Home
You may like this!
31.
Which of the following is not a common cloud service model?
  • A.
    Software as a Service
  • B.
    Programming as a Service
  • C.
    Infrastructure as a Service
  • D.
    Platform as a Service.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Programming as a Service is not a common offering; the others are ubiquitous throughout the industry.
Report
Name Email  
32.
All of these technologies have made cloud service viable except:
  • A.
    Virtualization
  • B.
    Widely available broadband
  • C.
    Cryptographic connectivity
  • D.
    Smart hubs
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Virtualization allows scalable resource allocation; broadband connections allow users to have remote access from anywhere; cryptographic connections allow for secure remote access. Smart hubs aren’t widely used in cloud offerings.
Report
Name Email  
33.
Cloud vendors are held to contractual obligations with specified metrics by:
  • A.
    SLAs
  • B.
    Regulations
  • C.
    Law
  • D.
    Discipline
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Service-level agreements (SLAs) specify objective measures that define what the cloud provider will deliver to the customer.
Report
Name Email  
34.
______________drive security decisions.
  • A.
    Customer service responses
  • B.
    Surveys
  • C.
    Business requirements
  • D.
    Public opinion
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Security is usually not a profit center, and is therefore beholden to business drivers; the purpose of security is to support the business.
Report
Name Email  
35.
If a cloud customer cannot get access to the cloud provider, this affects what portion of the CIA triad?
  • A.
    Integrity
  • B.
    Authentication
  • C.
    Confidentiality
  • D.
    Availability
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Lack of access is an availability issue.
Report
Name Email