Question 1
Question
With cloud computing services, the hardware purchases, software purchases, and IT support are the responsibility of whom? -
Question 2
Question
Which term best describes the ability to rapidly increase user accounts for a given cloud service?
Answer
-
Volatility
-
Synchronicity
-
Viability
-
Elasticity
Question 3
Question
Which option describes a benefit of virtualized servers?
Answer
-
Shared hardware
-
Individual hardware per virtual server
-
Physical servers taking less room space than virtual servers
-
Virtual servers taking less disk space than physical servers
Question 4
Question
Your company runs a virtualized web application server in-house. You decide to make the web applications available over the Internet through a cloud provider. Which method represents the quickest way to accomplish this?
Answer
-
Create a new cloud server, install web services, and install and configure web applications.
-
Create a new cloud server, install web services, and import web application data.
-
Migrate your in-house web application server to the cloud.
-
This cannot be done — only generic applications are available through the cloud.
Question 5
Question
Which term from the past describes the sharing of mainframe computing resources?
Question 6
Question
Purchasing software and providing it to a third party that installs and manages that software is an example of which of the following?
Question 7
Question
You are the IT director for a retail clothing outlet. Your competitors are using Internet-delivered inventory, storage, and backup solutions from a specific provider. You conclude it is best that your company use the same services from the same provider. What type of cloud will you be subscribing to?
Answer
-
Community cloud
-
Retail cloud
-
Private cloud
-
Public cloud
Question 8
Question
For which businesses would cloud computing be best suited? (Choose two.)
Answer
-
Waterfront marketplace that thrives during the summer tourist season
-
Rural medical practice with four employees
-
Law enforcement agency
-
A new company start-up that manufactures watercraft
Question 9
Question
Which of the following are valid reasons for a firm's not adopting a cloud solution? (Choose two.)
Answer
-
Local hardware is being fully utilized for unchanging IT workloads.
-
The number of employees rarely changes.
-
The number of employees changes often.
-
The firm experiences unpredictable project spikes throughout the year.
Question 10
Question
As a developer for a software company, you have decided to build and test your web applications in a cloud environment. Which type of cloud service best meets your needs?
Question 11
Question
How are cloud computing and outsourcing similar?
Question 12
Question
Which of the following is a benefit of outsourcing?
Question 13
Question
True or false? Cloud computing is a form of outsourcing.
Question 14
Question
What cloud computing characteristic ensures services and data are always reachable?
Answer
-
Confidentiality
-
Integrity
-
Availability
-
Scalability
Question 15
Question
You must ensure that your business computing resources can quickly grow as business demands change. Which of the following allows this?
Answer
-
Confidentiality
-
Integrity
-
Availability
-
Scalability
Question 16
Question
[Blank] protects data contents, while [blank] ensures that data has not been tampered with.
Answer
-
Availability, scalability
-
Integrity, confidentiality
-
Scalability, availability
-
Confidentiality, integrity
Question 17
Question
Which of the following are related to cloud computing costs? (Choose two.)
Answer
-
Monthly subscription
-
Server hardware costs
-
Usage fees
-
Software licensing costs
Question 18
Question
How does cloud computing help an organization as new opportunities arise? (Choose two.)
Answer
-
Shifting operating expenses to capital expenses
-
Speedy addition of computing resources
-
Less cost for new server hardware
-
Speedy removal of computing resources
Question 19
Question
[Blank] and [blank] give cloud customers a competitive advantage.
Answer
-
Integrity, confidentiality
-
Availability, integrity
-
Time to market, collaboration
-
Collaboration, confidentiality
Question 20
Question
Which of the following statements are true? (Choose two.)
Answer
-
Public clouds are for the exclusive use of a single organization.
-
Private clouds are for the exclusive use of a single organization
-
Public clouds are offered over an intranet.
-
Public clouds are offered over the Internet.
Question 21
Question
True or false? Virtual servers are used only in public clouds.
Question 22
Question
When creating cloud virtual servers, which of the following must be specified? (Choose two.)
Question 23
Question
You are linking your company’s Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company?
Answer
-
Identity trust
-
XML provider
-
Relying party trust
-
JSON provider
Question 24
Question
Your public cloud environment is configured such that additional cloud storage is allocated to a virtual server when the used disk space on that server reaches more than 80 percent of disk capacity. Which term best describes this configuration?
Answer
-
Elasticity
-
Automation
-
Self-service
-
Disk latency
Question 25
Question
Which of the following might factor into an exit strategy for a cloud customer?
Answer
-
Vendor lock-in
-
Self-service
-
Standardization
-
Automation
Question 26
Question
Which of the following is not considered a cloud computing risk?
Question 27
Question
What is a benefit of PaaS?
Question 28
Question
Developers build these components in the cloud.
Question 29
Question
Which component is a set of programming instructions and standards for accessing a web based program?
Answer
-
Platform
-
Web API
-
Web Browser
-
Web Application
Question 30
Question
Identify the client that uses a web browser as an interface to connect to the cloud.
Answer
-
Thick
-
Thin
-
Mobile
-
Web API
Question 31
Question
Which model facilitates sharing of a complex computational task across multiple computers?
Answer
-
Client Server
-
Peer to Peer
-
Grid Computing
-
Virtualization
Question 32
Question
All applications accessed through the Internet are cloud applications.
Question 33
Question
What are the benefits of DBaas? (Choose Three)
Question 34
Question
Distributed computing helps to perform data intrusive tasks for applications.
Question 35
Question
What are the business drivers of cloud computing? (Choose three.)
Question 36
Question
SaaS provides services to an organization that requires the standard business process infrastructure such as CRM.
Question 37
Question
Which type of scaling involves the addition of additional processors, RAM, or disk space to a server?
Answer
-
Load Balancing
-
Vertical Scaling
-
Horizontal Scaling
-
Diagonal Scaling
Question 38
Question
Scalability provides a flexible infrastructure architecture to software organizations.
Question 39
Question
What are the major security concerns with regard to cloud computing? (Choose three.)
Answer
-
Data integration
-
Data location
-
Recovery
-
Long-term viability
Question 40
Question
Cloud security is deployed to protect data, applications, and the infrastructure of cloud computing.
Question 41
Question
At which level does an organization benefit through the availability of elastic computing resources and pay-per-use models of cloud computing?
Question 42
Question
What are the elements of an organization that are deployed at the Utility level? (Choose three.)
Answer
-
Labor
-
Software
-
Hardware
-
Business Model
Question 43
Question
When costs are being shared among fewer users, public cloud computing is a more expensive venture.
Question 44
Question
What are the essential components of a cloud network? (Choose three.)
Answer
-
Scalability
-
Hypervisor
-
Latency
-
Storage
-
Operating System
Question 45
Question
Network node latency can be reduced by using optimized fabric.
Question 46
Question
What are the key benefits of cloud automation? (Choose three.)
Answer
-
Optimal utilization of the cloud resources
-
Minimal cost incurred for maintenance (power consumption)
-
High operating costs
-
Adherence to compliance standards for data security.
Question 47
Question
User authentication is the basic attribute of self-service.
Question 48
Question
The use of pseudonyms is not encouraged in user identity management systems of a federated cloud environment because it is a breach of trust.
Question 49
Question
What are the chief characteristics of the Cloud Gateway? (Choose three.)
Question 50
Question
Interoperability in federated cloud reduces the need for vendor lock-in.
Question 51
Question
What are the various standards adopted by the service providers to ensure the security of data in a federated cloud environment? (Choose three.)
Question 52
Question
Identify the challenges involved in cloud service backup. (Choose three.)
Answer
-
Bandwidth
-
Security
-
Reliability
-
Recovery
Question 53
Question
In cloud computing, there is a trade-off between reliability and the speed of deployment.
Question 54
Question
Identify the challenges involved in performance of cloud applications. (Choose three.)
Question 55
Question
Identify the benefits of cloud databases. (Choose three.)
Answer
-
Improved security
-
Increased accessibility
-
Automated scalability
-
Minimal investment
Question 56
Question
Identify the challenges involved in data integration. (Choose three.)
Answer
-
Speed of change
-
Data distribution
-
Data volumes
-
Data privacy
Question 57
Question
Identify the challenges involved in migrating data to the could. (Choose three.)
Answer
-
Liability
-
Data protection
-
Data distribution
-
Data interruption
Question 58
Question
Identify the challenges involved in implementing cloud security. (Choose three.)
Answer
-
Scalability
-
Security controls
-
Sharing of resources
-
Loss of control
Question 59
Question
PCI is not a specific set of auditing standards; instead, cloud providers are responsible for choosing their own controls and the goals of those controls intend to achieve.
Question 60
Question
The traditional architecture is designed to balance heavy workload in the cloud.
Question 61
Question
Identify the architecture that splits the workload over multiple servers to improve processing power.
Answer
-
Traditional application
-
Scale-up
-
Scale-out
-
Multi-tier application
Question 62
Question
Identify the feature that helps you determine the level of service provided by the cloud vendor.
Answer
-
Historical performance
-
Redundancy
-
Monitoring
-
SLA
Question 63
Question
What is the first step involved in the vendor selection process?
Answer
-
Drawing an outline with the critical criteria that determines the desired cloud vendor.
-
Analyzing the organization
-
Comparing cloud vendors based on the selected criteria
-
Finalizing the cloud vendor.
Question 64
Question
Identify the activities that help you determine cloud readiness. (Choose three.)
Answer
-
Optimize the current environment by providing an internal set of cloud services and enabling the incorporation of external services.
-
Draft the Service level Agreement (SLA).
-
Designate a cross-functional team to monitor cloud services.
-
Undertake pilot projects with various services.
Question 65
Question
What are the tasks involved in drafting a plan for cloud migration? (Choose three.)
Answer
-
Run "what-if" analysis to make build vs. buy cloud computing decisions such as on-premise private cloud, hosted private cloud, and public cloud.
-
Determine cost and value trade-offs of your cloud computing architectures.
-
Design and manage cloud performance KPI's such as unit rate reduction goals and return on assets (ROA).
-
Analyze the organization
Question 66
Question
Identify ways to minimize threats to data integrity. (Choose three.)
Answer
-
Determine how well the vendor meets your detailed requirements.
-
Back up data regularly
-
Control access to data using security mechanisms
-
Design user interfaces that prevent the input of invalid data.
Question 67
Question
The externalized aspect of outsourcing makes it harder to maintain data integrity and privacy.
Question 68
Question
Identify the cloud migration pattern that is most appropriate for the separation of application logic and database components in the current application.
Answer
-
Service facade pattern
-
Re-host and optimize
-
Application re-hosting
-
Re-architect
Question 69
Question
identify the degree of multi-tenancy that allows the database schema to be shared and supports customization of the business logic and user-interface layers.
Question 70
Question
Which Lifecycle phase is concerned with building and testing a service before it is delivered to the customers?
Question 71
Question
Which lifecycle phase is concerned with financial planning?
Answer
-
Service Design
-
Service Strategy
-
Service Operation
-
Service planning
Question 72
Question
Which phase is a larger, all encompassing phase in the IT Service Life-cycle that can be applied at any point in the Life-cycle?
Question 73
Question
Which Lifecycle phase consists of processes and functions that are required for the service to be provided at the agreed-upon service level?
Answer
-
Service Design
-
Service Operation
-
Service Transition
-
Service Strategy
Question 74
Question
Identify the three different phases of Service Strategy.
Answer
-
Portfolio Management
-
Demand Management
-
Change Management
-
Financial Management
Question 75
Question
What is the overall goal of demand management?
Answer
-
To determine the best possible use of its monetary resources to provide services.
-
To determine a balance between the offering of a service and the demand for that service.
-
To deliver and support operational IT services to achieve business and deliver forecasted business benefits.
-
To deliver service value by facilitating the desired outcome that customers want to achieve.
Question 76
Question
Who also should be included in making service strategy decisions along with the cloud providers?
Question 77
Question
Identify the risks that are involved in the three stages of Service Strategy. (Choose three.)
Answer
-
Failure to identify the specific delivery model of cloud will result in service delays when fixing incidents and problems.
-
Failure to provide services and meet demands ahead of time.
-
Failure to measure the demand exactly could result in agreed demand levels going beyond and penalties being imposed by the cloud suppliers.
-
Failure to specify and measure performance requirements during peak periods could result in unwarranted delays for users of cloud based services.
Question 78
Question
Which of the following is an internal agreement between the support teams of an IT service provider?
Question 79
Question
The ability of an organization to restore Service Operations after a catastrophic failure is the goal of availability management.
Question 80
Question
Samuel establishes a formal agreement with a client to set up the service hours of operation, transaction response times, and throughput expectations. This activity is part of which process of the Service Design Phase?
Answer
-
Availability Management
-
Capacity Management
-
Service Level Management
-
Supplier Management
Question 81
Question
Which of the following is an objective of the Service Transition phase?
Answer
-
To develop strategies on what the business needs, and what it does not.
-
To develop a strategy for restoring normal service operation as quickly as possible following a disruption.
-
To continually realign IT services to changing business needs
-
To plan and manage the resources to establish a new or changed service into production within constraints.
Question 82
Question
Which of the following processes of the Service Transition phase manages the building, testing, and delivering of new or changed service components?
Question 83
Question
Which of the following is the best example of an incident?
Answer
-
A DNS Server has had its IP address changed.
-
A user logs on to her workstation.
-
A customer attempts to place an order through your company website, and the transaction gets caught in a loop and never completes.
-
A network drive has reached 65% capacity, which is within the boundaries of the SLA.
Question 84
Question
Which of the following is the best example of a problem?
Answer
-
A customer is unable to log on to her account, even after entering her user name and password correctly.
-
An unauthorized attempt to access the wireless network was blocked
-
No one can access a database, and its discovered that the password database is offline, but the reason for the database to go offline is unknown.
Question 85
Question
Which of the following occurs in the financial authorization activity of the request Fulfillment process? (Choose two.)
Answer
-
Determining a cost prior to handling the request.
-
Verifying that the users budget allows for the request to be made.
-
Determining the cost after a user makes a request
-
Determining that the request falls within you fulfillment budget.
Question 86
Question
During which step of the CSI Process Model are stakeholders informed about whether or not goals have been achieved?
Question 87
Question
What happens to cloud providers when they face a new market technology, competitive pressure, an inadequate business strategy, or lack of financial support?
Answer
-
They run out of business, lose their services or restructure their business services.
-
They look for more financial support
-
They allocate new resources.
-
They cancel the SLA's
Question 88
Question
Name the security risk factors associated with the delivery model of cloud services. (Choose three.)
Question 89
Question
In a public cloud, service providers give complete assurance for data security.
Question 90
Question
When does an organization become prone to a man-in-the-middle attack?
Answer
-
When there is a denial of service.
-
When there is a loss of encryption keys.
-
When there is interception of data in transit.
Question 91
Question
What are the legislation risks involved while adopting cloud services? (Choose three.)
Answer
-
Data performance
-
Jurisdiction issues
-
High cost and latency
-
Lawful access
Question 92
Question
Online licensing checks help ensure the availability of software licenses when adopting cloud services.
Question 93
Question
Identify the indirect costs that affect TCO(total cost of ownership) in an organization. (Choose three.)
Answer
-
Security
-
Value-added services.
-
Scalability
-
Interoperability.
Question 94
Question
What is the correct definition of TCO?
Answer
-
TCO provides value added services to a customer.
-
TCO identifies only the intangible costs associated with a product or system.
-
TCO is a cost calculation designed to evaluate direct and indirect costs of a product or system.
-
TCO is a performance metric used to measure the efficiency of an investment.
Question 95
Question
Identify the various cost factors for an IaaS cloud provider. (Choose three.)
Answer
-
No server maintenance costs.
-
No ongoing IT support costs or operation costs involved.
-
No outsourcing of IT infrastructure.
-
Low subscription fees for the IT help desk.
Question 96
Question
Organizations with defined demand levels can adopt public cloud services as their demand for resources is always constant.
Question 97
Question
What compliance and governance requirements should be ascertained by organizations before opting for cloud services? (Choose three.)