Cloud Technology Concepts v6.0 (C90.02)

Page:    1 / 6   
Total 86 questions

It is possible to make ten virtual servers available via two physical servers. Select the correct answer.

  • A. True
  • B. False


Answer : A

Cloud computing is a specialized form of ___________________ computing based on
___________________ access to IT resources. Select the correct answer.

  • A. legacy, local
  • B. batch, remote
  • C. distributed, remote
  • D. centralized, local


Answer : C

The resource replication mechanism can encompass a hypervisor that can support the multitenancy cloud characteristic. Select the correct answer.

  • A. True
  • B. False


Answer : A

When a pay-for-use mechanism is in place, a denial of service attack can target IT resources leased to a specific cloud consumer, resulting in the cloud consumer being charged for the extra usage. Select the correct answer.

  • A. True
  • B. False


Answer : A

__________________ represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers, and is therefore directly related to the
__________________ mechanism. Select the correct answer.

  • A. Replicated usage, cloud monitor
  • B. Measured usage, pay-for-use monitor
  • C. Agent usage, on-premise monitor
  • D. None of the above.


Answer : B

In a cloud balancing environment, routing criteria can be based on which of the following factors? Select the correct answer.

  • A. load balancing of cloud-based IT resources
  • B. on-premise service usage
  • C. cloud bursting thresholds
  • D. None of the above. Cloud bursting does not utilize routing logic.


Answer : A

Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server
B. Both virtual servers are hosted by the same physical server and the trust boundaries of
Cloud Services A and B overlap. A cloud service consumer successfully uses Cloud
Service A to gain access to the underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud security threat? Select the correct answer.

  • A. denial of service
  • B. insufficient authorization
  • C. weak authorization
  • D. None of the above.


Answer : D

Which of the following cloud computing mechanisms are directly associated with the realization of the elasticity cloud characteristic? SELECT ALL THAT APPLY

  • A. virtual server
  • B. automated scaling listener
  • C. resource replication
  • D. pay-for-use monitor


Answer : A,B,C,D

Which of the following security threats is classified as a data-oriented threat? Select the correct answer.

  • A. insufficient authorization
  • B. malicious intermediary
  • C. overlapping trust boundary
  • D. virtualization attack


Answer : B

Which of the following security mechanisms enables one cloud service consumer to be authenticated by a security broker, so that its security context is persisted when accessing other cloud services? Select the correct answer.

  • A. digital certificates
  • B. certificate authority
  • C. single sign-on
  • D. None of the above.


Answer : C

Cloud services can be built as components because Web-based communication is not an essential requirement for an IT resource to be considered cloud-based. Select the correct answer.

  • A. True
  • B. False


Answer : A

Two redundantly deployed cloud services need to be configured so that they are kept in sync with each other. Which of the following roles would be most suitable for this task?
Select the correct answer.

  • A. cloud service consumer
  • B. cloud service owner
  • C. cloud resource administrator
  • D. None of the above.


Answer : C

Which of the following statements are true about the failover system mechanism? SELECT

ALL THAT APPLY -

  • A. A failover system can only be used for legacy batch programs.
  • B. A failover system cannot span over more than one geographical region.
  • C. A failover system can be used to make redundant implementations of the same cloud service.
  • D. A failover system can be used to avoid introducing cloud services as single points of failure.


Answer : C,D

Which of the following cloud computing mechanisms can exist as a service agent that monitors and keeps track of communication between cloud service consumers and cloud services for load balancing purposes? Select the correct answer.

  • A. multi-device broker
  • B. pay-for-use monitor
  • C. resource replicator
  • D. automated scaling listener


Answer : D

Which of the following characteristics of cloud-based IT resources are difficult to fully test on Software-as-a-Service (SaaS) implementations? SELECT ALL THAT APPLY

  • A. availability
  • B. confidentiality
  • C. reliability
  • D. performance


Answer : A,C

Page:    1 / 6   
Total 86 questions