1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is NOT a characteristic of cloud computing?
a. metered services
b. delayed elasticity
c. on-demand self-service
d. universal client support
b. delayed elasticity
Alois is creating a report for his team about the cost savings associated with cloud computing. Which of the following would NOT be included in his report on the cost savings?
a. reduction in broadband costs
b. resiliency
c. scalability
d. pay-per-use
a. reduction in broadband costs
Lyam is completing a requisition form for the IT staff to create a type of cloud that would only be accessible to other HR managers like Lyam who are employed at manufacturing plants. The form asks for the type of cloud that is needed. Which type of cloud would best fit this need?
a. public cloud
b. group cloud
c. hybrid cloud
d. community cloud
d. community cloud
Mael is working on a project to deploy automated guided vehicles on the industrial shop floor of the manufacturing plant in which he works. What location of computing would be best for this project?
a. remote
b. edge
c. off-premises
d. fog
d. fog
Alderic is frustrated that his company is using so many different cloud services that span multiple cloud provider accounts and even different cloud providers. He wants to implement a technology to give full control and visibility over all the cloud resources, including network routing and security. What product does he need?
a. thin virtual visibility appliance (TVVA)
b. SWG
c. CASB
d. transit gateway
d. transit gateway
What does the term "serverless" mean in cloud computing?
a. The cloud network configuration does not require any servers.
b. Server resources of the cloud are inconspicuous to the end-user.
c. Servers are run as VMs.
d. All appliances are virtual and do not interact with physical servers.
b. Server resources of the cloud are inconspicuous to the end-user.
Arsene has been given a project to manage the development of a new company app. He wants to use a cloud model to facilitate the development and deployment. Which cloud model should he likely choose?
a. SaaS
b. XaaS
c. IaaS
d. PaaS
d. PaaS
Which cloud model requires the highest level of IT responsibilities?
a. IaaS
b. SaaS
c. PaaS
d. Hybrid cloud
a. IaaS
The CEO is frustrated by the high costs associated with security at the organization and wants to look at a third party assuming part of their cybersecurity defenses. Emeric has been asked to look into acquiring requests for proposals (RFPs) from different third parties. What are these third-party organizations called?
a. MXIAs
b. MPSs
c. MSSPs
d. MSSOs
c. MSSPs
Which of the following is NOT true about microservices?
a. It is a solution to monolithic application design by dividing it into smaller entities.
b. It is also called cloud-native microservices.
c. It is used when the application is developed locally and then imported into the cloud.
d. The division of the application is not by technical processes.
c. It is used when the application is developed locally and then imported into the cloud.
Which of the following is NOT correct about high availability across zones?
a. In a cloud computing environment, reliability and resiliency are achieved through duplicating processes across one or more geographical areas.
b. An Availability Zone (AZ) is one or more data centers within a Region, each with redundant power, networking, and connectivity.
c. They are more highly available, fault tolerant, and scalable than would be possible with a single data center.
d. They require that specific security appliances be located on-prem so that the local data center can be considered as a qualified Zone.
d. They require that specific security appliances be located on-prem so that the local data center can be considered as a qualified Zone.
Which of these is NOT created and managed by a microservices API?
a. user experience (UX)
b. database
c. logs
d. authentication
a. user experience (UX)
Which of the following is true about secrets management?
a. It does not provide a central repository.
b. It can only be used on-prem for security but has a connection to the cloud.
c. It requires AES-512.
d. It cannot be audited for security purposes.
a. It does not provide a central repository.
Based on a common responsibility matrix, which of the following is a cloud service provider NOT responsible for?
a. devices
b. physical hosts
c. physical datacenters
d. physical network
a. devices
Which of the following includes ZTA?
a. SWG
b. CASB
c. SASE
d. RCSC
c. SASE
Which type of hypervisor runs directly on a computer's hardware?
a. Type I
b. Type II
c. Type III
d. Type IV
a. Type I
Which of the following is NOT correct about containers?
a. Containers start more quickly.
b. Containers reduce the necessary hard drive storage space to function.
c. Containers require a full OS whenever APIs cannot be used.
d. Containers include components like binary files and libraries.
c. Containers require a full OS whenever APIs cannot be used.
Which of the following virtualizes parts of a physical local network?
a. SDN
b. SDV
c. VDI
d. SD-WAN
a. SDN
Which of the following will NOT protect containers?
a. Use a hardened OS.
b. Use reduced-visibility images to limit the risk of a compromise.
c. Only use containers in a protected cloud environment.
d. Eliminate APIs.
d. Eliminate APIs.
What do SDN, SD-WAN, and SDV all have in common?
a. They were all developed in the 1970s.
b. They are all infrastructure as code.
c. They require a public cloud.
d. Specific REST-R-APIs must be used with each of them.
b. They are all infrastructure as code.