Three key pillars of virtual information management are networking, virtualization and _____

  1. Science
  2. Computer Science

Show

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (119)

    high availability

    Accessible when you need it

    fault tolerance

    Ability to withstand a certain amount of failure and still remain functional

    Iaas

    User Manages the Virtual Resources, such as virtual servers

    Example of Cloud Deployment Model

    Hybrid

    On-Premises

    Local Data Centres

    Cloud computing as we know it now is a relatively new concept, which started to become strong in the last 10-12 years. However, some of the (a) for clouds exist and have been used for much longer than that.

    In this context, (a) is:

    Enabling Technologies

    Scaling is the ability of clouds to handle increases or decreases in usage demands for IT resources. Vertical scaling is obtained by simply adding more of the same resources and it is recommended because the new resources will be instantly available. Horizontal scaling is achieved by replacing IT resources by more powerful ones. The latter is specially recommended when equipments in a data centre are reaching technology obsolescence.(TF)

    False

    Capacity planning is about making sure that computational resources are available when needed. The goal (and the main challenge) is to minimise differences between what is needed and what is available to reduce costs without impacting efficiency and performance, and without negatively interfering in the business outcomes.(TF)

    True

    Both cloud providers and cloud consumers can be cloud service owners. It depends on who legally owns the services being provided. For example, if an organisation owns a website which is hosted in AWS (Amazon Web Services) or Microsoft Azure, either AWS or Azure will be the legal owners of this website, regardless of the service it provides.(TF)

    False

    QoS management can be very difficult when different Internet service providers are involved. This is a problem that most _____ users and providers have to deal with, as multiple carriers may be involved and they have, potentially, different SLAs.

    cloud

    Latency is the amount of time a packet takes to travel from a data node to another. Every intermediary node on the data packet's path will potentially increase latency, specially if there is transmission queues or faults/failures in the node. Latency can impact QoS in the provision of cloud services.(TF)

    True

    Virtualisation can only be applied to create virtual servers on top of physical servers. Other types of IT resources cannot be virtualised.(TF)

    False

    Cloud services are the IT resources that are available for remote access on cloud environments. For each service, a SLA has to be established in order to describe features related to quality of service. A SLA is needed because the cloud user must know what he or she is paying for.(TF)

    True

    From the portability point of view, operating system-based virtualisation is better than hardware-based virtualisation. However, the latter is more efficient in terms of performance because it reduces the layers between the VMs and the hardware by bypassing the operating system.(TF)

    True

    Virtualisation technologies enable a number of virtual servers to be created in a single physical server, being the availability of resources (e.g., hardware, network) the only real limitation. It is not very good for performing administrative tasks though, because automation is usually more difficult in virtual environments.(TF)

    False

    The hypervisor can be used to optimise performance in hardware-based virtual systems. This layer has to be carefully designed to make the most of the hardware resources. Device drivers and system services don't need to be optimised in this case because improving performance is solely a responsibility of the hypervisor.(TF)

    False

    Performance overheads can be a real issue to implement virtualisation. Monitoring the impact of operating system-based virtualisation can be challenging and does not help in solving hardware compatibility issues.(TF)

    False

    There are real concerns about _____ for cloud environments. Among them are the fact that cloud users have to share responsibility on this concern and having such huge amounts of data on the same place increases the potential for damage if an attack is successful.

    Security

    Usually, a new system-based product will require more than an insignificant amount of _____ in IT resources (infrastructure). On-demand clouds can help to reduce upfront _____, as the infrastructure cost will grow according to the actual usage. This also simplifies capacity planning.

    Investments

    _____ can be dynamically allocated in most clouds, which allows better cost-effective solutions for peak variations along pre-determined periods of time (e.g., daily, monthly).

    It Resources

    IT environment designed for remotely provisioning scalable and measured IT resources.

    Cloud

    _____ issues may arise because of the extra layers that your VM will have to go through in order to reach the hardware. On the other hand, this process can help solving hardware incompatibilities caused by, for example, unavailability of device drivers.(TF)

    Performance

    Latency is the amount of time a packet takes to travel from a data node to another. Every intermediary node on the data packet's path will potentially increase latency, specially if there is transmission queues or faults/failures in the node. Latency can impact QoS on the provision of cloud services.(TF)

    True

    Virtualisation can be applied to create virtual servers on top of physical servers. Other types of IT resources cannot be virtualised. (TF)

    False

    An _____ method is a method that can be executed several times and it always will provide the same outcome without affecting anything else on the system. In other words, after the method call, all variables will have the same value as they had before.

    idempotent

    _____ is important to enable applications to take advantage of certain cloud characteristics such as flexibility.

    The related operations eliminate unnecessary dependencies, making the corresponding classes and methods self-contained and order-independent. It also enables scalability.

    Atomicity

    _____ access refers to a property of clouds where supporting different devices, transport protocols, interfaces, and security technologies is mandatory.

    This property cannot be confused with elasticity, where having the ability to add new IT resources by applying scalability strategies is more important.

    Ubiquitous

    A stateless object holds data, information, or context that is important across multiple calls on a given instance of that object. This is the reason why statelessness is so important for cloud application design, as all that information is required to develop a quality system. Having this type of stateless implemented also helps cloud applications to better take advantage of the fundamental cloud characteristics. (TF)

    False

    Manually installing applications in a VM is never recommended because cloud environments are more frequently created and destroyed, so scripts are much better. Also, the developer should never rely on the cloud topology. Only logs and state information can be locally saved in the VM because they will not be impacted by such problems.
    TF

    False

    Obscure protocols should not be used in cloud applications. It usually pays off choosing reliable technology and/or standards, such as HTTP, SSL, standard database solutions, etc. The only exception is operating systems specific features because changes in operating systems are unlikely and therefore they are more portable and resilient.
    TF

    False

    Lightweight documentation is essential for clouds. Documenting architectural views, operational features and software components is essential. The documentation must provide a map of the application and the required deployment information. TF

    True

    Parallelism is a type of computation where several processes can be executed simultaneously. Most distributed cloud environments allow the usage of parallel resources. However, as statelessness and idempotence, the usage of parallel resources may require the development of tailored code, especially designed to carry out several operations simultaneously.
    TF

    True

    The Internet topology is quite complex because of the way Internet Service Providers have connected to each other and because they are free to select partners for interconnection. Fortunately, there are no connectivity issues (e.g., internal end user access) related to organisations working on-premise or on the cloud because they all use the same protocols.
    TF

    False

    Standardisation is fundamental to build efficient cloud environments and data centres, as well as high availability, storage and remote operations, among others. TF

    True

    Routers are usually connected to multiple networks. They have the ability to efficiently forward packets because they understand the network topology and can manage traffic conditions. Connectionless packet switching and routers are fundamental technologies for Internet communication. TF

    True

    Virtualisation is among the most important data centre technologies. Operating system-based virtualisation can be implemented with Oracle VM VirtualBox, for example. TF

    True

    Running a browser from your VM will allow you to do the same things that you could do with a browser installed in the hosting operating systems.

    If you had access to a container that could run from a browser, you could use that as well.

    That would be containerisation running on top of _____ and this concept is entirely possible because a VM in this case is simply an abstraction for a computer (which could be a server, your laptop, etc.).

    Virtualisation

    Single sign-on (SSO) enables a cloud service consumer to establish a security context that is persisted among different cloud services. SSO cannot be applied to access cloud services residing on different clouds though, because technology restrictions prevent them from sharing the same security broker.
    TF

    False

    Virtualisation attack exploits vulnerabilities in the virtualisation platform to jeopardise its confidentiality, integrity, and/or availability. If physical IT resources within a cloud are shared by different cloud service consumers, these cloud service consumers will necessarily have overlapping trust boundaries as there are no effective means to protect them in this situation. This may represent a vulnerability, for example, if an attacker can grant access to the services of a cloud consumer and then use this access to attack other consumers within the same overlapping trust boundaries. TF

    False

    A hardened virtual server is a VM created from an image that has been stripped from unnecessary software to reduce potential vulnerabilities. The reasoning behind this security strategy is "what is not there cannot be abused or exploited by attackers". TF

    True

    Digital coding system dedicated to preserving the confidentiality and integrity of data by using specific algorithms to encode plaintext data into ciphertext.

    Encryption

    One-way, non-reversible form of data protection.

    Hashing

    System of protocols, data formats, rules, and practices that enable large-scale systems to securely use public key cryptography.

    Public Key Infrastructure

    It delineates areas where different security measures can be applied

    Cloud Based

    DoS attacks have the purpose to overload IT resources to the point where they cannot function properly, resulting in server degradation and/or failure. Successful DoS attacks are usually based on artificially increasing the workload on cloud services (e.g., with imitation messages or communication requests), artificially overloading the network with traffic to reduce its responsiveness, and by sending multiple cloud service requests to consume memory and processing resources. TF

    True

    It occurs when data being transferred to or within a cloud is passively intercepted by a malicious service agent for illegitimate information gathering purposes.

    Traffic Eavesdropping

    It arises when messages are intercepted and altered by a malicious service agent, thereby potentially compromising the message's confidentiality and/or integrity.

    Malicous Intermediary

    It occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker getting access to IT resources that are normally protected

    Insuficcient Authorisation

    It happens when weak passwords or shared accounts are used to protect IT resources.

    Weak Authentication

    Most successful attacks result from overloading IT resources to the point where they cannot function properly, resulting in service degradation and/or failure.

    Denial of service

    SLAs establish the guarantees and usage terms for cloud services. They are fundamental to understand how quality attributes will be addressed in cloud-based software systems. Some important metrics are the ones related to availability, reliability, performance, and security. TF

    True

    By working on-premise or on cloud environments, a company will always be able to work under the same service-level agreements for quality attributes, e.g., usability, performance, security and availability. TF

    False

    Cloud services are the IT resources that are available for remote access on a cloud environment. For each service, a SLA has to be established in order to describe features related to the quality of service. A SLA is needed because the cloud user must know what he or she is paying for. TF

    True

    Scaling is the ability of clouds to handle increases or decreases in usage demands for IT resources. Vertical scaling is obtained by simply adding more of the same resources and it is recommended because the new resources will be instantly available. Horizontal scaling is achieved by replacing IT resources by more powerful ones. The latter is specially recommended when equipments in a data centre are reaching technology obsolescence. TF

    False

    Because they use most of the same resources and technology, it is correct to say that cloud is just another name for the Internet. TF

    False

    On premise and cloud-based SLAs can be considerably different, which makes building hybrid distributed solutions that utilize both (on-premise and cloud) very challenging. TF

    True

    SLAs need to specify where monitoring is performed and where measurements are calculated. Monitoring within the cloud firewall is usually a good approach as the metrics will properly reflect the cloud consumer experience in terms of QoS.
    TF

    False

    Cloud providers don't need to disclosure the collection and storage of the cloud consumer's usage data for future reporting purposes as the data belongs to the provider. Terms of service are usually helpful and the cloud consumer should pay attention to them as well.
    TF

    False

    A SLA should define penalties for non-compliance, such as compensation, penalties, reimbursements, or otherwise. If the cloud provider is responsible for monitoring IT resources to ensure compliance with their own SLAs, the tools and practices are being used to carry out the compliance checking process should be disclosed. TF

    True

    Reliability is the probability that an IT resource can perform its intended function under pre-defined conditions without experiencing failure. Reliability focuses on how often the service performs as expected, which requires the service to remain in an operational and available state. TF

    True

    SLAs use service quality metrics to express measurable QoS characteristics. The main service quality metrics are related to service availability, reliability, performance, scalability and resiliency. For each metric, a SLA should provide at least a description, the formula used to calculate the metric and the frequency with which the metric is calculated (e.g., weekly, monthly, yearly). TF

    True

    Service performance metrics measures the ability on an IT resource to carry out its functions within expected parameters; different metrics may apply, such as network capacity metric and storage device capacity metric. Service scalability metrics are related to the ability on an IT resource to carry out its functions within expected parameters related to IT resource elasticity capacity. TF

    True

    Availability rate metric is the percentage of service up-time and should be calculated cumulatively while outage duration metric measures the duration of a single outage and should be calculated per event. TF

    True

    Symmetric and asymmetric encryption have a few different characteristics and applications.

    Both are required to implement HTTPS: symmetric encryption is used to exchange data between the web browser and the server while asymmetric encryption is used to securely exchange the symmetric key generated by the browser when HTTPS is established.

    The reason for this approach is the difference of performance between symmetric encryption and asymmetric encryption, being the first much faster than the latter. TF

    True

    Latency is the amount of time a packet takes to travel from a data node to another. Every intermediary node on the data packet's path will potentially increase latency, specially if there is transmission queues or faults/failures in the node, even though ISPs cannot interfere with latency. Latency can impact the quality of the cloud services. TF

    False

    Provision of IaaS usually includes hardware, network, connectivity, operating systems, programming languages, databases, and other "raw" IT resources, which are typically virtualised. TF

    False

    Containers and micro-services have a higher level of abstraction than virtualisation while multi-tenancy enables multiple users (tenants) to access the same application logic simultaneously. Access to basic operating systems features is allowed in all of the three technologies above to enable proper automated data centre technology. TF

    False

    From the cloud provider perspective, virtual servers and storage device mechanisms represent two of the most fundamental IT resources that are delivered as part of a standard rapid provisioning architecture within the cloud delivery model known as: ____.

    Infrastructure-as-a-service IaaS

    A virtual machine abstracts a complete server including hardware resources like memory, disk and operating system. Instead of a virtual server, another technology can be used to abstract the operating system and provide virtual resources. As they are lighter, you can provide many more units of this technology than of VMs, for the same hardware, though directly access to the operating system/hardware is usually not available or very limited. This technology is known as: _____

    Containerisation

    It happens when weak passwords or shared accounts are used to protect IT resources.

    Weak Authentication

    Minimise discrepancy between IT resources capacity and demand to achieve predictable efficiency and performance.

    Capacity Planning

    IT environment designed for remotely provisioning scalable and measured IT resources.

    Clout

    It hosts IT resources in a conventional IT environment within an organisational boundary.

    On-Premise

    Lack of established standards for cloud computing within the cloud computing industry.

    Limited Portability

    A cloud provider should provide resources for service deployment and orchestration, cloud services management, security and privacy. In terms of services management, in addition to provisioning the services and offering tools for services configuration, the cloud provider must also offer at least some level of support to the cloud consumers. TF

    True

    Even though security is a main issue for cloud computing adoption, small business are an exception and actually have improved security when using public cloud environments. TF

    True

    A cloud consumer who does not want to deal with cloud providers directly can hire a cloud broker to intermediate the provision of services. The cloud broker may combine services offered by multiple cloud providers to address the cloud consumer requirements. In that case, the cloud providers may be invisible to the cloud consumer, who will mainly interact with the cloud broker. TF

    True

    A router is a mechanism that receives and forward packets from multiple data flows. They are one of the fundamental components of ISP communication. ISPs (Internet Service Providers) are also known as cloud providers in the cloud computing context. TF

    False

    Confidentiality is the characteristic of not having been altered by an unauthorised party; in the cloud, the main concern is to guarantee that a message sent by the cloud consumer matches the one received by the cloud service which should process that message. TF

    False

    Insufficient authorisation occurs when access to an IT resource that is normally protected is granted to an attacker. For example, a database can be designed with open, readable passwords -instead of unreadable ones obtained by applying hashing and other security mechanisms- under the assumption that they only would be seen by authorised cloud consumers. TF

    True

    DoS attacks have the purpose to overload IT resources to the point where they cannot function properly, resulting in server degradation and/or failure. Successful DoS attacks are usually based on artificially increasing the workload on cloud services, artificially overloading the network with traffic to reduce its responsiveness, and by sending multiple cloud service requests to consume memory and processing resources. TF

    True

    A threat is a potential security violation in an attempt to breach privacy and/or cause harm; if a threat is carried out, the result is an attack. Threat agents are entities that pose a threat because they are capable of carrying out an attack. Anonymous attackers, malicious service agents, trusted attackers and malicious insiders are the most common threat agents. TF

    True

    Considering a software system composed of operating system layer, middleware layer and application layer, we can say the cloud provider's responsibility in each cloud model is:

    (1): usually comprehends the operating system layer and the middleware layer;

    (2): usually comprises the whole solution; and

    (3): usually restricted to the provision of resources up to the operating system layer.

    (1), (2) and (3) are respectively:

    PaaS, SaaS, and IaaS

    Parallelism is a type of computation where several processes can be executed simultaneously. Most distributed cloud environments allow the usage of parallel resources. However, as statelessness and idempotence, the usage of parallel resources may require the development of tailored code, especially designed to carry out several operations simultaneously. Parallel algorithms may also require knowledge of the underlying hardware architecture. TF

    True

    Cloud applications should be designed to run on multiple distributed systems. Advanced programming concepts must be well understood and applied whenever possible. Unfortunately, this means that many systems may have to be refactored because they were not designed to take advantage of the cloud real potential, even though they may eventually be able to run on clouds by using virtualisation, for example.
    TF

    True

    From the portability point of view, operating system-based virtualisation is better than hardware-based virtualisation. However, the latter is more efficient in terms of performance because it reduces the layers between the VMs and the hardware by bypassing the operating system.
    TF

    True

    VoIP, video conferencing, photo sharing and editing, data streaming, image search, image-based rendering, and video transcoding are different types of:

    Multimedia Services

    Multimedia clouds have to deal with different types of devices, with different capabilities for multimedia processing, such as TVs, PCs, and mobile phones. This may require specific cloud resources and careful management of those. Among those resources are CPUs, GPUs, displays, memories, storage, and power. Dealing with this device heterogeneity is easily accomplished by multimedia clouds.

    False

    They are part of a logical network perimeter:

    Virtual Firewall, Virtual Network

    Instances of these devices can be virtualised, similar to how physical servers can spawn virtual server images. TF

    True

    Pay-per-use mechanism, as in Virtual Servers, can also be provided. TF

    True

    Cloud storage services can expose cloud storage devices. TF

    True

    Only fixed-increment capacity allocation is support. TF

    False

    You don't need to use storage devices that are designed specifically for cloud-based provisioning. TF

    True

    S3 is an object storage suitable for the storage of 'flat' files like Word documents, photos, etc. TF

    True

    S3 replicates all objects ______. (Select the best answer).

    in Multiple availability zones within the same region

    Which of the following can be used as a storage class for an S3 object lifecycle policy?

    S3 - Standard Access, Glacier, S3 -infrequent access

    The name of an S3 bucket must be unique _________. (Select the best answer)

    Worldwide across all AWS accounts

    Amazon EBS is recommended when data _______ and _______. (Choose two)

    must be quickly accessible, requiring long-term persistence, requires an encryption solution

    Which of the following AWS tools help your application scale up or down based on demand (Choose two)

    Elastic Load Balancing, Auto Scaling

    Which service would you use to send alerts based on Amazon CloudWatch Alarms?

    Amazon Simple Notification Service (Amazon SNS)

    Which of the following must be configured on an Elastic Load Balancing load balancer to accept incoming traffic?

    A Listener

    What are the minimum elements required to create an Auto Scaling launch configurations? (Choose three)

    Launch Configuration Name, Amazon Machine Image (AMI), Instance type

    Which of the following are required elements of an Auto Scaling group? (Choose two)

    Minimum size, Launch configuration

    Which of the following services controls user access to your AWS resources

    AWS IAM

    Through IAM you can

    Create and Manage AWS users and groups, Use existing corporate identities to grand secure access to AWS resources, Use permissions to allow and deny AWS users

    What are the pillars of the Well-Architected Framework

    Cost Optimisation, Performance Efficiency, Reliabilty, Security

    A hardened virtual server is a VM created from an image that has been stripped from unnecessary software to reduce potential vulnerabilities. The reasoning behind this security strategy is "what is not there cannot be abused or exploited by attackers".

    A container is different from a VM. The main difference is that a container provides an abstraction for a complete server, including hardware resources, while a VM provides an abstraction for an operating system instead. Containers are also tailored for a specific application or group of services, supporting only the minimum resources to make applications or services work. Thus, a similar reasoning can be applied to containerisation security, as unused services, libraries and operating system capabilities that are not provided in a container cannot be abused/exploited. (T/F)

    False

    Virtualisation attack exploits vulnerabilities in the virtualisation platform to jeopardise its confidentiality, integrity, and/or availability. If physical IT resources within a cloud are shared by different cloud service consumers, these cloud service consumers will necessarily have problems related to overlapping trust boundaries as there are no effective means to protect them in this situation. This may represent a vulnerability, for example, if an attacker can grant access to the services of a cloud consumer and then use this access to attack other consumers within the same overlapping trust boundaries. (T/F)

    False

    Ability to add new IT resources by applying scalability strategies.

    Elasticity

    Depending on the delivery model, the cloud provider will have more work to do. This varies accordingly to the type of administrative constraints that a particular model encompass. In SaaS, for example, the cloud provider doesn't need to work too hard to keep the services up and running, as the users do most of the work themselves. PaaS is a mixed model with shared responsibilities while IaaS is the model that requires less involvement of the cloud consumer in administrative tasks.(T/F)

    False

    Access is usually restricted in community clouds and private clouds. The first is usually owned by a community and not even the community members themselves can have free access to the available resources. In the second, only members of a particular organisation have access to the cloud resources. Access to public clouds is usually granted to everyone who can afford their services, usually under measured up resource usage contracts.(T/F)

    True

    In AWS, a 192.168.168.0/24 VPC may be placed inside a 192.168.0.0/16 subnet.(T/F)

    False

    In AWS, a 192.168.168.0/24 subnet may be placed inside a 192.168.0.0/16 VPC.(T/F)

    True

    A failover system is a mechanism used to increase the reliability and availability of IT resources by creating redundant implementations, which can span to more than one geographical area so as to provide increased reliability.

    In AWS, that could be implemented by having two or more Regions in the same or different Availability Zones, depending on the required level of redundancy. (T/F)

    False

    Edge locations help lower latency and improve performance for end users by establishing a . (T/F)

    True

    Moving the company's systems to the Cloud would be only a matter of analysing the available providers by carefully studying tables 1, 2 and 3. Once that is sorted out, the migration would happen smoothly, as project and architectural solutions developed for on premise systems usually work just as well in cloud environments, with the additional benefit of having superior elasticity and availability. (T/F)

    False

    Should the Sixth cheapest cloud provider be considered for this exam?

    No, because this exam doesn't test real world skill and uses poor wording

    Amazon is the oldest and certainly one of the most reliable cloud providers in the world, even when compared with Azure and Google. However, Innovartus would probably discard Amazon right from the beginning because Amazon is also the most expensive one from them, in all scenarios, and cost should be the ultimate criteria to select a provider.(T/F)

    False, also this is blatant advertising for AWS and is garbage.

    Sets with similar terms

    Cloud Module 2 - Cloud Technology Concep…

    93 terms

    patrizzTEACHER

    Cloud Technology Concepts

    31 terms

    agatod

    Cloud Module 4 - Fundamental Cloud Archi…

    79 terms

    patrizzTEACHER

    Technology Guide 3: Cloud Computing

    32 terms

    Ria_Buenafe

    Other sets by this creator

    TEM

    122 terms

    DoraldSpunsten

    CRT

    291 terms

    DoraldSpunsten

    SSIT2 Electric Boogaloo

    49 terms

    DoraldSpunsten

    Contemp IT

    159 terms

    DoraldSpunsten

    Verified questions

    COMPUTER SCIENCE

    T F A class object passed to a function template must overload any operators used on the class object by the template.

    Verified answer

    COMPUTER SCIENCE

    Each byte in memory is assigned a unique ___________.

    Verified answer

    COMPUTER SCIENCE

    When the _ _init_ _ method executes, what does the self parameter reference?

    Verified answer

    COMPUTER SCIENCE

    Which of the following statements is correct? A) #include (iostream) B) #include {iostream} C) #include <iostream> D) #include [iostream] E) All of the above

    Verified answer

    Recommended textbook solutions

    Three key pillars of virtual information management are networking, virtualization and _____

    Service Management: Operations, Strategy, and Information Technology

    7th EditionJames Fitzsimmons, Mona Fitzsimmons

    103 solutions

    Three key pillars of virtual information management are networking, virtualization and _____

    Introduction to Algorithms

    3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

    720 solutions

    Three key pillars of virtual information management are networking, virtualization and _____

    Information Technology Project Management: Providing Measurable Organizational Value

    5th EditionJack T. Marchewka

    346 solutions

    Three key pillars of virtual information management are networking, virtualization and _____

    Fundamentals of Database Systems

    7th EditionRamez Elmasri, Shamkant B. Navathe

    687 solutions

    Other Quizlet sets

    Alpha Delta Pi Initiation Review

    30 terms

    ariherreraa

    ct-Chapter 50 - Prophylaxis of Atherosclerotic Car…

    59 terms

    Cristina_Torres61PLUS

    Finance Exam 2: Book and Powerpoint

    52 terms

    serena_koontz

    Biology B test

    30 terms

    latashalb

    Related questions

    QUESTION

    What is the term for a virtual machine that is hosted on a Remote Desktop Virtualization Host (RD Virtualization Host) server and assigned to a user?

    2 answers

    QUESTION

    What is an advantage of implementing virtual machine (VM) clone?

    3 answers

    QUESTION

    What is the newest version of HTML?

    15 answers

    QUESTION

    This feature will automatically check for software updates that are published on a WSUS server.

    3 answers