IS5503 Cloud Computing Solutions

1) You are working as a cloud architect at Congruence crop. Management he asked you to implement an vitualized infrastructure to provide the company’s  employees with on-demand storage which should be accessible through a web interface over the public internet. Which of the following cloud deployment models will you use to implement this ?

Private

2) Which of the following storage solutions saves space by eliminating files or blocks that have redundant data?

Deduplication

3) You are as a cloud administrator at BigCo. Management he asked you to move the company’s on-premises data to the cloud. You have received a request from the network administration team while migrating. They want to manage both the Linux- and Windows-based servers efficiently. What should you implement to accomplish this task?

Secure Shell

Remote Desktop Protocol

4) Ron, a security analyst, found an unkwon design flaw in a product. He notices that correcting the flaw would be cost-prohibitive and would only affect a vey small number of customers. Rather than recalling the product, he decides to simply the product as it is. This is best describe as what type of risk response technique?

Acceptance

5) Which of the following risks should be considered during and after the migration process while performing the right migration steps?

Security risks

Complexity Creep

6) Jack is Working as a network administration at NilCo. Management has asked him to create a demilitarized zone (DMZ) in the cloud to enhance the security of the company’s cloud network. What will he use to accomplish this task?

Firewall

7) Which of the following cloud assessment techniques determine the difference between where a company is now in business and technical readiness versus where it needs to be?

Gap analysis

8) Joe is working as a product manager at NilCo.  He is planning to make sure that an upcoming company promotion suring a major sporting event does not overwhelm his company’s cloud-based e-commerce site. For this, he need to add capacity to the company’s web server so it can process the anticipated additional workload dynamically. What should he use?

Horizontal scaling

Vertical scaling

9) What Is the first step of searching the right cloud vendor?

Request for information

10) What storage type is used for the OS boot partition of an instance running in the cloud?

Block

11. A company has purchsed a new systm, but secrity pesonnel is spending a lot of time on systm maintenancce . A new third pary vendor has been selected for maintaning the company’s system. Which of the following documents should be created before assigning the job to the vensor?

Service level agreement

12. Which of the following is a final step that you will perform in the cloud assessement process?

Create documentation and diagrams.

13. what are the four cloud deployment models?

public, private, hybrid, and community

14. Will si testing his vackup disaster recovery site. He wants to verfy that the database in the disaster recovery facility is updated in real-time and ramains current with the production rerplica in the primary data center, which of the following should he use in his primary data denter servers?

Synchronous replication

15. Stella, a cloud+ stident, is learning the process of evaluating current sresources used in on-premeses data cetemine the resources required in the cloud. What is she learning about?

Right-sizing

16. which of the follwing international Organization for Standardization (ISO) standards is specific to CSPs and details information security?

27017

17. which of the following is the process of obfuscatinf ddata such that only authrized individuals can read the data?

Encryption

18. which of the following porvides high-levvel guidence dictated by business goals and objectives?

 policy

19. which of the following are exmples of an operating expenditure?

 propertu taxes and insutance

Licences fees

20.which of the following makes networks more agile and fiexible by separatring the fowarding of network packets (the infrastructure layer) from the logical decision-making process (the control layer)?

Software-defined networking

21)  Which of the following is an item or collection of items that has a qualitative value to a company?

Asset

22)  which of the following statements are correct regarding synchronous replication?

It is limited the distance between the locations

It writes data to multiple locations in real-time

23)  Tom is working as a cloud administrator at BigCo. Management has asked him to increase the security of the companys cloud resources so that no unauthorized can access the resources.

 Multifactor authentication

24) Erika, a project manager, identifies a project risk that harm  the team members. So she hires a professional vendor to complete the critical part of the project.  What type of risk response is she using for handling the potential risk

Transference

25)   Which of the following allows clients to remotely connect to virtual Linux machine, securely, and act as if the user were sitting at the virtual computer?

Secure shell

26)  Who is responsible not only for an organization’s asset but also for the risk response to any identified threat to the said asset?

Risk owner

Asset owner

27)  Bob is a cloud + architecture for BigCo Inc. He is using a clous service that provides computing hardware, but the operating system is not included . Which of the following cloud service is he using?

Infrastructure as a service

28)  Which of the following documents includes the defined steps that an individual or an organization takes once an event occurs?

Standard operating procedure

29)  Roman is the network administrator for a company. The company is currently managing an  on-premises network using cloud serviceor running some combination of two

 Baseline

30)  Which storage offerings will have a cost associated with the amount of data stored even if resource using the storage is powered off?

Block storage

File storage

Object storage

 31. Which of the following laws reforms the financial services industry and specifically addressed concerns about protecting consumer privacy?

Gramm-Leach-Billey Act

32. David is working as cloud administrator at NilCo. He is performing a cloud assessment for the company’s new applications. Management has asked him to determine the capabilities that can be offloaded to the cloud and the level of support services needed. What will he use to accomplish this task?

Feasibility study

33. Which of the following cloud characteristics explains that a cloud provides services to serve multiple clients according to their priority?

Resource pooling

34. Which of the following security policies defines behaviors and activities that are acceptable in an organization?

Advisory

35. Jancie manages the MySQL database thar runs on multi-CPU instance that has reached 100 percent utilization. The database can run on only a single server. What would she used to support the requirements of this database?

Vertical scaling

 36. Which cloud computing model provides only low-level server resources to host applications for organizations?

Infrastructure as a service

37. A company hires contractors for six months to work on projects. After six months, a new team of contractors will be brought in. Which type of software licensing allows the license to be transferred from the first group to the second group?

Bring your own license

38. What refers to the ability of a client to acquire additional cloud resources without supplier intervention?

Self-service

39. Patrick is working  as a cloud administrator at BigCo. He is looking at business requirements that specify the data available at the disaster recovery site must not be more than 48 hours old. Which of the following metrics relates to these requirements?

Recovery point objective

40. In dealing with risks, which response is accomplished when an organization purchases insurance to protect the income when a disaster or threat is realized?

Transference

41) Which of the following standard is concerned with HIPAA, GLBA, PCi DSS, and FINRA ?

Industry-based

42) You are negotiating cloud services with a CSP. You need to ensure that your organization can get more storage space without CSP intervention. Which service do you need?

Capacity on demand

43) Frank, the CEO of an organization, has set up a team to periodically evaluate regulatory compliance alone with associated documentation. His team implmented a policy that focuses on protecting the information that uniquely recognizes a person, either on its own or in conjunction with other information. Which of the following types of regulated information is this?

Personally identifiable information

44) Which of the following international Organization for standardization (ISO) standards covers the following topics?

27017

45) Which of the following helps to determine the compliance, security, and privacy guidefine during cloud assessment?

Feasibility study

46) Which of the following services do managed service providers (MSPs) deliver?

Backup and recovery

 Performance testing

47) Which of the following is an act locating weaknesses and vulnerablities of information systems by copying the intent and actions of malicious hackers?

Penetration testing

48) Which of the following cloud storage types allows an operating system to modify one portion one of a file without opening the entire file?

Block

49) Which cloud concept makes networks more agile by separating the forwarding of network packets for the logical decission-making process?

Software -define networking

50) Which of the following is defined by the health insurance portability and Accountability Act (HIPAA) and must be protected by an organization the jurisdiction of HIPAA?

Protected health information

51. Bob, a user, enters a username and password at the beginning of a session and accesses multiple applications. He does not need to re-authenticate for accessing each application each application. Which of the following authentication processes is he using?

Single sign-on

52. Harold is a software developer for NiCo inc. Management has asked him to migrate the company’s database application to the cloud. The company only wants to be responsible for the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support the application. Which of the following cloud service models will he use to accomplish this task?

platform as a service

53.  which of the following is the process of assigning costs of cloud resources to either individuals or departments that are responsible for the resources?

Chargeback

54.  Which of the following are benefits of using an open- source cloud solution?

Flexibility in development

Faster updates

55. George is a senior cloud architect at BIgCo. He is working on a project to  interconnect his company’s private data center to cloud company that offers e-mail and other    services that can provide burstable compute capacity. What type of cloud deployment model is he creating

Hybrid

56.  which of the following are example of the free-for–use software license?

Linux

Apache

57. How many classification levels are there in the risk classification system?

Five

58. You are working as a cloud engineer at Congruence Corp. Management has asked you to run a small cloud evaluation in the production environment to see if there any application compatibility issues. What will you use to accomplish this task?

Pilot

59. what are the benefits of using digital marketing?

Campaign automation and integration

Real-time results, monitoring and optimization

60. John works as a security analyst at XYZ. His organization uses Telnet for remote

Management. To ensure more secure client-server connections. He recognizes a

Necessity to replace Telnet with an encrypted network protocol. What should

He use to accomplish this task?

Secure shell

61. Which of the following is a short-term process designed to have employees develop skills or obtain knowledge to perform their jobs?

 Training

62. You are working as a software engineer at XYZ. You just received an email reporting suspicious activity from the CEO’s account. The email provides a link to review the suspicious activity and immediately lock the account. You want review the suspicious activity before manually looking the CEO’s account, so you click the first link. Which data security principle did you just violate?

Integrity

63. You are working as a cloud engineer at Congruence Corp. Management has asked you to move the company’s extensive on-premises IT infrastructure to the cloud. Because of the cost involved, you have decided to move some services the fiscal year and move the rest of the services next fiscal year. Which migration approach will you use?

Phased

64. After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. Which type of risk response behavior is she recommending?

Transference

65. Which of the following processes strives to make automation efficient and manageable

Orchestration

66) In the shared security model of the cloud, who is responsible for securing access management and firewell configurations?

Clint

67) Which of the following is an agreement between parties to engage in some specified activity. Usually for mutual benfit?

Contract

68.  You are working as a cloud administrator at BigCo. The company uses a financial transaction database that updates frequently. If a natural disaster occurred any data backup older than one hour would not be useful to the company. Which of the following should you include in the disaster recovery plan to ensure that backups are always up to date?

Recovery point objective

69. which of the following laws requires publicity traded companies to have proper inte3rnal control structures in place to validate that their financial statements accurately reflect their financial results?

Sarbanes-Oxley Act

70.  what refers to a semi-public intermediary network located between two firewalls?

Demilitarized zone

  Week-2 Quiz

1)Which feature of cloud design is measured in terms of nines?

 High availability

2) Microsoft Azure is an example of which type of cloud deployment model?

Public

3) Which cloud service model provides hardware capacities, such as compute, storage, or networking, to a client?

Infrastructure as a service

4) In the shared responsibility model, what is the client responsible for?

Security in the cloud

5) Which cloud characteristic states that iOS, Android, and Windows users should all be able to use cloud resources?

Broad network access

6) Which cloud characteristic allows clients to access additional resources without requiring intervention from the service provider?

Self-service

7) Which cloud service model supports Gmail?

Software as a service

8) In cloud disaster recovery, what defines the maximum age of files that must be recovered from backups?

Recovery point objective

9) Which of the following defines the maximum amount of time a system can be offline in the event of a disaster?

Recovery time objective

10) Which term refers to having a device or system that can take over in the event of a failure?

Redundancy

Week-3 Quiz

1. Which cloud access type is used to securely connect to an online Windows instance?

Remote Desktop Protocol

2. ___________ is used by a web browser such as Google Chrome, Microsoft Edge, or Apple Safari to connect to a URL for the cloud resource.

Hypertext Transfer Protocol Secure

3. What refers to a security device that protects computers or networks from malicious network traffic?

Firewall

4. Which storage feature works by looking for repeated information within a file and then replacing that information with a shorter string?

Compression

5. Which cloud-based service resolves hostnames (or URLs) to IP addresses?

Domain Name System

6. Which of the following distributes work between multiple servers to speed up network performance?

 Load balancer

7. Which storage type is best for unstructured data such as pictures and videos?

 Object

8.A _____________ speeds up access to web resources for users in geographically distributed locations.

content delivery network

9. What storage type is best suited for databases and large scale, frequently accessed storage solutions?

Block

10. A _________ is a semi-public intermediary network located between two firewalls.

demilitarized zone

Week-4 Quiz

1Which of the following is not one of the three key components of reporting in cloud assessments?

Blockchain

2. Which of the following identifies policies or regulations that are not being met with the current migration plan?

Gap analysis

3. A ___________ is a standard of performance or point of reference for comparison.

benchmark

4. What refers to the ability of a client to acquire additional cloud resources without supplier intervention?

 Self-service

5. Which of the following breaks down a monolith program into smaller components that are independently coded and managed?

Microservice

6. Which cloud service is an open and distributed ledger that can securely record transactions between two parties in a verifiable and permanent way?

Blockchain

7. Which of the following services allows users to authenticate once across multiple security domains?

Federation

8. Which of the following is a way to store all the components needed to execute a microservice in the same package?

Containerization

9.  The __________ is a network of devices that are able to communicate with each other and exchange data.

 Internet of Things

10. Which of the following are examples of digital marketing services offered within cloud environments?

Email campaigns

Social media posts

Week-5 Quiz

1.  ____________ instances are responsible for renting reserved instances that are not currently being used.

Spot

2. _________________ is the continuous execution of the first three steps (dev, build, and test) in the application development life cycle.

Continuous integration

3. Which type of scaling refers to adding servers for handling system load?

 Horizontal

4. Which of the following is the process of taking a VM and performing post-deployment actions to customize the VM to the required configuration?

Bootstrapping

5. Which of the following storage types stores individual files like a normal file system, but there is no hierarchy as there is in a file system?

Object

6. Which testing validates that new features and bug fixes don’t have a negative impact on the production code?

Regression

7. The four steps of the continuous integration and continuous delivery (CI/CD) pipeline are:

Dev > Build > Test > Release

8. What refers to the glue or the coordination between automation tasks?

Orchestration

9. Which testing can be performed in both the user acceptance (UA) and dev/test environments?

Regression

10. ____________ instances are instances with the capacity of CPU and RAM that users are willing to pay even if the instances or capacity are not used or even powered on.

Reserved

Week-7 Quiz

1. Which of the following analyses is dependent on the monetary value of an asset?

Quantitative

2. An organization purchases insurance for company vehicles. What kind of risk response is this?

Transfer

3. Identifying all the assets of an organization and documenting any risk and the response to the risk refers to a(n):

risk register

4. __________ is the process of storing data in multiple locations to provide other means of data availability if one location is no longer available.

Replication

5. Which license is free to use in a CSP’s infrastructure?

Open-source

6. Which of the following risk responses attempts to reduce or eliminate risk entirely through utilizing resources or changing the probability of threats?

 Avoidance

7. In how many ways can you classify risk in the risk classification system?

Five

8. Risk is the probability of the occurrence of a ________.

threat

9. What refers to the difficulty of extracting data from one CSP and importing it to on-premises?

 Data portability

10. Which control type returns assets to a normal operating state after a security event occurs?

Corrective

WEEK-8 Quiz

1. Which of the following properties ensures the privacy of an asset?

Confidentiality

2. Which of the following properties validates that an asset has not been altered or modified?

Integrity

3. Which of the following properties ensures the timely and uninterrupted access to an asset?

Availability

4. Which of the following laws requires publicly traded companies to have proper internal control structures in place to validate that their financial statements accurately reflect their financial results?

Sarbanes-Oxley Act

5. What refers to logs or records of actions that occurred on an asset or actions that are performed by an asset?

Audit

6. Security assessments that scan and review the source code for bugs and defects is an example of:

application scanning

7. A __________ is a threat that has not been mitigated.

vulnerability

8. Which of the following is the process of looking at threats against assets and past events to determine a plan of action that will improve the security posture of an organization?

Hardening

9. Which of the following International Organization for Standardization (ISO) establishes the criteria for a quality management system?

9001

10. Which of the following properties is designed to prevent assets from unauthorized access by other assets?

Confidentiality

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *