Deck 17: Cloud Computing: Management

ملء الشاشة (f)
exit full mode
سؤال
Point out the correct statement.

A)amazon elastic cloud is a system for creating virtual disks(volume)
B)simpledb interoperates with both amazon ec2 and amazon s3
C)ec3 is an analytics as a service provider
D)none of the mentioned
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a billing and account management service?

A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
سؤال
The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as __________    

A)base
B)acid
C)atom
D)all of the mentioned
سؤال
Which of the following is property of ACID principle?

A)atomicity
B)consistency
C)isolation
D)all of the mentioned
سؤال
Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained?

A)atomicity
B)consistency
C)isolation
D)durability
سؤال
Which of the following component is required for both online and local data access in hybrid application?

A)local
B)cloud
C)both local and cloud
D)none of the mentioned
سؤال
Which of the following factors might offset the cost of offline access in hybrid applications?

A)scalability
B)costs
C)ubiquitous access
D)all of the mentioned
سؤال
An application that needed_________     storage alone might not benefit from a cloud deployment at all.

A)online
B)offline
C)virtual
D)all of the mentioned
سؤال
The ___________    property states that the system must have a mechanism to recover from committed transactions should that be necessary.

A)atomicity
B)consistency
C)isolation
D)durability
سؤال
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?

A)atomicity
B)consistency
C)isolation
D)durability
سؤال
Which of the following is a core management feature offered by most cloud management service products?

A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
سؤال
Point out the correct statement.

A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
سؤال
Which of the following is an industry organization that develops industry system management standards for platform interoperability?

A)dmtf
B)dms
C)ebs
D)all of the mentioned
سؤال
Which of the following is used to extend CIM to virtual computer system management?

A)ovf
B)vman
C)ocsi
D)none of the mentioned
سؤال
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?

A)cce
B)occi
C)smi
D)all of the mentioned
سؤال
Which of the following is open and both hypervisor and processor-architecture- agnostic?

A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
سؤال
Which of the following is a workflow control and policy based automation service by CA?

A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
سؤال
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?

A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
سؤال
Which of the following service provider provides the least amount of built in security?

A)saas
B)paas
C)iaas
D)all of the mentioned
سؤال
Point out the correct statement.

A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
سؤال
Which of the following services that need to be negotiated in Service Level Agreements?

A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
سؤال
The following flowchart is intended to evaluate ___________    in any cloud.

A)risk
B)errors
C)inconsistencies
D)none of the mentioned
سؤال
Which of the following area of cloud computing is uniquely troublesome?

A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
سؤال
Which of the following is the operational domain of CSA?

A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
سؤال
Which of the following is considered an essential element in cloud computing by CSA?

A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
سؤال
Which of the following is used for Web performance management and load testing?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
سؤال
Which of the following is application and infrastructure management software for hybrid multi-clouds?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
سؤال
Which of the following is a compliance standard?

A)pci-dss
B)hippa
C)glba
D)all of the mentioned
سؤال
HTTP is a protocol

A)stateful
B)unidirectional
C)bidirectional
D)full dulpex
سؤال
websocket is a Protocol

A)stateful
B)bidirectional
C)connection oriented
D)all of the above
سؤال
Which of the following subject area deals with pay-as-you-go usage model?

A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
سؤال
Point out the correct statement

A)except for tightly managed saas cloud providers
B)cloud computing vendors run very reliable networks
C)the low barrier to entry cannot be accompanied by a low barrier to provisioning
D)all of the mentioned
سؤال
  captive requires that the cloud accommodate multiple compliance regimes.

A)licensed
B)policy-based
C)variable
D)all of the mentioned
سؤال
Security methods such as private encryption, VLANs and firewalls comes under subject area.

A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
سؤال
Which of the following captive area deals with monitoring?

A)licensed
B)variable but under control
C)law
D)all of the mentioned
سؤال
Network bottlenecks occur when data sets must be transferred

A)large
B)small
C)big
D)all of the mentioned
سؤال
RDS is a type of database

A)sql
B)nonsql
C)simple storage
D)all of above
سؤال
Dynamodb is type of storage

A)nonsql
B)sql
C)simple storage
D)all of above
سؤال
Cloud are standardized in order to appeal to the majority of its audience.

A)svas
B)slas
C)sals
D)none of the mentioned
سؤال
The reputation for cloud computing services for the quality of those services is shared by  

A)replicas
B)shards
C)tenants
D)all of the mentioned
سؤال
  is a function of the particular enterprise and application in an on- premises deployment.

A)vendor lock
B)vendor lock-in
C)vendor lock-ins
D)none of the mentioned
سؤال
  computing refers to applications and services that run on a distributed network using virtualized resources.

A)distributed
B)cloud
C)soft
D)parallel
سؤال
. as a utility is a dream that dates from the beginning of the computing industry itself

A)model
B)computing
C)software
D)all of the mentioned
سؤال
Which of the cloud concept is related to pooling and sharing of resources

A)polymorphism
B)abstraction
C)virtualization
D)none of the mentioned
سؤال
  has many of the characteristics of what is now being called cloud computing

A)internet
B)softwares
C)web service
D)all of the mentioned
سؤال
Which of the following is the highest degree of integration in cloud computing?

A)saas
B)iaas
C)paas
D)all of the mentioned
سؤال
Communication between services is done widely using protocol

A)rest
B)soap
C)restful
D)none of the mentioned
سؤال
Applications such as a Web server or database server that can run on a virtual machine image are referred to as  

A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
سؤال
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes.

A)ben
B)xen
C)ken
D)zen
سؤال
  is a CPU emulator and virtual machine monitor

A)imaging
B)parallels
C)qemu
D)none of the mentioned
سؤال
Which of the following is the standard for interoperable cloud-based key management?

A)kmip
B)pmik
C)aimk
D)none of the mentioned
سؤال
Which of the following was one of the weaker aspects of early cloud computing service offerings?

A)logging
B)integrity checking
C)consistency checking
D)none of the mentioned
سؤال
Which of the following is one of the most actively developing and important areas of cloud computing technology?

A)logging
B)auditing
C)regulatory compliance
D)none of the mentioned
سؤال
Amazon Web Services supports ___________ Type II Audits.

A)sas70
B)sas20
C)sas702
D)none of the mentioned
سؤال
Which of the following is the most complete cloud computing service model?

A)paas
B)iaas
C)caas
D)saas
سؤال
Point out the correct statement.

A)platforms can be based on specific types of development languages, application frameworks, or other constructs
B)saas is the cloud-based equivalent of shrink-wrapped software
C)software as a service (saas) may be succinctly described as software that is deployed on a hosted service
D)all of the mentioned
سؤال
Which of the following aspect of the service is abstracted away?

A)data escrow
B)user interaction
C)adoption drivers
D)none of the mentioned
سؤال
Which of the following SaaS platform is with an exposed API?

A)salesforce.com
B)amazon.com
C)flipkart.com
D)all of the mentioned
سؤال
Point out the wrong statement.

A)saas applications come in all shapes and sizes
B)every computer user is familiar with saas systems
C)saas software is not customizable
D)none of the mentioned
سؤال
Which of the following is a SaaS characteristic?

A)the typical license is subscription-based or usage-based and is billed on a recurring basis
B)the software is available over the internet globally through a browser on demand
C)the software and the service are monitored and maintained by the vendor
D)all of the mentioned
سؤال
___________  applications have a much lower barrier to entry than their locally installed competitors.

A)iaas
B)caas
C)paas
D)none of the mentioned
سؤال
SaaS supports multiple users and provides a shared data model through ___________   model.

A)single-tenancy
B)multi-tenancy
C)multiple-instance
D)all of the mentioned
سؤال
Open source software used in a SaaS is called_________    SaaS.

A)closed
B)free
C)open
D)all of the mentioned
سؤال
The componentized nature of SaaS solutions enables many solutions to support a feature called __________    

A)workspace
B)workloads
C)mashups
D)all of the mentioned
سؤال
Which of the following service provider provides the highest level of service?

A)saas
B)paas
C)iaas
D)all of the mentioned
سؤال
Point out the correct statement.

A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
سؤال
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)cas
B)csa
C)sac
D)all of the mentioned
سؤال
For the ___________  model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)saas
B)paas
C)iaas
D)all of the mentioned
سؤال
Point out the wrong statement.

A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
سؤال
Which of the following model allows vendor to provide security as part of the Service Level Agreement?

A)saas
B)paas
C)iaas
D)all of the mentioned
سؤال
Which of the following cloud does not require mapping?

A)public
B)private
C)hybrid
D)none of the mentioned
سؤال
Which of the following service model is owned in terms of infrastructure by both vendor and customer?

A)public
B)private
C)hybrid
D)none of the mentioned
سؤال
Which of the following model type is not trusted in terms of security?

A)public
B)private
C)hybrid
D)none of the mentioned
سؤال
Which of the following has infrastructure security managed and owned by the vendor?

A)hybrid
B)private/community
C)public
D)none of the mentioned
سؤال
Which of the following feature make cloud-based storage systems highly reliable?

A)redundant networks
B)redundant name servers
C)replication
D)all of the mentioned
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 17: Cloud Computing: Management
1
Point out the correct statement.

A)amazon elastic cloud is a system for creating virtual disks(volume)
B)simpledb interoperates with both amazon ec2 and amazon s3
C)ec3 is an analytics as a service provider
D)none of the mentioned
simpledb interoperates with both amazon ec2 and amazon s3
2
Which of the following is a billing and account management service?

A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
amazon devpay
3
The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as __________    

A)base
B)acid
C)atom
D)all of the mentioned
acid
4
Which of the following is property of ACID principle?

A)atomicity
B)consistency
C)isolation
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained?

A)atomicity
B)consistency
C)isolation
D)durability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following component is required for both online and local data access in hybrid application?

A)local
B)cloud
C)both local and cloud
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following factors might offset the cost of offline access in hybrid applications?

A)scalability
B)costs
C)ubiquitous access
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
An application that needed_________     storage alone might not benefit from a cloud deployment at all.

A)online
B)offline
C)virtual
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ___________    property states that the system must have a mechanism to recover from committed transactions should that be necessary.

A)atomicity
B)consistency
C)isolation
D)durability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?

A)atomicity
B)consistency
C)isolation
D)durability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is a core management feature offered by most cloud management service products?

A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
Point out the correct statement.

A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is an industry organization that develops industry system management standards for platform interoperability?

A)dmtf
B)dms
C)ebs
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is used to extend CIM to virtual computer system management?

A)ovf
B)vman
C)ocsi
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?

A)cce
B)occi
C)smi
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is open and both hypervisor and processor-architecture- agnostic?

A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is a workflow control and policy based automation service by CA?

A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?

A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following service provider provides the least amount of built in security?

A)saas
B)paas
C)iaas
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
Point out the correct statement.

A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following services that need to be negotiated in Service Level Agreements?

A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
The following flowchart is intended to evaluate ___________    in any cloud.

A)risk
B)errors
C)inconsistencies
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following area of cloud computing is uniquely troublesome?

A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is the operational domain of CSA?

A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is considered an essential element in cloud computing by CSA?

A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is used for Web performance management and load testing?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is application and infrastructure management software for hybrid multi-clouds?

A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is a compliance standard?

A)pci-dss
B)hippa
C)glba
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
HTTP is a protocol

A)stateful
B)unidirectional
C)bidirectional
D)full dulpex
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
websocket is a Protocol

A)stateful
B)bidirectional
C)connection oriented
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following subject area deals with pay-as-you-go usage model?

A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
Point out the correct statement

A)except for tightly managed saas cloud providers
B)cloud computing vendors run very reliable networks
C)the low barrier to entry cannot be accompanied by a low barrier to provisioning
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
  captive requires that the cloud accommodate multiple compliance regimes.

A)licensed
B)policy-based
C)variable
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
Security methods such as private encryption, VLANs and firewalls comes under subject area.

A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following captive area deals with monitoring?

A)licensed
B)variable but under control
C)law
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
Network bottlenecks occur when data sets must be transferred

A)large
B)small
C)big
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
RDS is a type of database

A)sql
B)nonsql
C)simple storage
D)all of above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
Dynamodb is type of storage

A)nonsql
B)sql
C)simple storage
D)all of above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
Cloud are standardized in order to appeal to the majority of its audience.

A)svas
B)slas
C)sals
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
The reputation for cloud computing services for the quality of those services is shared by  

A)replicas
B)shards
C)tenants
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
  is a function of the particular enterprise and application in an on- premises deployment.

A)vendor lock
B)vendor lock-in
C)vendor lock-ins
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
  computing refers to applications and services that run on a distributed network using virtualized resources.

A)distributed
B)cloud
C)soft
D)parallel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
. as a utility is a dream that dates from the beginning of the computing industry itself

A)model
B)computing
C)software
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the cloud concept is related to pooling and sharing of resources

A)polymorphism
B)abstraction
C)virtualization
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
  has many of the characteristics of what is now being called cloud computing

A)internet
B)softwares
C)web service
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is the highest degree of integration in cloud computing?

A)saas
B)iaas
C)paas
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
Communication between services is done widely using protocol

A)rest
B)soap
C)restful
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Applications such as a Web server or database server that can run on a virtual machine image are referred to as  

A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes.

A)ben
B)xen
C)ken
D)zen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
  is a CPU emulator and virtual machine monitor

A)imaging
B)parallels
C)qemu
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is the standard for interoperable cloud-based key management?

A)kmip
B)pmik
C)aimk
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following was one of the weaker aspects of early cloud computing service offerings?

A)logging
B)integrity checking
C)consistency checking
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
Which of the following is one of the most actively developing and important areas of cloud computing technology?

A)logging
B)auditing
C)regulatory compliance
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
Amazon Web Services supports ___________ Type II Audits.

A)sas70
B)sas20
C)sas702
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is the most complete cloud computing service model?

A)paas
B)iaas
C)caas
D)saas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
Point out the correct statement.

A)platforms can be based on specific types of development languages, application frameworks, or other constructs
B)saas is the cloud-based equivalent of shrink-wrapped software
C)software as a service (saas) may be succinctly described as software that is deployed on a hosted service
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following aspect of the service is abstracted away?

A)data escrow
B)user interaction
C)adoption drivers
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following SaaS platform is with an exposed API?

A)salesforce.com
B)amazon.com
C)flipkart.com
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
Point out the wrong statement.

A)saas applications come in all shapes and sizes
B)every computer user is familiar with saas systems
C)saas software is not customizable
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is a SaaS characteristic?

A)the typical license is subscription-based or usage-based and is billed on a recurring basis
B)the software is available over the internet globally through a browser on demand
C)the software and the service are monitored and maintained by the vendor
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
___________  applications have a much lower barrier to entry than their locally installed competitors.

A)iaas
B)caas
C)paas
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
SaaS supports multiple users and provides a shared data model through ___________   model.

A)single-tenancy
B)multi-tenancy
C)multiple-instance
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
Open source software used in a SaaS is called_________    SaaS.

A)closed
B)free
C)open
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
The componentized nature of SaaS solutions enables many solutions to support a feature called __________    

A)workspace
B)workloads
C)mashups
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
Which of the following service provider provides the highest level of service?

A)saas
B)paas
C)iaas
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
Point out the correct statement.

A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)cas
B)csa
C)sac
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
For the ___________  model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)saas
B)paas
C)iaas
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
Point out the wrong statement.

A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following model allows vendor to provide security as part of the Service Level Agreement?

A)saas
B)paas
C)iaas
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following cloud does not require mapping?

A)public
B)private
C)hybrid
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following service model is owned in terms of infrastructure by both vendor and customer?

A)public
B)private
C)hybrid
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following model type is not trusted in terms of security?

A)public
B)private
C)hybrid
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following has infrastructure security managed and owned by the vendor?

A)hybrid
B)private/community
C)public
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following feature make cloud-based storage systems highly reliable?

A)redundant networks
B)redundant name servers
C)replication
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.