4455 - Midterm Flashcards

1
Q

what is capacity planning?

A

focuses on minimizing the difference between capacity of an IT resource and the demand for the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the 3 types of capacity planning strategies?

A

lead, lag and matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the lead capacity planning strategy?

A

adding capacity to a resource in anticipation of demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the lag capacity planning strategy?

A

adding capacity to a resource after it has reached its full capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the matching capacity planning strategy?

A

adding capacity to a resource in small increments as demand increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the two cost buckets associated with cloud technology?

A

cost of acquiring infrastructure and the cost of ongoing ownership of infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is organizational agility?

A

the ability to adapt to change caused by internal or external factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is clustering?

A

when independent IT resources are connected into a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is reduced and what is increased when clustering is used?

A

failure rates are reduced, availability and reliability are increased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is grid computing?

A

when IT resources are grouped into logical pools - heterogeneous and geographic distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the difference between clustering and grid computing?

A

grid systems are much more loosely coupled and distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is virtualization?

A

it allows IT resources to provide multiple virtual images of themselves, essentially severing the hardware-software dependency, and allowing multiple users to share their capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a cloud?

A

an IT environment that can provision resources remotely which is also scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TF: cloud has a finite boundry

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TF: it is necessary for clouds to be web based

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what processing capabilities are cloud environment dedicated to supplying?

A

back-end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the differences between horizontal and vertical scaling?

A

horizontal: cheaper, replicates existing resources, not limited by hardware capacity
vertical: more expensive, requires setup, limited by hardware capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a cloud service?

A

an IT resource that is remotely accessible through the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what do SLA’s define?

A

quality of service specifications and IT outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the benefits of cloud computing?

A

eliminates upfront IT investment, increased scaleability, improved availability and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are unique issues that face cloud computing?

A

security vulnerabilities, regional compliance and legal issues, reduced operational governance and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what causes security vulnerabilities with cloud computing?

A

overlapping trust boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

to improve cloud security what should cloud consumer and providers have?

A

compatible security frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the reasons for reduced operational governance control?

A

shitty cloud providers and bandwidth constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is portability?
a measure of the impact of moving cloud consumer resources and data between clouds
26
TF: There are no established industry standards for cloud portability?
T
27
Researchers referred to the cloud computing technologies since mid of 1960 as a) Public Computer utilities b) Artificial intelligence c) Distributed systems d) Wide area networks
a
28
All of the following considered as cloud computing systems except a) Amazon web services b) UWO email services c) Google documents d) Linux servers
b
29
The adjective “elastic” in the cloud computing definition refer to a) The cloud is upgradable b) Adding or releasing resources on demand c) Support integration with other clouds d) Support different computations needs
b
30
All the following technologies is cloud computing enablers except a) Web technology b) Distributed systems. c) Machine learning d) WIFI Technology
c
31
``` Which of the following cloud computing characteristics is the most important for the IT systems capacity planning a) Scalability b) Reliability c) Availability d) Cost ```
a
32
``` The most cost factor will be reduced by using the cloud technology rather than the using on-premise systems is a) Operational cost b) Infrastructure cost c) Maintenance cost d) None of the above ```
b
33
The main common characteristic between clustering and grid computing systems is a) Cooperative systems b) Composed of Tightly coupled IT resources c) Built by interconnected homogeneous IT resources. d) Geographically distributed systems
b
34
Which of the following best define the Virtualization technology a) Technology allow multiple users to work remotely in the same physical server. b) Technology eliminate the dependency between operating systems and physical servers c) Technology that enables the parallel processing d) Technology to optimize the computing resources allocation
b
35
Which of the following best to achieve the availability of the IT resources 1) Deploy in single cloud. 2) Deploy in private environment not accessed remotely 3) Deploy in a cloud and on-premise environment 4) Deploy in multiple reliable clouds
3
36
Why is the horizontal scaling is less expensive than the vertical one a) No need for additional IT resources b) Using automated scaling c) No needs for physical upgrades d) Not limited by the hardware capacity
c
37
Which of the following is not cloud service a) Google Assistant b) Microsoft .NET platform c) Amazon Alexa d) None of the above
b
38
Which of the following is correct about the SLA a) include the response time of the cloud service b) Include the security technology used in the service c) Useful for the service consumer because services details are always encapsulated. d) All of the above
d
39
Which of the following is advantage of adopting the cloud computing technology a. meet and fulfill unpredictable usage b. “ready-to-use” concept c. tangible business benefits due to the availability and reliability d. elimination of up-front IT investments e. All of the above
e
40
who can a cloud administrator be?
a cloud provider, consumer or a third party
41
what are the four cloud roles
administrator, broker, auditor, carrier
42
what is ubiquitous access
wide accessibility that is tailored to different cloud service consumers
43
what is multitenancy?
characteristic of a software program that allows an instance of the program to serve multiple users
44
what is cloud elasticity
ability of cloud to scale IT resources to respond to runtime or pre-determined conditions
45
what is cloud measured usage?
ability of cloud to track usage of IT resources
46
what is cloud resiliency?
ability of cloud to distribute redundant implementations of IT resources across physical locations
47
what is IaaS, Paas, and SaaS
infrastructure, platform, and software as a service
48
what are the typical levels of control granted to cloud customers for: - SaaS - PaaS - IaaS
- usage related configuration - limited administrative - full administrative
49
what are the typical functionality granted to cloud customers for: - SaaS - PaaS - IaaS
- access to front end user interfaces - moderate level of admin control - full accessed to IT resources
50
what are the common cloud consumer activities for: - SaaS - PaaS - IaaS
- uses and configures cloud service - develops, tests, deploys and manages cloud service - set up and configure bare infrastructure
51
what are the common cloud provider activities for: - SaaS - PaaS - IaaS
- implement, manage, maintain and monitor usage - pre configure and provide underlying infrastructure, monitor usage - provision and manage the physical processing, storage and networking, monitor usage
52
what are the differences between public, private and community clouds?
varying levels of accessibility public: offered at a cost or advertisement private: owned by organization that is both the consumer and provider community: owned by community member or a third party
53
what is a hybrid cloud and why are they challenging?
a combination of public, private and community clouds, challenging due to disparity between environments
54
what is a virtual private cloud?
a self contained cloud hosted by a public cloud provider
55
what is a inner-cloud?
a cloud comprised of two or more inner connected clouds
56
What is the role of the cloud broker a) Provide the communication link between the cloud provider and consumers b) Provide best offers from cloud providers in term of services and prices. c) Provide cloud different services such as IaaS, PaaS, SaasS. d) Both b & c
b
57
IT Company leases platform from public cloud provider, what is the security boundary should be applied for the company a) Organizational boundary b) Private boundary c) Trust boundary d) None of the above
c
58
Which of the following is not main characteristic of the cloud technology a) High speed communication b) Usage On demand c) Widely accessible d) Consumed by different of users
a
59
Which of the following technologies required to do the IT resource pooling a) Multitenancy b) Virtualization c) Resiliency d) Measured usage
b
60
Testing as service can be classified as a) Infrastructure-as-a-Service (IaaS) b) Platform-as-a-Service (PaaS) c) Software-as-a-Service (SaaS) d) None of the above
b
61
§ Printer as service can be classified as a) Infrastructure-as-a-Service (IaaS) b) Platform-as-a-Service (PaaS) c) Software-as-a-Service (SaaS) d) None of the above
c
62
``` Which of the following is environment comprised of infrastructure-centric IT resources a) Infrastructure-as-a-Service (IaaS) b) Platform-as-a-Service (PaaS) c) Software-as-a-Service (SaaS) d) None of the above ```
a
63
SaaS cloud services are always provided as a) Virtual servers b) Preconfigured environments c) Physical computing resources d) Cloud web services
d
64
Which of the following is a task for the PaaS delivery model owner a) Develops cloud services. b) Manages physical resources and hard storages c) Preconfigure the DBMSs d) Non of the above
c
65
``` Which of the following cloud delivery models has the highest degree of the administrative control? a) Infrastructure-as-a-Service (IaaS) b) Platform-as-a-Service (PaaS) c) Software-as-a-Service (SaaS) d) None of the above ```
a
66
``` A company provide PaaS cloud , what possible option for building the infrastructure layer a) owning IasS b) Consuming IaaS c) Own on-premise Infrastructure d) All of the above ```
d
67
Communication-as-a-Service is cloud delivery models , which are more close to a) Infrastructure-as-a-Service (IaaS) b) Platform-as-a-Service (PaaS) c) Software-as-a-Service (SaaS) d) None of the above
c
68
Database-as-a-Service is cloud delivery models , which are more close to a) Infrastructure-as-a-Service (IaaS) b) Platform-as-a-Service (PaaS) c) Software-as-a-Service (SaaS) d) None of the above
b
69
What is the main difference between private and public cloud a) Ownership b) Ownership and access c) Access d) Size
b
70
A company has multi level of data sensitivities which makes that not all the data IT resources can be available to public access, which is the deployment model best for the company a) Private cloud b) Public cloud c) Hybrid cloud d) Hosted cloud
c
71
All the following are correct about the hosted cloud except a) Owned and managed by a public cloud provider b) Consumed by a private organization c) The model is based on the ownership and access roles d) None of the above
d
72
Interconnected cloud deployment model is defined based on a) Size b) Access c) Architecture d) Ownership
c
73
what is the architecture of ISP's?
a hierarchical topology composed of 3 tiers
74
what is a data center?
a grouping of IT resources in close physical proximity
75
what are the benefits of using a data center?
higher usage efficiency for shared resources, power sharing, better accessibility
76
what are the components of a data center?
computing hardware, storage hardware, network storage, and the facility itself
77
what network hardware is there in data centers?
nas gateways, lan fabric, san fabric, web tier load balancing and acceleration, carriers and external network connections
78
what is a hypervisor?
a virtual machine monitor or manager
79
what are the 3 main positive characteristics of virtualization?
hardware independence, server consolidation, resource replication
80
what is operation system based virutalization
installing virtualization software in a pre existing operating system
81
what is the problem associated with operation system based virtualization?
can lead to lots of performance overhead
82
what are the advantages of hardware based virtualization?
it requires negligible storage space, is easy to use, and handles hardware management functions
83
what are the disadvantages of hardware based virtualization?
hardware compatibility can be problematic
84
what is VIM?
virtualization infrastructure management
85
what does VIM rely on?
centralized management modules
86
what are the 3 concerns with virutalization?
- performance overhead - hardware compatibility - portability
87
The main concern about the Broadband Networks and Internet in the cloud computing industry is a) The bandwidth limits b) Latency delays c) Cloud services availability depends on the cloud carrier d) All of the above
d
88
All the following can be hot-swappable components in the data center except a) Storages b) Switches c) CPUs d) Virtual memory
d
89
SAN is : a) Array of storages connected through the SAN and have access to network b) Storage Area Network c) Multiple storage devices connected through LAN network. d) b & c
d
90
NAS is : a) Array of storages connected through the NAS device and have access to the network b) Network Area Storage c) Multiple storage devices connected through LAN network. d) Virtual storage network
a
91
All the following are IT resources can be virtualized except: a) Printers b) Routers c) Monitors d) None of the above
d
92
Guest operating system in virtualization technology is a) The hypervisor OS b) The virtualized machine OS c) The virtual machine OS d) The virtualization manager
b
93
Which of the following is advantage of the virtualization technology a) Virtual machine mobility b) Easy and automated VMs administration c) Increase hardware utilization d) All of the above
d
94
Which of the following is not part of the Operating System-Based Virtualization a) Virtual machines b) Virtual networks c) Physical routers d) Hypervisors
c
95
Hypervisor advantage over the OS-Based Virtualization is a) Advanced administrative features. b) More compatible to physical servers c) More efficient. d) More scalable
c
96
Which is the following is not a concern for the virtualization technology. a) Performance overhead of the guest Virtual OS b) Performance overhead of the Host OS c) Compatibility between the hypervisors and hardware. d) Lack of portability of virtualization management
a
97
what are web resources?
artifacts that can be accessed over the world wide web
98
what are the two basic components of the world wide web?
web browser client and web server
99
what are the three layers of a web application?
- presentation layer - application layer - data layer
100
TF: tenants in multi-tenant application have access to application data and configuration information
F - only their own data and no configuration information
101
# Define the following characteristics of multitenant applications: - usage isolation - data security - recovery
– The usage behavior of one tenant does not affect the application availability and performance of other tenants. – Tenants cannot access data that belongs to other tenants. – Backup and restore procedures are separately executed for the data of each tenant.
102
``` Define the following characteristics of multitenant applications: - application upgrades § Scalability tenants. § Metered Usage § Data Tier Isolation ```
- individual tenant usage does not effect other tenants - tenants can't access data of other tenants - backup and restore can be executed for the data of each individual tenant - tenants can have individual databases
103
what is the difference between virtualization and multitenancy
virtualization - multiple copies of the server environment can be hosted by a single physical server multitenancy - a physicla OR virtual server hosting an application that is designed to allow usage by multiple users
104
what sort of interaction do web based services provide?
machine to machine
105
what are SOAP based web services?
simple object access protocol | - a common messaging format for request and response messages
106
what is REST API?
a design for loosely coupled application that use the HTTP protocol to transfer data (representational state transfer)
107
what are the REST services architecture constraints?
uniform interface - all client requests should look the same client server separation - the client and the server should act independently statelessness - each request should contain all the info the server needs to know cacheable resources - server responses should contain information on whether the information is cacheable or not layered system - layers should not effect requests or responses code on demand - a response can include code that the client can execute
108
SOAP vs REST: design
standardized protocol with predefined rules vs architecture style with loose recommendations
109
SOAP vs REST: approach
function driven vs data driven
110
SOAP vs REST: statefulness
stateless by default but can be stateful vs always stateless
111
SOAP vs REST: caching
API calls cannot be cached vs API calls can be cached
112
SOAP vs REST: security
WS/SSL vs HTTPS/SSL
113
SOAP vs REST: performance
more resources vs less resources
114
SOAP vs REST: message format
XML vs lots of formats
115
SOAP vs REST: transfer protocols
lots of protocols vs HTTP only
116
SOAP vs REST: best for
enterprise apps, high security apps vs public API's, social networks
117
SOAP vs REST: advantages
high security, standardized vs scalable, better performance, flexibility
118
SOAP vs REST: disadvantages
poorer performance, more complex, less flexible vs less security, not suitable for distributed environments
119
what are service agents?
event-driven programs designed to intercept messages at runtime
120
what do cloud based services rely on service agents for?
monitoring and measuring during runtime
121
what is the difference between an active and a passive service agent?
active - changes the message contents | passive - reads and records message contents but makes no changes
122
what does service middleware accomodate?
complex service compositions
123
what are the two types of service middleware platforms
enterprise service bus - intermediary processing features | orchestration platform - hosts and executes workflow logic
124
Which of the following is NOT an element of the web technology a) Web communication protocol b) Web Representational language c) Web browsers d) Web resource identifier
c
125
All the following are a typical web application tasks except 1) Retrieving the data from the data storage upon user request. 2) Execute the application logics. 3) Respond to the client request. 4) Represent the response for the client.
4
126
Multitenancy is different than virtualization in following a) It can be applied in software only b) It allows different users to use the IT-resource c) It can be applied in virtual servers only d) It can be applied in physical servers only
a
127
SOAP service should be discoverable by a) Following SOAP message format to search for the service b) Developing the Service description using XML schema c) Using java language in the implementation d) Developing Statefulness service
b
128
REST service response message should a) Be encoded only in JSON format b) Include a flag to indicate if the data is cashable or not c) Include a code to be executed in the client side d) Has no body
b
129
Why REST service technology is not adequate for distributed environments a) Support limited security protocols b) Support limited transfer protocols c) Support Limited message format d) All of the above
d
130
Statefulness service should a) Allow save information about the client request at the server side b) Respond to service based on the client request and client previous status c) Allows session between client and servers d) Respond to service based on the client request only
a
131
§ Stateful service should a) Allows save information about the client request at the server side b) Responds to service based on the client request and previous client status c) Allows session between client and servers d) All of the above
d
132
The advantage of the SOAP services over the REST services is a) Better Performance b) Security c) Scalability d) All of the above
b
133
The advantage of the REST services over the SOAP services a) Better Performance b) Flexibly to develop and design c) Scalability d) All of the above
d
134
cloud service broker platform is type a) ESB platform b) middleware orchestration platform c) SOAP platform d) None of the above
a
135
A service intercept a message and send it back to different destination , is type of a) Active agent b) Passive agent c) Middleware service d) REST service
a/c?
136
What is the main characteristic of the tire 3 infrastructure data centers a) Have single configuration for all the data center components b) Have redundant configuration for all the data center components except the power supply c) Have redundant configuration for all the data center components d) Have redundant configuration for servers and storages only
c
137
who is responsible for ensuring the availability of cloud services?
the provider and the carrier
138
what are security controls?
counter measures used to respond to security threats and reduce or avoid risk
139
what are security mechanisms?
a defensive framework put in place to protect IT resources
140
what is a cloud security policy?
the defined positioning and usage of security controls and mechanisms
141
what is a threat agent?
an entity that is capable of carrying out an attack
142
what is a malicious service agent?
an entity that can intercept and forward network traffic that flows within a cloud can exist as an external program
143
what is a trusted attacker?
an entity that launches attacks within the trust boundary | usually appears to be a legitimate user that is sharing IT resources within the cloud
144
what is a malicious insider?
a human attacker that have privileged access to the cloud
145
what is traffic eavesdropping and what does it compromise?
passively intercepting messages | comprises confidentiality
146
what is a malicious intermediary and what does it compromise?
intercept and alters messages | comprises confidentiality and integrity
147
what is a denial of service attack?
attacker overloads IT resources until they don't function properly anymore
148
what is insufficient authorization?
when attacker is granted direct access to IT resources
149
what is a virtualization attack and what does it comprimise?
an attack that exploits vulnerabilities in virtualized environment compromises confidentiality, integrity, availability and underlying physical infrastructure
150
what is the problem with overlapping trust boundaries?
malicious cloud consumers can target shared IT resources within the same trust boundaries impacting their performance relative to other users
151
what are security brokers?
entity with distinct set of security policies3
152
with regard to what 2 measures are security risk evaluated?
probability of occurrence and degree of impact
153
Unauthorized cloud consumer intercept a message have been sent to a cloud and change the destination to other cloud this will be violation for 1. Integrity 2. Authenticity 3. Confidentiality 4. All of the above
4
154
Authorized user get an error exception that include server ports , which would allow him to hack these ports , the error exception is 1) Security Threat 2) Security weakness 3) Security Risk 4) Security mechanism
2
155
``` Using the digital signature in the cloud to ensure the data integrity and authenticity is 1) Security mechanism 2) Security control 3) Security risk 4) Security policy ```
1
156
``` Which is of the following is not violated by the trusted attacker and malicious insider: § Confidentiality § Authenticity § Integrity § Availability ```
authenticity
157
Traffic eavesdropping threat is hard to be detected by any security mechanisms because 1. It is a passive action 2. It violate the confidentiality of the data 3. It used to collect illegitimate information about the cloud 4. Always occurs by malicious service agent
1
158
Malicious Intermediary threats is more danger than the eavesdropping because 1. Violate the integrity and confidentiality of the data 2. Send harm data to the cloud. 3. Messages from consumers are intercepted and altered 4. All of the above
4
159
All the following is correct about the insufficient authorization threat except: 1. Always done by anonymous attacker 2. Done by unauthorized consumers 3. It violates the authenticity 4. It can be done by malicious insider
4
160
What is the risk of the virtualization attack 1. Lose the data confidentiality and integrity in the virtual server 2. Denial of service for virtual service 3. Compromising the physical infrastructure 4. All of the above
4
161
In the overlapping trusted boundaries the trusted attacker can compromise a) Shared IT-resources only b) All resources in the trusted boundaries c) Authorized IT-resources only d) Un-authorized IT-resources only
b
162
All of the following are a concerns regarding cloud computing security except a) Flaw implementation b) Security policy disparity c) unclear contracts between consumer and provider d) Cloud availability
d
163
Identify a web service security defect is a part of 1. Risk assessment 2. Risk mitigation 3. Risk monitoring 4. Risk control
a
164
``` Firing a employee that previously violate the confidentiality and privacy of the company data 1. Risk assessment 2. Risk Treatment 3. Risk monitoring 4. Risk control ```
2
165
A company decided to upgrade their security encryption technology used after it discover that the previous technology was not effective to avoid some type of attacks , this situation is part of 1. Risk assessment 2. Risk Treatment 3. Risk monitoring 4. Risk control
4
166
what is a logical network perimeter?
isolation of a network environment from the rest of the network
167
what are the uses of a logical network perimeter?
to isolate resources for consumers, authorized users, and other user groups as well as a means of bandwidth control
168
what is included in a logical network perimeter?
virtual firewall and virtual network
169
what does a virtual firewall do?
filter traffic through the isolated network
170
what does a virtual network do?
isolated the network environment within a data center
171
what is the most foundational building block for cloud environments?
cloud servers
172
what limits the number of virutal servers one physical server can create?
its capacity
173
what are template virtual servers?
pre-made VM images
174
TF: can a cloud storage device be virutalized?
T
175
what mechanism supports the fixed increment capacity allocation of cloud storage devices?
pay per use
176
what are the concerns with cloud storage device?
confidentiality, integrity, security, and performance on large amounts of data
177
what is the lowest level of cloud data storage and what are they?
blocks - smallest unit of data that is still individually accessible
178
what are the two types of network storage interfaces?
storage blocks and file & network storage
179
how are object storage interfaces accessed?
via REST or web based cloud services using HTTP
180
who supports the use of object storage interfaces?
SNIA's CDMI
181
what are the 2 main categories of storage interfaces?
relational and non-relational
182
how is storage management carried out?
using either a standard API or administrator interface
183
what are the challenges for relational database storage?
vertical scaling and performance
184
what are the benefits of a non-relational database?
- less processing overhead and complexity | - more horizontally scalable than relational database storage
185
what are the challenges of a non-relational database?
- schemas and models are primitive and not complete picture of data - can't use relational database functions - lack of normalization
186
what is cloud usage monitor?
a lightweight and automated software program that keeps track of IT resource usage data
187
what are the 3 formats of cloud usage monitor?
monitoring agent, polling agent and resource agent
188
what does a monitoring agent measure?
network traffic and message metrics
189
what is a monitoring agent?
an event driven program that exists as a intermediary service agent that exists along communication paths
190
what is a resource agent?
a program that collects usage data based on event driven interaction with specialized resource hardware
191
what is a polling agent?
a processing module that collected usage data by polling IT resources
192
All the following are correct about cloud IT-resource isolation except a) Supports the cloud security b) Enables cloud IT-resources distribution c) Uses virtual firewalls d) Uses physical LAN
d
193
In addition to the IT-resources isolation the logical network perimeter mechanism can a) Improve the logical network performance b) Increase the bandwidth used by the logical network c) Improve the vertical scalability of the cloud IT-Resources d) Reduce the virtualization over head
b
194
Logical Network Perimeter mechanism can isolate cloud IT-Resource from a) Other IT-Resource within cloud b) Internet and public users c) Malicious attacker d) All of the above
d
195
The deployment of the Logical Network Perimeter mechanism include a) Virtual networks b) Virtual networks and virtual firewalls c) Physical networks d) Physical networks and virtual firewalls
b
196
``` Which one of the following virtual networks is the most loosely isolated from the cloud external user? a) VIM virtual network b) Consumer IT-Resources virtual network c) Cloud storage virtual network d) internet routers virtual network ```
d
197
Which the following is part of the virtualization logical architecture a) Physical IT-resources b) VIMs and hypervisors c) Virtual machines d) All of the above
d
198
In virtualization the virtual server instance is created by a) VIM b) Hypervisor c) Consumer d) Usage monitor
b
199
Which of the following is not standard storage interface a) Block b) Object c) Relational dataset d) Multimedia
d
200
Which is of the following is concern about the relational cloud storage a) Doesn't support vertical scalability b) Doesn't support horizontal scalability c) Is not scalable d) Is not support REST services
a
201
Which of the following is best storage interface for multimedia web resources a) Files b) Block c) Object d) NoSQL database
c
202
Which of the following are correct about the LUN a) Stands for logic unit number b) Created and configured by the VIM c) Used by Storage Virtualization software to create the consumer storage device d) All of the above
d
203
§ Monitoring agent actions is similar to a) Eavesdropping attack b) Malicious intermediary attack c) Denial of service attack d) authorization attack
a or b not sure
204
The resources agent is different than monitor agent in following a) is event driven b) collects traffic data c) collects IT-Resource usage d) counts the consumer messages
d
205
Polling Agent is cloud usage agent that can capture the IT-resource a) Usage b) Performance c) Availability d) Security weaknesses
c
206
``` _________ receives predefined events from VIM as response for the consumer VM stopping request a) Polling agent b) Resource agent c) Monitor agent d) None of the above ```
b
207
``` Usually resource agent receives predefined events from the _______ as response for the consumer VM upgrade request a) Hyper visor b) VIM c) Virtual machine d) Administrative portal ```
b
208
what is an automated scaling listnener?
tracks comms between cloud service consumers and cloud services for DYNAMIC SCALING purposes
209
where are automated scaling listeners typically located?
near the firewall
210
what are workloads for automated scaling listeners determined by?
volume of cloud consumer generated requests and back end processing demands triggered by certain types of requests
211
§ The automated scaling listener could be a part of of _____ a) VIM b) Hypervisor c) Virtual machine d) Usage and administration portal
b) hypervisor
212
The scaled virtual server should be migrated to other physical host in the case of ____ a) Scaling up b) Scaling down c) The scale is above the host capabilities. d) The scale is below the host capabilities.
c
213
``` § The automated scaling listener detects the need to scale down the VM and send a commands to _____ to scale down the VM a) Hypervisor b) VM c) VIM d) Physical server ```
c) VIM
214
what scaling problem does a load balancer address?
horizontal scaling
215
what are the 3 types of workload distribution functions?
1. Asymmetric (larger first) 2. Prioritized (assigned priority levels) 3. Content Aware (request content based)
216
load balancers can exists as what?
- switch - appliance - software based system - service agent
217
§ Load balancer mechanism enables the a) Vertical scaling b) Horizontal scaling c) Vertical and horizontal scaling d) None of the above
b
218
§ Which of the following is load balancer advantage provided to the cloud consumer a) Optimize the cloud resources usage. b) Minimize the waiting time for requested tasks c) Apply priority strategies for task processing. d) All of the above
d
219
Which of the following is a distribution methodology for the load balancer a) Fair distribution b) Size based c) Content based d) All of the above
d
220
what does the SLA monitor observe?
the runtime performance of cloud services
221
The SLA Monitor observe the _____ of the web services a) The performance b) The availability c) The reliability d) All of the above
d
222
§ The SLA monitoring agent can be a) Polling agent b) Event based agent c) Usage monitor agent d) Both a , b
d
223
§ The following agent is needed to review and audit QoS Requirements a) SLA Monitor b) Audit monitor c) Failover monitor d) Quality monitor
a
224
what processes the data collected by a pay per use monitor?
billing managment system
225
what are typical monitoring variables for a pay per use monitor?
request/response volumes, data volume, bandwidth consumption, usage time
226
§ Most of the time the billing receipt for the cloud consumer is calculated by____ a) Usage monitor b) Pay-per-use Monitor c) Billing management system d) SLA Monitor
c
227
which of the following parameters can be measured by pay-per-used monitor a) Number of of consumer messages b) IT-resource usage period c) The cloud services bandwidth consumption d) All of the above
d
228
§ Which of the following is needed to by the pay-per-use monitor to fulfill its task 1. Pricing scheme database 2. Usage monitor 3. VIM 4. All of the above
4
229
§ Which of the following is one of the pay-per-use monitor tasks? a) Respond to VIM events b) Request Inquiries about the service usage pricing schemes c) Store billable events d) All of the above
d
230
how is an audit monitor implemented?
as a monitoring agent
231
what does an audit monitor intercept?
login requests
232
Which cloud monitor should be implemented to keep track of all log in requests ? a) Audit b) SLA c) Load d) Failover
a
233
hich cloud monitor should be implemented to apply location based access ? a) Audit b) SLA c) Load d) Failover
a (Audit)
234
what does a failover system help increase?
the availability and reliability of a system
235
what are failover systems often used for?
mission critical programs, reusable services
236
what are the two types of failover configurations?
- active active | - active passive
237
what failover configuration has redundant implementations serving the workload synchronously?
active active
238
which failover configuration involves the load balancer?
active active
239
which failover configuration redirects workload towards redundant implementation in the event of a failure?
active passive
240
In active passive failover mechanism , the recovered resource status becomes a) Active resource b) Standby resource c) Failed resource d) Deleted resource
b
241
§ which is of the following agents is needed by the active–active fail over system a) Router b) Load balancer c) Audit monitor d) SLA monitor
b
242
Which of the following is a technology that enables the failover systems 1. Clustering 2. Resource replication 3. Load balancing 4. All of the above
4
243
§ Which of the following government artifacts most needs the failover system a) Distributed database systems b) Centralized data centers c) web services d) None of the above need failover system
b
244
what tasks are done by a hypervisor
create, start, shutdown, scale, suspend
245
§ All the following tasks are done by the hypervisor except a) Create new VM b) Delete VM c) Migrate VM d) Scale VM
c
246
``` How many hypervisor instances needed for 3 physical servers and 6 virtual servers model a) 6 b) 1 c) 3 d) 2 ```
c
247
§ One of the VIM commands to migrate the virtual server from busy server to other idle server is a) Ask the busy server’s hypervisor to migrate the VM b) Ask the busy server hypervisor to suspend the VM c) Ask the Idle server hypervisor to to migrate the VM d) Ask the busy server hypervisor to start the VM
b
248
what are the 3 resource cluster types?
server, database, large dataset
249
what does a server cluster increasee?
performance and availability
250
what does a database cluster increase?
availability
251
how does a database cluster maintain consistency across different storage devices?
with synchronization
252
what is implemented with a large dataset cluster?
data partitioning and distribution
253
what two layers are required between nodes in a cluster?
one for accessing storage devices, another for executing IT resource orchestration
254
what are the two types of resource clusters?
load balance and HA
255
what does load balance cluster preserve?
centralization of IT resoure
256
what has redundant implementation of most clustered It resources?
a HA cluster (high availability)
257
what does a HA cluster implement?
failover system mechanisms
258
§ All the following can be improved by using clustering mechanism except a) Resource usage optimization b) Availability of the cloud resource. c) The cloud security d) The cloud performance
c
259
§ Clustered servers needs dedicated networks to a) Distribute workloads among clusters. b) To apply orchestration among cluster nodes c) To increase the availability of the resources d) To improve the performance of the cluster
b
260
Large dataset cluster mechanism is similar to a) Centralized database b) Distributed database c) Replicated Database d) Database failover mechanism
b
261
High availability cluster is different than load balanced cluster in the following a) Uses Active –active failover b) Uses Active –passive failover c) Uses Load-balancer d) Uses storage clusters
b *confimred with prof
262
§ How many cluster enabled hypervisors needed to implement 10 virtual servers for 2 physical server clusters each composed of 4 nodes a) 10 b) 4 c) 2 d) 8
d
263
what is used to overcome incompatibilities between cloud service and cloud customers?
multi-device broker
264
what does a multi device broker facilitate?
runtime data transformation
265
``` § All the following database transformations can be done by MULTI-Device broker except a) Adding constraints b) Changing data fields names c) Deleting rows or columns d) Change the data filed type ```
c
266
``` § What is the type of gateway needed by drobox cloud service to provide its services to mobile and desktop devices a) SQL Gateway b) Cloud Storage Gateway c) Mobile Device Gateway d) b and c ```
d
267
what are the four cloud management mechanisms?
remote, resource, billing, sla
268
remote admin systems provide the user interface and tools for what cloud resource administrators?
external ones
269
what are the two remote system admin portals?
usage and administration portal, and self service portal
270
cloud consumers like working with remote administration systems that offer what?
standardized api's
271
resource management system coordinates what in response to what action?
coordinates IT resources in response to management actions
272
what is core to the resource management system ?
VIM (virtual infrastructure manager)
273
what does a resource managment system contain?
a VIM and a VM image repository
274
what does an SLA management system apply for SLA data?
administration, collection, storage, reporting, runtime notifications
275
what does the SLA managmet system rely on?
SLA monitors
276
what does the billing management system rely on?
pay per use monitors
277
what is a billing managment system comprised of?
and pricing and contract manager, and a pay per use measurement repository
278
what are the 3 pricing models in billing management system
flat rate, pay per use, pay per allocation
279
ALL standard cloud managements functionalities provided through 1. APIs 2. Custom Applications 3. Open source modules 4. Cloud services
1
280
``` § Which of the following is used by remote administration system to control, and manage the cloud a) Resource Management System b) SLA Management System c) Billing Management System d) All of the above ```
d
281
§ Self-Service Portal is used for a) Initiating virtual machines b) Getting the usage of the virtual machines c) Getting possible configurations for the virtual machines d) Checking the status of virtual machines
c
282
§ What is the advantages of providing the remote administration system through standard APIs a) Easy to access the cloud administration b) Enable centralized administration for multiple clouds c) Can be used by different cloud administrators d) Easy to interoperate with single access security mechanism
b
283
Which of the following is not a task for remote administration system a) Issues receipts for the cloud consumer usage b) Releases cloud services upon consumer requests c) Manages the consumer payments d) Reports the consumer resources availability
c
284
Which of the following is the core of the resource management system a) hypervisors b) The virtual servers c) VIM d) LUN
c
285
``` § the resource management system can monitor the operation of the resources through a) SLA monitor b) VIM c) Pay per use Monitor d) Usage monitor ```
b
286
§ The VM image repository is used to save a) Active virtual machines images b) Hypervisor software images c) Virtual machines configuration templates images d) Virtual machine status image
c
287
§ SLA management repository stores a) Billable events b) Resource Usage events c) Resource status events d) None of the above
c
288
§ SLA Management System can be accessed through a) Usage and Administration Portal b) Self-Service Portal c) Directly through than SLA manger d) a and c
d
289
§ Which of the following is part of Billing Management System a) Billable events repository b) Pricing models repository c) Pricing manager d) All of the above
d
290
what does the cloud security mechanism of encryption preserve?
confidentiality and integrity of data
291
what does encryption rely on?
a cipher
292
what does encryption help counter?
man in the middle, eavesdropping, authorization issues, trust boundary overlap
293
what characteristic does symmetric encryption not have? why?
non-repudiation, you can't determine which party performed what action
294
TF: asymmetric encryption is slower than symmetric encryption
Td
295
how is encryption most commonly provided for web based communication?
HTTPs
296
§ Which of the following attacks that Encryption can be used against ? a) traffic eavesdropping b) Malicious intermediary c) insufficient authorization d) All of the above
d
297
Which of the following can NOT be provided by private key encryption a) message confidentiality b) Message authenticity c) Message integrity d) Non of the above
a
298
§ Which of the following is transport layer security protocol a) SSL b) RC4 c) RSA d) Triple-DES
a
299
§ Which of the following is asymmetric encryption cipher a) SSL b) RC4 c) RSA d) Triple-DES
c
300
what clod threats can hashing solve?
malicious intermediary, insufficient authorization
301
§ Which of the of the following IT-Resources that Hashing technique can be applied for to check the originality of the resource ? § Data repositories § On-premise applications § Web-services § All of the above
d
302
§ Cloud consumer uses hashing technique to communicate with the cloud so any request sent by the consumer should include a) Message only b) Message and hashing algorithm c) Message and message digest d) The hash code only
c
303
Hashing technique can discover changes in the message by having both a) Original message and original message digest b) Changed message and original message digest c) Original message and changed message digest d) Changed message and original message digest
b
304
what do digital signatures provide?
data authenticity and integrity
305
what is involved in the digital signature process
hashing and assymetric encrytpion
306
what is encyrpted by the private key and appended to the original message in digital signing?
the message digest
307
The two major security concepts can be provided by the digital signature are a) Data integrity and non-repudiation. b) Data authenticity and confidentiality c) Data confidentiality and non-repudiation d) Non of the above
a
308
``` What are the two security mechanisms are applied to implement the digital signature? a) Hashing and public key encryption b) Hashing and private key encryption c) Hashing and secret key encryption d) Symmetric and asymmetric encryption ```
b
309
``` § Attacker having the public and private keys intercept a message with digital signature can violate a) message confidentiality and integrity b) message confidentiality only c) message integrity only d) Nothing violated ```
b
310
what is a PKI?
public key infrastructure - associated a public key with its owner
311
what does a PKI rely on?
digital certificates
312
what are digital certificated signed by?
third party certificate authority
313
§ The digital certificate should include a) Authorized consumer public key b) Consumer identity authorized by a private key c) Authorized consumer identity and public key d) Authorized private key
c
314
what is an IAM
identity and access manager
315
what are teh four main componenents of an IAM
authentication, authorization, user management , credential management
316
what is an IAM used to counter?
insufficient authentication, denial of service, and overlapping trust boundaries
317
what does authorization define?
the correct granularity for access controls
318
what does user management involve?
creating access groups, resetting passwords, defining password policies, managing user priveleges
319
what threat to credential management address?
insufficient authorization
320
``` § Which one of the following IAM components has responsibility to create new user password? a) Authentication b) Authorization c) User Management d) Credential Management ```
c
321
Which one of the following IAM components can provide the face id access? a) Authentication b) Authorization c) User Management d) Credential Management
a
322
what authenticates cloud users in SSO?
a security broker
323
what security threats does SSO address?
none
324
what does SSO enhance?
usability
325
``` Which of the following cloud quality factors that single sign on security mechanism can improve it? a) Security b) Usability c) Availability d) Resource usage ```
b
326
Single sign on is optimum for the authentication of the administrators that managed a) Single cloud recourses b) Distributed resources in multiple cloud providers c) On-premise resources d) Non of the above
b
327
what process creates a cloud based security group
cloud based resource segmentation
328
what security threats does clod based security groups help adress?
denial of service, sufficient authentication and overlapping trust boundaries
329
§ What is correct about the security group IT-Resources a) They are virtual servers b) They have the same capacity configurations c) They have the same security rules and mechanism d) They have the same virtual network
c
330
``` § Which of the following cloud infrastructure cloud mechanism can be similar to the security groups a) Virtualization b) Logical network perimeter c) Replication d) None of the above ```
b
331
what is software hardneing?
stripping away unnecessary features of a software to remove potential vulnerabilities
332
what cloud security threats does virtual server hardening help prevents?
DOS, insufficient auth, trust boundaries
333
§ Hardening process can be done for a) Virtual servers b) Physical servers c) Database servers d) All of the above
d
334
§ All the following tasks can be done during the Virtual server hardening except a) Removing programs b) closing server ports c) Upgrading memories d) disabling services
c
335
what is the purpose of workload distribution architecture?
to reduce it under utilization and over utilization
336
what does workload distibution architecture rely on?
sophistication of load balancing mechanism and run time logic
337
what does workload distribution architecture support?
cloud services, virtual servers, cloud storage devices
338
what are the 3 mechanisms for workload distribution architecture?
load balancing, cloud storage device, and virtual server
339
a) Replicated data storages b) Load balancer c) Security broker d) Resource cluster
c
340
``` Which of the following is applying the workload distribution architecture to implement its mechanism a) Cloud data storages b) Load balancer c) Security broker d) Resource cluster ```
d
341
§ Which one of the following architectures is reducing the over utilization of ITresources a) Workload Distribution Architecture b) Resource Pooling Architecture c) Dynamic Scalability Architecture d) Elastic Resource Capacity Architecture
a
342
what is the underlying principle of resource pooling architecture
that resource pools with identical IT resources are synchronized
343
what is a sub-pool
a resource pool within a resource pool (of resource pools)
344
when are nested pools commonly used?
when cloud services need to be rapidly instantiated with the same type of it resource and the same configuration
345
Which of the following are correct about the resource pool a) Group of multi-type resource instances. b) Group of single resource type instances that have different configuration. c) Group of sub pools d) Group cloud mechanisms
c
346
§ IF we have pool A comprised { 10 : 8 G Ram ,7 : Quad Core CPU, 4 : 100G storage } which of the following is possible sibling of parent A a) { 8 : 1 G Ram ,2 : dual Core CPU, 4 : 10G storage } b) { 2 : 4 G Ram ,2 : Quad Core CPU} c) {1 : 100G storage } d) { 8 : 8 G Ram ,10 : Quad Core CPU}
c
347
IF we have pool A comprised { 10 : 8 G Ram ,7 : Quad Core CPU, 4 : 100G storage } which of the following is possible nested pool a) { 8 : 8 G Ram ,2 : dual Core CPU, 4 : 100G storage } b) { 2 : 8 G Ram ,2 : Quad Core CPU} c) { 8 : 8 G Ram ,7 : Quad Core CPU, 4 : 100G storage } d) { 8 : 8 G Ram ,10 : Quad Core CPU, 5 : 100G storage }
c
348
what is dynamically scaling architecture based on?
predefined scaling conditions
349
in dynamically scaling architecture what dictates the new IT resources that need to be added to workload processing?
the automated scaling listener
350
what type of scaling handles fluctuatioing workload?
horizontal
351
what type of scaling handles the need to adjust processing capacity of single IT resource
vertical
352
what type of scaling relocates an IT resource to a host withmore capacity?
rellocation
353
``` § Moving virtual machine to new physical host in order to accommodate dynamic memory upgrade is a) Dynamic Horizontal Scaling b) Dynamic vertical Scaling c) Dynamic reallocation d) Dynamic virtualization ```
c
354
§ In order to accommodate the increase in the database inquiries, the hypervisor has been asked to add more storage to the virtual database server A then the replication monitor create new instance B of the virtual database server A to process 30% of the incoming requests while the other 70% requests is served by server A, what is the type of the scaling has been applied in this sitiuation a) Load balance scaling b) Horizontal scaling c) Vertical scaling d) Horizontal and vertical scaling
d
355
§ Which of the following are the main mechanisms that used to apply horizontal scaling a) Hypervisor & Pay-Per-Use Monitor b) Cloud Usage Monitor & automated scaling listener c) automated scaling listener & Hypervisor d) automated scaling listener & resource replication
d
356
elastic resource capacity architecture provisions what dynamically? in response to what?
virtual servers, fluctuating processing requirements
357
what is an intelligent automation engine?
executes workflow logic which automates some administrative tasks
358
what additional mechanisms can be included in an elastic resource capacity architecture
cloud usage monitor, pay per use monitor, resource replicator
359
dynamic scalability architecture uses what ore mechanisms
resource replicator and automated scaling listener
360
what additional mechanisms can the dynamic scalability architecture use
cloud usage monitor, hypervisor, pay per use monitor
361
Elastic Resource Capacity Architecture is based in the following scaling a) Vertical b) Horizontal c) Multidimensional d) Storage and server
a
362
§ An intelligent automation engine is mainly applied in the following architecture a) Dynamic Scalability Architecture b) Elastic Resource Capacity Architecture c) Cloud Bursting Architecture d) Elastic Disk Provisioning Architecture
b
363
Intelligent Automation Engine is used to determine a) how many new virtual server instances needed to be replicated b) the upgrades needed to be added to the virtual servers c) The upgrades need to be added to the physical servers d) The virtual server usage
b
364
service load balancing architecture is most similar to what other architecture?
workload distribution architecture
365
service load balancing architecture uses what type of cloud service deployment?
redundant
366
duplicated cloud services are grouped into what in service load balancing architecture
resource pools
367
what are the mechanisms in service load balancing architecture?
cloud usage monitor, resource cluster, resource replication
368
``` § All the following are main mechanisms to apply the Service Load Balancing Architecture except a) Cloud Usage Monitor b) Resource Cluster c) Resource Replication d) Multitenancy ```
d
369
§ Which of the following is not correct regarding the service load balancer a) Can be independent to the service b) Can be embedded in the service c) Balance the load between service instances d) can be imbedded in the host server
d
370
§ resource replication in Cloud Bursting Architecture is always done for a) Cloud resources b) On-premise resources c) Virtual servers d) Virtual storages
b
371
§ Cloud bursting architecture implements the dynamic scaling by adding and releasing a) resources to cloud environment b) Resources to on-premise environment c) Cloud resources to on-premise environment d) On-premise resources to cloud environment
c
372
what mechanisms are core to cloud bursting architecture
resource replication and automated scaling listener
373
what core mechanisms are used in elastic disk provisioning architecture?
cloud storage device, virtual server, pay per use monitor, hypervisor
374
what additional mechanisms can be used in elastic disk provision architecture?
cloud usage monitor, resource replication
375
§ 400 G storage are provided through Elastic disk provisioning technology how much the consumer will be charged if used 30% of the storage and billing rate is 20 cent per 1 G Storage a) 80 $ b) 24 $ c) 56 $ d) 20 $
b
376
§ 400 G storage are provided through thick provisioning technology how much the consumer will be charged if used 30% of the storage and billing rate is 20 cent per 1 G Storage a) 80 $ b) 24 $ c) 56 $ d) 20 $
a
377
The redundant storage architecture introduces what?
a secondary duplicate cloud | storage device
378
what diverts cloud consumer requests to the secondary | device whenever the primary device fails
§ A storage service gateway
379
redundant storage architecture primarily | relies on what?
storage replication system
380
§ Which of the following is correct about the LUN a) Used to assign storage device to virtual servers b) Represent the physical locations of virtual storage device c) Used to apply redundant storage cloud architecture d) All of the above
d
381
§ A storage service gateway is used to a) Balance between multiple storage devices b) Divert request to the current active storage c) Reject invalid requests to the storage devices d) All of the above
b
382
§ State management database can help in a) Convert stateless service to stateful service b) Convert stateful service to stateless service c) Store the data of the stateless service d) Store the data of the stateful service
d
383
``` § Which of the following most be improved by using state management database mechanism? a) Resources usage optimization b) Resources availability c) Resources performance d) Resources replication ```
a