Which of the following statements accurately describes the level of administrative control a cloud provider has over an environment (residing in the cloud provider's cloud platform) based on the Infrastructure-as-a-Service (IaaS) delivery model? Select the correct answer.
Answer : A
Which of the following are technology innovations that contributed to the emergence of cloud computing? Select the correct answer.
Answer : D
The expense required by an organization to run and maintain its IT resources is the
___________________.Select the correct answer.
Answer : C
An IT resource with increased __________________ is available for longer periods of time.
Cloud providers generally offer resilient IT resources for which they are able to guarantee high levels of _________________.Select the correct answer.
Answer : A
Which of the following statements are true about cloud-based IT resources? Select ALL
THAT APPLY -
Answer : A,B
____________________ represents the ability for a cloud-based IT resource to be widely accessible. Select the correct answer.
Answer : C
A service must be Web-based for it to be considered a cloud service. Select the correct answer.
Answer : B
Each cloud has a specific level of reliability and availability that it guarantees for a given cloud service. By spanning a failover system across separate clouds, the overall levels of reliability and availability will be higher than the maximum levels of reliability and availability of either cloud. Select the correct answer.
Answer : A
The challenge of Limited Portability Between Cloud Providers can be mitigated if cloud consumers can build solutions based on industry standards and if cloud providers support these industry standards. Select the correct answer.
Answer : A
Within cloud computing, resiliency refers to redundant IT resources within the same cloud
(but in different physical locations) or across multiple clouds. Select the correct answer.
Answer : A
The ____________________ boundary represents the physical perimeter that surrounds a set of IT resources owned by a specific organization. The ___________________ boundary establishes a logical perimeter wherein IT resources are trusted from a security perspective. To use cloud-based IT resources, the cloud consumer will generally need to trust them with the result that the cloud consumer's ___________________ boundary is expanded beyond its ___________________ boundary to encompass the cloud-based IT resources. Select the correct answer.
Answer : C
A ___________________ is an event-driven program capable of transparently intercepting and processing messages sent to or from services. Select the correct answer.
Answer : C
Which of the following can exist as cloud-based IT resources? Select ALL THAT APPLY
Answer : A,B,C,D
The cloud consumers that are members of a community cloud typically share the responsibility for defining and evolving the community cloud. Therefore, membership in the community guarantees access to and administrative control of all cloud-hosted IT resources. Select the correct answer.
Answer : B