integrate cloud with a traditional on-premise system, which deployment model are you building?
Hybrid
__________ cloud enables data and application portability
Hybrid
Give 1 security recommendation for virtualization.
Hypervisor platforms with hardware assisted virtualization provides greater security assurance. Number of user accounts requiring direct access to hypervisor host should be limited to bare minimum. Place the management interface of the hypervisor in a dedicated virtual network segment. Communication from a given VM to the enterprise (physical) network should be enabled through multiple communication paths (or physical NICs) within the virtualized host.
Which of the following are necessary in designing an enterprise IT architecture? (Select 3) Human resources IT applications Business Model IT infrastructure and products
IT applications Business Model IT infrastructure and products
Which of the following types of PaaS allows developers to have a streamlined deployment of applications while retaining control over the underlying infrastructure? IaaS-centric PaaS SaaS-centric PaaS Generic PaaS None of the above
IaaS-centric PaaS
Which of the following is true for Software-as-a-Service? The consumer manages and controls the underlying cloud infrastructure Manages delivery of disk space, virtual CPUs, and database services Includes delivery of fully featured applications that are targeted at private and business users IT organization builds, deploys, and runs the solution
Includes delivery of fully featured applications that are targeted at private and business users
According to what we discussed in class, which of the following is the greatest benefit of public cloud deployment? Broader Geographic Distribution Cost Savings Increased Business Agility Increased Availability
Increased Business Agility
Which of the following is NOT a benefit of SaaS? Low initial cost Easy upgrades Increased administration Scalability
Increased administration
___________ is the network of dedicated physical objects that contain embedded technology to sense or interact with their internal state or external environment.
Internet of Things
What is sandboxing?
Isolating each guest OS from the others and restricting what resources they can access and what privileges they have
Which of the following statements about Fog Computing are TRUE? [Select 2] It runs specific applications in a fixed logic location and provides a direct transmission service It supports processing of data of different forms acquired through various network communication capabilities Fog computing applications involve real-time interactions rather than batch processing Fog computing is limited to a small number of peripheral devices
It supports processing of data of different forms acquired through various network communication capabilities Fog computing applications involve real-time interactions rather than batch processing
Which of the following are part of the service provider's responsibilities in a PaaS service? (Select 3) Applying security patches to the application as required Updating applications as required Maintaining an inventory of applications Providing execution environments for consumer's applications Providing a set of development tools
Maintaining an inventory of applications Providing execution environments for consumer's applications Providing a set of development tools
In the PaaS service model, the __________ layer is responsible for pushing, starting, and stopping of applications.
Management
The ________________ layer of the PaaS model allows control over the deployed applications and configuration settings of the platform.
Management
If your architecture involves a combination of on-premise systems and cloud components, what technology would you deploy to manage communication between them?
Message Broker
A standard way of translating between software from different vendors is achieved by using:
Middleware
What is the biggest advantage of a layered application architecture?
Modularity: If you want to update something, you only need to change the respective layer.
Which of the following statements is FALSE for PaaS? Provides on-demand and self-service application development Provides standard application framework Portability between PaaS clouds is quick and easy Abstracts infrastructure and other configuration details from application developers
Portability between PaaS clouds is quick and easy
When single instance of a software application and its underlying infrastructure serves multiple user accounts
Multi-tenancy
In a PaaS model, which service stack is hosted and operated by the PaaS vendor and typically co-located to the PaaS environment inside the same infrastructure?
Native services
Which of the following modules are a part of the Integration Broker Pipeline? [Select 3] Orchestrate Governance Infrastructure Transform Security
Orchestrate, Transform, Security
Which of the following types of cloud IaaS is operated by the cloud provider and located at the subscriber's end? External Private Cloud Virtual Private Cloud Outsourced Private Cloud Internal Private Cloud
Outsourced Private Cloud
In the _________ cloud service model, the consumer makes use of the interfaces provided by the service provider and develops, implements, and deploys applications.
PaaS
Which service model does not require consumers to manage or control the underlying cloud infrastructure, but maintain control over the deployed applications and configuration settings for the application hosting environment?
PaaS
Considering IU's enterprise network, name one system for each of the following zones in a zone-based network architecture: Perimeter zone Internal zone
Perimeter Zone: Email Internal Zone: Kuali
Servers, storage, and network components are a part of _________ layer in the cloud infrastructure.
Physical
_____________ focuses on the fidelity of data and applications received from another system and whether they are useable or not.
Portability
An enterprise would like to leverage cloud solution for managing highly classified data. Which of the following cloud deployment models would be most suitable? Public Cloud Private Cloud Community Cloud Hybrid Cloud
Private Cloud
The cloud infrastructure which is provisioned for exclusive use by a single organization comprising multiple consumers (i.e. business units)
Private Cloud
If you need more capacity, cloud enables you to add more machines or storage and when you stop consuming it, that excess capacity is released back into the resource pool. This can be depicted by which characteristic of cloud computing?
Rapid Elasticity
Which of the following is not one of the characteristics of cloud computing? Resource pooling On demand self service Rapid virtualization Broad access
Rapid virtualization
Solutions based on big data architecture typically involve one or more of the following types of workload: (Select all correct answers) Real-time processing of data Batch processing of data Simulations or massive number crunching Store and process data in finite volumes
Real-time processing of data, Batch processing of data
If you deploy failover clusters in your architecture, your application is built for:
Reliability
Which of the following is NOT a benefit of using IaaS? Improves disaster recovery and business continuity Requires precise capacity planning Lowers up-front cost Faster time to market
Requires precise capacity planning
Which of the following is NOT a benefit of cloud computing? Easy to change resources and cost effective as compared to hardware solutions Helps manage software upgrades and installations Requires you to provision capacity by guessing theoretical maximum peaks No need to have an IT support organization to manage applications
Requires you to provision capacity by guessing theoretical maximum peaks
Which characteristic of cloud computing enables the multi-tenant model of computing resources, storage and memory?
Resource Pooling
Gmail is an example of which cloud service offering?
SaaS
Isolating guest Operating Systems from each other and limiting their capabilities (restricting access/privileges)
Sandboxing
If you divide your users into application-defined logical roles and grant access to them based on their role, your application is built for ________________
Security
Which of the following is a cross-cutting capability in the layered architecture we discussed in class? Security Service agents Data helpers/utilities Services layer
Security
What is the function of the data layer?
The data layer provides access to data hosted within the boundaries of the system, and data exposed by other networked systems. It exposes generic interfaces that the components in the business layer can consume.
What is a Service Level Agreement?
The parameters and definitions of what service a company will provide to customers
Which of the following statements are true about Private Cloud? [Select 2] The underlying infrastructure cannot be shared with others It can only exist on premises Provides an organization greater control over security and assurance over data location It is the cheapest deployment model
The underlying infrastructure cannot be shared with others, Provides an organization greater control over security and assurance over data location
Which of the following are components of Hybrid Cloud IT Operating Model? [Select 3] Traditional IT Management Group IT Service Broker Group User Management Control IT Quality Assurance Group Cloud Management Group
Traditional IT Management Group, IT Service Broker Group, Cloud Management Group
True or False: A Private Cloud can be located at a service provider's data center .
True
True or False: A load balanced cluster is a design for scalable infrastructure tier that accounts for changes in load while maintaining an acceptable level of performance.
True
True or False: In SaaS, consumers have limited admin control and full user level control over applications.
True
True or False: In application design, when moving from logical layers to physical tiers, it is possible to have ALL layers on a SINGLE tier.
True
True or False: In application design, when moving from logical layers to physical tiers, it is possible to have ONE layer on MULTIPLE tiers.
True
True or False: Mist computing is NOT a required sub-component of Fog Computing.
True
True or False: Platform as a Service model enables an abstraction of middleware, infrastructure and configuration details, thus helping reduce complexity.
True
True or False: Private Cloud can be deployed on as well as off premises.
True
True or False: User specific application configuration settings can be applied to a SaaS solution although it is limited.
True
True or False: When you move from traditional data center into cloud computing, you are shifting from a capital expense (CapEx) to an operational expense (OpEx)
True
True or False: With software-as-a-service, it is the vendor who builds, deploys, and runs the solution.
True
Look at the quiz screen and identify: 1) UI component and 2) the presentation logic underlying that UI component
UI Component -could be buttons, textbox, etc. Logic - What happens when you click buttons/controls
Which of the following is NOT true with respect to the characteristics of SaaS? Web access to commercial software Software delivered in a "one to many" model - multitenancy Users are required to handle software upgrades and patches Software is managed from a central location
Users are required to handle software upgrades and patches
Which of the following can be considered a potential issue pertaining to IaaS? (Select all that apply) Upfront costs Flexibility Virtual Machine sprawl Network dependence Browser based risks
Virtual Machine sprawl Network dependence Browser based risks
In IaaS, which of the following components is NOT managed by subscribers? Applications Middleware Virtualization Operating System
Virtualization
Which of the following is NOT a type of PaaS? SaaS-centric PaaS Generic PaaS IaaS-centric PaaS Virtualized PaaS All of the above are types of PaaS
Virtualized PaaS