1 Own Device) Threats, risk refers to the Network Application Device Implementation data lost from stolen or lost devices
Which instance of SaaS allows users
to explore functionality of WebServices 2 such as Google Maps, Payroll TaaS CaaS (d) APIaaS processing and credir card processing services etc. Network of National National National Institute of Institute of Institute of Institute of 3 NIST stands for Standards and Standards and Science and Spain and Technology Technology Technology Turkey IaaS,DBaaS, IaaS, 4 Basic Service Models as per NIST are IaaS,DTaaS IaaS,SaaS STaaS PaaS,SaaS The _____ of the cloud computing system comprises of the client's 5 Back End Frond End Either a or b Both a and b devices and some applications are needed for accessing the cloud In Cloud Computing the _______ is a cloud itseld which may encompass 6 Back End Front End Either a or b Both a and b varipus computer machines data storage system and servers. Secured Security as a 7 SECaaS stands for Services as a Either a or b Both a and b Service Service ________ is the foundation of cloud 8 SaaS IaaS NaaS CaaS services ________ is a hardware level services 9 which offers memory storage and SaaS NaaS IaaS CaaS Networks etc VoIP, IM, Videoconferencing are 10 NaaS CaaS SaaS IaaS offered as a part of which Services Cloud Computing gives us the ability to expand and reduce resouces according Elasticity and Pay as per On Demand 11 to the specific requirement. Which of Resliency Scalability Usage Service the following features does the above line signifies We pay for cloud services only when we use them, either for short term or Elasticity and Pay as per On Demand 12 Resliency for a longer term Which of the following Scalability Usage Service features does the above line signifies we invoke cloud services only when we Elasticity and Pay as per On Demand 13 need them, they are not permanent Resliency Scalability Usage Service parts of the IT infrastructure Which cloud service offering can completely isolate the failure of server Elasticity and Pay as per On Demand 14 Resliency and storage resources from cloud Scalability Usage Service users Chap 4 -EIS Slno Question A B C D Which charateristics of public cloud service providers that can host the Pay as per On Demand Elasticity and 15 Multi tenancy cloud services for multiple users within Usage Service Scalability the same infrastructure Community 16 Provider Clouds are also called Private Cloud Public Cloud Hybrid Cloud Cloud Community 17 Internal Clouds are also called Private Cloud Public Cloud Hybrid Cloud Cloud Which model is suitable for organizations that cannot afford a Community 18 Private Cloud Public Cloud Hybrid Cloud private cloud and cannot rely on the Cloud public cloud either. _______ cloud is shared among two or Community 19 more organization that have similar Private Cloud Public Cloud Hybrid Cloud Cloud cloud requirements Ability of two or more applications that are required to support a business Resource None of the 20 need to work together by sharing data Data Sharing Interoperatbility Provisioning Above and other business-related resources in cloud is called _________ ______provides the users the ability to develop and deploy an application on 21 DTaaS SECaaS PaaS SaaS the development platform provided by the service provider Which Cloud Service offers directory services, authentication services, risk 22 and event monitoring, single sign-on DTaaS SECaaS IDaaS PaaS services, and identity and profile management. None of the 23 Examples of IaaS OpenStack Eucalyptus. Both a and b Above __________ refers refers to technologies designed to provide a Mobile None of the 24 layer of abstraction between computer Grid Computing Virtualization Computing Above hardware systems and the software running on them. Virtualizatioon is the process of None of the 25 creating _______computing Resource Logical Arithmetic Reasonable Above from Physical Resource The software that creates a virtual Virtual None of the 26 machine on the host hardware is hypervisor Machine Both a and b Above called Manager. ______ normally exemplified and Application Weak BYOD 27 Device Risk Network Risk hidden in 'Lack of Device Visibility' Risk Policy ____describes sites wherein the computers will be generated raw data None of the 28 Web 3.0 Semantic Web Both a and b on their own without direct user Above interaction. Chap 4 -EIS Slno Question A B C D _______ is a software system that None of the 29 supports computer-to-computer Web 3.0 Web Services Both a and b Above interaction over the Internet Google Windows Azure None of the 30 Examples of PaaS includes Both a and b AppEngine Compute Above Which of these is a software solution Cloud Green 31 wich fulfills the need of supercomputer Grid Computing Virtualization Computing Computing in an orgaanization Present E-commerce revolution, WWW 32 and emerging technologies have one Hard work Government User Internet key common factor. Tick it. Which is not a common services model Virtual Private Bandwidth on Mobile Virtual 33 VOIP Network as a Service (NaaS)? Network ( VPN) Demand (BOD) Network (MVN) Which type of risk a company is not Application Implementation 34 vulnerable to when it adopts Bring Your Availability Risk Device Risk Risk Risk Own Device (BYOD)? Mr. X features in an advertisement of an Air conditioner of brand Z where he emphasizes that this Air Conditioner Internet of T Artificial Bring Your Own 35 Cloud Computing can be all controlled through a mobile. hings (IoT ) Intelligence Device (BYOD) T his is perfect example of _________ technology. 36 Pick the odd one out. Amazon Alexa BossSpeakers Apple Siri Google Talk Global System Global Sim Global System None of the 37 GSM stands for for Mobile Mobile For Mobile Above Communication What are the best practices of Green Conserve 38 Reduce Paper Recycle All of the Above Computing Energy The software which help their custoner Artificial Cloud Mobile 39 and provide online help, falls under Data Mining Intelligence Computing Computing which of the following technology Data and Customers may It is feasibke to Information can Gettting more have to face continue within be accessed with work done in restrictions on budgetary Which of the following is not true about 40 minimal upfront less time with the availabilty allocations and cloud computing spending in a pay less resources of applications can be ahead of as you go are possible OS and completion approach infrastructure cycle times