Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is an economic cloud solution for a short term project like a one time application design?

A.

Platform-as-a-Service

B.

Software as-a-Service

C.

Communication-as-a-Service

D.

Security-as-a-Service

The Total Cost of Ownership (TCO) of a Cloud solution may change and in the worst case increase.

How can this happen?

A.

In certain cases the TCO is intentionally shortened by lack of vision on future developments.

B.

In certain cases the TCO is just not the right measure for calculating relevant costs and expenditures.

C.

In some cases customers have not acted upon a good business case.

D.

In some cases only the distribution of different components that add up to the TCO may change.

What is meant by data partitioning in the Cloud?

A.

formatting a hard disk to allow for very big files

B.

keeping data from one Cloud user on a single hard disk

C.

keeping data from one Cloud user safe from other users

D.

splitting data into small parts so they fit more easily on a solid state disk

What do we call the threat of data compromised due to unauthorized access?

A.

Account service and traffic hijacking

B.

Data loss/leakage

C.

Insecure application interfaces

D.

Shared technology vulnerabilities

What does the integrity of information mean?

A.

It means that the access to the information is limited.

B.

It means that the information can be accessed by those users who are allowed to access it.

C.

It means that the information is accurate.

D.

It means that the information is protected.

Why are Service level agreements (SLAs) in Public Clouds highly standardized?

A.

They need to be available to and usable by everyone.

B.

Cloud providers aim for a single service level for all offered services.

C.

They are standardized by the ISO.

D.

They are standardized by the US government.

Which characteristic of an Identity management system attributes permissions to roles and not to people?

A.

digital identity

B.

group management

C.

people management

D.

self service functions

How could presence be used to enhance security in the Cloud?

A.

by prohibiting users to access cloud applications, except when on their work place

B.

by prohibiting users to access cloud applications at their work place

C.

by restricting access to applications, depending on the user's physical location

D.

by using a web cam to identify the user of a cloud application

Why can virus scanning software not run directly on the hypervisor?

A.

because the hypervisor is hidden software

B.

because the hypervisor only guests other operating systems

C.

because the hypervisor runs on a server

D.

because the hypervisor starts up before the virus scanning software

One of the limitations concerns of Cloud computing is uncertainty about where your data is stored in conjunction with varying national and international legislation on data protection.

Which issue does this raise?

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Security