Cloud Essentials

Ace your homework & exams now with Quizwiz!

A cloud subscriber may come under certain security constraints when hosting sensitive data in the cloud due to government regulations. Which of the following is the BEST mitigating control that could be implemented by the cloud provider? A. Offer multi-tenancy software as a service with segregated physical infrastructure. B. Offer a single-tenancy software service with segregated virtualized infrastructure. C. Offer multi-tenancy software as a service with logically segregated infrastructure. D. Offer a single-tenancy software service with monitored intrusion detection systems.

B. Offer a single-tenancy software service with segregated virtualized infrastructure.

QUESTION 2 Which of the following technologies are related to Web services? A. HTML, IDM, JSON B. HTML, IDM, XML C. HTML, JSON, XML D. DM, JSON, XML

C. HTML, JSON, XML

The IT department has migrated company email to a web-based cloud provider. Which of the following dependencies placed on the cloud computing vendor will have the MOST affect on all company staff? A. Cost of service B. Availability of service C. Maintainability of service D. Location of service

B. Availability of service

How can the internal IT department successfully react to cloud computing? A. By becoming an external cloud provider B. By becoming an internal cloud provider C. By outsourcing all IT services D. By solely focusing on security issues

B. By becoming an internal cloud provider

Which of the following describes the amount of data that can be sent across a link in a given time? A. Network bandwidth B. Network QoS C. Network latency D. Network speed

A. Network bandwidth

Which of the following capabilities MUST a vendor be able to fulfill in order to provide a successful IaaS solution? (Select TWO). A. Network maintenance B. Application development C. Web-based application maintenance D. Application configuration settings E. Physical security

A. Network maintenance E. Physical security

How can an organization successfully implement a PaaS strategy? A. Open up internal databases with Web service access. B. Take inventory of the application portfolio and select external suppliers C. Standardize on a limited set of virtual machines. D. Continuously execute performance analytics to monitor providers

A. Open up internal databases with Web service access.

An organization is replacing its core insurance platform. The solution is made up of internally hosted insurance systems and applications hosted in the cloud. Which of the following activities is part of service transition? A. Ensure that as part of the change management process the events are sequenced to include the cloud provider and that they have resources available. B. Ensure that monitoring controls are implemented by the cloud provider to ensures that the system is highly available and that performance can be measured. C. Ensure that the SLA's for availability have been well documented and agreed to as part of the contract arrangement between the two companies. D. Ensure that the capacity and storage is available to meet the current and future demands of the solution of the cloud provider's infrastructure.

A. Ensure that as part of the change management process the events are sequenced to include the cloud provider and that they have resources available.

Which of the following critical success factors would likely persuade a company to use a SaaS service? A. The elimination of company driven application maintenance and backups B. The lowering of thin client management costs C. The decrease of company-owned physical system downtime D. The increase of web presence

A. The elimination of company driven application maintenance and backups

Why do management tools introduce a risk? A. The management tools present a vendor lock-in B. The management tools are indispensible above a specific scale of operation C. The migration may not be successful D. Too many software licenses are needed

A. The management tools present a vendor lock-in

Which of the following is the difference between cloud computing and IT outsourcing? A. The service levels of cloud computing are much better. B. IT outsourcing is not based on open standards. C. Contracts with cloud providers can be changed much quicker. D. Only IT outsourcing works with external staff.

A. The service levels of cloud computing are much better.

Cloud computing can BEST reduce costs for a business by: A. Utilizing services as needed. B. Increasing available data storage. C. Utilizing local resources. D. Increasing sales potential.

A. Utilizing services as needed.

In cloud computing, the ability to scale resources on demand, benefits the business in which of the following ways? A. Allowing a third party to manage service delivery ensures lower staffing costs. B. It is more cost effective to pay for what is needed rather than pay for peak demand upfront. C. Fewer in-house servers lower the power consumption of the datacenter. D. Shorter contracts and less capital expenses reduce expenditures to the IT budget.

B. It is more cost effective to pay for what is needed rather than pay for peak demand upfront.

A software development platform is in the process of being migrated from an in-house framework to a cloud-based PaaS. Which of the following development aspects is likely to be applicable in the PaaS environment? A. PaaS providers do not allow customers with their own software development teams to write new applications on the cloud platform. B. Cloud environments only support agile development. The software development team will need to change from their waterfall SDLC methodology before migrating. C. Familiarization will be required with cloud provider-based APIs, web services, and development frameworks. D. No expected change in software development process when migrating from in-house to PaaS.

C. Familiarization will be required with cloud provider-based APIs, web services, and development frameworks.

Which of the following cloud computing risks is compliance related? A. Access rights that are handled by a cloud provider B. Capacity management that is handled by a cloud provider C. Cross-charging policies that are handled by both clients D. Provider reputation

A. Access rights that are handled by a cloud provider

A financial services company plans to move its existing CRM system into the cloud. The current system hosts 50 million customers. Which of the following steps should be done FIRST for moving this application into the cloud? A. Perform security testing of the application to ensure that there are no new security vulnerabilities being introduced. B. Perform testing to confirm that all the customer data can be mapped/migrated during the allocated change window. C. Communicate with customers that they will be moving to a new CRM system which will be hosted in the cloud. D. Perform a physical site assessment on where the application is hosted to ensure adequate controls are in place.

A. Perform security testing of the application to ensure that there are no new security vulnerabilities being introduced.

Which of the following BEST describes the properly of cloud computing that allows changes in transaction volume without major changes to the system? A. Scalability B. Reliability C. Integrity D. Availability

A. Scalability

Which of the following characteristics of cloud computing describes the ability to grow easily in response to an increase in demand? A. Hardware independence B. Scalability C. Variability D. Security

A. Scalability

A company is trying to understand the IT service management impacts of adopting cloud computing as the delivery vehicle for a new service. Which of the following lifecycle phases would be likely to see these impacts evaluated? A. Strategy B. Operation C. Design D. Transition

A. Strategy

An external cloud service provider has been chosen by a financial company to deliver some capabilities that used to be performed in-house. Which of the following would provide the BEST amount of coverage to the financial company byway of continually asserting that there is an acceptable security posture being achieved by the service provider? A. Define required security service levels, agree on security evaluation criteria, and perform regular compliance checks based on the service levels and evaluation criteria. B. Perform a penetration test every 6 to 12 months and mandate that any unacceptably high issues or risks are mitigated. C. Perform a risk assessment annually and mandate that any unacceptably high risks are mitigated. D. Ensure that the service provider aligns to an industry standard, such as ISO 27000 series or another regulatory compliance framework and request that they self-monitor annually.

A. Define required security service levels, agree on security evaluation criteria, and perform regular compliance checks based on the service levels and evaluation criteria.

A military facility is NOT able to fully embrace cloud computing because of which of the following? A. High degree of confidentiality and operational assurance B. The associates cost and infrastructure needs C. Constantly changing and unpredictable workloads D. Constantly changing data and accessibility needs

A. High degree of confidentiality and operational assurance

Which of the following only provides configurable physical hardware and network resources used to make up the cloud? A. IaaS B. SaaS C. PaaS D. CaaS

A. IaaS

Which of the following is the MOST significant difference between SaaS and IaaS? A. IaaS can test network configurations. B. SaaS is accessible anywhere. C. SaaS is used for only public clouds. D. IaaS can be secured and encrypted.

A. IaaS can test network configurations.

An organization subscribes to a public cloud. For which of the following does the subscriber NOT depend on the vendor? A. Internet bandwidth and packet latency B. Service Level Agreement C. Data backups D. Infrastructure availability

A. Internet bandwidth and packet latency

Which of the following does the server virtualization layer do? A. It allows the underling physical server hardware to be shared B. It allows the virtual machines to be dependent on each other C. It allows the virtual machines to be load balanced D. It prohibits the use of virtual machines by unauthorized users

A. It allows the underling physical server hardware to be shared

Why is standardization of data formats important? A. It facilitates movement from one provider to another. B. It helps encourage innovation. C. It leads to a more mature stage of the cloud computing landscape D. It leads to more efficient machine utilization.

A. It facilitates movement from one provider to another.

Which of the following is an essential step in the start-up process of a virtual server? A. Identify the location of the physical machine B. Select identity providers C. Select security credentials D. Select the application set that will run on it

C. Select security credentials

Which of the following is a unique characteristic of virtualization? A. Security features B. Federated identities C. Shared hardware D. Sourcing challenges

C. Shared hardware

Which of the following is a definition of virtualization? A. Virtualization is a method to organize servers in a more efficient manner to double the number of accessible users B. Virtualization is a set of techniques for hiding software resources behind hardware abstractions. C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions. D. Virtualization is a method to structure data in a more efficient manner with less cost to the user.

C. Virtualization is a set of techniques for hiding hardware resources behind software abstractions.

Cloud computing is priced according to ___________ or has ___________, rather than having upfront costs. A. recurring subscription, a yearly contract B. a yearly contract, usage-based charges C. recurring subscription, usage-based charges D. number of users, a yearly contract

C. recurring subscription, usage-based charges

Which of the following roles can the IT department play in the selection process of cloud computing providers? A. Help understand and explain the application lifecycle B. Help understand performance parameters C. Help understand provider quality D. All of the above are correct

D. All of the above are correct

In order to maintain strategic flexibility and the ability to bring a cloud system back internally, which of the following is the MOST important requirement in the contract? A. Yearly independent audit is performed to measure performance B. Cloud provider has ability to terminate contract C. One week timeframe for termination of service D. Cloud subscriber maintains ownership of their data

D. Cloud subscriber maintains ownership of their data

Which of the following confidentiality risks is introduced by cloud computing? A. Company information can be transmitted electronically B. Digitizing information makes it easier to copy C. Government regulations require data to be disclosed D. Having files stored on the servers of a cloud provider

D. Having files stored on the servers of a cloud provider

Which of the following is a benefit of implementing cloud computing via the ITIL guideline? A. Increased costs B. Larger knowledge base C. Increased free hard drive space D. Improved service level

D. Improved service level

Which of the following is an advantage of cloud computing for an organization? A. Increased security of applications and data due to virtualization B. Decreased downtime due to increased control over hosted servers C. Increased internal focus on IT when hosting with proven providers D. Increased scalability to meet usage demands

D. Increased scalability to meet usage demands

Why are traditional chargeback systems not compatible with cloud computing? A. Cloud computing is low cost and does not accommodate charge back fees B. Cloud computing can be more expensive than in-house capacity C. Licensing models can become outdated quickly D. Resources that are used can fluctuate throughout the budget cycle

D. Resources that are used can fluctuate throughout the budget cycle

How does using cloud computing help to enhance business value? A. By using cloud computing, businesses are able to realize lower asset utilization for personnel. B. By paying for actual usage, cloud computing allows businesses to convert fixed costs into variable costs. C. By using cloud computing, businesses are able to lower server utilization. D. By paying for actual usage, cloud computing allows businesses to convert variable costs into fixed costs.

B. By paying for actual usage, cloud computing allows businesses to convert fixed costs into variable costs

Why does hardware and operating system maintenance take less effort with SaaS? A. Maintenance becomes irrelevant B. Cloud provider takes care of it C. Hardware vendor takes care of it D. Operating system vendor takes care of it

B. Cloud provider takes care of it

A specific cloud deployment has been established specifically for financial services companies to consume. Which of the following BEST describes this type of cloud environment? A. Private cloud B. Community cloud C. Hybrid cloud D. Public cloud

B. Community cloud

Which of the following skills is MOST needed by the cloud vendor to communicate with the subscriber? A. Project management B. Customer service C. Industry best practices D. Visualization

B. Customer service

An existing capability is being migrated into the cloud. Capacity management issues have been noticed in the past and an exercise is being performed to calculate current and future volumes. In which of the following lifecycle phases is this likely to be performed? A. Operation B. Design C. Transition D. Strategy

B. Design

Which of the following is a reason why an IT manager understanding business cost allocations would recommend implementing a cloud infrastructure? (Select TWO). A. The cloud can be used to increase revenue. B. The cloud can be used to help cut unnecessary spending on IT. C. The cloud can be used to increase system downtime. D. The cloud can be used to reduce payroll costs of IT staff E. The cloud can be used to increase customer base.

B. The cloud can be used to help cut unnecessary spending on IT. D. The cloud can be used to reduce payroll costs of IT staff

How does cloud computing influence service operations? A. Cloud computing is more cost effective B. The provisioning of servers and services is quicker or ceases to be an issue C. The provisioning of servers and services can be much slower D. The security level will increase

B. The provisioning of servers and services is quicker or ceases to be an issue

Cloud computing has the greatest benefit for which of the following user populations? A. User populations which steadily increase in size. B. User populations that vary and are unpredictable. C. User populations that are of fixed size. D. User populations that vary in size on a seasonal basis.

B. User populations that vary and are unpredictable.

How do demand management processes change with the introduction of SaaS? A. New vendors have to be accommodated B. Users can procure SaaS solutions themselves C. The number of virtual machines can fluctuate with demand D. Maintenance will become easier

B. Users can procure SaaS solutions themselves

Which of the following is included in a compliance audit? A. Analyzing chargeback agreements B. Analyzing cloud provider Service Level Agreements (SLAs) C. Analyzing identity management and access controls D. Analyzing the provider release calendar

C. Analyzing identity management and access controls

Which of the following is a limitation of owning servers? A. Inability to deploy new services quickly B. Inability to rapidly change to a different technology C. Capital tied up in hardware that might become obsolete D. Additional resources must be hired to maintain each server

C. Capital tied up in hardware that might become obsolete

Which of the following is the difference between cloud computing and IT outsourcing? A. The service levels of cloud computing are much better. B. IT outsourcing is not based on open standards. C. Contracts with cloud providers can be changed much quicker. D. Only IT outsourcing works with external staff.

C. Contracts with cloud providers can be changed much quicker.

Which of the following is indicated by a high number of variations of different virtual servers? A. Lack of an automated provisioning process of the virtual machines B. Lack of automation of virtual machine image manufacturing C. Lack of manpower to monitor the virtual machines D. Lack of physical servers to accommodate the different virtual servers

B. Lack of automation of virtual machine image manufacturing

Which of the following risk results if cloud computing providers limit their Service Level Agreement (SLA) liabilities? A. Compliance risk B. Legal risk C. Privacy risk D. Security risk

B. Legal risk

Which of the following would be considered in a private cloud? A. Organizational direct attached storage B. Organizational SAN C. Vendor leased co-hosted storage D. Encrypted shared drive

B. Organizational SAN

Which of the following is MOST typically accessed through Web services? A. IaaS B. PaaS C. SaaS D. None of the above

B. PaaS

Why does request fulfillment become more complicated in a cloud environment? A. All processes must become automated. B. Processes must be redesigned with the user experience in mind. C. The IT service team must be expanded. D. Users should be aware of the benefits before changes to the process are incorporated

B. Processes must be redesigned with the user experience in mind.

Google Apps is a set of online applications allowing users to create and share documents and spreadsheets. This is an example of: A. PaaS B. SaaS. C. IaaS. D. None of the above.

B. SaaS.

Which of the following cloud service characteristics would impact how a current application will adapt in the future according to how quickly a business will grow? A. Time to market B. Scalability C. Hardware independence D. Security

B. Scalability

Which of the following is an advantage of cloud computing that can enhance business value? A. Hardware dependence B. Scalability C. Fixed costs D. Security

B. Scalability

Which of the following early examples of cloud computing was used for software engineering purposes in the form of web-based applications and required interoperability between different systems? A. Distributed Computing B. Service-Oriented Architecture (SOA) C. Virtual Private Networks (VPNs) D. Desktop Virtualization

B. Service-Oriented Architecture (SOA)

Which of the following is the risk when an IT department restricts itself to solely being an infrastructure provider? A. Business users will bypass the IT department B. Cloud providers will take over the role of the IT department C. Service providers will bypass the IT department D. All of the above are correct

Business users will bypass the IT department

QUESTION 16 How does cloud computing improve business flexibility? A. Easier access by users outside of the organization B. Faster deployment of applications C. Rapidly growing and shrinking capacity D. All of the above are correct

D. All of the above are correct

Amazon Elastic Cloud Computing (EC2) is a facility for quickly providing virtual servers. This is an example of: A. SaaS B. IaaS C. PaaS D. QoS.

B. IaaS

Who is responsible for granting access to a user in federated identity management? A. Identity provider B. Relying party C. SaaS provider D. User

B. Relying party

Which of the following companies would BEST benefit from moving to a cloud service? A. A retail company that has a history of peaks and troughs throughout the year with its online shopping application. B. A family business that does not have any IT applications, but runs off manual processes and good customer service. C. A financial services company that is having a number of security issues with its customer internet banking platform. D. An insurance company that has a mature, low cost and efficient IT infrastructure that does not have significant change.

A. A retail company that has a history of peaks and troughs throughout the year with its online shopping application.

Which of the following can influence the monthly service fee Company A pays for Company B to host their cloud, such that Company A might pay more per month as their company grows? A. Amount of data stored B. Connectivity speed C. Confidentiality of the data D. Uptime requirements

A. Amount of data stored

Which of the following are the appropriate steps to migrating a backwards compatible application into the cloud? A. Assess, proof of concept, migrate data, migrate application, automation/scaling, and optimizing B. Migrate the data and rebuild the application using APIs C. Purchase service from cloud provider, migrate the user accounts, and disable the internal infrastructure D. Decommission the internal infrastructure, purchase service from the cloud provider, and enable for business users

A. Assess, proof of concept, migrate data, migrate application, automation/scaling, and optimizing

Which of the following is a benefit of cloud computing? A. Cloud computing delivers IT capabilities that scale with demand. B. Cloud computing delivers a wide range of services that are easily accessible to users C. Cloud computing delivers IT capacity on demand. D. Cloud computing negates the need for a procurement department.

A. Cloud computing delivers IT capabilities that scale with demand.

In which of the following ways do IT outsourcing and cloud computing differ? A. Cloud computing services are typically much more scalable. B. Cloud computing is much cheaper. C. Hardware and software assets are typically customizable. D. IT outsourcing promotes innovation.

A. Cloud computing services are typically much more scalable.

A company is implementing a system replacement which has application components that are internally hosted and multiple application components that are hosted as software as a service by different cloud providers. Which of the following represents the challenge of this architecture? A. Complexity B. Time to market C. Cost saving D. Elasticity

A. Complexity

Which of the following would be a method to ensure ongoing benefits of a cloud agreement? A. Confirm a continual assurance framework is in place to measure the cloud provider's performance in line with organizational objectives. B. Have independent security testing performed against the cloud provider to ensure that the business's customer data is safe. C. Ask the cloud provider to lower the cost before each contractual renewal so that the business is obtaining value for money. D. Have independent stress and volume testing performed against the cloud provider to measure the availability SLA.

A. Confirm a continual assurance framework is in place to measure the cloud provider's performance in line with organizational objectives.

Which of the following risks occurs when a cloud provider stops serving the company? A. Continuity risk B. Financial risk C. Legal risk D. Confidentiality risk

A. Continuity risk

Which of the following aspects of public cloud computing would a company MOST likely need to consider to ensure information security? A. Data integrity B. Server type C. Firewall specifications D. Network hardware

A. Data integrity

Which of the following assets have risks related to a cloud provider going out of business? A. Data stored at the provider B. Cloud management tools housed at the provider C. Investment in servers at the provider D. Machine capacity at the provider

A. Data stored at the provider

Which of the following questions should be considered BEFORE selecting a cloud computing vendor? A. What cloud computing product will fit the business need? B. What is the vendor policy on telecommuting? C. What is the timeline for transition to the vendor? D. What is the datacenter's power consumption?

A. What cloud computing product will fit the business need?

Which of the following is true when mitigating risks in a cloud environment while avoiding impact to performance? A. When securing cloud resources, only the most sensitive data should be secured. B. When securing cloud resources, it is always a best practice to encrypt all data stored in the cloud. C. When securing cloud resources, data security is not an issue. D. When securing cloud resources, it is always a best practice to use the strongest security on the most sensitive data.

A. When securing cloud resources, only the most sensitive data should be secured.

An organization requires that it federates its internal systems and their externally hosted SaaS finance system so a user does not have to re-authenticate. This is an example of which of the following? A. Open authentication B. Single sign-on C. Biometric scanning D. Multifactor authentication

B. Single sign-on

A university has migrated several services from their internal infrastructure to a third-party cloud provider. Which of the following is MOST important to the university in order to ensure an appropriate security posture? A. Regular patching applied by the university B. Governance and oversight by the cloud provider C. Antivirus checks performed by the cloud provider D. SLA and metrics requested by the cloud provider

B. Governance and oversight by the cloud provider

Why does cloud computing shift capital cost to variable cost? A. Cloud computing is more cost-efficient B. IT assets are not owned by the customer C. Servers are better utilized D. Staff is no longer hired by the customer

B. IT assets are not owned by the customer

Which of the following cloud services would be used to rent hardware, computing and network space, and storage over the Internet? A. SaaS B. IaaS C. PaaS D. XaaS

B. IaaS

Which of the following is a relevant component of the cloud ecosystem? A. Hypervisors B. Image factory C. Security procedures D. Trained IT staff

B. Image factory

Which of the following is the business benefit of private PaaS? A. Improve the reuse of internal databases in an organization. B. Improve the speed of the internal development and deployment processes. C. Reduce cost and reliance on internal technical skills. D. Simplify interfaces for specific user groups.

B. Improve the speed of the internal development and deployment processes.

Synchronization of updates is ___________ than replicating data across locations because it gives better assurance that data is always ___________ everywhere. A. better, secure B. better, up to date C. worse, secure D. worse, up to date

B. better, up to date

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources. A. commercial B. financial C. legal D. service

B. financial

Private clouds are operated solely for _______________ organization(s) A. governmental B. specific C. for-profit D. multiple

B. specific

Which of the following statements represents the correct definition of the terms 'cost allocation' and 'chargeback'? A. 'Cost allocation' focuses on recovering costs from consumers of cloud-delivered services whereas 'chargeback' relates to identifying costs and assigning them to specific cost categories. B. 'Cost allocation' and 'chargeback' are synonymous terms that relate to allocating costs of cloud services and ensuring that billing occurs for the services being delivered. C. 'Cost allocation' relates to identifying costs and assigning them to specific cost categories. 'Chargeback' is focused on recovering costs from consumers of the cloud-delivered services. D. 'Cost allocation' and 'chargeback' relate to ensuring that cloud computing delivery services are a profit center instead of a cost center. This leads to a positive return on investment for both cloud provider and cloud consumer.

C. 'Cost allocation' relates to identifying costs and assigning them to specific cost categories. 'Chargeback' is focused on recovering costs from consumers of the cloud-delivered services.

An organization has just gone to a start-up cloud provider for its entire infrastructure. Which of the following is one of the new organizational roles required at the cloud provider? A. Supply manager B. Commercial manager C. Infrastructure project manager D. Credit risk manager

C. Infrastructure project manager

Which of the following is a drawback of direct cost when implementing cloud computing? A. It cannot be applied to IaaS. B. It is complex. C. It is less accurate. D. It only works with SaaS.

C. It is less accurate.

Which of the following risks are associated with using a customized proprietary cloud application? A. Simplified continuity of operation and disaster recovery plan B. Lack of internal control over function and design of applications C. Locking into the cloud provider and increasing costs over the long term D. Reassignment of roles and responsibilities would be necessary

C. Locking into the cloud provider and increasing costs over the long term

Which of the following is the MOST complex security provisioning problem in a cloud environment? A. Handling credit cards for purchasing cloud services B. Keeping track of cloud provider performance C. Managing users and their rights across multiple providers D. Software assets that are introduced and can expire

C. Managing users and their rights across multiple providers

When an organization moves to a cloud service for IaaS the cost model changes. Which of the following illustrates that cost model? A. Move from an ongoing OPEX model for infrastructure to an ongoing service charge for the life of the infrastructure B. Move from a depreciation model of infrastructure to a leasing model of infrastructure with bundled support and maintenance. C. Move from a CAPEX model for infrastructure to an ongoing OPEX charge with bundled support and ongoing maintenance. D. Move from an OPEX model for infrastructure to an ongoing CAPEX charge with bundled support and ongoing maintenance.

C. Move from a CAPEX model for infrastructure to an ongoing OPEX charge with bundled support and ongoing maintenance.

Web hosting is a service that enables customers to deploy a website quickly. This is an example of: A. IaaS. B. SaaS C. PaaS. D. On-demand software. E. None of the above.

C. PaaS.

Which IT process is likely to take more effort with cloud computing? A. Hardware maintenance B. Installing operating system patches C. Performance monitoring D. Server maintenance

C. Performance monitoring

Which of the following services represents an environment where the computing architecture is providing a hosted service to a limited group inside a corporate firewall? A. Public Cloud B. VLAN C. Private Cloud D. VPN

C. Private Cloud

Which of the following business benefits do cloud computing and IT outsourcing have in common? A. Clarity and budgeting ease of upfront costs B. Improvement of employee skills sets C. Reduction of capital expenditures D. Flexible contracts

C. Reduction of capital expenditures

Which of the following is an effect of cloud computing on application development? A. SaaS allows for open-source application development. B. SaaS delays the time to market for most applications. C. SaaS inhibits vendor interoperability on application platforms. D. SaaS allows for a shorter time to market for some applications.

C. SaaS inhibits vendor interoperability on application platforms.

In which of the following scenarios would a hybrid cloud be the BEST choice for an organization to use? A. A security organization that performs a large percentage of penetration testing. B. A financial organization that must keep all data under their control. C. A retail organization that needs to maintain all processing in their own datacenter. D. A large development firm that creates applications for the customer to host on their cloud.

D. A large development firm that creates applications for the customer to host on their cloud.

Which of the following is BEST used when setting up security for services being used within a public cloud? A. LDAP B. SFTP C. SNMP D. SSL

D. SSL

A company decides to subscribe to a new CRM product that will help improve their business processes. Which of the following types of cloud computing would MOST likely be implemented? A. PaaS B. XaaS C. IaaS D. SaaS

D. SaaS

Which of the following processes needs to be changed to better handle Change Management in the cloud? A. Financial chargeback B. Security management C. Hardware maintenance D. Software distribution

D. Software distribution

Which of the following is an example of a cloud-related security risk? A. Losing network connectivity B. Not having enough software licenses C. Not knowing what the cloud provider will charge D. Storing customer data at a provider

D. Storing customer data at a provider

Which of the following is an important factor for maintaining strategic flexibility? A. Return on investment B. Integrity C. Elasticity D. Vendor lock-in

D. Vendor lock-in

Which change in the security processes is introduced by cloud computing? A. Increased security of accessing credit card information B. Regulations need to be updated more frequently C. Storing passwords in the Configuration Management Database (CMDB) D. Working with multiple providers of user identities

D. Working with multiple providers of user identities


Related study sets

Social change, Social movements, and Collective Behavior

View Set

Mechanics of Materials Chapters 1-5 Exam Review

View Set

Cardiac conduction and rhythm prepU

View Set

Developmental Psychology Chapter 1

View Set

Chapter 3: Gene Expression (Transcription), Synthesis of Proteins (Translation), and Regulation of Gene Expression

View Set