associate - cloud infrastructure and services v.4 exam
Last exam update: Nov 27 ,2024
Page 1 out of 3. Viewing questions 1-10 out of 36
Question 1
What is the objective of Confidentiality in information security?
A.
Prevents an unauthorized user from changing data
B.
Non-repudiation and authenticity of information
C.
Ensures that identify credentials are used to verify cloud assets
D.
Restricts user access to data held within the cloud
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
What activity is performed during the service creation phase of the cloud service lifecycle?
A.
Defining Service Template
B.
Developing Service Enablement Roadmap
C.
Assessing Service Requirements
D.
Establishing Billing Policy
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
What describes showback in the cloud billing process?
A.
Measuring resource consumption per business unit and charging them back accordingly
B.
Reporting of service charges against resource usage without charging the business units
C.
Providing an interface for generating usage bills for each consumer
D.
Showing all the costs that are associated with providing each cloud service
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
What is a benefit of link aggregation?
A.
Saves bandwidth by restricting traffic to a specific potentially congested ISL
B.
Improves performance by combining two or more parallel ISLs into a single physical ISL
C.
Optimizes fabric performance by distributing network traffic across ISL
D.
Improves ISL utilization by increasing the network traffic on a specific ISL
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Which concept ensures accountability for security breaches or misuse of resources?
A.
Compliance
B.
Governance
C.
Risk management
Answer:
b
User Votes:
A
50%
B
50%
C
50%
Discussions
0/ 1000
Question 6
What helps to recover the cost of providing the service, ensuring profitability, and meeting the providers return on investment and reinvestment goals?
A.
Service negotiation
B.
Service level objective
C.
Service valuation
D.
Service level agreement
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which risk management step deploys various security mechanisms that minimize risks impacts?
A.
Identification
B.
Mitigation
C.
Assessment
D.
Monitoring
Answer:
b
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
A development group is using an iterative and incremental software development method. Which standard is being utilized?
A.
Agile
B.
ITIL
C.
DevOps
D.
Orchestration
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
What is true about application virtualization?
A.
Resolves application conflicts and compatibility issues
B.
Allows for OS modifications on host machines
C.
Prevents the use of conflicting applications on the same end-point device
D.
Increases the complexity of application deployment
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
What is a benefit of application virtualization?
A.
Allows inclusion of standard applications into an end-point image
B.
Eliminates the need for OS modifications
C.
Enables online data migrations between storage systems