SOA C90.03 - Cloud Technology Lab Exam
Page: 2 / 5
Total 21 questions
Question #6 (Topic: )
Cloud Provider X has deployed a virtualization environment in Cloud X comprised of
Physical Server A hosting Virtual Servers A and B. Cloud Provider X implements Cloud
Service A on Virtual Server A and makes it available to Cloud Service Consumer A, which
interacts with Cloud Service A by sending and receiving messages (1, 2).
Cloud Provider Y has deployed a virtualization environment comprised of Physical Server B
hosting Virtual Servers C and D. Virtual Server C is made available to Cloud Service
Consumer B, which interacts with Virtual Server C (3,4) in order to prepare for the
deployment of a new cloud service that will be used internally by Cloud Provider Y to
process data obtained from Cloud Service A
[SOA-C90.03-6.0/SOA-C90.03-10_2.png]
Cloud Consumer Z and Cloud Provider X belong to the same organization. Cloud Provider
Y is a third-party organization. Which of the following statements provides a valid scenario
that accurately describes the involvement of cloud deployment models, cloud delivery
models, roles and/or boundaries? (Note that the correct answer represents one of multiple
valid scenarios that can exist.)
Physical Server A hosting Virtual Servers A and B. Cloud Provider X implements Cloud
Service A on Virtual Server A and makes it available to Cloud Service Consumer A, which
interacts with Cloud Service A by sending and receiving messages (1, 2).
Cloud Provider Y has deployed a virtualization environment comprised of Physical Server B
hosting Virtual Servers C and D. Virtual Server C is made available to Cloud Service
Consumer B, which interacts with Virtual Server C (3,4) in order to prepare for the
deployment of a new cloud service that will be used internally by Cloud Provider Y to
process data obtained from Cloud Service A
[SOA-C90.03-6.0/SOA-C90.03-10_2.png]
Cloud Consumer Z and Cloud Provider X belong to the same organization. Cloud Provider
Y is a third-party organization. Which of the following statements provides a valid scenario
that accurately describes the involvement of cloud deployment models, cloud delivery
models, roles and/or boundaries? (Note that the correct answer represents one of multiple
valid scenarios that can exist.)
A. Cloud X is based on the private cloud deployment model. Cloud Service A is based on the SaaS delivery model. Cloud Y is based on the private cloud deployment model. Virtual Server C is being offered as part of the IaaS delivery model. A cloud resource administrator working for Cloud Consumer Z uses Cloud Service Consumer B to access Virtual Server C. Cloud Consumer Z is the cloud service owner of Cloud Service A. Cloud Consumer T s organizational boundary encompasses Cloud Service Consumers A an
B. Cloud X is based on the private cloud deployment model. Cloud Service A is based on the SaaS delivery model. Cloud Y is based on the community cloud deployment model. Virtual Server C is being offered as part of the IaaS delivery model. A cloud resource administrator working for Cloud Consumer Z uses Cloud Service Consumer A to access Cloud Service A. Cloud Consumer T s organizational and trust boundaries encompass Cloud Service Consumers A and B, Cloud Service A and Virtual Server C.
C. Cloud X is based on the private cloud deployment model. Cloud Service A is based on the SaaS delivery model. Cloud Y is based on the public cloud deployment model. Virtual Server C is being offered as part of the IaaS delivery model. A cloud resource administrator working for Cloud Consumer Z uses Cloud Service Consumer B to access Virtual Server C. Cloud Consumer Z is the cloud service owner of Cloud Service A. Cloud Consumer Z's organizational boundary encompasses Cloud Service Consumers A and
D. Cloud X is based on the private cloud deployment model. Cloud Service A is based on the SaaS delivery model. Cloud Y is based on the public cloud deployment model. Virtual Server C is being offered as part of the IaaS delivery model. A cloud resource administrator working for Cloud Consumer Z uses Cloud Service Consumer B to access Virtual Server C. Cloud Consumer Z' s trust boundary encompasses Cloud Service Consumers A and B, Cloud Service A and Virtual Server C. The organization that owns Clo
Answer: D
Question #7 (Topic: )
Cloud Consumer A (the organization that owns Cloud Service Consumer A) needs regular
access to an external, cloud-based Weather Service that provides up-to-date weather
forecast information. Cloud Providers X, Y and Z are competing public cloud providers,
each offering a Weather Service with the features required by Cloud Consumer A.
[SOA-C90.03-6.0/SOA-C90.03-12_2.png]
[SOA-C90.03-6.0/SOA-C90.03-12_3.png]
Based on the provided statistics, which cloud provider can offer a Weather Service with the
least amount of projected downtime?
access to an external, cloud-based Weather Service that provides up-to-date weather
forecast information. Cloud Providers X, Y and Z are competing public cloud providers,
each offering a Weather Service with the features required by Cloud Consumer A.
[SOA-C90.03-6.0/SOA-C90.03-12_2.png]
[SOA-C90.03-6.0/SOA-C90.03-12_3.png]
Based on the provided statistics, which cloud provider can offer a Weather Service with the
least amount of projected downtime?
A. Cloud Provider X
B. Cloud Provider Y
C. Cloud Provider Z
D. Any of the three cloud providers, because their availability ratings are identical.
Answer: A
Question #8 (Topic: )
Organization A has been expanding and, as a result, is outgrowing the processing capacity
of its on-premise Service A implementation. It is determined that this is due to usage
of its on-premise Service A implementation. It is determined that this is due to usage
A. A failover system can be implemented in a hybrid architecture comprised of Organization A's existing on-premise environment and a public cloud environment. The failover system would span both environments so that when Service A is unable to process request messages from Service Consumers A, B or C, the failover system can automatically route messages to a redundant implementation of Service A residing in the public cloud. Similarly, when Database A is unable to process a data access request from
B. The state management database and resource replication mechanisms can be implemented to establish redundant implementations of Service A and Database A in both on-premise and cloud environments. Using resource replication, a cloud-based duplicate of Service A (Cloud Service A) will be established in a public cloud and will remain in synch with Service A via regular replication cycles. Using the resource replication mechanism together with the state management database mechanism allows for Databa
C. A cloud bursting solution can be implemented, whereby a redundant copy of Service A is implemented within a public cloud. This cloud-based, redundant implementation of Service A is referred to as Cloud Service A. A copy of Database A is also implemented within the cloud and both the on-premise and cloud-based copies of Database A are redesigned to be nonrelational in order to improve data access performance. Service A continues to act as a first point of contact for Service Consumers A, B and C.
D. None of the above
Answer: C
Question #9 (Topic: )
Cloud Provider X (which owns Cloud X) deploys two physical servers (Physical Servers A
and B) and two databases (Databases A and B). Virtual Servers A and B are hosted by
Physical Server A and Ready-Made Environments A and B are hosted by Virtual Server B.
Virtual Servers C and D are hosted by Physical Server B. Cloud Service Consumer A
regularly accesses Virtual Server D in order to test and deploy a new cloud service that
was developed on-premise by the cloud consumer organization operating Cloud Service
and B) and two databases (Databases A and B). Virtual Servers A and B are hosted by
Physical Server A and Ready-Made Environments A and B are hosted by Virtual Server B.
Virtual Servers C and D are hosted by Physical Server B. Cloud Service Consumer A
regularly accesses Virtual Server D in order to test and deploy a new cloud service that
was developed on-premise by the cloud consumer organization operating Cloud Service
A. Cloud Service Consumer A is using the IaaS delivery model. Cloud Service Consumer B is using the SaaS delivery model. Customers of the cloud services will be using the PaaS delivery model. The encryption mechanism can be implemented to mitigate the denial of service, insufficient authorization and overlapping trust boundaries security threats.
B. Cloud Provider X is providing a hybrid delivery model comprised of a combination of the IaaS and PaaS delivery models, which means that Cloud Service Consumers A and B are using both the IaaS and PaaS delivery models. Customers of the cloud services will be using the PaaS delivery model. The single sign-on mechanism can be implemented to mitigate the denial of service and insufficient authorization security threats. The encryption mechanisms can be implemented to mitigate the overlapping trust b
C. Cloud Service Consumer A is using the IaaS delivery model. Cloud Service Consumer B is using the PaaS delivery model. Customers of the cloud services will be using the SaaS delivery model. An identity and access management mechanism can be implemented to mitigate the denial of service, insufficient authorization and overlapping trust boundaries security challenges.
D. Cloud Service Consumer A is using the IaaS delivery model. Cloud Service Consumer B is using the PaaS delivery model. Customers of the cloud services will be using the SaaS delivery model. The digital signatures mechanism can be implemented to mitigate the denial of service, insufficient authorization and overlapping trust boundaries security challenges.
Answer: C
Question #10 (Topic: )
Cloud Provider Y owns Cloud Y, which provides a set of cloud services, virtual servers and
one physical server. Cloud Services A and B are hosted on Virtual Server A, which is
one physical server. Cloud Services A and B are hosted on Virtual Server A, which is
A. Cloud Provider Y can implement the identity and access management mechanism to mitigate denial of service attacks and can further implement the failover system mechanism (by introducing a redundant physical server with redundant virtual servers) so that when an attack is successful on a given virtual server, a redundant virtual server can take its place.
B. Cloud Provider Y can move Cloud Service B to Virtual Server A, thereby positioning Virtual Server B as a redundant fallback server used when Virtual Server A is successfully attacked. Similarly, Cloud Provider Yean move Cloud Service A to Virtual Server B, so that Virtual Server A acts as a redundant fallback server for when Virtual Server B is successfully attacked.
C. Cloud Provider Y can implement a cloud bursting system, whereby Cloud Service A on Virtual Server B automatically takes the place of Cloud Service A on Virtual Server A when that service fails. Similarly, Cloud Service B on Virtual Server A can then automatically take the place of Cloud Service B on Virtual Server A when that service fails.
D. Cloud Provider Y can introduce a single sign-on mechanism for Virtual Server A to mitigate denial of service threats. The automated scaling listener can then be implemented on Virtual Server B in order to limit the number of instances of Cloud Services A and B. This will prevent Virtual Server B from overloading due to denial of service attacks.
Answer: A