Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Started on Monday, September 13, 2021, 5:39 PM

State Finished

Completed on Monday, September 13, 2021, 5:46 PM

Time taken 6 mins 32 secs

Points 5/5

Grade 100 out of 100

Feedback Congratulations, you passed!

Question 1
Correct

1 points out of 1

Flag question

Question text

Complete the sentence. Cloud computing is the practice of

Select one:

connecting various computers and other network devices together using switches
and routers.

simultaneously running multiple datacenters using centralized mainframe


computing.

using a network of remote servers hosted on the internet to store, manage, and
process data. 

building LANs comprised of virtual servers and connected by routers to form a


virtual WAN.

Question 2
Correct

1 points out of 1
Flag question

Question text

Which two cloud services are types of cloud computing? (Choose two.)

Select one or more:

Security as a Service (SaaS)

Integration as a Service (IaaS)

Infrastructure as a Service (IaaS) 

Platform as a Service (PaaS) 

Question 3
Correct

1 points out of 1

Flag question

Question text

Who has ultimate responsibility for the safety of the customer’s data and services
hosted in the cloud?

Select one:

The cloud security syndicate

The cloud service provider

The customer 

The Interpol cloud security service

Question 4
Correct

1 points out of 1
Flag question

Question text

Identify the correct description for IaaS.

Select one:

Integrates multi-cloud environments with the on-premises network

Allows you to rent, or use for free, software, like Google Mail

Allows you to rent virtualized data infrastructure without having to physically


manage it on premises 

Provides an online platform for developing software delivered over the internet

Question 5
Correct

1 points out of 1

Flag question

Question text

Identify a potential problem that customers risk if they rely solely on vendor cloud
security tools.

Select one:

The tools are too complicated and consume too many valuable MIS resources.

The tools provide basic security and do not secure all facets of a multi-cloud
environment. 

The tools can interfere with BYOD and other Wi-Fi devices.

The tools can be expensive because they are based on a metered per-incident
basis.

You might also like