Deck 17: Cloud Computing: Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 17: Cloud Computing: Management
1
Point out the correct statement.
A)amazon elastic cloud is a system for creating virtual disks(volume)
B)simpledb interoperates with both amazon ec2 and amazon s3
C)ec3 is an analytics as a service provider
D)none of the mentioned
A)amazon elastic cloud is a system for creating virtual disks(volume)
B)simpledb interoperates with both amazon ec2 and amazon s3
C)ec3 is an analytics as a service provider
D)none of the mentioned
simpledb interoperates with both amazon ec2 and amazon s3
2
Which of the following is a billing and account management service?
A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
A)amazon elastic mapreduce
B)amazon mechanical turk
C)amazon devpay
D)multi-factor authentication
amazon devpay
3
The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as __________
A)base
B)acid
C)atom
D)all of the mentioned
A)base
B)acid
C)atom
D)all of the mentioned
acid
4
Which of the following is property of ACID principle?
A)atomicity
B)consistency
C)isolation
D)all of the mentioned
A)atomicity
B)consistency
C)isolation
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained?
A)atomicity
B)consistency
C)isolation
D)durability
A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following component is required for both online and local data access in hybrid application?
A)local
B)cloud
C)both local and cloud
D)none of the mentioned
A)local
B)cloud
C)both local and cloud
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following factors might offset the cost of offline access in hybrid applications?
A)scalability
B)costs
C)ubiquitous access
D)all of the mentioned
A)scalability
B)costs
C)ubiquitous access
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
An application that needed_________ storage alone might not benefit from a cloud deployment at all.
A)online
B)offline
C)virtual
D)all of the mentioned
A)online
B)offline
C)virtual
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
The ___________ property states that the system must have a mechanism to recover from committed transactions should that be necessary.
A)atomicity
B)consistency
C)isolation
D)durability
A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?
A)atomicity
B)consistency
C)isolation
D)durability
A)atomicity
B)consistency
C)isolation
D)durability
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a core management feature offered by most cloud management service products?
A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
A)support of different cloud types
B)creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C)performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Point out the correct statement.
A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
A)eucalyptus and rackspace both use amazon ec2 and s3 services
B)the rightscale user interface provides real-time measurements of individual server instances
C)rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is an industry organization that develops industry system management standards for platform interoperability?
A)dmtf
B)dms
C)ebs
D)all of the mentioned
A)dmtf
B)dms
C)ebs
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is used to extend CIM to virtual computer system management?
A)ovf
B)vman
C)ocsi
D)none of the mentioned
A)ovf
B)vman
C)ocsi
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
A)cce
B)occi
C)smi
D)all of the mentioned
A)cce
B)occi
C)smi
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is open and both hypervisor and processor-architecture- agnostic?
A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
A)dell scalent
B)cloudkick
C)elastra
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a workflow control and policy based automation service by CA?
A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
A)ca cloud optimize
B)ca cloud orchestrate
C)ca cloud insight
D)ca cloud compose
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
A)cloudwatch
B)cloudsensor
C)cloudmetrics
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following service provider provides the least amount of built in security?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Point out the correct statement.
A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
A)different types of cloud computing service models provide different levels of security services
B)adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C)data should be transferred and stored in an encrypted format for security purpose
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following services that need to be negotiated in Service Level Agreements?
A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
A)logging
B)auditing
C)regulatory compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
The following flowchart is intended to evaluate ___________ in any cloud.
A)risk
B)errors
C)inconsistencies
D)none of the mentioned
A)risk
B)errors
C)inconsistencies
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following area of cloud computing is uniquely troublesome?
A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
A)auditing
B)data integrity
C)e-discovery for legal compliance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is the operational domain of CSA?
A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
A)scalability
B)portability and interoperability
C)flexibility
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is considered an essential element in cloud computing by CSA?
A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
A)multi-tenancy
B)identity and access management
C)virtualization
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is used for Web performance management and load testing?
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is application and infrastructure management software for hybrid multi-clouds?
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
A)vmware hyperic
B)webmetrics
C)univa ud
D)tapinsystems
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a compliance standard?
A)pci-dss
B)hippa
C)glba
D)all of the mentioned
A)pci-dss
B)hippa
C)glba
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
HTTP is a protocol
A)stateful
B)unidirectional
C)bidirectional
D)full dulpex
A)stateful
B)unidirectional
C)bidirectional
D)full dulpex
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
websocket is a Protocol
A)stateful
B)bidirectional
C)connection oriented
D)all of the above
A)stateful
B)bidirectional
C)connection oriented
D)all of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following subject area deals with pay-as-you-go usage model?
A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Point out the correct statement
A)except for tightly managed saas cloud providers
B)cloud computing vendors run very reliable networks
C)the low barrier to entry cannot be accompanied by a low barrier to provisioning
D)all of the mentioned
A)except for tightly managed saas cloud providers
B)cloud computing vendors run very reliable networks
C)the low barrier to entry cannot be accompanied by a low barrier to provisioning
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
captive requires that the cloud accommodate multiple compliance regimes.
A)licensed
B)policy-based
C)variable
D)all of the mentioned
A)licensed
B)policy-based
C)variable
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Security methods such as private encryption, VLANs and firewalls comes under subject area.
A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
A)accounting management
B)compliance
C)data privacy
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following captive area deals with monitoring?
A)licensed
B)variable but under control
C)law
D)all of the mentioned
A)licensed
B)variable but under control
C)law
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Network bottlenecks occur when data sets must be transferred
A)large
B)small
C)big
D)all of the mentioned
A)large
B)small
C)big
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
RDS is a type of database
A)sql
B)nonsql
C)simple storage
D)all of above
A)sql
B)nonsql
C)simple storage
D)all of above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Dynamodb is type of storage
A)nonsql
B)sql
C)simple storage
D)all of above
A)nonsql
B)sql
C)simple storage
D)all of above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Cloud are standardized in order to appeal to the majority of its audience.
A)svas
B)slas
C)sals
D)none of the mentioned
A)svas
B)slas
C)sals
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
The reputation for cloud computing services for the quality of those services is shared by
A)replicas
B)shards
C)tenants
D)all of the mentioned
A)replicas
B)shards
C)tenants
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
is a function of the particular enterprise and application in an on- premises deployment.
A)vendor lock
B)vendor lock-in
C)vendor lock-ins
D)none of the mentioned
A)vendor lock
B)vendor lock-in
C)vendor lock-ins
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
computing refers to applications and services that run on a distributed network using virtualized resources.
A)distributed
B)cloud
C)soft
D)parallel
A)distributed
B)cloud
C)soft
D)parallel
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
. as a utility is a dream that dates from the beginning of the computing industry itself
A)model
B)computing
C)software
D)all of the mentioned
A)model
B)computing
C)software
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the cloud concept is related to pooling and sharing of resources
A)polymorphism
B)abstraction
C)virtualization
D)none of the mentioned
A)polymorphism
B)abstraction
C)virtualization
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
has many of the characteristics of what is now being called cloud computing
A)internet
B)softwares
C)web service
D)all of the mentioned
A)internet
B)softwares
C)web service
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is the highest degree of integration in cloud computing?
A)saas
B)iaas
C)paas
D)all of the mentioned
A)saas
B)iaas
C)paas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Communication between services is done widely using protocol
A)rest
B)soap
C)restful
D)none of the mentioned
A)rest
B)soap
C)restful
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Applications such as a Web server or database server that can run on a virtual machine image are referred to as
A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes.
A)ben
B)xen
C)ken
D)zen
A)ben
B)xen
C)ken
D)zen
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
is a CPU emulator and virtual machine monitor
A)imaging
B)parallels
C)qemu
D)none of the mentioned
A)imaging
B)parallels
C)qemu
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is the standard for interoperable cloud-based key management?
A)kmip
B)pmik
C)aimk
D)none of the mentioned
A)kmip
B)pmik
C)aimk
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following was one of the weaker aspects of early cloud computing service offerings?
A)logging
B)integrity checking
C)consistency checking
D)none of the mentioned
A)logging
B)integrity checking
C)consistency checking
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is one of the most actively developing and important areas of cloud computing technology?
A)logging
B)auditing
C)regulatory compliance
D)none of the mentioned
A)logging
B)auditing
C)regulatory compliance
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Amazon Web Services supports ___________ Type II Audits.
A)sas70
B)sas20
C)sas702
D)none of the mentioned
A)sas70
B)sas20
C)sas702
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is the most complete cloud computing service model?
A)paas
B)iaas
C)caas
D)saas
A)paas
B)iaas
C)caas
D)saas
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Point out the correct statement.
A)platforms can be based on specific types of development languages, application frameworks, or other constructs
B)saas is the cloud-based equivalent of shrink-wrapped software
C)software as a service (saas) may be succinctly described as software that is deployed on a hosted service
D)all of the mentioned
A)platforms can be based on specific types of development languages, application frameworks, or other constructs
B)saas is the cloud-based equivalent of shrink-wrapped software
C)software as a service (saas) may be succinctly described as software that is deployed on a hosted service
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following aspect of the service is abstracted away?
A)data escrow
B)user interaction
C)adoption drivers
D)none of the mentioned
A)data escrow
B)user interaction
C)adoption drivers
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following SaaS platform is with an exposed API?
A)salesforce.com
B)amazon.com
C)flipkart.com
D)all of the mentioned
A)salesforce.com
B)amazon.com
C)flipkart.com
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Point out the wrong statement.
A)saas applications come in all shapes and sizes
B)every computer user is familiar with saas systems
C)saas software is not customizable
D)none of the mentioned
A)saas applications come in all shapes and sizes
B)every computer user is familiar with saas systems
C)saas software is not customizable
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a SaaS characteristic?
A)the typical license is subscription-based or usage-based and is billed on a recurring basis
B)the software is available over the internet globally through a browser on demand
C)the software and the service are monitored and maintained by the vendor
D)all of the mentioned
A)the typical license is subscription-based or usage-based and is billed on a recurring basis
B)the software is available over the internet globally through a browser on demand
C)the software and the service are monitored and maintained by the vendor
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
___________ applications have a much lower barrier to entry than their locally installed competitors.
A)iaas
B)caas
C)paas
D)none of the mentioned
A)iaas
B)caas
C)paas
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
SaaS supports multiple users and provides a shared data model through ___________ model.
A)single-tenancy
B)multi-tenancy
C)multiple-instance
D)all of the mentioned
A)single-tenancy
B)multi-tenancy
C)multiple-instance
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Open source software used in a SaaS is called_________ SaaS.
A)closed
B)free
C)open
D)all of the mentioned
A)closed
B)free
C)open
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
The componentized nature of SaaS solutions enables many solutions to support a feature called __________
A)workspace
B)workloads
C)mashups
D)all of the mentioned
A)workspace
B)workloads
C)mashups
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following service provider provides the highest level of service?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
Point out the correct statement.
A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
A)paas supplies the infrastructure
B)iaas adds application development frameworks, transactions, and control structures
C)saas is an operating environment with applications, management, and the user interface
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
A)cas
B)csa
C)sac
D)all of the mentioned
A)cas
B)csa
C)sac
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
For the ___________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Point out the wrong statement.
A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
A)each different type of cloud service delivery model creates a security boundary
B)any security mechanism below the security boundary must be built into the system
C)any security mechanism above the security boundary must be maintained by the customer
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following model allows vendor to provide security as part of the Service Level Agreement?
A)saas
B)paas
C)iaas
D)all of the mentioned
A)saas
B)paas
C)iaas
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following cloud does not require mapping?
A)public
B)private
C)hybrid
D)none of the mentioned
A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following service model is owned in terms of infrastructure by both vendor and customer?
A)public
B)private
C)hybrid
D)none of the mentioned
A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following model type is not trusted in terms of security?
A)public
B)private
C)hybrid
D)none of the mentioned
A)public
B)private
C)hybrid
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following has infrastructure security managed and owned by the vendor?
A)hybrid
B)private/community
C)public
D)none of the mentioned
A)hybrid
B)private/community
C)public
D)none of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following feature make cloud-based storage systems highly reliable?
A)redundant networks
B)redundant name servers
C)replication
D)all of the mentioned
A)redundant networks
B)redundant name servers
C)replication
D)all of the mentioned
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck