100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CITM 711 FINAL EXAMS QUESTIONS AND ANSWERS 2022 VERIFIED SOLUTION

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
15-12-2022
Written in
2022/2023

CITM 711 FINAL EXAMS QUESTIONS AND ANSWERS 2022 VERIFIED SOLUTION 1. They cost less because you don't need to pay for all the people, products, and facilities to run them a. A: Cloud-based IT (Cloud Computing) 2. Q:You only pay for what you use (usually on a monthly subscription)Cloud-based IT a. (Cloud Computing) 3. Q: Apps are more scalable, secure, and reliable than the vast majority of apps out thereA: a. Cloud-based IT (Cloud Computing) 4. Upgrades are taken care of for you so your apos get security and performance enhancements and new features automatically a. Cloud-based IT (Cloud Computing) 5. Need staff and a team of experts to develop, test, and deploy complicated software a. Data Centres 6. It's one app that everyone shares but it's flexible enough for everyone to customize for their specific needs a. Multi-tenant Apps 7. Can run in a data centre or on the cloud a. Business Apps 8. Need both production and failover environments, software upgrades, and technical support a. Data Centres 9. Uses shared data centres a. Cloud-based IT (Cloud Computing) 10. You can quickly get started - just log in, customize it, and start using it (and it costs less) a. Cloud-based IT (Cloud Computing) 11. You do not need servers and storage or a technical team to keep it up and running a. Cloud-based IT (Cloud Computing) 12. There isn't a copy of the app for each business that's using it a. Multi-tenant Apps 13. Always been too expensive a. Business Apps 14. Need office space, power, cooling, bandwidth, networks, servers, and storage a. Data Centres 15. Don't eat up your valuable IT resources on increased demand a. Cloud-based IT (Cloud Computing) 16. Between Internet and cloud, which one is owned by an organization? a. Cloud 17. Between Internet and cloud, which one offers open access? a. Internet 18. Between Internet and cloud, which one is metered for billing purposes? a. Cloud 19. Between Internet and cloud, which one has an administrative boundary? a. Cloud 20. Between on-premises IT and cloud-based IT, which one offers full operational governance control? a. On-premises IT 21. What is a key challenge for switching cloud service providers? a. Portability 22. Cloud computing is not secure. True or False? a. False 23. Collecting, processing, and storing data on the cloud that is physically located in a different country may face what challenge? a. Multi-regional compliance and legal challenge 24. XYZ is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. Their most critical tools are their CRM and email servers. They are growing, and so is their customer list and their IT and marketing costs are growing at an alarming rate. They currently use managed services to run their CRM, email, etc software but they have had to deal with significant delays as each growth spurt is bogged down by the time and cost it takes to provision new servers, install the software, test it and bring it online. Which cloud delivery model would be best suited for them? a. IaaS b. SaaS c. PaaS d. DaaS 25. ABC is a mid-size animation company that has historically worked on some of the major animation movies in the last few years. Their core competence is their animation engineers, and their very talented IT staff that manages their server farms and develops new versions of their custom animation software. When they are working on a particular animation sequence, their typical development cycle involves large spikes in computing and storage usage, as they render each section and each version. Over the years, as animations have become more sophisticated, these spikes have become larger and more unpredictable as they start pushing the boundaries of what is computationally possible. Consequently, they have seen their hardware and IT costs increase at a rapid rate in order to service the rendering spikes, while sitting idle the rest of the time. Which cloud delivery model would be best suited for them? a. SaaS b. IaaS c. PaaS d. DaaS 26. PTL is a relatively young high tech company that provides a specialized location based service. Their platform is relatively straightforward: Web servers, application servers, databases, JavaScript and Python. They also require connectivity to some external services such as mapping and location software. As their customer base is growing, their IT provisioning is not able to keep up. Which cloud delivery model would be best suited for them? a. SaaS b. DaaS c. IaaS d. PaaS 27. Which of the following statements is true? a. In order to lease cloud-based IT resources, a cloud consumer’s up-front investment costs must increase when compared to the up-front costs required to purchase the same IT resources as part of an on-premise environment. b. A required characteristic of on premise environments is that they are resilient so as to provide high availability and reliability. This allows an on premise SaaS product to be widely accessible by multiple cloud service consumers. c. When leasing IT resources provided by a public cloud, cloud consumers are required to pay only for the amount of actual usage. d. None of the above. 28. A cloud provider redundantly implements a cloud service deployment to increase its availability and reliability. Which of the following cloud mechanisms is likely to be used for this purpose? a. multi-device broker b. failover system c. automated scaling listener d. All of the above 29. Which of the following cloud mechanisms helps enable the multitenancy characteristic of clouds? a. automated scaling listener b. state management database c. virtual server d. ready-made environment 30. Measured usage represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers. The mechanism can be used for the collection of billing information so that the cloud provider can charge the cloud consumer only for the IT resources actually used. a. resource replication b. pay-per-use monitor c. automated scaling listener d. multi-device broker input and output messages. messages. 2. A can use HTTP headers to carry meta information in its 1. A has a custom service contract that predefines the data model of 4. A shares a uniform contract via HTTP. 3. A has a service contract physically coupled to its solution logic. messages. 1. On a particular physical server, within each virtual machine: a. You can run any version of Windows without regard for the version(s) running in the other virtual machines. b. The versions of Windows must be no more than one release apart. c. The versions of Windows must be exactly the same. 2. Compared with a traditional server data centre, a data centre that makes extensive use of server virtualization requires: a. Fewer staffers to support the servers and operating systems. b. Roughly the same number of staffers to support the servers and operating systems. c. More staffers to support the servers and operating systems. 3. When it comes to avoiding major outages, the use of server virtualization: a. Reduces the frequency of hardware-related service outages. b. Has no material impact. c. Requires that levels of redundancy be increased to avoid an increase in outages affecting multiple applications or services. 4. On a particular server: a. You can reboot a virtual machine without it having any effect on the other virtual machines. b. If you reboot one virtual machine, all the other virtual machines reboot at the same time. c. If you need to reboot one virtual machine, you have to first reboot the physical server. The individual virtual machines then reboot automatically when the physical machine reboot is finished. 5. There are three different types of storage: block, object, and file storage. What is block storage? a. Block storage provides a virtualized storage area network (SAN) with logical volume management. b. Block storage provides a simple, scalable, elastic service for storing data. c. Block storage service provides automatic distribution across AWS regions. 5. A can use SOAP headers to carry meta information in its d. Block storage provides a storage instance that can manage video, multimedia, and data storage. 6. The system that is equipped with a complete software development kit that provides cloud consumers with programmatic access to the development technologies is the: a. Pay-per-use monitor. b. SLA management system. c. Ready-made environment. d. Resource replication. 7. Which of the following infrastructure mechanisms creates multiple instances of the same IT resource needed to enhance that IT resource’s availability and performance? a. Audit monitor. b. SLA monitor. c. Resource cluster. d. Resource replication. 8. Which of the following infrastructure mechanisms is used to specifically observe the runtime performance of cloud services to ensure that they are fulfilling the contractual QoS requirements? a. State management database. b. SLA management system. c. Billing management system. d. Resource management system. 9. Which of the following infrastructure mechanisms is dedicated to the collection and processing of usage data as it pertains to cloud provider accounting and cloud consumer billing? a. Billing management system. b. State management database. c. Resource management system. d. SLA management system. 10. Which of the following infrastructure mechanisms is a lightweight and autonomous software program responsible for collecting and processing IT resource usage data? a. Cloud usage monitor. b. Audit monitor. c. Pay-per-use monitor. d. SLA monitor. 11. Which of the following infrastructure mechanisms is a fundamental part of virtualization infrastructure that is primarily used to generate virtual server instances of a physical server? a. Load balancer. b. Hypervisor c. Audit monitor. d. SLA monitor. 12. Which of the following infrastructure mechanisms is a runtime agent with logic fundamentally based on the premise of employing horizontal scaling to balance a workload across two or more IT resources for increased performance and capacity beyond what a single IT resource can provide? a. Virtual server. b. Audit monitor. c. SLA monitor. d. Load balancer. 13. The IT resources that are geographically diverse but can be logically combined into groups to improve their allocation and use is called: a. Resource replication. b. Virtual server. c. Failover system. d. Resource cluster. 14. What is the name of the monitoring system that is used to collect audit tracking data for networks and IT resources in support of, or dictated by, regulatory and contractual obligations? a. Pay-per-use monitor. b. SLA monitor. c. Audit monitor. d. Cloud usage monitor. 15. A service agent that monitors and tracks communications between cloud service consumers and cloud services for dynamically allocating or releasing IT resources is called the" a. Load balancer. b. Audit monitor. c. Resource cluster. d. Automated scaling listener. 16. Which monitoring mechanism measures cloud-based IT resource usage in accordance with predefined pricing parameters and generates usage logs for fee calculations and billing purposes? a. SLA monitor. b. Pay-per-use monitor. c. Cloud usage monitor. d. Audit monitor. 17. Which system is used to increase the reliability and availability of IT resources by using established clustering technology to provide redundant implementations? a. SLA management system. b. Failover system. c. Virtual server. d. Hypervisor. Week 9 Questions 1. What is the last stage in the cloud data lifecycle? a. Archive b. Store c. Use d. Destroy 2. Vendors should have access to the keys used to encrypt customer data. a. True b. False 3. Alice would like to be able to prove to Charlie that a message she received actually came from Bob. What cryptographic goal is Alice trying to enforce? a. Confidentiality b. Non-repudiation c. Authentication d. Integrity 4. If Alice wants to send a message to Bob using symmetric cryptography, what key does she use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Shared secret key 5. What operation uses a cryptographic key to convert plaintext into ciphertext? a. Encryption b. Hashing c. Decryption d. Digital signature 6. Maloof would like to digitally sign a message that he is sending to Clementine. What key does he use to create the digital signature? a. Clementine's private key b. Maloof's private key c. Maloof's public key d. Clementine's public key 7. Who provides the digital signature on a digital certificate? a. Certificate owner b. Server using the certificate c. Certificate authority d. Certificate recipient Week 10 Questions 1. Fixed resource allocation to a cloud consumer always results in low resource utilization. a. True b. False i. Resource utilization depends on the ratio of the load applied (demand) on the resource and the amount of resource. The higher the load for a fixed resource, the higher the utilization. 2. Fixed resource allocation to a cloud consumer cannot result in steady and high utilization. a. True b. False i. If the demand/load doesn’t change, then the utilization stays steady for a fixed resource allocation. 3. Which of the following is an advantage of automatic scaling? a. Ensures connectivity between the service consumer and provider. b. Helps trace illegal activities. c. Keeps the system running even if some instance fails. d. Maintains service performance by right-sizing resources. 4. Which of the following statements about the SLA monitor is correct? a. It monitors whether a resource is underutilized or not. b. It stores the duration of usage by a consumer for billing purposes. c. It observes the runtime performance of cloud services to ensure that they are fulfilling the contractual QoS requirements. d. It distributes workload to multiple instances. 5. Cloud consumer demand causes the virtual server usage to increase by over 85% of the CPU capacity for two minutes. Which of the following is the automated scaling listener likely to do? a. Shut down the virtual machine with high load. b. Send a notification to the administrator and ask him to control load. c. Instruct the VIM to create another instance of the VM. d. Block the user from accessing the cloud. 6. The up/down status of resources with the status duration information is stored in a log database by the a. Load balancer. b. Audit monitor. c. SLA monitoring agent. d. Failover system. Week 12 (All modules) Questions 1. computing refers to on-demand delivery of compute power, database, storage, applications, and other IT resources on a distributed network using virtualized resources. a. Distributed b. Grid c. Cloud d. Parallel 2. Which of the following is an essential technology for cloud? a. Reliability b. Abstraction c. Windows operating system d. Productivity e. None of the above 3. Which of the following statements is false? a. You can deploy any application in the cloud. b. With cloud computing, you can start very small and become big very fast. c. Cloud computing is built on it evolutionary technologies. d. Cloud computing can support all business sizes, starting from very small to very big. 4. With cloud computing, you abstract IT resources from pooling physical resources and presenting them as a resource. a. Real b. Virtual c. Cloud d. On-premises 5. Which of the following is the cloud platform by Amazon? a. Azure b. AWS c. GCP d. Bluemix e. Rackspace 6. refers to certain cloud environment parameters such as accessibility and ownership of the cloud’s infrastructure. a. Service b. Deployment c. Application d. Distribution e. None of the above 7. Which of the following is a cloud deployment model? a. Public b. Private c. Hybrid d. Community e. All of the above 8. Which of the following is the best known service model? a. SaaS b. IaaS c. PaaS d. All of the above 9. Which of the following cloud deployment models is operated for the exclusive use of an organization? a. Public b. Private c. Community d. Hybrid e. All of the above 10. Which of the following cloud deployment models is used to serve a common function or purpose? a. Public b. Private c. Community d. Hybrid e. All of the above 11. Which of the following cloud deployment models combines multiple clouds where those clouds retain their unique identities but are bound together as a unit? a. Public b. Private c. Community d. Hybrid e. All of the above 12. Which of the following service models provides virtual machines, virtual storage, virtual infrastructure, and other hardware resources? a. IaaS b. SaaS c. PaaS d. DaaS e. All of the above 13. Which of the following provides development frameworks? a. IaaS b. DaaS c. SaaS d. PaaS e. All of the above 14. is a complete operating environment with applications, management, and user interface. a. IaaS b. SaaS c. PaaS d. DaaS e. All of the above 15. Which of the following is an issue especially in cloud-based applications? a. Security b. Storage c. Scalability d. Load balancing e. All of the above 16. Which of the following is a unique attribute of cloud computing? a. Utility type of service delivery b. Elasticity c. Easy to join d. Multi-tenancy e. All of the above 17. Which of the following statements about cloud computing is true? a. Cloud providers and consumers agree to service level agreements (SLAs) b. You need a software licence in the cloud environment c. Cloud computing presents new opportunities for users and developers d. All of the above 18. A type of cloud service that you can use as an alternative to buying your own hardware is the model. a. IaaS b. DaaS c. SaaS d. PaaS e. All of the above 19. Which of the following areas deals with a pay-as-you-go usage model? a. Billing management b. Compliance c. Performance d. Data privacy e. All of the above 20. Security methods, such as encryption, come under the subject area. a. Accounting management b. Compliance c. Elasticity d. Data privacy e. All of the above 21. In which of the following cases is cloud computing a good option for the IT of a business? a. The infrastructure and management cost is low b. The infrastructure and management cost is high. c. The infrastructure and management cost is moderate. d. None of the above 22. A(n) level agreement is the contract for performance negotiated between a service consumer and a service provider. a. Application b. Service c. Deployment d. Payment e. All of the above 23. Which of the following services provides the tools and development environment to deploy applications? a. PaaS b. IaaS c. SaaS d. DaaS e. All of the above 24. Which of the following IT resources is virtualized in the cloud environment? a. Storage b. Memory c. Network d. CPU e. All of the above 25. Which of the following technologies is used to distribute service requests to different instances of the same resource? a. Load performing b. Load scheduling c. Load balancing d. Load reduction e. All of the above 26. Which of the following statements about cloud computing is correct? a. A client can request access to a cloud service from any location b. There are multiple instances of a resource c. A physical machine can be partitioned into a set of virtual machines with each machine being independent d. All of the above 27. An operating system running on a Type hypervisor is full virtualization. a. 1 b. 2 c. 3 d. All of the above 28. Which of the following statements is false? a. The hypervisors installed over an operating system are Type 2 hypervisors b. All CPUs support virtual machines c. On Type 2 hypervisors, the guest operating system interacts with emulated devices d. All of the above 29. In which type of virtualization is the VM installed as a Type 1 hypervisor directly on to the hardware? a. Paravirtualization b. Full virtualization c. Emulation d. None of the above 30. Which of the following statements is false? a. A virtual network can create virtual network cards/interfaces b. Instantiating a virtual machine is a very slow process c. You can make multiple instances of working virtual machines d. You can change the configuration of virtual machines e. All of the above 31. Which of the following is the operational domain of Cloud Security Alliance (CSA)? a. Scalability b. Portability and interoperability c. Flexibility d. None of the above 32. Which of the following is a key mechanism for protecting data? a. Access control b. Auditing c. Authentication d. Encryption e. All of the above 33. Which of the following is a common cause of losing access to encrypted data? a. Losing the keys b. Losing the encryption standard c. Losing the account d. All of the above 34. Which of the following impose additional overhead on clients and offer faster transfer? a. Block storage b. File storage c. File server d. All of the above 35. Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a. SAN b. iSCSI c. Fibre channel d. All of the above 36. When horizontally scaling, the allocation of resources is referred to as and the releasing of resources is referred to as . a. Scaling up / scaling down b. Scaling down / scaling up c. Scaling in / scaling out d. Scaling out / scaling in 37. A cloud service consumer owned by Cloud Consumer A (an organization) accesses a cloud service offered by public Cloud A. Based on this, which of the following statements is false? a. Cloud Consumer A has its own organizational boundary b. Cloud A has its own organizational boundary c. Cloud Consumer A extends its trust boundary to encompass the organizational boundary of Cloud A d. Cloud A extends its organizational boundary to encompass Cloud Consumer A 38. An organization will often have existing IT resources that are already paid for and operational. The prior investment that has been made in these on-premises IT resources is referred to as: a. On-going costs b. Integration costs c. Sunk costs d. Locked-in costs 39. An attacker gains unauthorized access to a virtual server in a public cloud. Which of the following statements about the attack can be true? a. The attacker is an anonymous, non-trusted cloud service consumer b. The attacker is a cloud service consumer that resides outside of the cloud, in an on-premises environment c. The attacker is a cloud service consumer that resides in a different cloud d. All of the above 40. A cloud provider redundantly implements a cloud service deployment to increase its availability and reliability. Which of the following cloud mechanisms is likely to be used for this purpose? a. Multi-device broker b. Failover system c. Automated scaling listener d. All of the above 41. Which of the following cloud mechanisms helps enable the multitenancy characteristic of clouds? a. Automated scaling listener b. State management database c. Virtual server d. Ready-made environment 42. Measured usage represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers. The mechanism can be used for the collection of billing information so that the cloud provider can charge the cloud consumer only for the IT resources actually used. a. Resource replication b. Pay-per-use monitor c. Automated scaling listener d. Multi-device broker 43. Which of the following mechanisms is considered a specialized variation of the cloud usage monitor mechanism? a. Load balancer b. Resource replication c. Resource clustering d. All of the above 44. The is a specialized variation of the cloud usage monitor that is dedicated to collecting usage data for auditing purposes. a. Pay-per-use monitor b. Automated scaling listener c. Audit monitor d. SLA monitor 45. You have a primary storage device and a secondary storage device that duplicates data from the primary storage device and serves the cloud consumer requests in the event that the primary storage device becomes unavailable. Which architecture have we created to establish this system? a. Elastic disk provisioning b. Intra-storage devic

Show more Read less
Institution
CITM 711
Module
CITM 711











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CITM 711
Module
CITM 711

Document information

Uploaded on
December 15, 2022
Number of pages
31
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bettergraders Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
26
Member since
4 year
Number of followers
28
Documents
1622
Last sold
1 year ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions