DEMO ONLY VERSION. Easy CramBible Lab C90-02A. SOA Cloud Technology Concepts. ** Single-user License **

Similar documents
SOA C90-02A. Cloud Technology Concepts. Practice Test. Version: QQ:

Easy CramBible Lab DEMO ONLY VERSION Partner Certification for IAM:Foundation Exam 41

DEMO ONLY VERSION. Easy CramBible Lab HP0-J59. HP StoreOnce Solutions Advanced Service and Support. ** Single-user License **

EE Easy CramBible Lab DEMO ONLY VERSION EE F5 Big-Ip v9 Local Traffic Management

Cloud Certified Professional (CCP)

Cloud Architect Certification Self-Study Kit Bundle

Easy CramBible Lab DEMO ONLY VERSION. ** Single-user License ** This copy can be only used by yourself for educational purposes

Citrix 1Y0-911 Citrix Resource Manager CCEA. Version 1.0

Fundamental Concepts and Models

The Service, The Cloud & The Method: The Connection Points

DEMO ONLY VERSION. Easy CramBible Lab M Magento Front End Developer Certification Exam. ** Single-user License **

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Cloud Security Specialist Certification Self-Study Kit Bundle

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

Cloud Storage Specialist Certification Self-Study Kit Bundle

DEMO ONLY VERSION. Easy CramBible Lab. adwords-reporting. Google Reporting and. Analysis Exam. ** Single-user License **

Cloud Computing Architecture

Q&A. DEMO Version

Q&A. DEMO Version

Chapter 6: Fundamental Cloud Security

: RSA 050-V60X-CSEDLPS. : CSE RSA Data Loss Prevention 6.0. Version : R6.1

Exam : IBM : IBM NEDC Technical Leader. Version : R6.1

Web Application Hosting Cloud Architecture

PassGuide CBAP IIBA CBAP. Cetified business analysis professional (CBAP) appliaction.

Sentinel Cloud V.3.6 Quick Start Guide

: HP HP0-M28. : Implementing HP Asset Manager Software. Version : R6.1

SERENA SOFTWARE Serena Service Manager Security

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

2B0-023 ES Advanced Dragon IDS

Chapter 10. Cloud Security Mechanisms

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Avamar Backup and Data De-duplication Exam

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Free Small Business Security Q&A Version of a Single digit Pentragilium

journey to a hybrid cloud

IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>>

IBM EXAM QUESTIONS & ANSWERS

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity:

Keyword: Cloud computing, service model, deployment model, network layer security.

Identity Federation Broker for Service Cloud

MOVING SECURITY TO THE CLOUD. pandasecurity.com

1z0-102 Q&A. DEMO Version

Cloud Customer Architecture for Web Application Hosting, Version 2.0

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Investor Newsletter. Storage Made Easy Cloud Appliance High Availability Options WHAT IS THE CLOUD APPLIANCE?

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Securing Corporate on Personal Mobile Devices

WHITE PAPER MICROSOFT LIVE COMMUNICATIONS SERVER 2005 LOAD BALANCING WITH FOUNDRY NETWORKS SERVERIRON PLATFORM

CompTIA Cloud+ 9318; 5 Days, Instructor-led

: HP HP Version : R6.1

Endpoint Protection Small Business Edition 2013?

Safeguarding the cloud with IBM Security solutions

Symantec Enterprise Vault.cloud Overview

About the VM-Series Firewall

Preparation Guide. EXIN Cloud Computing Foundation

IBM API Management Overview IBM Corporation

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Connectivity to Polycom RealPresence Platform Source Data

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

SHARPCLOUD SECURITY STATEMENT

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

Cloud Computing Concept, Technology & Architecture

Market Application Delivery Networking. Products ADC, WAN Optimization, Secure Access

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud.

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

132-S Avaya Specialist - IP Office Implement & Support Elective Exam

Google Apps Deployment Guide

How To Protect Your Data From Being Hacked On Security Cloud

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring

SSOScan: Automated Testing of Web Applications for Single Sign-On vulnerabilities

G-Cloud IV Framework Service Definition Accenture Web Application Security Scanning as a Service

Capturing the New Frontier:

A Survey on Cloud Security Issues and Techniques

Ariett Purchasing & Expense Management. Go Paperless, Go Mobile, Go Easy.

MS 20487A Developing Windows Azure and Web Services

Windows Azure Platform

Cloudscaling: The Power of Infrastructure as a Service. James O Neil First National Technology Solutions

Developing Windows Azure and Web Services

THE QUEST FOR A CLOUD INTEGRATION STRATEGY

Introduction to the EIS Guide

An Introduction to Cloud Computing Concepts

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

The Sumo Logic Solution: Security and Compliance

Exam : IBM : Iseries Linux Soluton Sales v5r3

Microsoft SharePoint 2013 with Citrix NetScaler

About the VM-Series Firewall

Performance Management for Cloudbased STC 2012

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Q&A. DEMO Version

Extend and Enhance AD FS

ORACLE APPLICATION EXPRESS 5.0

Cloud Security Training Days 3 and 4 Syllabus

Transcription:

Easy CramBible Lab ** Single-user License ** C90-02A SOA Cloud Technology Concepts This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/ E-mail: web@crambible.com

Important Note Please Read Carefully Study Tips This product will provide you questions and answers along with carefully compiled and written by our experts. Try to understand the concepts behind the questions instead of cramming the questions. Go through the entire document at least twice so that you make sure that you are not missing anything. Latest Version We are constantly reviewing our products. New material is added and old material is revised. Free updates are available for 90 days after the purchase. You should check your member zone at CramBible an update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1. Go to www.crambible.com 2. Click on Member zone/log in 3. The latest versions of all purchased products are download from here. Just click the links. For most updates, it is enough just to print the new questions at the end of the new version, not the whole document. Feedback Feedback on specific questions should be send to web@crambible.com. You should state: Exam number and version, question number, and login ID. Our experts will answer your mail promptly. Copyright Each pdf file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular pdf file is being distributed by you, CramBible reserves the right to take legal action against you according to the International Copyright Laws.

THE TOTAL NUMBER OF QUESTIONS IS 86 QUESTION NO: 1 Which cloud computing mechanism is used to maintain synchronicity between on-premise and cloud-based IT resources? Select the correct answer. A. automated scaling listener B. failover system C. pay-for-use monitor Answer: D QUESTION NO: 2 Black box testing refers to a technique where testers are provided with visibility into an IT resource's implementation architecture. Select the correct answer. A. complete B. periodic C. no Answer: C QUESTION NO: 3 Cloud balancing cannot be achieved by redundantly deploying IT resources in advance. Redundant instances of IT resources must be dynamically generated on-demand, at runtime. Select the correct answer. A. True B. False

QUESTION NO: 4 Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server B. Both virtual servers are hosted by the same physical server and the trust boundaries of Cloud Services A and B overlap. A cloud service consumer successfully uses Cloud Service A to gain access to the underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud security threat? Select the correct answer. A. denial of service B. insufficient authorization C. weak authorization Answer: D QUESTION NO: 5 Which of the following are primary areas of testing a cloud service in relation to information published in its service level agreement? Select the correct answer. A. availability B. reliability C. performance D. All of the above. Answer: D QUESTION NO: 6 The required parts of a SOAP message are the envelope document and the header and body sections. Select the correct answer.

A. True B. False QUESTION NO: 7 The resource replication mechanism can encompass a hypervisor that can support the multitenancy cloud characteristic. Select the correct answer. A. True B. False Answer: A QUESTION NO: 8 Which of the following characteristics of cloud-based IT resources are difficult to fully test on Software-as-a-Service (SaaS) implementations? SELECT ALL THAT APPLY A. availability B. confidentiality C. reliability D. performance Answer: A,C QUESTION NO: 9 Which of the following statements are true about the state management database mechanism? SELECT ALL THAT APPLY A. Software programs can off-load state data to a state management database in order to reduce the amount of runtime memory they consume.

B. The use of a state management database can improve scalability. C. State management databases rely on the use of virtualization software. D. The use of state management databases requires a ready-made environment. Answer: A,B QUESTION NO: 10 With cloud storage, consumers only pay for the actual storage they use. Select the correct answer. A. True B. False Answer: A QUESTION NO: 11 Which of the following security mechanisms enables one cloud service consumer to be authenticated by a security broker, so that its security context is persisted when accessing other cloud services? Select the correct answer. A. digital certificates B. certificate authority C. single sign-on Answer: C QUESTION NO: 12 We exported data from our on-premise relational database to a cloud-based non-relational database. After the export, we noticed that the size of the cloud-based database was significantly larger than our on-premise database. What is the likely reason that the database size increased? Select the correct answer.

A. The transmission of the data over a wide area network resulted inthe accumulation of additionalmeta data from HTTP headers that was stored in the non-relational database, resulting in the increase in data received by the cloud. B. The data in the relational database was normalized and became denormalized after being exported into a non-relational database. C. In order to support higher levels of scalability, the cloud-based database is required to add state data to the non-relational data it stores. This state data is used to synchronize instances of the database tables during runtime usage, but also increases the size of the overall database. D. All of the above. QUESTION NO: 13 The attack occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker gaining access to IT resources that are normally protected. Select the correct answer. A. denial of service B. malicious intermediary C. insufficient authorization D. virtualization Answer: C QUESTION NO: 14 The is a service agent that can measure the usage of a cloud-based IT resource by a cloud consumer for billing purposes. Select the correct answer. A. automated scaling listener B. pay-for-use monitor C. multi-device broker D. resource replicator

QUESTION NO: 15 A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as:. Select the correct answer. A. denial of service B. overlapping trust boundary C. insufficient authorization D. buffer overrun Answer: A QUESTION NO: 16 represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers, and is therefore directly related to the mechanism. Select the correct answer. A. Replicated usage, cloud monitor B. Measured usage, pay-for-use monitor C. Agent usage, on-premise monitor QUESTION NO: 17 A is a mechanism used to temporarily persist certain types of data as an alternative to caching the data in memory. Select the correct answer. A. resource replicator B. state management database