web analytics

Which of the following aspects of public cloud computing would a company MOST likely need to consider to ensure information security?

Which of the following aspects of public cloud computing would a company MOST likely need to consider to ensure information security? A. Data integrity B. Server type C. Firewall specifications

A specific cloud deployment has been established specifically for financial services companies to consume. Which of the following BEST describes this type of cloud environment?

A specific cloud deployment has been established specifically for financial services companies to consume. Which of the following BEST describes this type of cloud environment? A. Private cloud B. Community

Which of the following is an advantage of cloud computing for an organization?

Which of the following is an advantage of cloud computing for an organization? A. Increased security of applications and data due to virtualization B. Decreased downtime due to increased control

An existing capability is being migrated into the cloud. Capacity management issues have been noticed in the past and an exercise is being performed to calculate current and future volumes. In which of the following lifecycle phases is this likely to be performed?

An existing capability is being migrated into the cloud. Capacity management issues have been noticed in the past and an exercise is being performed to calculate current and future volumes.

An existing capability is being migrated into the cloud. Capacity management issues have been noticed in the past and an exercise is being performed to calculate current and future volumes. In which of the following lifecycle phases is this likely to be performed?

An existing capability is being migrated into the cloud. Capacity management issues have been noticed in the past and an exercise is being performed to calculate current and future volumes.

Which of the following early examples of cloud computing was used for software engineering purposes in the form of web-based applications and required interoperability between different systems?

Which of the following early examples of cloud computing was used for software engineering purposes in the form of web-based applications and required interoperability between different systems? A. Distributed Computing

An organization is replacing its core insurance platform. The solution is made up of internally hosted insurance systems and applications hosted in the cloud. Which of the following activities is part of service transition?

An organization is replacing its core insurance platform. The solution is made up of internally hosted insurance systems and applications hosted in the cloud. Which of the following activities is

A company decides to subscribe to a new CRM product that will help improve their business processes. Which of the following types of cloud computing would MOST likely be implemented?

A company decides to subscribe to a new CRM product that will help improve their business processes. Which of the following types of cloud computing would MOST likely be implemented?

The business benefits of mobile computing are enhanced MOST by which of the following cloud service characteristics?

The business benefits of mobile computing are enhanced MOST by which of the following cloud service characteristics? A. Hardware independence B. Security C. Distribution over the Internet D. Time to

Which of the following refers to providing a combination of servers, networking components, hosting, provisioning, and basic services needed to run a cloud?

Which of the following refers to providing a combination of servers, networking components, hosting, provisioning, and basic services needed to run a cloud? A. PaaS B. CaaS C. SaaS D.

A company is adopting a public SaaS cloud based computing system to migrate a mission critical application. Which of the following capabilities will be MOST likely lost?

A company is adopting a public SaaS cloud based computing system to migrate a mission critical application. Which of the following capabilities will be MOST likely lost? A. Centralized management

Which of the following is the BEST example of maintaining ‘strategic flexibility’?

Which of the following is the BEST example of maintaining ‘strategic flexibility’? A. Cloud provisioning models have a risk of not maintaining flexibility once services have been migrated. B. When

Which of the following correctly identifies a key difference between cloud computing and IT outsourcing?

Which of the following correctly identifies a key difference between cloud computing and IT outsourcing? A. Typically, industry definitions state that cloud computing and IT outsourcing are synonymous terms with

In order for an organization to have a successful cloud implementation, which of the following must be true?

In order for an organization to have a successful cloud implementation, which of the following must be true? A. The organization must perform and successfully complete a cloud readiness assessment.

Which of the following is the business benefit of private PaaS?

Which of the following is the business benefit of private PaaS? A. Improve the reuse of internal databases in an organization. B. Improve the speed of the internal development and

How can cloud computing help reduce integrity risks?

How can cloud computing help reduce integrity risks? A. Cloud computing makes it easier to have a backup available. B. Cloud computing makes it easier to monitor access and usage

Which of the following is the difference between cloud computing and IT outsourcing?

Which of the following is the difference between cloud computing and IT outsourcing? A. The service levels of cloud computing are much better. B. IT outsourcing is not based on

Which of the following cloud computing risks is compliance related?

Which of the following cloud computing risks is compliance related? A. Access rights that are handled by a cloud provider B. Capacity management that is handled by a cloud provider

Which of the following is the risk when an IT department restricts itself to solely being an infrastructure provider?

Which of the following is the risk when an IT department restricts itself to solely being an infrastructure provider? A. Business users will bypass the IT department B. Cloud providers

Why does cloud computing shift capital cost to variable cost?

Why does cloud computing shift capital cost to variable cost? A. Cloud computing is more cost-efficient B. IT assets are not owned by the customer C. Servers are better utilized

Which IT process is likely to take more effort with cloud computing?

Which IT process is likely to take more effort with cloud computing? A. Hardware maintenance B. Installing operating system patches C. Performance monitoring D. Server maintenance Answer: C

Which of the following business benefits do cloud computing and IT outsourcing have in common?

Which of the following business benefits do cloud computing and IT outsourcing have in common? A. Clarity and budgeting ease of upfront costs B. Improvement of employee skills sets C.

Which of the following is a relevant component of the cloud ecosystem?

Which of the following is a relevant component of the cloud ecosystem? A. Hypervisors B. Image factory C. Security procedures D. Trained IT staff Answer: B

Which of the following risks occurs when a cloud provider stops serving the company?

Which of the following risks occurs when a cloud provider stops serving the company? A. Continuity risk B. Financial risk C. Legal risk D. Confidentiality risk Answer: A

How does scalability work with cloud computing?

How does scalability work with cloud computing? A. Servers and storage can be added quickly. B. Servers and storage can be released quickly. C. Users can be added and removed

All of the following are availability risks that are introduced by cloud computing EXCEPT:

All of the following are availability risks that are introduced by cloud computing EXCEPT: A. Dependence on an external provider. B. Dependence on internal IT C. Increase in users who

A military facility is NOT able to fully embrace cloud computing because of which of the following?

A military facility is NOT able to fully embrace cloud computing because of which of the following? A. High degree of confidentiality and operational assurance B. The associates cost and

Which of the following application types is suitable for a cloud computing pilot?

Which of the following application types is suitable for a cloud computing pilot? A. Desktop productivity applications B. Marginal applications C. Mission-critical applications D. Legacy applications Answer: A

All of the following are important design decisions when deploying SaaS EXCEPT:

All of the following are important design decisions when deploying SaaS EXCEPT: A. How existing company data is integrated in or migrated to the application. B. How the application will

Which of the following are strategic exit options?

Which of the following are strategic exit options? A. Change the system applications B. Change the cloud provider C. Re-host in-house D. All of the above Answer: C

How can an organization successfully implement an IaaS strategy?

How can an organization successfully implement an IaaS strategy? A. Standardize on a limited set of virtual machines B. Continuously execute performance analytics C. Open up internal databases with Web

In which of the following ways do IT outsourcing and cloud computing differ?

In which of the following ways do IT outsourcing and cloud computing differ? A. Cloud computing services are typically much more scalable. B. Cloud computing is much cheaper. C. Hardware

Which of the following processes needs to be changed to better handle Change Management in the cloud?

Which of the following processes needs to be changed to better handle Change Management in the cloud? A. Financial chargeback B. Security management C. Hardware maintenance D. Software distribution Answer:

Which of the following confidentiality risks is introduced by cloud computing?

Which of the following confidentiality risks is introduced by cloud computing? A. Company information can be transmitted electronically B. Digitizing information makes it easier to copy C. Government regulations require

Which of the following is a definition of virtualization?

Which of the following is a definition of virtualization? A. Virtualization is a method to organize servers in a more efficient manner to double the number of accessible users B.

Who is responsible for granting access to a user in federated identity management?

Who is responsible for granting access to a user in federated identity management? A. Identity provider B. Relying party C. SaaS provider D. User Answer: B

Which change in the security processes is introduced by cloud computing?

Which change in the security processes is introduced by cloud computing? A. Increased security of accessing credit card information B. Regulations need to be updated more frequently C. Storing passwords

Cloud computing is priced according to ___________ or has ___________, rather than having upfront costs.

Cloud computing is priced according to ___________ or has ___________, rather than having upfront costs. A. recurring subscription, a yearly contract B. a yearly contract, usage-based charges C. recurring subscription,

Which of the following is indicated by a high number of variations of different virtual servers?

Which of the following is indicated by a high number of variations of different virtual servers? A. Lack of an automated provisioning process of the virtual machines B. Lack of

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources.

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources. A. commercial B. financial C. legal D. service Answer: B

How does cloud computing influence service operations?

How does cloud computing influence service operations? A. Cloud computing is more cost effective B. The provisioning of servers and services is quicker or ceases to be an issue C.

Which of the following is included in a compliance audit?

Which of the following is included in a compliance audit? A. Analyzing chargeback agreements B. Analyzing cloud provider Service Level Agreements (SLAs) C. Analyzing identity management and access controls D.

Which of the following assets have risks related to a cloud provider going out of business?

Which of the following assets have risks related to a cloud provider going out of business? A. Data stored at the provider B. Cloud management tools housed at the provider

Which of the following is a characteristic of cloud computing?

Which of the following is a characteristic of cloud computing? A. Cloud computing is typically based on open Internet technology B. Cloud computing is typically based on web technology C.

Which of the following can cause user response times to deteriorate?

Which of the following can cause user response times to deteriorate? A. High CPU usage and low network bandwidth B. High network latency and high volume of data stored C.

Twitter is a service that allows users to exchange short text messages. This is an example of:

Twitter is a service that allows users to exchange short text messages. This is an example of: A. PaaS B. SaaS C. IaaS D. QoS Answer: B

Why can cloud computing be a challenge in relation to compliance risks (e.g. compliance with the Sarbanes-Oxley Act)?

Why can cloud computing be a challenge in relation to compliance risks (e.g. compliance with the Sarbanes-Oxley Act)? A. It makes it harder to know where a company’s important assets

Which of the following is the MOST important impact of cloud computing on managing service levels?

Which of the following is the MOST important impact of cloud computing on managing service levels? A. Capacity can be more elastic. B. External providers can deny a capacity increase

Which of the following is MOST typically accessed through Web services?

Which of the following is MOST typically accessed through Web services? A. IaaS B. PaaS C. SaaS D. None of the above Answer: B

Which of the following is an essential step in the start-up process of a virtual server?

Which of the following is an essential step in the start-up process of a virtual server? A. Identify the location of the physical machine B. Select identity providers C. Select