Categories
CLOUDF Dumps

CLOUDF Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam
http://www.EnsurePass.com/CLOUDF.html

Question No.51

In its 2010 Whitepaper the Cloud Security Alliance (CSA) identifies a number of Top threats to Cloud Computing. What is not identified by the CSA as a threat?

  1. abuse and nefarious use of Cloud computing

  2. insecure application interfaces

  3. lack of good Service level agreements

  4. unknown risk profile and account

Correct Answer: C

Question No.52

What is a specific advantage of a Community Cloud?

  1. It is tailored to the needs of a single community.

  2. It is more secure than a Private Cloud.

  3. It is cheaper than a Public Cloud.

  4. It can form a Hybrid Cloud with a Private Cloud.

Correct Answer: A

Question No.53

A network protocol designed to provide strong authentication for client/server applications by using key cryptography. Which protocol is described?

  1. Extensive Messaging and Presence Protocol

  2. Kerberos protocol

  3. Lightweight Directory Access Protocol

  4. Transmission Control Protocol

Correct Answer: B

Question No.54

Failover is the capacity to switch, often automatically, to another system or resource in the event of a failure. How does failover assist in the provision of cloud services?

  1. It assists providers in ensuring continuity of service when there is a problem.

  2. It automatically restarts the system in case of a failure.

  3. It builds a back-up while the system is active.

  4. It provides hidden storage to be used when needed.

Correct Answer: A

Question No.55

Why does a VPN offer more mobility to employees?

  1. It allows employees to work from locations other than their office.

  2. It offers more security at home than at the office.

  3. It offers a higher network speed at home than at the office.

  4. It does not require a network connection.

Correct Answer: A

Question No.56

How might moving to the Cloud have a negative impact on users?

  1. Development is no longer in house and may take longer to be performed.

  2. Software licensing is no longer part of operations.

  3. Support and maintenance are no longer in house and may take longer to be performed.

  4. Uptimes can be guaranteed but not adjusted in a flexible manner.

Correct Answer: A

Question No.57

What is not a staffing benefit of Cloud computing?

  1. Fewer IT-staff

  2. Lower employee benefits

  3. Lower recruitment costs

  4. Lower self-service costs

Correct Answer: D

Question No.58

Which process is an external process for a Cloud data center?

  1. Availability management

  2. Capacity management

  3. Service continuity management

  4. Service level management

Correct Answer: D

Question No.59

What is meant by Virtualization?

  1. Virtualization means that data does not exist anywhere.

  2. Virtualization is a method to combine more computing power onto one server.

  3. Virtualization is a method to combine multiple computer environments onto one server.

  4. Virtualization means that no real computer system is needed to distribute cloud solutions.

Correct Answer: C

Question No.60

What might be considered an advantage for someone storing valuables in a bank in comparison to someone storing data in the Cloud?

  1. The bank customer knows where the bank is located and which locker is used to store valuables.

  2. The bank uses physical measures to protect your valuables.

  3. The bank has better protection against fires and floods.

  4. The bank has better opening hours.

Correct Answer: A

Get Full Version of CLOUDF Dumps

Categories
CLOUDF Dumps

CLOUDF Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/CLOUDF.html

Question No.21

What is a main benefit of a Thin Client?

  1. Access to suspicious web sites can be locked.

  2. Access to web applications can easily be restricted.

  3. Users can login from any location they want.

  4. Users cannot install unauthorized or risky software.

Correct Answer: D

Question No.22

What is an example of the implementation of federation?

  1. driver#39;s license

  2. fingerprint

  3. information card

  4. iris scan

Correct Answer: C

Question No.23

Why can virus scanning software not run directly on the hypervisor?

  1. because the hypervisor is hidden software

  2. because the hypervisor only guests other operating systems

  3. because the hypervisor runs on a server

  4. because the hypervisor starts up before the virus scanning software

Correct Answer: B

Question No.24

What is Web-based Enterprise Management (WBEM)?

  1. a management system for distributed computer environments

  2. a protocol to manage all web-based applications of an enterprise

  3. a set of management standards based on Internet standards

  4. a web-based application to manage the enterprise resources

Correct Answer: C

Question No.25

What is the implication on storage availability of moving to a Cloud environment?

  1. storage capability can be easily added

  2. storage capability is expensive

  3. storage capability is limited

  4. storage capability needs to be integrated

Correct Answer: A

Question No.26

What is the single point of truth in a Claim-based identity management solution?

  1. the cloud application

  2. the Hypervisor

  3. the identity provider

  4. the server hosting the application

Correct Answer: C

Question No.27

What are the functions supported by HTTP?

  1. Command Fill Add Use

  2. Get Post Put Delete

  3. Order Retrieve Send Replace

  4. Receive View Select Send

Correct Answer: B

Question No.28

What is a key advantage of a content management system?

  1. It distributes content to users.

  2. It is a management system for distributed computer environments.

  3. It provides the possibility to connect to multiple web-sites without using a password.

  4. It reduces repetitive duplicate input.

Correct Answer: D

Question No.29

What is an important environment related benefit of Cloud?

  1. fewer requirements for power capabilities

  2. highly protected data

  3. independency from the Internet

  4. small bandwidth

Correct Answer: A

Question No.30

What is an important limitation of Cloud computing?

  1. actuality of data

  2. inflexibility

  3. regulatory concerns

  4. volume of waste

Correct Answer: C

Get Full Version of CLOUDF Dumps

Categories
CLOUDF Dumps

CLOUDF Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/CLOUDF.html

Question No.31

Which technique allows multiple operating systems to run on a single host computer?

  1. client

  2. Hypervisor

  3. sandboxing

  4. server

Correct Answer: B

Question No.32

What is a benefit of virtual client operating systems in protection against virus infections?

  1. A virus infection in one operating system will not infect the other operating systems.

  2. One virus scanner on a client operating system will protect all other operating systems.

  3. The client operating systems are virtual and cannot be infected from outside.

  4. The client operating systems can be protected by the virus scanner of the host operating system.

Correct Answer: A

Question No.33

How could presence be used to enhance security in the Cloud?

  1. by prohibiting users to access cloud applications, except when on their work place

  2. by prohibiting users to access cloud applications at their work place

  3. by restricting access to applications, depending on the user#39;s physical location

  4. by using a web cam to identify the user of a cloud application

Correct Answer: C

Question No.34

Why are standards important?

  1. Standards provide interoperability.

  2. Standards provide legal compliance.

  3. Standards provide security.

  4. Standards provide the most user-friendly solution.

Correct Answer: A

Question No.35

What is the function of the Web Tier?

  1. load balanced databases

  2. multiple backend application servers

  3. responding to client requests

  4. supporting the client requests

Correct Answer: C

Question No.36

What is the purpose of failover?

  1. to automatically restart the system in case of a failure

  2. to build up a back-up while the system is active

  3. to switch over automatically to another system

  4. to work on two systems at the same time

Correct Answer: C

Question No.37

What is a major benefit of using applications on mobile devices?

  1. Mobile devices are cheaper than personal computers.

  2. Mobile devices provide location independence.

  3. Mobile devices uniquely identify the user approaching the application

  4. Mobile devises are more secure than personal computers.

Correct Answer: B

Question No.38

What is the Pay as You Go Model?

  1. a discount for customers changing their network provider

  2. a discount for mobile connections based on the distance to the datacenter

  3. to pay for a service after ending the contract

  4. to pay for services based on their use

Correct Answer: D

Question No.39

What is a difference between XML and HTML?

  1. XML is used to format many types of documents and structures; HTML formats the display of content in a web-browser.

  2. HTML is used to format many types of documents and structures; XML formats the display of content in a web-browser.

  3. HTML can be used to format the display of content in a web-browser, XML cannot.

  4. XML can be used to format the display of content in a web-browser, HTML cannot.

Correct Answer: A

Question No.40

What does CaaS represent?

  1. combining applications in a single access system

  2. communication applications provided by an offsite location service provider

  3. computer maintenance services provided by an external service provider

  4. computing services provided by an offsite location service provider

Correct Answer: B

Get Full Version of CLOUDF Dumps

Categories
CLOUDF Dumps

CLOUDF Real Exam Dumps Questions and answers 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/CLOUDF.html

Question No.41

How can moving to Cloud Computing reduce capital expenses?

  1. One can reduce the number of applications in use within the enterprise.

  2. One can reduce the number of IT staff in the datacenter.

  3. One needs less client computers to access the enterprise applications in the Cloud.

  4. One pays for the use of hardware, not for the value of the hardware at the time of purchase.

Correct Answer: D

Question No.42

What is the intended result of a Distributed Denial of Service (DDOS) attack on a web site?

  1. To change the content of the site to prevent it from providing further services

  2. To distribute the content of the site to users who are denied access to its service

  3. To infect the site to distribute a virus to users, which denies them access to further services

  4. To lock users out of the site by exhausting the sites resources

Correct Answer: D

Question No.43

What does #39;loosely coupled#39; mean?

  1. An object implementing only a single method or function.

  2. The application from one organization can use the service of another organization.

  3. The services in the cloud can be ordered when needed.

  4. The thin clients can be disconnected anytime.

Correct Answer: B

Question No.44

What is the benefit of replication of data center sites?

  1. data protection

  2. disaster recovery

  3. extended data storage

  4. increased response rate

Correct Answer: B

Question No.45

How can backups be generated without interrupting ongoing processes?

  1. by using Network Attached Storage (NAS)

  2. by using replicated data

  3. by using storage in the cloud

  4. by using storage virtualization

Correct Answer: B

Question No.46

What is one of the requirements for successfully using a Web-based application?

  1. ample client storage capacity

  2. control of user identity

  3. Service level agreements (SLAs)

  4. sufficient bandwidth

Correct Answer: D

Question No.47

Which language can be used for running programs on the client side during web access?

  1. HTML

  2. Java

  3. Javascript

  4. XML

Correct Answer: C

Question No.48

What does the total cost of Application Ownership (TCAO) consist of?

  1. The total annual costs of ownership including hardware support plus some amortization costs

  2. The total annual costs of ownership including all platform costs, staffing and other internal costs

  3. The total costs of ownership including hardware support plus some amortization costs

  4. The total costs of ownership including software, hardware and services

Correct Answer: A

Question No.49

Why is the Elastic Compute Cloud (EC2) by Amazon a Public Cloud service?

  1. Amazon allows anyone with a credit card access to the service.

  2. Amazon sells books, DVD#39;s and electronic equipment.

  3. Amazon monitors the servers 24 hours per day.

  4. Amazon is a company with publicly trade-able stocks.

Correct Answer: A

Question No.50

Why is privacy an area of concern in Cloud computing?

  1. Data cannot be securely stored in a Cloud solution.

  2. Data always resides in another country, with different privacy laws.

  3. People using Cloud solutions are afraid that their data is not secure in the Cloud.

  4. Privacy laws vary from country to country.

Correct Answer: D

Get Full Version of CLOUDF Dumps

Categories
CLOUDF Dumps

CLOUDF Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/CLOUDF.html

Question No.1

What is a specific feature of Network Attached Storage (NAS)?

  1. NAS presents data to the user as if it is stored on a file server

  2. NAS uses the file system of the client computers.

  3. The NAS operating system does not provide security features.

  4. With NAS the file system is managed by the servers storing the data.

Correct Answer: A

Question No.2

What is OpenID used for?

  1. to connect to multiple web-sites without using a password

  2. to identify yourself in dealing on-line with government agencies

  3. to pay on-line via your own bank account

  4. to use one account to sign in to multiple web sites

Correct Answer: D

Question No.3

How can moving to Cloud computing increase user satisfaction?

  1. by accomplishing quick and efficient release of applications

  2. by increasing the access to information available on the Internet

  3. by moving internal systems with performance problems to the Cloud

  4. by passing problems with applications to the Cloud provider

Correct Answer: A

Question No.4

Why became the Ethernet standard popular for Local Area Networks (LANs)?

  1. because the Ethernet standard was fastest

  2. because the Ethernet standard was released for general use

  3. because the Ethernet standard was suitable for mainframes

  4. because the Ethernet standard was used by the largest vendor

Correct Answer: B

Question No.5

What is an example of the use of location information?

  1. to determine the user#39;s native language

  2. to determine whether the user is connected via a mobile platform

  3. to provide advertisements for local restaurants, determined by GPS

  4. to provide the correct version of the application for the user#39;s operating system

Correct Answer: C

Question No.6

What is the generally accepted communication protocol on the Internet?

  1. Net BIOS

  2. OSI

  3. SNA

  4. TCP/IP

Correct Answer: D

Question No.7

What is an economic cloud solution for a short term project like a one time application design?

  1. Platform-as-a-Service

  2. Software as-a-Service

  3. Communication-as-a-Service

  4. Security-as-a-Service

Correct Answer: B

Question No.8

What may be an economic benefit of Cloud computing?

  1. a custom accounting system

  2. acceptance by employees

  3. purchasing thin clients

  4. reduced overhead

Correct Answer: D

Question No.9

What does the integrity of information mean?

  1. It means that the access to the information is limited.

  2. It means that the information can be accessed by those users who are allowed to access it.

  3. It means that the information is accurate.

  4. It means that the information is protected.

Correct Answer: C

Question No.10

What is a main challenge for enterprises in using cell phones for collaboration?

  1. Applications for collaboration are limited.

  2. Collaborative applications are complicated.

  3. Employees want to use their private cell phones.

  4. Separating business data from personal data.

Correct Answer: D

Get Full Version of CLOUDF Dumps

Categories
CLOUDF Dumps

CLOUDF Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/CLOUDF.html

Question No.11

What is the principal function of the Hypervisor?

  1. identity management

  2. responding to client requests

  3. scheduling the sharing of resources

  4. virus protection

Correct Answer: C

Question No.12

How can a protocol analyzer be used?

  1. to analyze errors in the protocol syntax used in a failed message

  2. to distribute messages according to the addressing protocol they use

  3. to measure the bandwidth required for different types of transactions

  4. to prevent virus infections in the network software

Correct Answer: C

Question No.13

What is specific for public cloud?

  1. It is a client computer connected to a network.

  2. It uses both local and remote services in its implementation

  3. It uses services provided by an external service provider.

  4. The services are shared in the organization.

Correct Answer: C

Question No.14

Why is a thin client called #39;thin#39;?

  1. because it has a thin monitor

  2. because it has limited functionality

  3. because it has no memory

  4. because it has no processor

Correct Answer: B

Question No.15

Providing a user access to an application in the Cloud requires several steps. In which step are the user#39;s permissions determined?

  1. during the auditing phase

  2. during the authentication phase

  3. during the authorization phase

  4. during the verification phase

Correct Answer: C

Question No.16

What was a serious drawback in the early development of networks?

  1. computers being dedicated to one function

  2. computers were too complicated to be connected

  3. the low speed of the network

  4. vendors developing their own network communication protocols

Correct Answer: D

Question No.17

Why is text messaging in automobiles outlawed in many countries?

  1. for financial reasons

  2. for safety reasons

  3. for security reasons

  4. for synchronization reasons

Correct Answer: B

Question No.18

In evaluating a Cloud service provider, which security issue is important?

  1. how the service provider implements and maintains security

  2. the compatibility of the virus scanners used by the vendor and in your organization

  3. the protection provided by your organization#39;s firewall

  4. the security protocols used by other customers of the services

Correct Answer: A

Question No.19

What is the main tool for users accessing the Cloud?

  1. remote desktop

  2. the firewall

  3. the web-browser

  4. the web-server

Correct Answer: C

Question No.20

What is the most important feature of a virtualized environment?

  1. Multiple applications can be used by a single user.

  2. Multiple computers can be connected to a single network.

  3. Multiple operating systems can be used on a single hardware platform

  4. Multiple users can be active on a single network.

Correct Answer: C

Get Full Version of CLOUDF Dumps