Cloud Computing

Description: Implementation of private cloud computing
Number of Questions: 15
Created by:
Tags: Implementaion of private cloud computing Information Technology IT Certificate Programs
Attempted 0/15 Correct 0 Score 0

Which of the following security techniques represents that your data in the cloud can be trusted by the government rules and policies?

  1. Change management control

  2. Output reconciliation control

  3. Data control

  4. Access control list

  5. Physical security


Correct Option: C
Explanation:

This security technique represents that your data in the cloud can be trusted by the government rules and policies.

Which of the following provides close support with technology providers insisting on private and hybrid cloud creation?

  1. System integrator

  2. Bandwidth manager

  3. Technical account manager

  4. TAM management business review

  5. System monitor


Correct Option: A
Explanation:

It provides close support with technology providers insisting on private and hybrid cloud creation.

Which of the following technologies is used when an organisation is concentrating on collaboration projects?

  1. Collaborative computing

  2. Sify my storage

  3. Virtual machine technology

  4. Hybrid cloud

  5. Public cloud


Correct Option: E
Explanation:

This technology is used when an organisation is concentrating on collaboration projects.

Which of the following technologies allows the compute capabilities and services to the internal users in a self service manner?

  1. Hybrid cloud

  2. Private cloud

  3. Client server computing

  4. Peer to peer computing

  5. Virtual machine technology


Correct Option: B
Explanation:

This technology allows the compute capabilities and services to the internal users in a self service manner.

Which of the following security techniques is used to make certain that data is operated accurately in unstructured files?

  1. Physical security

  2. Access control list

  3. Output reconciliation control

  4. File control

  5. Change management control


Correct Option: D
Explanation:

This security technique is used to make certain that data is operated accurately in unstructured files.

By using which of the following storages as a service can you just drag and drop file back and forth between your online storage and your local desktop?

  1. Jungle disk

  2. Wuala

  3. CouchDB

  4. MangoDB v.1.8.0

  5. Sify my storage


Correct Option: A
Explanation:

By using this storage as a service, you can just drag and drop files back and forth between your online storage and your local desktop.

Which of the following data stores is used with two other Amazon products to store, process and query data sets in the cloud?

  1. Sales force

  2. Amazon SimpleDB

  3. MangoDB v.1.8.0

  4. CouchDB

  5. Apache hadoop


Correct Option: B
Explanation:

This data store is used with two other Amazon products to store, process and query data sets in the cloud.

Which of the following security techniques is used to act as an obstruction between the public internet and any private network?

  1. Gateway

  2. Physical security

  3. Firewall

  4. Access control list

  5. Output reconciliation control


Correct Option: C
Explanation:

This security technique is used to act as an obstruction between the public internet and any private network.

Which of the following security techniques is used to protect your sensitive data from hackers and enables only the computer that you send it to have the key to decode the data?

  1. Access control list

  2. Physical security

  3. Output reconciliation control

  4. Backup and recovery control

  5. Encryption


Correct Option: E
Explanation:

This security technique is used to protect your sensitive data from hackers. Only the computer that you send it to have the key to decode the data.

Which of the following techniques allows you to specify the target storage and path?

  1. Force.com

  2. CouchDB

  3. Data transformation

  4. Data relocation

  5. Change management control


Correct Option: D
Explanation:

This technique allows you to specify the target storage and path.

Which of the following matters in the cloud environment, especially from a legal stand point?

  1. Data transparency

  2. Data transformation

  3. Data location

  4. Output reconciliation control

  5. MangoDB v.1.8.0


Correct Option: C
Explanation:

In the cloud environment, data location matters, especially from a legal stand point.

Which of the following data stores includes web indexing, Google earth and Google finance?

  1. MangoDB v.1.8.0

  2. Google bigtable

  3. CouchDB

  4. Wuala

  5. Google app engine


Correct Option: B
Explanation:

This data store includes web indexing, Google earth and Google finance.

Which of the following is the service level agreement with an individual customer group that covers all the services?

  1. Customer based service level agreement

  2. Service based service level agreement

  3. Corporate level service level agreement

  4. Force.com

  5. Client server computing


Correct Option: A
Explanation:

This is the service level agreement with an individual customer group that covers all the services.

In which of the following storages can you upload any type of file but cannot edit the file through the online desktop?

  1. CouchDB

  2. Live mesh

  3. Wuala

  4. MangDB v.1.8.0

  5. Sify my storage


Correct Option: B
Explanation:

In this storage, you can upload any type of file but cannot edit the file through the online desktop.

Which of the following security techniques is used to ensure that data is permanently deleted from backups and redundant storage sites?

  1. Data destruction control

  2. Backup and recovery control

  3. Change management control

  4. Output reconciliation control

  5. Physical security


Correct Option: A
Explanation:

This security technique is used to ensure that data is permanently deleted from all backups and redundant storage sites.

- Hide questions