Que- Which of the following is a virtualization provisioning system that will be rolled into Dell’s AIM ?
a. Dell Scalent
b. CloudKick
c. Elastra
d. All of the mentioned
Answer- Dell Scalent
Que- Which of the following is used for Web site monitoring and analytics ?
a. Gomez
b. Ganglia
c. Elastra
d. None of the mentioned
Answer- Gomez
Que- Which of the following is used for performance management for virtualized Java Apps with VMware integration ?
a. Hyperic
b. Internetseer
c. RightScale
d. All of the mentioned
Answer- Hyperic
Que- Which of the following is a core management feature offered by most cloud management service products ?
a. Support of different cloud types
b. Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
c. Performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
d. All of the mentioned
Answer- All of the mentioned
Que- Point out the correct statement:
a. Eucalyptus and Rackspace both use Amazon EC2 and S3 services
b. The RightScale user interface provides real-time measurements of individual server instances
c. RightScale server templates and the Rightscript technology are highly configurable and can be run under batch control
d. All of the mentioned
Answer- All of the mentioned
Que- Which of the following is an industry organization that develops industry system management standards for platform interoperability ?
a. DMTF
b. DMS
c. EBS
d. All of the mentioned
Answer- DMTF
Que- Which of the following is used to extend CIM to virtual computer system management ?
a. OVF
b. VMAN
c. OCSI
d. None of the mentioned
Answer- VMAN
Que- Point out the wrong statement:
a. Cloudkick’s Insight module is powerful and particularly easy to use
b. Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
c. All of the service models support monitoring solutions
d. All of the mentioned
Answer- Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
Que- Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost ?
a. CCE
b. OCCI
c. SMI
d. All of the mentioned
Answer- SMI
Que- Which of the following is open and both hypervisor and processor-architecture-agnostic ?
a. Dell Scalent
b. CloudKick
c. Elastra
d. All of the mentioned
Answer- Dell Scalent
Que- Which of the following is a workflow control and policy based automation service by CA ?
a. CA Cloud Optimize
b. CA Cloud Orchestrate
c. CA Cloud Insight
d. CA Cloud Compose
Answer- CA Cloud Orchestrate
Que- Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons ?
a. CloudWatch
b. CloudSensor
c. CloudMetrics
d. All of the mentioned
Answer- CloudSensor
Que- Which of the following is a compliance standard?
a. PCI-DSS
b. HIPPA
c. GLBA
d. All of the mentioned
Answer- All of the mentioned
Que- Point out the correct statement:
a. The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements
b. To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
c. A security control model includes the security that you normally use for your applications only
d. All of the mentioned
Answer- To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
Que- Which of the following is key mechanism for protecting data?
a. Access control
b. Auditing
c. Authentication
d. All of the mentioned
Answer- All of the mentioned
Que- How many security accounts per client is provided by Microsoft?
a. 1
b. 3
c. 5
d. 7
Answer- 5
Que- Point out the wrong statement:
a. Securing data sent to, received from, and stored in the cloud is the single largest security concern
b. The problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider’s system
c. One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
d. All of the mentioned
Answer- One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
Que- Which of the following is a common means for losing encrypted data?
a. lose the keys
b. lose the encryption standard
c. lose the account
d. all of the mentioned
Answer- lose the keys
Que- Which of the following is the standard for interoperable cloud-based key management?
a. KMIP
b. PMIK
c. AIMK
d. None of the mentioned
Answer- KMIP
Que- Which of the following was one of the weaker aspects of early cloud computing service offerings?
a. Logging
b. Integrity checking
c. Consistency checking
d. None of the mentioned
Answer- Logging
Que- Which of the following is one of the most actively developing and important areas of cloud computing technology?
a. Logging
b. Auditing
c. Regulatory compliance
d. None of the mentioned
Answer- Regulatory compliance
Que- Amazon Web Services supports ________ Type II Audits.
a. SAS70
b. SAS20
c. SAS702
d. None of the mentioned
Answer- SAS70
Que- Which of the following is done by Identity management ?
a. controlling access to data in the cloud
b. maintaining user roles
c. preventing unauthorized uses
d. all of the mentioned
Answer- all of the mentioned
Que- Point out the correct statement:
a. Identities are not tied to the concept of accounts and can be used for contacts or “ID cards”
b. Identities are important from a reliability standpoint
c. Presence is important in cloud computing because it adds context that can modify services and service delivery
d. All of the mentioned
Answer- Presence is important in cloud computing because it adds context that can modify services and service delivery
Que- Which of the following is required by Cloud Computing ?
a. That you establish an identity
b. That the identity be authenticated
c. That the authentication be portable
d. All of the mentioned
Answer- All of the mentioned
Que- Which of the following standard is the key to creating Single Sign-On (SSO) systems ?
a. OpenID 2.0
b. CHAP
c. SMAL
d. None of the mentioned
Answer- OpenID 2.0
Que- Point out the wrong statement:
a. OpenID 2.0 is the standard associated with creating an identity
b. OpenID doesn’t specify the means for authentication of an identity,
c. OpenID provides access to important Web sites
d. None of the mentioned
Answer- None of the mentioned
Que- Which of the following is a complementary mechanism to OpenID and is used to create SSO systems ?
a. OpenSSL
b. CHAP
c. SMAL
d. None of the mentioned
Answer- SMAL
Que- Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials ?
a. serving party
b. relieving party
c. relaying party
d. none of the mentioned
Answer- relaying party
Que- Which of the following provides a token service that can be used to present validated access to resources ?
a. OAuth
b. OCheck
c. SAML
d. None of the mentioned
Answer- OAuth
Que- Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards ?
a. Windows Wor kflow
b. Windows Identity
c. Windows compliance
d. None of the mentioned
Answer- Windows Identity
Que- __________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
a. AD FS
b. AC
c. SAS
d. None of the mentioned
Answer- AD FS
Que- Which of the following service provider provides the least amount of built in security ?
a. SaaS
b. PaaS
c. IaaS
d. All of the mentioned
Answer- IaaS
Que- Point out the correct statement:
a. Different types of cloud computing service models provide different levels of security services
b. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
c. Data should be transferred and stored in an encrypted format for security purpose
d. All of the mentioned
Answer- All of the mentioned