Upgrade to remove ads Show
Only ₩37,125/year
Terms in this set (70)Microsoft Azure is an example of which type of cloud deployment model? Public Which cloud characteristic states that iOS, Android, and Windows users should all be able to use cloud resources? Broad network access Which cloud service model supports Gmail? SaaS In the shared responsibility model, what is the client responsible for? security IN the cloud What defines the maximum amount of time a system can be offline in the event of a disaster? RTO(Recovery Time Objective) Which term refers to having a device or system that can take over in the event of a failure? redundancy Which cloud service model provides hardware capacities, such as compute, storage, or networking, to a client? IaaS Which cloud characteristic allows clients to access additional resources without requiring intervention from the service provider? self-service Which feature of cloud design is measured in terms of nines? high availability In cloud disaster recovery, what defines the maximum age of files that must be recovered from backups? RPO(Recovery Point Objective) Which cloud access type is used to securely connect to an online Windows instance? Remote Desktop Protocol A _____________ speeds up access to web resources for users in geographically distributed locations. content delivery network ___________ is used by a web browser such as Google Chrome, Microsoft Edge, or Apple Safari to connect to a URL for the cloud resource. Hypertext Transfer Protocol Secure What refers to a security device that protects computers or networks from malicious network traffic? Firewall What storage type is best suited for databases and large scale, frequently accessed storage solutions? Block Which cloud-based service resolves hostnames (or URLs) to IP addresses? Domain Name System Which of the following distributes work between multiple servers to speed up network performance? Load balancer A _________ is a semi-public intermediary network located between two firewalls. demilitarized zone Which storage feature works by looking for repeated information within a file and then replacing that information with a shorter string? Compression Which storage type is best for unstructured data such as pictures and videos? Object A ___________ is a standard of performance or point of reference for comparison. benchmark The __________ is a network of devices that are able to communicate with each other and exchange data. Internet of Things What breaks down a monolith program into smaller components that are independently coded and managed? Microservice What is a way to store all the components needed to execute a microservice in the same package? Containerization What identifies policies or regulations that are not being met with the current migration plan? Gap analysis What refers to the ability of a client to acquire additional cloud resources without supplier intervention? Self-service What are two examples of digital marketing services offered within cloud environments? Email campaigns Which cloud service is an open and distributed ledger that can securely record transactions between two parties in a verifiable and permanent way? Blockchain What service allows users to authenticate once across multiple security domains? Federation What are the three key components of reporting in cloud assessments? Compute ___________ is a long-term educational process focused on employee growth. Professional development The cost for utilities is considered as what type of expenditure? Operating Which of the following are aspects of human capital?
A Training What collects written information about a CSP's capabilities? Request for information A _________ is a written document that is legally binding, specifying the rights and duties of the parties to the agreement. contract What is a small-scale initial rollout of a solution into the production environment? Pilot A _________ runs in a test environment and designed to prove that a technology works as it should. proof of concept In which migration approach are all applications and data migrated as it is? Lift and shift What document specifies metrics to determine whether a CSP is delivering things as specified in the statement of work (SOW)? Service level agreement In which migration approach are applications optimized to make full use of cloud capabilities? Rip and replace _________________ is the continuous execution of the first three steps (dev, build, and test) in the application development life cycle. Continuous integration ____________ instances are responsible for renting reserved instances that are not currently being used. Spot Which testing validates that new features and bug fixes don't have a negative impact on the production code? Regression What storage type stores individual files like a normal file system, but there is no hierarchy as there is in a file system? Object What refers to the glue or the coordination between automation tasks? Orchestration What is the process of taking a VM and performing post-deployment actions to customize the VM to the required configuration? Bootstrapping ____________ instances are instances with the capacity of CPU and RAM that users are willing to pay even if the instances or capacity are not used or even powered on. Reserved Which type of scaling refers to adding servers for handling system load? Horizontal Which testing can be performed in both the user acceptance (UA) and dev/test environments? Regression The four steps of the continuous integration and continuous delivery (CI/CD) pipeline are: Dev > Build > Test > Release What analysis is dependent on the monetary value of an asset? Quantitative Risk is the probability of the occurrence of a ________. threat An organization purchases insurance for company vehicles. What kind of risk response is this? Transfer In how many ways can you classify risk in the risk classification system? grades (A, B, C, D, E) or a scale from 1 to 5. __________ is the process of storing data in multiple locations to provide other means of data availability if one location is no longer available. Replication What risk response attempts to reduce or eliminate risk entirely through utilizing resources or changing the probability of threats? Avoidance What refers to the difficulty of extracting data from one CSP and importing it to on-premises?
Data portability Which license is free to use in a CSP's infrastructure? Open-source Identifying all the assets of an organization and documenting any risk and the response to the risk refers to a(n): risk register Which control type returns assets to a normal operating state after a security event occurs? Corrective What property validates that an asset has not been altered or modified? Integrity What property ensures the privacy of an asset? Confidentiality What law requires publicly traded companies to have proper internal control structures in place to validate that their financial statements accurately reflect their financial results? Sarbanes-Oxley Act Security assessments that scan and review the source code for bugs and defects is an example of: application scanning What property ensures the timely and uninterrupted access to an asset? Availability What is the process of looking at threats against assets and past events to determine a plan of action that will improve the security posture of an organization? Hardening What property is designed to prevent assets from unauthorized access by other assets? Confidentiality A __________ is a threat that has not been mitigated. vulnerability What refers to logs or records of actions that occurred on an asset or actions that are performed by an asset? Audit What International Organization for Standardization (ISO) establishes the criteria for a quality management system? 9001 Students also viewedAssessing Cloud Needs10 terms
luckyday757 C849 Practice Test C50 terms zacpell Cloud Essentials169 terms Alexander_Morales47 Management and Technical Operations10 terms luckyday757 Sets found in the same folderCloud essentials188 terms Slamone11 Comptia777 terms Lawrence_Reblora Cloud Essentials169 terms Alexander_Morales47 Windows Server Final204 terms jordan_english Other sets by this creatorAWS SysOps Exam Prep101 terms ty_kenneyPlus Other Services6 terms ty_kenneyPlus Networking - VPC95 terms ty_kenneyPlus Networking - Route 5378 terms ty_kenneyPlus Verified questions
engineering A region R in the z-plane and a complex mapping $w=f(z)$ are given. In each case, find the image region $R^{\prime}$ in the w-plane. Strip $0 \leq y \leq 1$ under $w=i z$ Verified answer physics Give a reason why the Thomson plum-pudding model does not agree with experimental results. does not agree with experimental results. Verified answer
engineering A 7-hp (shaft) pump is used to raise water to an elevation of 15 m. If the mechanical efficiency of the pump is 82 percent, determine the maximum volume flow rate of the water. Verified answer
physics The reflecting surfaces of two mirrors form a vertex with an angle of $120^{\circ}$. If a ray of light strikes mirror $1$ with an angle of incidence of $55^{\circ}$, find the angle of reflection of the ray when it leaves mirror $2$. Verified answer Recommended textbook solutionsFundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions Other Quizlet setsIntroduccion a la cromatografia de gases (CG)31 terms Alejandrass97 Tx Gov. test 2 ch. 4, 5, 666 terms alex_iveroth ORG/AD - Safety & Health in Workplace73 terms cocopunch SCM Chapter 5-9 Quiz Questions40 terms akvetnoy2002 What is the purpose of the shared responsibility model quizlet?In the shared responsibility model, AWS is responsible for providing security of the cloud.
Which of the following is the responsibility of AWS in shared responsibility model?Patch Management – AWS is responsible for patching and fixing flaws within the infrastructure, but customers are responsible for patching their guest OS and applications.
Which of the following is the responsibility of the customer according to the shared security model?Under this model, the customer is primarily responsible for firewall configuration and properly protecting their data (i.e. using encryption and access management).
Which statement about shared responsibility model is accurate?The shared responsibility model can include IT controls, and it is not just limited to security considerations. Therefore, answer C is correct.
|