A malicious cloud service consumer circumvents the authentication enforced by the virtual server and manages to attack the underlying hardware directly. This is an example of which cloud security threat? Select the correct answer.
Answer : D
Because non-relational cloud storage avoids the processing overhead that can be imposed by relational databases, it can be more scalable. Select the correct answer.
Answer : A
Which of the following types of testing are directly associated with testing the speed, responsiveness, stability and/or reliability of cloud-based IT resources? SELECT ALL
THAT APPLY -
Answer : BC
A ___________________ is a mechanism used to temporarily persist certain types of data as an alternative to caching the data in memory. Select the correct answer.
Answer : B
Where is the automated scaling listener in a cloud bursting architecture most commonly deployed? Select the correct answer.
Answer : A
Which of the following mechanisms are combined in a cloud balancing architecture?
SELECT ALL THAT APPLY -
Answer : AB
A successful attack on a virtual server within a public cloud will negatively impact multiple cloud consumers, as long as none of the cloud consumers share the same trust boundary that encompasses the underlying physical server. Select the correct answer.
Answer : B
With cloud-based security groups, a __________________ separation of network segments is performed. Each IT resource then becomes a member of
__________________ security group(s). Select the correct answer.
Answer : C
The required parts of a SOAP message are the envelope document and the header and body sections. Select the correct answer.
Answer : B
Which of the following cloud computing mechanisms is not directly associated with the realization of the resiliency cloud characteristic? Select the correct answer.
Answer : A
A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: __________________. Select the correct answer.
Answer : A
A cloud service built as a component will have a service contract that is physically coupled to the service's logic. Select the correct answer.
Answer : A
Which of the following characteristics of cloud-based IT resources can be measured with
Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) implementations?
SELECT ALL THAT APPLY -
Answer : ACD
The ___________________ attack occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker gaining access to IT resources that are normally protected. Select the correct answer.
Answer : C
Information that is encrypted is referred to as ___________________. Select the correct answer.
Answer : B
Have any questions or issues ? Please dont hesitate to contact us