31.
Which of the following is not a common cloud service model?
- A.Software as a Service
- B.Programming as a Service
- C.Infrastructure as a Service
- D.Platform as a Service.
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Programming as a Service is not a common offering; the others are ubiquitous throughout the industry. |
32.
All of these technologies have made cloud service viable except:
- A.Virtualization
- B.Widely available broadband
- C.Cryptographic connectivity
- D.Smart hubs
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Virtualization allows scalable resource allocation; broadband connections allow users to have remote access from anywhere; cryptographic connections allow for secure remote access. Smart hubs aren’t widely used in cloud offerings. |
33.
Cloud vendors are held to contractual obligations with specified metrics by:
- A.SLAs
- B.Regulations
- C.Law
- D.Discipline
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Service-level agreements (SLAs) specify objective measures that define what the cloud provider will deliver to the customer. |
34.
______________drive security decisions.
- A.Customer service responses
- B.Surveys
- C.Business requirements
- D.Public opinion
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Security is usually not a profit center, and is therefore beholden to business drivers; the purpose of security is to support the business. |
35.
If a cloud customer cannot get access to the cloud provider, this affects what portion of the
CIA triad?
- A.Integrity
- B.Authentication
- C.Confidentiality
- D.Availability
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Lack of access is an availability issue. |