Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (70)
Microsoft Azure is an example of which type of cloud deployment model?
Public
Which cloud characteristic states that iOS, Android, and Windows users should all be able to use cloud resources?
Broad network access
Which cloud service model supports Gmail?
SaaS
In the shared responsibility model, what is the client responsible for?
security IN the cloud
What defines the maximum amount of time a system can be offline in the event of a disaster?
RTO(Recovery Time Objective)
Which term refers to having a device or system that can take over in the event of a failure?
redundancy
Which cloud service model provides hardware capacities, such as compute, storage, or networking, to a client?
IaaS
Which cloud characteristic allows clients to access additional resources without requiring intervention from the service provider?
self-service
Which feature of cloud design is measured in terms of nines?
high availability
In cloud disaster recovery, what defines the maximum age of files that must be recovered from backups?
RPO(Recovery Point Objective)
Which cloud access type is used to securely connect to an online Windows instance?
Remote Desktop Protocol
A _____________ speeds up access to web resources for users in geographically distributed locations.
content delivery network
___________ is used by a web browser such as Google Chrome, Microsoft Edge, or Apple Safari to connect to a URL for the cloud resource.
Hypertext Transfer Protocol Secure
What refers to a security device that protects computers or networks from malicious network traffic?
Firewall
What storage type is best suited for databases and large scale, frequently accessed storage solutions?
Block
Which cloud-based service resolves hostnames (or URLs) to IP addresses?
Domain Name System
Which of the following distributes work between multiple servers to speed up network performance?
Load balancer
A _________ is a semi-public intermediary network located between two firewalls.
demilitarized zone
Which storage feature works by looking for repeated information within a file and then replacing that information with a shorter string?
Compression
Which storage type is best for unstructured data such as pictures and videos?
Object
A ___________ is a standard of performance or point of reference for comparison.
benchmark
The __________ is a network of devices that are able to communicate with each other and exchange data.
Internet of Things
What breaks down a monolith program into smaller components that are independently coded and managed?
Microservice
What is a way to store all the components needed to execute a microservice in the same package?
Containerization
What identifies policies or regulations that are not being met with the current migration plan?
Gap analysis
What refers to the ability of a client to acquire additional cloud resources without supplier intervention?
Self-service
What are two examples of digital marketing services offered within cloud environments?
Email campaigns
Social media posts
Which cloud service is an open and distributed ledger that can securely record transactions between two parties in a verifiable and permanent way?
Blockchain
What service allows users to authenticate once across multiple security domains?
Federation
What are the three key components of reporting in cloud assessments?
Compute
Network
Storage
___________ is a long-term educational process focused on employee growth.
Professional development
The cost for utilities is considered as what type of expenditure?
Operating
Which of the following are aspects of human capital?
A
Training
B
Support
C
Skill availability
D
Professional development
Training
Professional Development
What collects written information about a CSP's capabilities?
Request for information
A _________ is a written document that is legally binding, specifying the rights and duties of the parties to the agreement.
contract
What is a small-scale initial rollout of a solution into the production environment?
Pilot
A _________ runs in a test environment and designed to prove that a technology works as it should.
proof of concept
In which migration approach are all applications and data migrated as it is?
Lift and shift
What document specifies metrics to determine whether a CSP is delivering things as specified in the statement of work (SOW)?
Service level agreement
In which migration approach are applications optimized to make full use of cloud capabilities?
Rip and replace
_________________ is the continuous execution of the first three steps (dev, build, and test) in the application development life cycle.
Continuous integration
____________ instances are responsible for renting reserved instances that are not currently being used.
Spot
Which testing validates that new features and bug fixes don't have a negative impact on the production code?
Regression
What storage type stores individual files like a normal file system, but there is no hierarchy as there is in a file system?
Object
What refers to the glue or the coordination between automation tasks?
Orchestration
What is the process of taking a VM and performing post-deployment actions to customize the VM to the required configuration?
Bootstrapping
____________ instances are instances with the capacity of CPU and RAM that users are willing to pay even if the instances or capacity are not used or even powered on.
Reserved
Which type of scaling refers to adding servers for handling system load?
Horizontal
Which testing can be performed in both the user acceptance (UA) and dev/test environments?
Regression
The four steps of the continuous integration and continuous delivery (CI/CD) pipeline are:
Dev > Build > Test > Release
What analysis is dependent on the monetary value of an asset?
Quantitative
Risk is the probability of the occurrence of a ________.
threat
An organization purchases insurance for company vehicles. What kind of risk response is this?
Transfer
In how many ways can you classify risk in the risk classification system?
grades (A, B, C, D, E)
or a scale from 1 to 5.
__________ is the process of storing data in multiple locations to provide other means of data availability if one location is no longer available.
Replication
What risk response attempts to reduce or eliminate risk entirely through utilizing resources or changing the probability of threats?
Avoidance
What refers to the difficulty of extracting data from one CSP and importing it to on-premises?
Data portability
Which license is free to use in a CSP's infrastructure?
Open-source
Identifying all the assets of an organization and documenting any risk and the response to the risk refers to a(n):
risk register
Which control type returns assets to a normal operating state after a security event occurs?
Corrective
What property validates that an asset has not been altered or modified?
Integrity
What property ensures the privacy of an asset?
Confidentiality
What law requires publicly traded companies to have proper internal control structures in place to validate that their financial statements accurately reflect their financial results?
Sarbanes-Oxley Act
Security assessments that scan and review the source code for bugs and defects is an example of:
application scanning
What property ensures the timely and uninterrupted access to an asset?
Availability
What is the process of looking at threats against assets and past events to determine a plan of action that will improve the security posture of an organization?
Hardening
What property is designed to prevent assets from unauthorized access by other assets?
Confidentiality
A __________ is a threat that has not been mitigated.
vulnerability
What refers to logs or records of actions that occurred on an asset or actions that are performed by an asset?
Audit
What International Organization for Standardization (ISO) establishes the criteria for a quality management system?
9001
Students also viewedAssessing Cloud Needs
10 terms
luckyday757
C849 Practice Test C
50 terms
zacpell
Cloud Essentials
169 terms
Alexander_Morales47
Management and Technical Operations
10 terms
luckyday757
Sets found in the same folderCloud essentials
188 terms
Slamone11
Comptia
777 terms
Lawrence_Reblora
Cloud Essentials
169 terms
Alexander_Morales47
Windows Server Final
204 terms
jordan_english
Other sets by this creatorAWS SysOps Exam Prep
101 terms
ty_kenneyPlus
Other Services
6 terms
ty_kenneyPlus
Networking - VPC
95 terms
ty_kenneyPlus
Networking - Route 53
78 terms
ty_kenneyPlus
Verified questions
engineering
A region R in the z-plane and a complex mapping $w=f(z)$ are given. In each case, find the image region $R^{\prime}$ in the w-plane. Strip $0 \leq y \leq 1$ under $w=i z$
Verified answer
physics
Give a reason why the Thomson plum-pudding model does not agree with experimental results. does not agree with experimental results.
Verified answer
engineering
A 7-hp (shaft) pump is used to raise water to an elevation of 15 m. If the mechanical efficiency of the pump is 82 percent, determine the maximum volume flow rate of the water.
Verified answer
physics
The reflecting surfaces of two mirrors form a vertex with an angle of $120^{\circ}$. If a ray of light strikes mirror $1$ with an angle of incidence of $55^{\circ}$, find the angle of reflection of the ray when it leaves mirror $2$.
Verified answer
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Other Quizlet setsIntroduccion a la cromatografia de gases (CG)
31 terms
Alejandrass97
Tx Gov. test 2 ch. 4, 5, 6
66 terms
alex_iveroth
ORG/AD - Safety & Health in Workplace
73 terms
cocopunch
SCM Chapter 5-9 Quiz Questions
40 terms
akvetnoy2002