Which of the following IT resources are examples of multi-device brokers?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 2
Which of the following statements are true about the state management database mechanism?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
AB
Q: 3
Which of the following characteristics of cloud-based IT resources can be measured with
Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) implementations?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
ACD
Q: 4
Which of the following are data-oriented security mechanisms?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
AB
Q: 5
In a cloud balancing environment, routing criteria can be based on which of the following factors?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 6
A virtual server is being attacked by a malicious cloud service consumer that is generating increased
usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the
physical server are becoming unavailable to other cloud service consumers. This kind of attack is
known as: __________________.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 7
We exported data from our on-premise relational database to a cloud-based non-relational database.
After the export, we noticed that the size of the cloud-based database was significantly larger than
our on-premise database. What is the likely reason that the database size increased?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 8
Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server B. Both
virtual servers are hosted by the same physical server and the trust boundaries of Cloud Services A
and B overlap. A cloud service consumer successfully uses Cloud Service A to gain access to the
underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which
negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud
security threat?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 9
A cloud service can be hosted by a physical server or a virtual server. When using the failover system
mechanism, the same cloud service cannot be hosted by more than one physical server.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 10
Cloud service consumers typically use HTTP methods to communicate with cloud-based REST
services.