IS5503 Week-1 Pre asst Solutions (Cloud computing )

 

1) You are working as a cloud architect at Congruence crop. Management he asked you to implement an vitualized infrastructure to provide the company’s  employees with on-demand storage which should be accessible through a web interface over the public internet. Which of the following cloud deployment models will you use to implement this ?

Private

2) Which of the following storage solutions saves space by eliminating files or blocks that have redundant data?

Deduplication

A screenshot of a computer

Description automatically generated

3) You are as a cloud administrator at BigCo. Management he asked you to move the company’s on-premises data to the cloud. You have received a request from the network administration team while migrating. They want to manage both the Linux- and Windows-based servers efficiently. What should you implement to accomplish this task?

Secure Shell

Remote Desktop Protocol

A screenshot of a computer

Description automatically generated

4) Ron, a security analyst, found an unkwon design flaw in a product. He notices that correcting the flaw would be cost-prohibitive and would only affect a vey small number of customers. Rather than recalling the product, he decides to simply the product as it is. This is best describe as what type of risk response technique?

Acceptance

 

A screenshot of a computer

Description automatically generated

5) Which of the following risks should be considered during and after the migration process while performing the right migration steps?

A)Security risks

 

 

 

A screenshot of a computer

Description automatically generated

6) Jack is Working as a network administration at NilCo. Management has asked him to create a demilitarized zone (DMZ) in the cloud to enhance the security of the company’s cloud network. What will he use to accomplish this task?

Firewall

 

A screenshot of a computer

Description automatically generated

7) Which of the following cloud assessment techniques determine the difference between where a company is now in business and technical readiness versus where it needs to be?

Gap analysis

 

A screenshot of a computer

Description automatically generated

8) Joe is working as a product manager at NilCo.  He is planning to make sure that an upcoming company promotion suring a major sporting event does not overwhelm his company’s cloud-based e-commerce site. For this, he need to add capacity to the company’s web server so it can process the anticipated additional workload dynamically. What should he use?

Horizontal scaling

Vertical scaling

 

A screenshot of a computer

Description automatically generated

9) What Is the first step of searching the right cloud vendor?

Request for information

 

A screenshot of a computer

Description automatically generated

10) What storage type is used for the OS boot partition of an instance running in the cloud?

Block

 

A screenshot of a computer

Description automatically generated

11. A company has purchsed a new systm, but secrity pesonnel is spending a lot of time on systm maintenancce . A new third pary vendor has been selected for maintaning the company’s system. Which of the following documents should be created before assigning the job to the vensor?

A).Service level agreement

 

A screenshot of a computer

Description automatically generated

12. Which of the following is a final step that you will perform in the cloud assessement process?

A). Create documentation and diagrams.

 

A screenshot of a computer

Description automatically generated

13. what are the four cloud deployment models?

A). public, private, hybrid, and community

 

A screenshot of a computer

Description automatically generated

14. Will si testing his vackup disaster recovery site. He wants to verfy that the database in the disaster recovery facility is updated in real-time and ramains current with the production rerplica in the primary data center, which of the following should he use in his primary data denter servers?

A). Synchronous replication

A screenshot of a computer

Description automatically generated

15. Stella, a cloud+ stident, is learning the process of evaluating current sresources used in on-premeses data cetemine the resources required in the cloud. What is she learning about?

A). Right-sizing

 

A screenshot of a computer

Description automatically generated

16. which of the follwing international Organization for Standardization (ISO) standards is specific to CSPs and details information security?

A) 27017

A screenshot of a computer

Description automatically generated

17. which of the following is the process of obfuscatinf ddata such that only authrized individuals can read the data?

A).Encryption

 

A screenshot of a computer

Description automatically generated

18. which of the following porvides high-levvel guidence dictated by business goals and objectives?

A). policy

 

 

A screenshot of a computer

Description automatically generated

19. which of the following are exmples of an operating expenditure?

A).1. propertu taxes and insutance

2. Licences fees

A screenshot of a computer

Description automatically generated

20.which of the following makes networks more agile and fiexible by separatring the fowarding of network packets (the infrastructure layer) from the logical decision-making process (the control layer)?

A). Software-defined networking

 

A screenshot of a computer

Description automatically generated

21)  Which of the following is an item or collection of items that has a qualitative value to a company?

A:  Asset

 

A screenshot of a computer

Description automatically generated

22)  which of the following statements are correct regarding synchronous replication?

Each correct answer represents a complete solution. Choose all that apply

A:  It is limited the distance between the locations

It writes data to multiple locations in real-time

 

A screenshot of a computer

Description automatically generated

23)  Tom is working as a cloud administrator at BigCo. Management has asked him to increase the security of the companys cloud resources so that no unauthorized can access the resources.

A:  Multifactor authentication

 

A screenshot of a computer

Description automatically generated

24) Erika, a project manager, identifies a project risk that harm  the team members. So she hires a professional vendor to complete the critical part of the project.  What type of risk response is she using for handling the potential risk

A:  Transference

A screenshot of a computer

Description automatically generated

25)   Which of the following allows clients to remotely connect to virtual Linux machine, securely, and act as if the user were sitting at the virtual computer?

A:  Secure shell

A screenshot of a computer

Description automatically generated

26)  Who is responsible not only for an organization’s asset but also for the risk response to any identified threat to the said asset?

A:  Risk owner

Asset owner

 

A screenshot of a computer

Description automatically generated

27)  Bob is a cloud + architecture for BigCo Inc. He is using a clous service that provides computing hardware, but the operating system is not included . Which of the following cloud service is he using?

A:  Infrastructure as a service

 

A screenshot of a computer

Description automatically generated

28)  Which of the following documents includes the defined steps that an individual or an organization takes once an event occurs?

A:  Standard operating procedure

A screenshot of a computer

Description automatically generated

29)  Roman is the network administrator for a company. The company is currently managing an  on-premises network using cloud serviceor running some combination of two

A:  Baseline

 

A screenshot of a computer

Description automatically generated

30)  Which storage offerings will have a cost associated with the amount of data stored even if resource using the storage is powered off?

A:  Block storage

File storage

Object storage

 

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

31. Which of the following laws reforms the financial services industry and specifically addressed concerns about protecting consumer privacy?

A) Gramm-Leach-Billey Act

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

32. David is working as cloud administrator at NilCo. He is performing a cloud assessment for the company’s new applications. Management has asked him to determine the capabilities that can be offloaded to the cloud and the level of support services needed. What will he use to accomplish this task?

A) Feasibility study

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

33. Which of the following cloud characteristics explains that a cloud provides services to serve multiple clients according to their priority?

A) Resource pooling

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

34. Which of the following security policies defines behaviors and activities that are acceptable in an organization?

A) Advisory

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

35. Jancie manages the MySQL database thar runs on multi-CPU instance that has reached 100 percent utilization. The database can run on only a single server. What would she used to support the requirements of this database?

A) Vertical scaling

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

36. Which cloud computing model provides only low-level server resources to host applications for organizations?

A) Infrastructure as a service

37. A company hires contractors for six months to work on projects. After six months, a new team of contractors will be brought in. Which type of software licensing allows the license to be transferred from the first group to the second group?

A) Bring your own license

A screenshot of a computer

Description automatically generated

 

 

38. What refers to the ability of a client to acquire additional cloud resources without supplier intervention?

A) Self-service

 

A screenshot of a computer

Description automatically generated

39. Patrick is working  as a cloud administrator at BigCo. He is looking at business requirements that specify the data available at the disaster recovery site must not be more than 48 hours old. Which of the following metrics relates to these requirements?

A) Recovery point objective

 

A screenshot of a computer

Description automatically generated

40. In dealing with risks, which response is accomplished when an organization purchases insurance to protect the income when a disaster or threat is realized?

A) Transference

 

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

41) Which of the following standard is concerned with HIPAA, GLBA, PCi DSS, and FINRA ?

A) Industry-based

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

42) You are negotiating cloud services with a CSP. You need to ensure that your organization can get more storage space without CSP intervention. Which service do you need?

A) Capacity on demand

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

43) Frank, the CEO of an organization, has set up a team to periodically evaluate regulatory compliance alone with associated documentation. His team implmented a policy that focuses on protecting the information that uniquely recognizes a person, either on its own or in conjunction with other information. Which of the following types of regulated information is this?

A) Personally identifiable information

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

44) Which of the following international Organization for standardization (ISO) standards covers the following topics?

> Removal and return of cloud service customer assets upon contract termination

> Protection and separation of a customer’s virtual enviroment

> virtual machine hardening requiredments to meet business needs

A) 27017

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

45) Which of the following helps to determine the compliance, security, and privacy guidefine during cloud assessment?

A) Feasibility study

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

46) Which of the following services do managed service providers (MSPs) deliver?

Each correct answer epresents a complete solution. Choose all that apply.

A)

1. Backup and recovery

2. Performance testing

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

47) Which of the following is an act locating weaknesses and vulnerablities of information systems by copying the intent and actions of malicious hackers?

A) Penetration testing

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

48) Which of the following cloud storage types allows an operating system to modify one portion one of a file without opening the entire file?

A) Block

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

49) Which cloud concept makes networks more agile by separating the forwarding of network packets for the logical decission-making process?

A) Software -define networking

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

50) Which of the following is defined by the health insurance portability and Accountability Act (HIPAA) and must be protected by an organization the jurisdiction of HIPAA?

A) Protected health information

A screenshot of a computer

Description automatically generated

51. Bob, a user, enters a username and password at the beginning of a session and accesses multiple applications. He does not need to re-authenticate for accessing each application each application. Which of the following authentication processes is he using?

A) Single sign-on

 

A screenshot of a computer

Description automatically generated

52. Harold is a software developer for NiCo inc. Management has asked him to migrate the company’s database application to the cloud. The company only wants to be responsible for the application and would prefer that the public cloud company manage all underlying infrastructure and servers that are required to support the application. Which of the following cloud service models will he use to accomplish this task?

A) platform as a service

 

A screenshot of a computer

Description automatically generated

53.  which of the following is the process of assigning costs of cloud resources to either individuals or departments that are responsible for the resources?

A)  Chargeback

 

 

A screenshot of a computer

Description automatically generated

54.  Which of the following are benefits of using an open- source cloud solution?

Each correct answer represents a complete solution. Choose two.

A)

1. Flexibility in development

2. Faster updates

 

A screenshot of a computer

Description automatically generated

55. George is a senior cloud architect at BIgCo. He is working on a project to                             interconnect his company’s private data center to cloud company that offers e-mail and other    services that can provide burstable compute capacity. What type of cloud deployment model is he creating

A)  Hybrid

 

A screenshot of a computer

Description automatically generated

56.  which of the following are example of the free-for–use software license?

Each correct answer represents a complete solution. Choose all that apply

Linux

Apache

 

A screenshot of a computer

Description automatically generated

57. How many classification levels are there in the risk classification system?

A)  Five

 

A screenshot of a computer

Description automatically generated

58. You are working as a cloud engineer at Congruence Corp. Management has asked you to run a small cloud evaluation in the production environment to see if there any application compatibility issues. What will you use to accomplish this task?

A) Pilot

 

A screenshot of a computer

Description automatically generated

59. what are the benefits of using digital marketing?

A)  Campaign automation and integration

Real-time results, monitoring and optimization

 

A screenshot of a computer

Description automatically generated

60. John works as a security analyst at XYZ. His organization uses Telnet for remote

Management. To ensure more secure client-server connections. He recognizes a

Necessity to replace Telnet with an encrypted network protocol. What should

He use to accomplish this task?

A)Secure shell

A screenshot of a computer

Description automatically generated61. Which of the following is a short-term process designed to have employees develop skills or obtain knowledge to perform their jobs?

A) Training

A screenshot of a computer

Description automatically generated

62. You are working as a software engineer at XYZ. You just received an email reporting suspicious activity from the CEO’s account. The email provides a link to review the suspicious activity and immediately lock the account. You want review the suspicious activity before manually looking the CEO’s account, so you click the first link. Which data security principle did you just violate?

A) Integrity

A screenshot of a computer

Description automatically generated

 

 

 

 

63. You are working as a cloud engineer at Congruence Corp. Management has asked you to move the company’s extensive on-premises IT infrastructure to the cloud. Because of the cost involved, you have decided to move some services the fiscal year and move the rest of the services next fiscal year. Which migration approach will you use?

A) Phased

 

A screenshot of a computer

Description automatically generated

64. After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. Which type of risk response behavior is she recommending?

A) Transference

A screenshot of a computer

Description automatically generated

 

65. Which of the following processes strives to make automation efficient and manageable

A) Orchestration

 

A screenshot of a computer

Description automatically generated

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

66) In the shared security model of the cloud, who is responsible for securing access management and firewell configurations?

A) Clint

A screenshot of a computer

Description automatically generated

67) Which of the following is an agreement between parties to engage in some specified activity. Usually for mutual benfit?

A) Contract

 

A screenshot of a computer

Description automatically generated

68.  You are working as a cloud administrator at BigCo. The company uses a financial transaction database that updates frequently. If a natural disaster occurred any data backup older than one hour would not be useful to the company. Which of the following should you include in the disaster recovery plan to ensure that backups are always up to date?

A)   Recovery point objective

 

 

A screenshot of a computer

Description automatically generated

69. which of the following laws requires publicity traded companies to have proper inte3rnal control structures in place to validate that their financial statements accurately reflect their financial results?

A) Sarbanes-Oxley Act

 

A screenshot of a computer

Description automatically generated

70.  what refers to a semi-public intermediary network located between two firewalls?

A) Demilitarized zone

 

 

A screenshot of a computer

Description automatically generated

No comments:

Post a Comment

Pages