CITM 711 FINAL EXAMS QUESTIONS AND ANSWERS 2022 VERIFIED SOLUTION
CITM 711 FINAL EXAMS QUESTIONS AND ANSWERS 2022 VERIFIED SOLUTION 1. They cost less because you don't need to pay for all the people, products, and facilities to run them a. A: Cloud-based IT (Cloud Computing) 2. Q:You only pay for what you use (usually on a monthly subscription)Cloud-based IT a. (Cloud Computing) 3. Q: Apps are more scalable, secure, and reliable than the vast majority of apps out thereA: a. Cloud-based IT (Cloud Computing) 4. Upgrades are taken care of for you so your apos get security and performance enhancements and new features automatically a. Cloud-based IT (Cloud Computing) 5. Need staff and a team of experts to develop, test, and deploy complicated software a. Data Centres 6. It's one app that everyone shares but it's flexible enough for everyone to customize for their specific needs a. Multi-tenant Apps 7. Can run in a data centre or on the cloud a. Business Apps 8. Need both production and failover environments, software upgrades, and technical support a. Data Centres 9. Uses shared data centres a. Cloud-based IT (Cloud Computing) 10. You can quickly get started - just log in, customize it, and start using it (and it costs less) a. Cloud-based IT (Cloud Computing) 11. You do not need servers and storage or a technical team to keep it up and running a. Cloud-based IT (Cloud Computing) 12. There isn't a copy of the app for each business that's using it a. Multi-tenant Apps 13. Always been too expensive a. Business Apps 14. Need office space, power, cooling, bandwidth, networks, servers, and storage a. Data Centres 15. Don't eat up your valuable IT resources on increased demand a. Cloud-based IT (Cloud Computing) 16. Between Internet and cloud, which one is owned by an organization? a. Cloud 17. Between Internet and cloud, which one offers open access? a. Internet 18. Between Internet and cloud, which one is metered for billing purposes? a. Cloud 19. Between Internet and cloud, which one has an administrative boundary? a. Cloud 20. Between on-premises IT and cloud-based IT, which one offers full operational governance control? a. On-premises IT 21. What is a key challenge for switching cloud service providers? a. Portability 22. Cloud computing is not secure. True or False? a. False 23. Collecting, processing, and storing data on the cloud that is physically located in a different country may face what challenge? a. Multi-regional compliance and legal challenge 24. XYZ is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. Their most critical tools are their CRM and email servers. They are growing, and so is their customer list and their IT and marketing costs are growing at an alarming rate. They currently use managed services to run their CRM, email, etc software but they have had to deal with significant delays as each growth spurt is bogged down by the time and cost it takes to provision new servers, install the software, test it and bring it online. Which cloud delivery model would be best suited for them? a. IaaS b. SaaS c. PaaS d. DaaS 25. ABC is a mid-size animation company that has historically worked on some of the major animation movies in the last few years. Their core competence is their animation engineers, and their very talented IT staff that manages their server farms and develops new versions of their custom animation software. When they are working on a particular animation sequence, their typical development cycle involves large spikes in computing and storage usage, as they render each section and each version. Over the years, as animations have become more sophisticated, these spikes have become larger and more unpredictable as they start pushing the boundaries of what is computationally possible. Consequently, they have seen their hardware and IT costs increase at a rapid rate in order to service the rendering spikes, while sitting idle the rest of the time. Which cloud delivery model would be best suited for them? a. SaaS b. IaaS c. PaaS d. DaaS 26. PTL is a relatively young high tech company that provides a specialized location based service. Their platform is relatively straightforward: Web servers, application servers, databases, JavaScript and Python. They also require connectivity to some external services such as mapping and location software. As their customer base is growing, their IT provisioning is not able to keep up. Which cloud delivery model would be best suited for them? a. SaaS b. DaaS c. IaaS d. PaaS 27. Which of the following statements is true? a. In order to lease cloud-based IT resources, a cloud consumer’s up-front investment costs must increase when compared to the up-front costs required to purchase the same IT resources as part of an on-premise environment. b. A required characteristic of on premise environments is that they are resilient so as to provide high availability and reliability. This allows an on premise SaaS product to be widely accessible by multiple cloud service consumers. c. When leasing IT resources provided by a public cloud, cloud consumers are required to pay only for the amount of actual usage. d. None of the above. 28. A cloud provider redundantly implements a cloud service deployment to increase its availability and reliability. Which of the following cloud mechanisms is likely to be used for this purpose? a. multi-device broker b. failover system c. automated scaling listener d. All of the above 29. Which of the following cloud mechanisms helps enable the multitenancy characteristic of clouds? a. automated scaling listener b. state management database c. virtual server d. ready-made environment 30. Measured usage represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers. The mechanism can be used for the collection of billing information so that the cloud provider can charge the cloud consumer only for the IT resources actually used. a. resource replication b. pay-per-use monitor c. automated scaling listener d. multi-device broker input and output messages. messages. 2. A can use HTTP headers to carry meta information in its 1. A has a custom service contract that predefines the data model of 4. A shares a uniform contract via HTTP. 3. A has a service contract physically coupled to its solution logic. messages. 1. On a particular physical server, within each virtual machine: a. You can run any version of Windows without regard for the version(s) running in the other virtual machines. b. The versions of Windows must be no more than one release apart. c. The versions of Windows must be exactly the same. 2. Compared with a traditional server data centre, a data centre that makes extensive use of server virtualization requires: a. Fewer staffers to support the servers and operating systems. b. Roughly the same number of staffers to support the servers and operating systems. c. More staffers to support the servers and operating systems. 3. When it comes to avoiding major outages, the use of server virtualization: a. Reduces the frequency of hardware-related service outages. b. Has no material impact. c. Requires that levels of redundancy be increased to avoid an increase in outages affecting multiple applications or services. 4. On a particular server: a. You can reboot a virtual machine without it having any effect on the other virtual machines. b. If you reboot one virtual machine, all the other virtual machines reboot at the same time. c. If you need to reboot one virtual machine, you have to first reboot the physical server. The individual virtual machines then reboot automatically when the physical machine reboot is finished. 5. There are three different types of storage: block, object, and file storage. What is block storage? a. Block storage provides a virtualized storage area network (SAN) with logical volume management. b. Block storage provides a simple, scalable, elastic service for storing data. c. Block storage service provides automatic distribution across AWS regions. 5. A can use SOAP headers to carry meta information in its d. Block storage provides a storage instance that can manage video, multimedia, and data storage. 6. The system that is equipped with a complete software development kit that provides cloud consumers with programmatic access to the development technologies is the: a. Pay-per-use monitor. b. SLA management system. c. Ready-made environment. d. Resource replication. 7. Which of the following infrastructure mechanisms creates multiple instances of the same IT resource needed to enhance that IT resource’s availability and performance? a. Audit monitor. b. SLA monitor. c. Resource cluster. d. Resource replication. 8. Which of the following infrastructure mechanisms is used to specifically observe the runtime performance of cloud services to ensure that they are fulfilling the contractual QoS requirements? a. State management database. b. SLA management system. c. Billing management system. d. Resource management system. 9. Which of the following infrastructure mechanisms is dedicated to the collection and processing of usage data as it pertains to cloud provider accounting and cloud consumer billing? a. Billing management system. b. State management database. c. Resource management system. d. SLA management system. 10. Which of the following infrastructure mechanisms is a lightweight and autonomous software program responsible for collecting and processing IT resource usage data? a. Cloud usage monitor. b. Audit monitor. c. Pay-per-use monitor. d. SLA monitor. 11. Which of the following infrastructure mechanisms is a fundamental part of virtualization infrastructure that is primarily used to generate virtual server instances of a physical server? a. Load balancer. b. Hypervisor c. Audit monitor. d. SLA monitor. 12. Which of the following infrastructure mechanisms is a runtime agent with logic fundamentally based on the premise of employing horizontal scaling to balance a workload across two or more IT resources for increased performance and capacity beyond what a single IT resource can provide? a. Virtual server. b. Audit monitor. c. SLA monitor. d. Load balancer. 13. The IT resources that are geographically diverse but can be logically combined into groups to improve their allocation and use is called: a. Resource replication. b. Virtual server. c. Failover system. d. Resource cluster. 14. What is the name of the monitoring system that is used to collect audit tracking data for networks and IT resources in support of, or dictated by, regulatory and contractual obligations? a. Pay-per-use monitor. b. SLA monitor. c. Audit monitor. d. Cloud usage monitor. 15. A service agent that monitors and tracks communications between cloud service consumers and cloud services for dynamically allocating or releasing IT resources is called the" a. Load balancer. b. Audit monitor. c. Resource cluster. d. Automated scaling listener. 16. Which monitoring mechanism measures cloud-based IT resource usage in accordance with predefined pricing parameters and generates usage logs for fee calculations and billing purposes? a. SLA monitor. b. Pay-per-use monitor. c. Cloud usage monitor. d. Audit monitor. 17. Which system is used to increase the reliability and availability of IT resources by using established clustering technology to provide redundant implementations? a. SLA management system. b. Failover system. c. Virtual server. d. Hypervisor. Week 9 Questions 1. What is the last stage in the cloud data lifecycle? a. Archive b. Store c. Use d. Destroy 2. Vendors should have access to the keys used to encrypt customer data. a. True b. False 3. Alice would like to be able to prove to Charlie that a message she received actually came from Bob. What cryptographic goal is Alice trying to enforce? a. Confidentiality b. Non-repudiation c. Authentication d. Integrity 4. If Alice wants to send a message to Bob using symmetric cryptography, what key does she use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Shared secret key 5. What operation uses a cryptographic key to convert plaintext into ciphertext? a. Encryption b. Hashing c. Decryption d. Digital signature 6. Maloof would like to digitally sign a message that he is sending to Clementine. What key does he use to create the digital signature? a. Clementine's private key b. Maloof's private key c. Maloof's public key d. Clementine's public key 7. Who provides the digital signature on a digital certificate? a. Certificate owner b. Server using the certificate c. Certificate authority d. Certificate recipient Week 10 Questions 1. Fixed resource allocation to a cloud consumer always results in low resource utilization. a. True b. False i. Resource utilization depends on the ratio of the load applied (demand) on the resource and the amount of resource. The higher the load for a fixed resource, the higher the utilization. 2. Fixed resource allocation to a cloud consumer cannot result in steady and high utilization. a. True b. False i. If the demand/load doesn’t change, then the utilization stays steady for a fixed resource allocation. 3. Which of the following is an advantage of automatic scaling? a. Ensures connectivity between the service consumer and provider. b. Helps trace illegal activities. c. Keeps the system running even if some instance fails. d. Maintains service performance by right-sizing resources. 4. Which of the following statements about the SLA monitor is correct? a. It monitors whether a resource is underutilized or not. b. It stores the duration of usage by a consumer for billing purposes. c. It observes the runtime performance of cloud services to ensure that they are fulfilling the contractual QoS requirements. d. It distributes workload to multiple instances. 5. Cloud consumer demand causes the virtual server usage to increase by over 85% of the CPU capacity for two minutes. Which of the following is the automated scaling listener likely to do? a. Shut down the virtual machine with high load. b. Send a notification to the administrator and ask him to control load. c. Instruct the VIM to create another instance of the VM. d. Block the user from accessing the cloud. 6. The up/down status of resources with the status duration information is stored in a log database by the a. Load balancer. b. Audit monitor. c. SLA monitoring agent. d. Failover system. Week 12 (All modules) Questions 1. computing refers to on-demand delivery of compute power, database, storage, applications, and other IT resources on a distributed network using virtualized resources. a. Distributed b. Grid c. Cloud d. Parallel 2. Which of the following is an essential technology for cloud? a. Reliability b. Abstraction c. Windows operating system d. Productivity e. None of the above 3. Which of the following statements is false? a. You can deploy any application in the cloud. b. With cloud computing, you can start very small and become big very fast. c. Cloud computing is built on it evolutionary technologies. d. Cloud computing can support all business sizes, starting from very small to very big. 4. With cloud computing, you abstract IT resources from pooling physical resources and presenting them as a resource. a. Real b. Virtual c. Cloud d. On-premises 5. Which of the following is the cloud platform by Amazon? a. Azure b. AWS c. GCP d. Bluemix e. Rackspace 6. refers to certain cloud environment parameters such as accessibility and ownership of the cloud’s infrastructure. a. Service b. Deployment c. Application d. Distribution e. None of the above 7. Which of the following is a cloud deployment model? a. Public b. Private c. Hybrid d. Community e. All of the above 8. Which of the following is the best known service model? a. SaaS b. IaaS c. PaaS d. All of the above 9. Which of the following cloud deployment models is operated for the exclusive use of an organization? a. Public b. Private c. Community d. Hybrid e. All of the above 10. Which of the following cloud deployment models is used to serve a common function or purpose? a. Public b. Private c. Community d. Hybrid e. All of the above 11. Which of the following cloud deployment models combines multiple clouds where those clouds retain their unique identities but are bound together as a unit? a. Public b. Private c. Community d. Hybrid e. All of the above 12. Which of the following service models provides virtual machines, virtual storage, virtual infrastructure, and other hardware resources? a. IaaS b. SaaS c. PaaS d. DaaS e. All of the above 13. Which of the following provides development frameworks? a. IaaS b. DaaS c. SaaS d. PaaS e. All of the above 14. is a complete operating environment with applications, management, and user interface. a. IaaS b. SaaS c. PaaS d. DaaS e. All of the above 15. Which of the following is an issue especially in cloud-based applications? a. Security b. Storage c. Scalability d. Load balancing e. All of the above 16. Which of the following is a unique attribute of cloud computing? a. Utility type of service delivery b. Elasticity c. Easy to join d. Multi-tenancy e. All of the above 17. Which of the following statements about cloud computing is true? a. Cloud providers and consumers agree to service level agreements (SLAs) b. You need a software licence in the cloud environment c. Cloud computing presents new opportunities for users and developers d. All of the above 18. A type of cloud service that you can use as an alternative to buying your own hardware is the model. a. IaaS b. DaaS c. SaaS d. PaaS e. All of the above 19. Which of the following areas deals with a pay-as-you-go usage model? a. Billing management b. Compliance c. Performance d. Data privacy e. All of the above 20. Security methods, such as encryption, come under the subject area. a. Accounting management b. Compliance c. Elasticity d. Data privacy e. All of the above 21. In which of the following cases is cloud computing a good option for the IT of a business? a. The infrastructure and management cost is low b. The infrastructure and management cost is high. c. The infrastructure and management cost is moderate. d. None of the above 22. A(n) level agreement is the contract for performance negotiated between a service consumer and a service provider. a. Application b. Service c. Deployment d. Payment e. All of the above 23. Which of the following services provides the tools and development environment to deploy applications? a. PaaS b. IaaS c. SaaS d. DaaS e. All of the above 24. Which of the following IT resources is virtualized in the cloud environment? a. Storage b. Memory c. Network d. CPU e. All of the above 25. Which of the following technologies is used to distribute service requests to different instances of the same resource? a. Load performing b. Load scheduling c. Load balancing d. Load reduction e. All of the above 26. Which of the following statements about cloud computing is correct? a. A client can request access to a cloud service from any location b. There are multiple instances of a resource c. A physical machine can be partitioned into a set of virtual machines with each machine being independent d. All of the above 27. An operating system running on a Type hypervisor is full virtualization. a. 1 b. 2 c. 3 d. All of the above 28. Which of the following statements is false? a. The hypervisors installed over an operating system are Type 2 hypervisors b. All CPUs support virtual machines c. On Type 2 hypervisors, the guest operating system interacts with emulated devices d. All of the above 29. In which type of virtualization is the VM installed as a Type 1 hypervisor directly on to the hardware? a. Paravirtualization b. Full virtualization c. Emulation d. None of the above 30. Which of the following statements is false? a. A virtual network can create virtual network cards/interfaces b. Instantiating a virtual machine is a very slow process c. You can make multiple instances of working virtual machines d. You can change the configuration of virtual machines e. All of the above 31. Which of the following is the operational domain of Cloud Security Alliance (CSA)? a. Scalability b. Portability and interoperability c. Flexibility d. None of the above 32. Which of the following is a key mechanism for protecting data? a. Access control b. Auditing c. Authentication d. Encryption e. All of the above 33. Which of the following is a common cause of losing access to encrypted data? a. Losing the keys b. Losing the encryption standard c. Losing the account d. All of the above 34. Which of the following impose additional overhead on clients and offer faster transfer? a. Block storage b. File storage c. File server d. All of the above 35. Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a. SAN b. iSCSI c. Fibre channel d. All of the above 36. When horizontally scaling, the allocation of resources is referred to as and the releasing of resources is referred to as . a. Scaling up / scaling down b. Scaling down / scaling up c. Scaling in / scaling out d. Scaling out / scaling in 37. A cloud service consumer owned by Cloud Consumer A (an organization) accesses a cloud service offered by public Cloud A. Based on this, which of the following statements is false? a. Cloud Consumer A has its own organizational boundary b. Cloud A has its own organizational boundary c. Cloud Consumer A extends its trust boundary to encompass the organizational boundary of Cloud A d. Cloud A extends its organizational boundary to encompass Cloud Consumer A 38. An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premises IT resources is referred to as: a. On-going costs b. Integration costs c. Sunk costs d. Locked-in costs 39. An attacker gains unauthorized access to a virtual server in a public cloud. Which of the following statements about the attack can be true? a. The attacker is an anonymous, non-trusted cloud service consumer b. The attacker is a cloud service consumer that resides outside of the cloud, in an on-premises environment c. The attacker is a cloud service consumer that resides in a different cloud d. All of the above 40. A cloud provider redundantly implements a cloud service deployment to increase its availability and reliability. Which of the following cloud mechanisms is likely to be used for this purpose? a. Multi-device broker b. Failover system c. Automated scaling listener d. All of the above 41. Which of the following cloud mechanisms helps enable the multitenancy characteristic of clouds? a. Automated scaling listener b. State management database c. Virtual server d. Ready-made environment 42. Measured usage represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers. The mechanism can be used for the collection of billing information so that the cloud provider can charge the cloud consumer only for the IT resources actually used. a. Resource replication b. Pay-per-use monitor c. Automated scaling listener d. Multi-device broker 43. Which of the following mechanisms is considered a specialized variation of the cloud usage monitor mechanism? a. Load balancer b. Resource replication c. Resource clustering d. All of the above 44. The is a specialized variation of the cloud usage monitor that is dedicated to collecting usage data for auditing purposes. a. Pay-per-use monitor b. Automated scaling listener c. Audit monitor d. SLA monitor 45. You have a primary storage device and a secondary storage device that duplicates data from the primary storage device and serves the cloud consumer requests in the event that the primary storage device becomes unavailable. Which architecture have we created to establish this system? a. Elastic disk provisioning b. Intra-storage device vertical tiering c. Storage workload management d. None of the above 46. Which of the following statements correctly describes the role of the pay-per-use monitor mechanism as part of the elastic disk provisioning cloud architecture? a. The pay-per-use monitor tracks and collects fixed-disk storage allocation data so that the cloud consumer is billed for the fixed amount of storage provisioned, not for what is consumed. b. The pay-per-use monitor tracks and collects billing-related usage data as it corresponds to the actual amount of storage provisioned and consumed by the cloud consumer. c. The pay-per-use monitor tracks the cloud consumer’s on-premises storage capacity, so that the cloud provider is notified of the capacity for which it can elastically provision the disks. d. None of the above. The pay-per-use monitor is not associated with the elastic disk provisioning architecture. 47. Which of the following statements correctly describes the cloud balancing architecture? a. A cloud architecture in which IT resources are load-balanced across multiple clouds b. A cloud architecture in which IT resources are load-balanced within a single cloud c. A cloud architecture in which IT resources are scaled in from a cloud to an on-premises environment d. A cloud architecture in which IT resources are scaled out from an on-premises environment to a cloud 48. Which of the following is owned by an organization selling cloud services? a. Public b. Private c. Community d. Hybrid 49. Which of the following is the most important area of concern in cloud computing? a. Security b. Storage c. Scalability d. Load balancing e. All of the above C)ITM 711 – Final Exam Sample Questions 1. Which of the following characteristic describes on-premises datacenter? A. Need both production and failover environments, software upgrades, and technical support B. Upgrades are taken care of for you so your apps get security and performance enhancements and new features automatically C. You only pay for what you use (usually on a monthly subscription) D. You do not need servers and storage or a technical team to keep it up and running 2. Which of the following is a key challenge for switching between cloud service providers? A. The new providers cloud service might not be accessible over the Internet B. There might be limited portability between providers C. Some providers don’t have pay-per-use billing system D. Some providers don’t allow different type of devices 3. Which of the following is a characteristic of Cloud Computing? A. On-demand self-service B. Broad network access C. Single-tenancy D. Scalability E. All of the above except option C 4. What does the acronym VIM stand for? A. Virtual Infrastructure Management B. Virtual Integration Manager C. Virtual Internet Machine D. Virtual Implementation Model 5. Cloud based IT resources need to be . A. Configured B. Maintained C. Monitored D. All of the Above 6. ABC is a relatively young high tech company that provides a specialized location based service. Their platform is relatively straightforward: Web servers, application servers, databases, JavaScript and Python. They also require connectivity to some external services such as mapping and location software. As their customer base is growing, their IT provisioning is not able to keep up. Which cloud delivery model would be best suited for them? A. SaaS B. DaaS C. IaaS D. PaaS 7. In which of the following cases the consumer manages the OS, runtime and applications but the cloud provider manages virtualization and physical hardware? A. On-premises datacenter B. IaaS C. PaaS D. SaaS 8. SLA management system mechanism represents a range of commercially available cloud management products that provide features pertaining to the: A. Administration B. Collection C. Storage D. All of the Above 9. What is the purpose of the billing management system? A. Administration of Cloud Services B. Management of VIM C. Collecting and Processing of usage D. None of the Above 10. What are some pricing models for a cloud based service? A. Pay- per –use B. Pay-per-allocation C. Flat-rate D. All of the Above 11. Plaintext data converted into encrypted data is called ? A. Public Key B. Private Key C. Cipher Text D. Morse- code E. Cipher 12. Which of the following is a characteristic of type 1 hypervisor? A. Much simpler to set up B. The machine boots to hypervisor C. Easier to manage D. Does not require dedicated admin 13. Which of the following represents the “Service availability” metric? A. The percentage of a successful outcome from all requests B. The elasticity that an IT resource can achieve C. The percentage of time the services are up to its users D. The time expected to complete switchover from service failure to a replicated instance 14. What type of encryption uses the same key for both encryption and decryption? A. Cipher text B. Symmetric Encryption C. Non- Symmetric Encryption D. Asymmetric Encryption 15. What does the term “non-repudiation” refer to? A. Use of both Public & Private Key B. Privacy of message details C. Non- Symmetric Encryption D. Ensuring message transmission via digital signature 16. Which of the following infrastructure mechanisms is a fundamental part of virtualization infrastructure that is primarily used to generate virtual server instances of a physical server? A. Load balancer. B. Hypervisor C. Audit monitor. D. SLA monitor. 17. Which of the following is a popular example of the hashing application? A. Local Area Network B. Storage of Passwords C. Private Key D. Public Key 18. Which of the following is an upfront cost? A. Electricity cost B. Maintenance costs C. Insurance premium D. Cost to buy an Air Conditioner 19. Fill in the blanks for A, B and C in the following diagram representing how a hashing function is applied to protect the integrity A. Cloud Service Consumer, Message Digest, Malicious Service Agent B. Cloud Service Consumer, Malicious Service Agent, Internet C. Internet, Malicious Service Agent, Message Digest D. Cloud Provider, Message Digest, Internet 20. is a mechanism, which exists as a system of protocols, data formats, rule and practices that enable large-scale systems to securely use public key cryptography. A. Hashing B. VeriSign C. Comodo D. Public Key Infrastructure 21. mechanism enables one cloud service consumer to be authenticated by a security broker, which establishes a security context that is persisted while the consumer accesses other cloud services or resources, so that they need not to re-authenticate itself for every request. A. Public Key B. VeriSign C. Hashing D. Single Sign-On 22. is a service agent that monitors and tracks communications between cloud service consumers and cloud services for dynamic scaling purposes. A. Auto scaling B. Automated scaling listener mechanism C. Auto Notification D. Single Sign-On 23. The assurance that an unauthorized party has altered nothing is called . A. Confidentiality B. Integrity C. Availability D. Authenticity 24. The Load balancer mechanism can exist as: A. Service Agent B. Multi-layer network switch C. Dedicated Hardware Appliance D. All of the Above 25. The device/component labeled with ‘?’ in the following graphic can be which of the following? A. Network Switch B. Dedicated Hardware Appliance C. Load Balancer D. None of the Above 26. What is the purpose of an SLA monitor? A. Authenticate identity using digital signatures B. Measures the usage of resources C. Monitor for malicious traffic D. Observe runtime performance of cloud service to ensure contractual QoS requirement is met. 27. mechanism measures cloud-based IT resource usage in accordance with predefined pricing parameters and generates usage logs for fee calculations and billing purposes. A. Network Switch B. Pay-per use monitor C. Cloud Measure Tool D. Load Balancer 28. A is a distinct and remote IT environment designed for the purpose of remotely provisioning scalable and measured IT resources. A. horizontal scaling B. cloud C. IT resources D. cloud-based IT resource E. vertical scaling 29. is a cloud computing service that creates a development environment for building applications/software. A. Infrastructure as a Service (IaaS) B. Software as a Service (SaaS) C. Platform as a Service (PaaS) D. All of the mentioned 30. Point out the wrong statement: A. It’s always beneficial to put any application on the cloud B. With cloud computing, you can start very small and become big very fast C. Cloud computing is revolutionary, even if the technology it is built on is evolutionary D. None of the mentioned 31. A third party that conducts independent unbiased assessment of cloud environments to help strengthen the trust relationship between cloud consumers and cloud providers is called a . A. cloud provider B. cloud consumer C. cloud service owner D. cloud resource administrator E. cloud auditor 32. virtualization abstracts networking hardware and software into a manageable virtual network. A. Storage B. Network C. Software D. None of the mentioned 33. The diagram shown below represents . A. Single-tenancy B. Multi-tenancy C. Resiliency D. Scaling E. None of the mentioned 34. Which of the following should be placed in the top layer of the following figure? A. Host Operating System B. Guest Operating System C. Software D. Network E. None of the mentioned 35. A measures the usage of a cloud-based IT resource by a given cloud consumer for billing purposes. A. Pay-per-use monitor B. Virtual server C. Ready-made environment D. Automated scaling listener 36. Which of the following is a benefit of Cloud Computing? A. Cloud is the answer to everything B. It is scalable C. It is totally free D. It is cost-saving for all kind of business. 37. Hardening is the process of stripping unnecessary software from a system to limit potential vulnerabilities that can be exploited by attackers. A. Hardening B. Encryption C. Single sign-on D. authorization 38. All Cloud Computing applications suffer from the inherent that is intrinsic in their WAN connectivity. A. noise B. gain C. delay D. All of the mentioned 39. The is a part of the PaaS cloud delivery model that represents a predefined, cloud-based platform comprised of a set of already installed IT resources, ready to be used and customized by a cloud consumer. A. Pay-per-use monitor B. Virtual server C. Ready-made environment D. Cloud storage device E.AWS’s Simple Storage Services (S3) 40. Which of the following monitoring capabilities is NOT needed for pay-per-use and timebased billing purposes? A. Consumer’s Internet connection speed B. Allocation of storage capacity C. Measure inbound and outbound network usage D. Virtual Server uptime periods 41. refers to certain cloud environment parameters such as accessibility and ownership of the cloud’s infrastructure. A. Service B. Deployment C. Application D. Distribution E. None of the above 42. What is the last stage in the cloud data lifecycle? A. Archive B. Store C. Use D. Destroy 43. A database, a physical server, and a service are examples of . A. cloud-based IT resource B. IT resources C. horizontal scaling D. cloud service 44. If Alice wants to send a secure message to Bob using asymmetric cryptography so that only Bob will be able to decrypt the message, what key does she use to encrypt the message? A. Alice's private key B. Alice's public key C. Bob's public key D. Shared secret key E. Bob’s private key 45. What does the acronym VIM stand for? A. Virtual Infrastructure Management B. Virtual Integration Manager C. Virtual Internet Machine D. Virtual Implementation Model
Written for
- Institution
- CITM 711
- Module
- CITM 711
Document information
- Uploaded on
- December 13, 2022
- Number of pages
- 31
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
citm 711 final exams questions and answers 2022 verified solution
-
citm 711 final exams questions and answers 2022 verified solution 1 they cost less because you dont need to pay for all
Also available in package deal