Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CLOUDF Questions and Answers

Question # 6

Which communication protocol group is generally accepted on the Internet?

A.

NetBIOS

B.

OSI

C.

SNA

D.

TCP/IP

Full Access
Question # 7

What is the benefit of replication of data center sites?

A.

data protection

B.

disaster recovery

C.

extended data storage

D.

increased response rate

Full Access
Question # 8

What is the intended result of a Distributed Denial of Service (DDOS) attack on a web site?

A.

To change the content of the site to prevent it from providing further services

B.

To distribute the content of the site to users who are denied access to its service

C.

To infect the site to distribute a virus to users, which denies them access to further services

D.

To lock users out of the site by exhausting the sites resources

Full Access
Question # 9

Which process is an external process for a Cloud data center?

A.

Availability management

B.

Capacity management

C.

Service continuity management

D.

Service level management

Full Access
Question # 10

What might be considered an advantage for someone storing valuables in a bank in comparison to someone storing data in the Cloud?

A.

The bank customer knows where the bank is located and which locker is used to store valuables.

B.

The bank uses physical measures to protect your valuables.

C.

The bank has better protection against fires and floods.

D.

The bank has better opening hours.

Full Access
Question # 11

What describes a serious drawback in the early development of networks?

A.

Computers were dedicated to one function.

B.

Computers were too complicated to be connected.

C.

There was low network speed.

D.

Vendors developed their own network communication protocols.

Full Access
Question # 12

The e-mail service provided by Google (Gmail) is an example of which deployment and service model?

A.

SaaS in a Public Cloud

B.

SaaS in a Community Cloud

C.

IaaS in a Private Cloud

D.

PaaS in a Hybrid Cloud

Full Access
Question # 13

What do we call the threat of data compromised due to unauthorized access?

A.

Account service and traffic hijacking

B.

Data loss/leakage

C.

Insecure application interfaces

D.

Shared technology vulnerabilities

Full Access
Question # 14

In its 2010 Whitepaper the Cloud Security Alliance (CSA) identifies a number of Top threats to Cloud Computing.

What is not identified by the CSA as a threat?

A.

abuse and nefarious use of Cloud computing

B.

insecure application interfaces

C.

lack of good Service level agreements

D.

unknown risk profile and account

Full Access
Question # 15

What is a good question to ask a prospective Cloud provider?

A.

How can we access the servers in case of an incident?

B.

How is data partitioning done?

C.

What are the names of the Service desk employees?

D.

What are the provisions when a service ends?

Full Access
Question # 16

Why are Service level agreements (SLAs) in Public Clouds highly standardized?

A.

They need to be available to and usable by everyone.

B.

Cloud providers aim for a single service level for all offered services.

C.

They are standardized by the ISO.

D.

They are standardized by the US government.

Full Access