Which of the following cloud service models best supports a software development team to work efficiently with members working from different geographical locations?
A: Platform as a service
- You are working as a cloud administrator at BigCo. The company CIO asks you to ensure that the new cloud solution provides fault tolerance. Which aspect of cloud design does this refer to?
A: Redundancy
- You are working as a cloud administrator at BigCo. You are buying new cloud services for the company. The internal network administration team needs assurance regarding cloud access from different OSs, such as Windows, macOS, and Android. What should you tell them to provide assurance?
A: Resources will be available to all client OSs via broad network access.
- Tony works as a security analyst in an organization. He purchases virtual machines from Microsoft Azure and uses them exclusively for services such as analytics, virtual computing, storage, networking, and much more. Which of the following model of cloud computing is referred to in the given scenario?
A: Public
- Which cloud deployment model offers the best scalability and cost-effectiveness?
A: Public
- Which of the following best describes the purpose of the shared responsibility model?
A: The CSP and client share responsibility for cloud security.
- Your CSP makes daily backups of important files and hourly backups of an essential database, which will be used to restore the data if needed. Which aspect of cloud design is your CSP implementing?
A: Disaster recovery
- When shopping for public cloud services, the CSP tells you that if your company needs more or fewer resources, the CSP can instantly accommodate that. What cloud characteristic is the CSP referring to?
A: Elasticity
- Which of the following provides the maximum downtime per day as 4.32 seconds in the cloud?
A: Four nines five
Which of the following are examples of infrastructure as a service (IaaS) that a cloud provider might offer?
A: 1. Compute
2. Storage
What will you use to speed up access to web resources for users in geographically distributed locations?
A: Content delivery network
Which of the following is a secure point-to-point tunneled connection over the Internet?
A: Virtual private network
Which solution should you use to handle spikes in network traffic while migrating to the cloud?
A: Load balancer
A network administrator needs to remotely log into a cloud-based Linux server to perform some administrative tasks. Which cloud access type should the network administrator use?
A: Secure Shell
Which of the following is used in conjunction with a web browser to securely access cloud storage?
A: Hypertext Transfer Protocol Secure
Which of the following services will help users to locate a web server on the Internet?
A: Domain Name System
Which of the following abstracts the storage hardware from logical storage volumes?
A: Software-defined storage
Which of the following cloud storage types is designed to provide the fastest access to data and is more expensive per gigabyte?
A: Hot
Which type of storage is best for uploading a large, offline backup archive to the new cloud service?
A: Object
- What will you use to reduce the needed cloud storage space and cost?
A: Compression
Deduplication
- A network administrator who is part of the cloud assessment team mentions that the average server CPU utilization is at 40 percent. What will the network administrator use to determine if this is acceptable performance?
A: Benchmark
- Which of the following is not the feature of a gap analysis?
A: Determining key stakeholder feedback about the migration plan
- Which of the following is the appropriate order for conducting cloud assessment tasks?
A: Contact key stakeholders, run a baseline, perform a gap analysis, and create documentation.
- A small company needs to set up a security surveillance system to protect its building. Which cloud-based technology will the company most likely take advantage of?
A: Internet of Things
- Which of the following best describes a blockchain in cloud computing?
A: It’s a secure, open, and distributed ledger.
- You are working as a cloud administrator at BigCo. A user has reported an issue that he can connect to all the web services individually, but each requires a different password. He wants to access web services securely with a unique password by eliminating the overhead of entering the different passwords for different services. Which of the following should you configure?
A: Single sign-on
- Which of the following is not an implication of implementing VDI?
A: Higher costs
- Company A has a software development team with members located in Geneva and others in Chicago. Which cloud service will best help the team members to manage the project that all of them are working on?
A: Collaboration
- Which of the following captures performance data for a system during cloud assessment?
A: Baseline
- Which of the following allows users to authenticate once across multiple security domains?
A: Federation
- Which of the following are examples of capital expenditure?
A: 1. Furniture and fixtures
2. Building expansion
- Which of the following is not the benefit of using the subscription licensing model?
A; Users are required to pay for the software only once.
- Which of the following migration approaches requires the applications to be completely redesigned from scratch, during migration, using only cloud-native components?
A: Rip and replace
- Sue, an IT employee, tells her manager that she wants to create a five-year plan to fulfill some career goals. Which of the following is she referring to?
A: Professional development
- Which licensing model has the following benefits:
A: Subscription
- Which of the following documents is designed to collect written information about a CSP’s capabilities?
A: Request for information
- Which of the following is a follow-up to a request for information (RFI) that requests pricing information on a specific set of standard services or products?
A: Request for quotation
- Which document includes the following sections:
A: Contract
- You are working as a cloud administrator at NilCo. Management has asked you to migrate an on-premises data slot to the public cloud. This on-premises data slot has multiple commercial applications that can’t be refactored. Which of the following migration approaches will you use?
A: Rehosting
- Which of the following principles should be considered while constructing a request for information (RFI)?
A: 1 .Be clear on the project objectives.
2. Make it as easy as possible for the vendor to complete.
- What refers to the ability to deploy the application code to production at any given time, but with control in place for final approval?
A: Continuous delivery
- Joe is working as a product manager at NilCo. Management has asked him to deploy some new infrastructure with the updates and changes without implementing them directly on the production server. The deployment should occur in a procedural and repeatable fashion. Which of the following will he use to accomplish this task?
A: 1. Bootstrapping
2. Golden image
- You are working as a cloud administrator at Congruence Crop. The company has several branch offices and each branch has a different cloud model. Management has asked you to keep track of the cloud resources used by each department such that the branches pay only for the resources they are using. What will you use to accomplish this task?
A; Resource tagging
- You are working as a network administrator at Congruence Crop. Management has asked you to create a clone of two different servers and place them in a new network environment isolated from the production network to validate the functionality of the servers. Which of the following will you use?
A: Sandbox
- Jack is working as a product manager at NilCo. Management has asked him to design the infrastructure for an e-commerce website that plans on selling sporting apparel for football (soccer) clubs around the globe. The website should offer the lowest latency and best performance for the shoppers. What should he use to accomplish this task?
A: Content delivery network
- Which testing is intended to uncover new bugs introduced by patches or configuration changes?
A: Regression
- What are the steps involved in the continuous integration (CI) of the application development life cycle?
A: Dev, build, and test
- Hazel is working as a cloud administrator at NilCo. Management has asked her to perform an analysis of on-premises resources and provide the correctly sized resources in the cloud such that the company pays only for the resources they are using. What points should she consider to accomplish this task?
A: 1 .Focus on recent data.
2. Separate the environments for development, testing, and production.
- Which of the following includes the addition of servers to a pool for handling system load?
A; Horizontal scaling
- Which of the following is primarily used when doing upgrades and patching on production infrastructure?
A; Blue/green deployment
- Which of the following access control types attempts to block any security events from occurring?
A: Preventive
- You are working as a cloud engineer at NilCo. You have put in a request to install a security update on your organization’s firewalls. The security update is needed to address a potential security vulnerability with the firewall authentication system. Your manager agrees with the value the security update offers but asks if there are any known issues with the patch and if there is a rollback plan if the firewalls stop functioning. What process is your manager requesting?
A: Change management
- You are working as a cloud manager at Congruence Corp. Management has decided that the company will purchase iPhones for all engineers who are on an on-call rotation. This is to help ensure availability and provide a standard for all on-call engineers. Since the iPhones are being purchased by the organization, management wants to have a level of control over the iPhones, i.e., the ability to wipe data, enable security settings like PIN, and enable Find My iPhone. What should you look into to meet this request?
A: Resource management
- You are working as an account manager at NilCo. You’ve received an email from the organization’s CEO that he has signed a check of $40,000 and you need to mail it to a P.O. box in another state. What process should you initiate?
A: Incident response
- John, a security analyst, is purchasing the DDoS protection service because while performing a risk assessment he considers the DDoS attack as a serious threat. What type of risk management strategy is John pursuing?
A: Mitigation
- A telecommunication company in Alaska has been continuously getting emails from customers that they are experiencing poor voice quality over the network. The degraded quality is due to extremely harsh weather conditions, which have frozen the network transmitters. This will automatically restore once the weather conditions drop down to normal. The company has decided to eliminate the risk and wait for the weather conditions to get better. Which of the following risk management techniques is the company using to manage the risk?
A: Avoidance
- Erika is working as a service desk manager at BigCO. She gets a request from her manager to immediately disable an employee’s account because he is being terminated. For this purpose, she wants to validate the employee’s manager and contact HR to verify termination. However, her manager is insistent that she should disable the employee’s account now or he will terminate her. What process would she be violating if she disables the employee’s account right away?
A: Standard operating procedure
- In dealing with risks, which response is accomplished when an organization purchases insurance to protect the income when a disaster or threat is realized?
A: Transference
- Purchasing employment practice liability insurance is what type of risk management technique?
A: Transference
- Which of the following security policies defines the behaviors and activities that are acceptable in an organization?
A: Advisory
- Katy, a project manager, identifies a project risk that could harm the team members. So, she hires a professional vendor to complete the critical part of the project. What type of risk response is she using for handling the potential risks?
A: Transfer
- The network diagrams have been digitized while migrating it to the cloud. Which data category and data security principle is referred in the scenario?
A: Sensitive
- Which of the following is a testament to the compliance of standards, practices, or regulations by an independent third party?
A: Certification
- Which of the following International Organization for Standardization (ISO) standards governs personally identifiable information (PII) in the cloud?
A: 27018
- Which law reforms the financial services industry and specifically addressed concerns about protecting consumer privacy?
A: Gramm-Leach-Bliley Act
- Flora works as a software engineer at BigCo. She is developing an application that will assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers focusing on assessing security throughout the life cycle. Which of the following methods should she perform to assess the security of the product?
A: Vulnerability scanning
- Peter is working as a cloud engineer at NilCo. Management has asked him to identify the services and desktops that have missing security patches and updates. Which of the following will he perform to accomplish the task?
A: Vulnerability scanning
- Your organization’s network file share was crypto-locked (encrypted), and a ransom was demanded for access to the files. Management has requested that you review and lock down access to the file share. They want only authorized individuals to be able to make changes to the entire file share. What is management asking you to perform?
A: Hardening
- Edward is working as a security analyst at NilCo. Management has asked him to perform a security audit of the systems on a network to determine their compliance with security policies. Which of the following will he perform in the audit?
A: Vulnerability scanning
- What will you use to perform a security audit of the systems on a network to determine their compliance with security policies?
A: Vulnerability scanning
A _________ is a written document that is legally binding, specifying the rights and duties of the parties to the agreement.
A) Contract
The cost for utilities is considered as what type of expenditure?
A) Operating
Which of the following are aspects of human capital?
A) Training
B) Professional development
A _________ runs in a test environment and designed to prove that a technology works as it should.
A) proof of concept
Which of the following documents specifies metrics to determine whether a CSP is delivering things as specified in the statement of work (SOW)?
A) Service level agreement
In which migration approach are all applications and data migrated as it is?
A) Lift and shift
Which of the following is a small-scale initial rollout of a solution into the production environment?
A) Pilot
In which migration approach are applications optimized to make full use of cloud capabilities?
A) Rip and replace
___________ is a long-term educational process focused on employee growth.
A) Professional development
Which of the following collects written information about a CSP’s capabilities?
A) Request for information
Other Links:
See other websites for quiz:
Check on QUIZLET
