0% found this document useful (0 votes)
693 views

Cloud Computing Answers

This document discusses key concepts related to cloud computing including: - Full virtualization is ideal for disaster recovery and migration capacity. - Abstraction is an essential cloud computing concept. - SaaS supports multiple users through a multi-tenancy model. - A hybrid cloud environment is used to deploy private clouds for critical workloads and public clouds for less critical workloads.

Uploaded by

Nanny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
693 views

Cloud Computing Answers

This document discusses key concepts related to cloud computing including: - Full virtualization is ideal for disaster recovery and migration capacity. - Abstraction is an essential cloud computing concept. - SaaS supports multiple users through a multi-tenancy model. - A hybrid cloud environment is used to deploy private clouds for critical workloads and public clouds for less critical workloads.

Uploaded by

Nanny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

Full virtualization is ideal for ___________.

- Disaster Recovery, Migration


Capacity, Data replication, Computer system sharing, isolate user
Ans: Computer system sharing,isolate users

Which of the following is an essential concept related to the cloud?-Abstraction,


Productivity, Reliability, All of the above
Ans: Abstraction

SaaS supports multiple users and provides a shared data model through ________
model.
Multi-tenancy

________ environment is used to deploy private clouds for critical workloads and a
public cloud to host less critical workloads.- Hybrid, Public, Private, community
Ans: Hybrid

Better Control, higher security, and privacy can be achieved through which type of
cloud deployment model?-- Hybrid, Public, Private, community
Ans: Private

What is the first step in the process of deploying a cloud computing offering?-
Plan governance, Assess risk, cloud readiness assessment, None
Ans: cloud readiness assessment

Which of the following option is offered by Identity as a Service?-Provisioning,


Risk & Event, Identity governance, All of the options
Ans: All of the option

In which type of virtualization, you create a virtual machine on top of physical


hardware?- Desktop, Software, Storage, Server
Ans: Server wrong: storage, desktop

Which feature is needed to make enterprise application migrate to a private cloud?


Elasticity of storage for the application

Reporting services are one of the cloud characteristics.


True

What are the economic advantages of the cloud?


All

What are the cloud cost models?- Free payment, Plan payment, Pay as you use, All of
the option
Ans: All of the option

In paravirtualization, guest operating systems run in isolation.True or false


Ans: False

Paravirtualization is ideal for __________.- Data replication, Computer system


sharing & isolate users,Automatic failure detection, Disaster recovery, migration
capacity
Ans: Disaster recovery wrong: automatic failure detection

IDaaS is a ________-based identity and access management offering.- Daas, Saas,


Paas, Iaas
SaaS

In the public cloud, it incurs high CAPEX and less OPEX.- False/True
False
Which of the following options are virtualization characteristics?-Partitioning,
Encapsulation, Isolation, All
Ans: All of the option

DaaS is utilized for provisioning critical data on demand.True/False


Ans: True

Among the following options, which is an example of hypervisor?-HyerV, Virtual


Machine, Server, None
Ans:Server Wrong: None, HyperV, Virtual Machine

In which cloud model, several organizations access to the same cloud for a similar
application?-Private, public, hybrid, community
Ans: Wrong:Public, private, hybrid

__________ is a tool that communicates with the hosts and their virtual machines.-
virtual server, Virtualization platform, Virtual machine monitor, virtual
infrastructure management component
Ans: Virtual machine monitor

What are the security risks of cloud computing?-Data location and segregation, long
term viability, Privileged access, recovery, all
Ans: All of the above

Infrastructure APIs help in provisioning ________.-Computing and storage resources,


Functionality for the applications,Interaction with application layer, All
Ans: Computing and storage resources

What are the cons of cloud computing?-Sensitive data, Internet Outage, Site access,
All
Ans: All of the above

The resilience characteristic of the cloud helps in easy data recovery after any
failure.
True

Which of the following are cloud characteristics?


ALl

Which computing points to services and applications that operate on a distributed


network utilizing virtualized resources?
Ans: Cloud

Which of the following is cloud computing key enabling technologies?


Ans:All Wrong: Virtualization

What are the components of Cloud?-


Ans: Clients, Data center, Distibuted servers

In hardware virtualization, the resource allotment for the virtual machine is done
by __________.
Hypervisor

Multi-factor authentication is one of the DaaS applications.


False

What refers to the location and management of clouds infrastructure?- service,


application, deployment, none
Ans: Deployment

Which clouds are on-premise giving IT managers complete control over the available
resources?
Ans: Private; Wrong: Public, hybrid

Reporting services are one of the cloud characteristics.


False

You might also like