Cloud Computing
Description: Implementation of private cloud computing | |
Number of Questions: 15 | |
Created by: Tanya Dwivedi | |
Tags: Implementaion of private cloud computing Information Technology IT Certificate Programs |
Which of the following security techniques represents that your data in the cloud can be trusted by the government rules and policies?
Which of the following provides close support with technology providers insisting on private and hybrid cloud creation?
Which of the following technologies is used when an organisation is concentrating on collaboration projects?
Which of the following technologies allows the compute capabilities and services to the internal users in a self service manner?
Which of the following security techniques is used to make certain that data is operated accurately in unstructured files?
By using which of the following storages as a service can you just drag and drop file back and forth between your online storage and your local desktop?
Which of the following data stores is used with two other Amazon products to store, process and query data sets in the cloud?
Which of the following security techniques is used to act as an obstruction between the public internet and any private network?
Which of the following security techniques is used to protect your sensitive data from hackers and enables only the computer that you send it to have the key to decode the data?
Which of the following techniques allows you to specify the target storage and path?
Which of the following matters in the cloud environment, especially from a legal stand point?
Which of the following data stores includes web indexing, Google earth and Google finance?
Which of the following is the service level agreement with an individual customer group that covers all the services?
In which of the following storages can you upload any type of file but cannot edit the file through the online desktop?
Which of the following security techniques is used to ensure that data is permanently deleted from backups and redundant storage sites?