Filters
Question type

Study Flashcards

Point out the correct statement.


A) different types of cloud computing service models provide different levels of security services
B) adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C) data should be transferred and stored in an encrypted format for security purpose
D) all of the mentioned

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Request field is present in which message format?


A) request message
B) response message
C) both request and response
D) neither request nor response

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a core management feature offered by most cloud management service products?


A) support of different cloud types
B) creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C) performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D) all of the mentioned

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

D

Process that prevents someone from denying that she accessed resource


A) accounting
B) non-repudiation
C) sniffing
D) authorisation

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is an industry organization that develops industry system management standards for platform interoperability?


A) dmtf
B) dms
C) ebs
D) all of the mentioned

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following makes sure that data is not changed when it not supposed to be?


A) integrity
B) availability
C) confidentiality
D) accounting

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Point out the wrong statement.


A) you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B) any distributed application has a much greater attack surface than an application that is closely held on a local area network
C) cloud computing doesn't have vulnerabilities associated with internet applications
D) all of the mentioned

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?


A) cce
B) occi
C) smi
D) all of the mentioned

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is considered an essential element in cloud computing by CSA?


A) multi-tenancy
B) identity and access management
C) virtualization
D) all of the mentioned

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A

__________is an application for collecting messages sent in RSS and Atom format from information providers.


A) google reader
B) yahoo mail
C) emailrackspace
D) all of the mentioned

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following application is a newsreader?


A) google reader
B) bloglines
C) newsgator online
D) all of the mentioned

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

D

Point out the correct statement.


A) different types of cloud computing service models provide different levels of security services
B) adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C) data should be transferred and stored in an encrypted format for security purpose
D) all of the mentioned

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?


A) atomicity
B) consistency
C) isolation
D) durability

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The control in SCADA is


A) online control
B) direct control
C) supervisory control
D) automatic control

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is a compliance standard?


A) pci-dss
B) hippa
C) glba
D) all of the mentioned

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is application and infrastructure management software for hybrid multi-clouds?


A) vmware hyperic
B) webmetrics
C) univa ud
D) tapinsystems

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which layer is CoAP?


A) control layer
B) transport layer
C) service layer
D) application layer

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following area of cloud computing is uniquely troublesome?


A) auditing
B) data integrity
C) e-discovery for legal compliance
D) all of the mentioned

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

CoAP is specialized for


A) internet applications
B) device applications
C) wireless applications
D) wired applications

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?


A) cas
B) csa
C) sac
D) all of the mentioned

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 75

Related Exams

Show Answer