Cloud Technology Concepts v6.0

Page:    1 / 6   
Exam contains 86 questions

A malicious cloud service consumer circumvents the authentication enforced by the virtual server and manages to attack the underlying hardware directly. This is an example of which cloud security threat? Select the correct answer.

  • A. denial of service
  • B. insufficient authorization
  • C. information leakage
  • D. None of the above.


Answer : D

Because non-relational cloud storage avoids the processing overhead that can be imposed by relational databases, it can be more scalable. Select the correct answer.

  • A. True
  • B. False


Answer : A

Which of the following types of testing are directly associated with testing the speed, responsiveness, stability and/or reliability of cloud-based IT resources? SELECT ALL

THAT APPLY -

  • A. virtual testing
  • B. performance testing
  • C. stress testing
  • D. regression testing


Answer : B,C

A ___________________ is a mechanism used to temporarily persist certain types of data as an alternative to caching the data in memory. Select the correct answer.

  • A. resource replicator
  • B. state management database
  • C. failover system
  • D. multi-device broker


Answer : B

Where is the automated scaling listener in a cloud bursting architecture most commonly deployed? Select the correct answer.

  • A. on-premise with the cloud consumer
  • B. in the cloud that hosts the cloud-based IT resources being scaled
  • C. in a separate cloud from the cloud-based IT resources being scaled
  • D. None of the above.


Answer : A

Which of the following mechanisms are combined in a cloud balancing architecture?

SELECT ALL THAT APPLY -

  • A. automated scaling listener
  • B. failover system
  • C. multi-device broker
  • D. pay-for-use monitor


Answer : A,B

A successful attack on a virtual server within a public cloud will negatively impact multiple cloud consumers, as long as none of the cloud consumers share the same trust boundary that encompasses the underlying physical server. Select the correct answer.

  • A. True
  • B. False


Answer : B

With cloud-based security groups, a __________________ separation of network segments is performed. Each IT resource then becomes a member of
__________________ security group(s). Select the correct answer.

  • A. logical, only one
  • B. physical, only one
  • C. logical, one or more
  • D. physical, one or more


Answer : C

The required parts of a SOAP message are the envelope document and the header and body sections. Select the correct answer.

  • A. True
  • B. False


Answer : B

Which of the following cloud computing mechanisms is not directly associated with the realization of the resiliency cloud characteristic? Select the correct answer.

  • A. automated scaling listener
  • B. failover system
  • C. resource replication
  • D. state management database


Answer : A

A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: __________________. Select the correct answer.

  • A. denial of service
  • B. overlapping trust boundary
  • C. insufficient authorization
  • D. buffer overrun


Answer : A

A cloud service built as a component will have a service contract that is physically coupled to the service's logic. Select the correct answer.

  • A. True
  • B. False


Answer : A

Which of the following characteristics of cloud-based IT resources can be measured with
Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) implementations?

SELECT ALL THAT APPLY -

  • A. availability
  • B. confidentiality
  • C. reliability
  • D. performance


Answer : A,C,D

The ___________________ attack occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker gaining access to IT resources that are normally protected. Select the correct answer.

  • A. denial of service
  • B. malicious intermediary
  • C. insufficient authorization
  • D. virtualization


Answer : C

Information that is encrypted is referred to as ___________________. Select the correct answer.

  • A. cleartext
  • B. ciphertext
  • C. plaintext
  • D. secret text


Answer : B

Page:    1 / 6   
Exam contains 86 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary doesn't offer Real Microsoft Exam Questions.
Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.