This is a timed quiz.
You have 1 hour to complete the 97 questions in this quiz.
Click the button below to start the quiz.
With cloud computing services, the hardware purchases, software purchases, and IT support are the responsibility of whom? -
Internet service provider
Application service provider
Which term best describes the ability to rapidly increase user accounts for a given cloud service?
Which option describes a benefit of virtualized servers?
Individual hardware per virtual server
Physical servers taking less room space than virtual servers
Virtual servers taking less disk space than physical servers
Your company runs a virtualized web application server in-house. You decide to make the web applications available over the Internet through a cloud provider. Which method represents the quickest way to accomplish this?
Create a new cloud server, install web services, and install and configure web applications.
Create a new cloud server, install web services, and import web application data.
Migrate your in-house web application server to the cloud.
This cannot be done — only generic applications are available through the cloud.
Which term from the past describes the sharing of mainframe computing resources?
Time division multiplexing
Purchasing software and providing it to a third party that installs and manages that software is an example of which of the following?
Platform as a service
You are the IT director for a retail clothing outlet. Your competitors are using Internet-delivered inventory, storage, and backup solutions from a specific provider. You conclude it is best that your company use the same services from the same provider. What type of cloud will you be subscribing to?
For which businesses would cloud computing be best suited? (Choose two.)
Waterfront marketplace that thrives during the summer tourist season
Rural medical practice with four employees
Law enforcement agency
A new company start-up that manufactures watercraft
Which of the following are valid reasons for a firm's not adopting a cloud solution? (Choose two.)
Local hardware is being fully utilized for unchanging IT workloads.
The number of employees rarely changes.
The number of employees changes often.
The firm experiences unpredictable project spikes throughout the year.
As a developer for a software company, you have decided to build and test your web applications in a cloud environment. Which type of cloud service best meets your needs?
How are cloud computing and outsourcing similar?
Long contract renegotiation
Tailor-made client solutions
Which of the following is a benefit of outsourcing?
True or false? Cloud computing is a form of outsourcing.
What cloud computing characteristic ensures services and data are always reachable?
You must ensure that your business computing resources can quickly grow as business demands change. Which of the following allows this?
[Blank] protects data contents, while [blank] ensures that data has not been tampered with.
Which of the following are related to cloud computing costs? (Choose two.)
Server hardware costs
Software licensing costs
How does cloud computing help an organization as new opportunities arise? (Choose two.)
Shifting operating expenses to capital expenses
Speedy addition of computing resources
Less cost for new server hardware
Speedy removal of computing resources
[Blank] and [blank] give cloud customers a competitive advantage.
Time to market, collaboration
Which of the following statements are true? (Choose two.)
Public clouds are for the exclusive use of a single organization.
Private clouds are for the exclusive use of a single organization
Public clouds are offered over an intranet.
Public clouds are offered over the Internet.
True or false? Virtual servers are used only in public clouds.
When creating cloud virtual servers, which of the following must be specified? (Choose two.)
Username and password
Operating system licensing
You are linking your company’s Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company?
Relying party trust
Your public cloud environment is configured such that additional cloud storage is allocated to a virtual server when the used disk space on that server reaches more than 80 percent of disk capacity. Which term best describes this configuration?
Which of the following might factor into an exit strategy for a cloud customer?
Which of the following is not considered a cloud computing risk?
Loss of network connectivity
Data stored in the cloud
What is a benefit of PaaS?
Rapid application development
Developers build these components in the cloud.
Federation identity providers
Cloud load balancers
SaaS user mailboxes
Which component is a set of programming instructions and standards for accessing a web based program?
Identify the client that uses a web browser as an interface to connect to the cloud.
Which model facilitates sharing of a complex computational task across multiple computers?
Peer to Peer
All applications accessed through the Internet are cloud applications.
What are the benefits of DBaas? (Choose Three)
Higher availability of resources
Distributed computing helps to perform data intrusive tasks for applications.
What are the business drivers of cloud computing? (Choose three.)
Increased time to market
Cost efficiency maximization
Accommodation of unpredictable demand
SaaS provides services to an organization that requires the standard business process infrastructure such as CRM.
Which type of scaling involves the addition of additional processors, RAM, or disk space to a server?
Scalability provides a flexible infrastructure architecture to software organizations.
What are the major security concerns with regard to cloud computing? (Choose three.)
Cloud security is deployed to protect data, applications, and the infrastructure of cloud computing.
At which level does an organization benefit through the availability of elastic computing resources and pay-per-use models of cloud computing?
Business Model Innovation
What are the elements of an organization that are deployed at the Utility level? (Choose three.)
When costs are being shared among fewer users, public cloud computing is a more expensive venture.
What are the essential components of a cloud network? (Choose three.)
Network node latency can be reduced by using optimized fabric.
What are the key benefits of cloud automation? (Choose three.)
Optimal utilization of the cloud resources
Minimal cost incurred for maintenance (power consumption)
High operating costs
Adherence to compliance standards for data security.
User authentication is the basic attribute of self-service.
The use of pseudonyms is not encouraged in user identity management systems of a federated cloud environment because it is a breach of trust.
What are the chief characteristics of the Cloud Gateway? (Choose three.)
Provisioning of network resources
Interoperability in federated cloud reduces the need for vendor lock-in.
What are the various standards adopted by the service providers to ensure the security of data in a federated cloud environment? (Choose three.)
Cloud Security Alliance
The Green Grid
Cloud Computing interoperability forum
Identify the challenges involved in cloud service backup. (Choose three.)
In cloud computing, there is a trade-off between reliability and the speed of deployment.
Identify the challenges involved in performance of cloud applications. (Choose three.)
Monitoring operating systems
Identify the benefits of cloud databases. (Choose three.)
Identify the challenges involved in data integration. (Choose three.)
Speed of change
Identify the challenges involved in migrating data to the could. (Choose three.)
Identify the challenges involved in implementing cloud security. (Choose three.)
Sharing of resources
Loss of control
PCI is not a specific set of auditing standards; instead, cloud providers are responsible for choosing their own controls and the goals of those controls intend to achieve.
The traditional architecture is designed to balance heavy workload in the cloud.
Identify the architecture that splits the workload over multiple servers to improve processing power.
Identify the feature that helps you determine the level of service provided by the cloud vendor.
What is the first step involved in the vendor selection process?
Drawing an outline with the critical criteria that determines the desired cloud vendor.
Analyzing the organization
Comparing cloud vendors based on the selected criteria
Finalizing the cloud vendor.
Identify the activities that help you determine cloud readiness. (Choose three.)
Optimize the current environment by providing an internal set of cloud services and enabling the incorporation of external services.
Draft the Service level Agreement (SLA).
Designate a cross-functional team to monitor cloud services.
Undertake pilot projects with various services.
What are the tasks involved in drafting a plan for cloud migration? (Choose three.)
Run "what-if" analysis to make build vs. buy cloud computing decisions such as on-premise private cloud, hosted private cloud, and public cloud.
Determine cost and value trade-offs of your cloud computing architectures.
Design and manage cloud performance KPI's such as unit rate reduction goals and return on assets (ROA).
Analyze the organization
Identify ways to minimize threats to data integrity. (Choose three.)
Determine how well the vendor meets your detailed requirements.
Back up data regularly
Control access to data using security mechanisms
Design user interfaces that prevent the input of invalid data.
The externalized aspect of outsourcing makes it harder to maintain data integrity and privacy.
Identify the cloud migration pattern that is most appropriate for the separation of application logic and database components in the current application.
Service facade pattern
Re-host and optimize
identify the degree of multi-tenancy that allows the database schema to be shared and supports customization of the business logic and user-interface layers.
Which Lifecycle phase is concerned with building and testing a service before it is delivered to the customers?
Continual Service Improvement
Which lifecycle phase is concerned with financial planning?
Which phase is a larger, all encompassing phase in the IT Service Life-cycle that can be applied at any point in the Life-cycle?
Which Lifecycle phase consists of processes and functions that are required for the service to be provided at the agreed-upon service level?
Identify the three different phases of Service Strategy.
What is the overall goal of demand management?
To determine the best possible use of its monetary resources to provide services.
To determine a balance between the offering of a service and the demand for that service.
To deliver and support operational IT services to achieve business and deliver forecasted business benefits.
To deliver service value by facilitating the desired outcome that customers want to achieve.
Who also should be included in making service strategy decisions along with the cloud providers?
Consumer Business Managers
Identify the risks that are involved in the three stages of Service Strategy. (Choose three.)
Failure to identify the specific delivery model of cloud will result in service delays when fixing incidents and problems.
Failure to provide services and meet demands ahead of time.
Failure to measure the demand exactly could result in agreed demand levels going beyond and penalties being imposed by the cloud suppliers.
Failure to specify and measure performance requirements during peak periods could result in unwarranted delays for users of cloud based services.
Which of the following is an internal agreement between the support teams of an IT service provider?
Department Support Agreement
Service Level Agreement
IT Support Agreement
Operational Level Agreement
The ability of an organization to restore Service Operations after a catastrophic failure is the goal of availability management.
Samuel establishes a formal agreement with a client to set up the service hours of operation, transaction response times, and throughput expectations. This activity is part of which process of the Service Design Phase?
Service Level Management
Which of the following is an objective of the Service Transition phase?
To develop strategies on what the business needs, and what it does not.
To develop a strategy for restoring normal service operation as quickly as possible following a disruption.
To continually realign IT services to changing business needs
To plan and manage the resources to establish a new or changed service into production within constraints.
Which of the following processes of the Service Transition phase manages the building, testing, and delivering of new or changed service components?
Release and deployment management
Which of the following is the best example of an incident?
A DNS Server has had its IP address changed.
A user logs on to her workstation.
A customer attempts to place an order through your company website, and the transaction gets caught in a loop and never completes.
A network drive has reached 65% capacity, which is within the boundaries of the SLA.
Which of the following is the best example of a problem?
A customer is unable to log on to her account, even after entering her user name and password correctly.
An unauthorized attempt to access the wireless network was blocked
No one can access a database, and its discovered that the password database is offline, but the reason for the database to go offline is unknown.
Which of the following occurs in the financial authorization activity of the request Fulfillment process? (Choose two.)
Determining a cost prior to handling the request.
Verifying that the users budget allows for the request to be made.
Determining the cost after a user makes a request
Determining that the request falls within you fulfillment budget.
During which step of the CSI Process Model are stakeholders informed about whether or not goals have been achieved?
Present and use information
Implement corrective action
What happens to cloud providers when they face a new market technology, competitive pressure, an inadequate business strategy, or lack of financial support?
They run out of business, lose their services or restructure their business services.
They look for more financial support
They allocate new resources.
They cancel the SLA's
Name the security risk factors associated with the delivery model of cloud services. (Choose three.)
Loss of management control
In a public cloud, service providers give complete assurance for data security.
When does an organization become prone to a man-in-the-middle attack?
When there is a denial of service.
When there is a loss of encryption keys.
When there is interception of data in transit.
What are the legislation risks involved while adopting cloud services? (Choose three.)
High cost and latency
Online licensing checks help ensure the availability of software licenses when adopting cloud services.
Identify the indirect costs that affect TCO(total cost of ownership) in an organization. (Choose three.)
What is the correct definition of TCO?
TCO provides value added services to a customer.
TCO identifies only the intangible costs associated with a product or system.
TCO is a cost calculation designed to evaluate direct and indirect costs of a product or system.
TCO is a performance metric used to measure the efficiency of an investment.
Identify the various cost factors for an IaaS cloud provider. (Choose three.)
No server maintenance costs.
No ongoing IT support costs or operation costs involved.
No outsourcing of IT infrastructure.
Low subscription fees for the IT help desk.
Organizations with defined demand levels can adopt public cloud services as their demand for resources is always constant.
What compliance and governance requirements should be ascertained by organizations before opting for cloud services? (Choose three.)
Monitoring the cloud model
Detection and Forensics