EXIN Cloud Computing Foundation



Similar documents
Preparation Guide. EXIN Cloud Computing Foundation

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Security Issues in Cloud Computing

Architectural Implications of Cloud Computing

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

How to Turn the Promise of the Cloud into an Operational Reality

Module 1: Facilitated e-learning

Cloud Computing: Risks and Auditing

Cloud models and compliance requirements which is right for you?

Securing the Service Desk in the Cloud

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Clinical Trials in the Cloud: A New Paradigm?

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Enterprise Architecture Review Checklist

Planning the Migration of Enterprise Applications to the Cloud

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

SERENA SOFTWARE Serena Service Manager Security

Cloud Computing. What is Cloud Computing?

BMC s Security Strategy for ITSM in the SaaS Environment

6 Cloud computing overview

Managing Cloud Computing Risk

Getting Familiar with Cloud Terminology. Cloud Dictionary

Security management in the internet era

Addressing Data Security Challenges in the Cloud

How To Secure Cloud Computing

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

EXIN IT Service Management Foundation based on ISO/IEC 20000

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Secure Cloud Computing through IT Auditing

Cloud Computing Security Issues And Methods to Overcome

Tips For Buying Cloud Infrastructure

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

IT Audit in the Cloud

Security Threat Risk Assessment: the final key piece of the PIA puzzle

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

LEGAL ISSUES IN CLOUD COMPUTING

AskAvanade: Answering the Burning Questions around Cloud Computing

NCTA Cloud Architecture

Cloud Computing for SCADA

SaaS, PaaS & TaaS. By: Raza Usmani

CompTIA Cloud+ 9318; 5 Days, Instructor-led

The Protection Mission a constant endeavor

Performance Management for Cloud-based Applications STC 2012

EMC E Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems

TRG Clients in the Cloud Today

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Third Party Cloud Services Its Adoption in the New Age

Security Issues in Cloud Computing

White Paper. Cloud Performance Testing

EXIN Cloud Computing Foundation

Cloud Computing Governance & Security. Security Risks in the Cloud

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

Cloud Courses Description

Cloud Glossary. A Guide to Commonly Used Terms in Cloud Computing

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT

Private vs. Public Cloud Solutions

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

Lecture 02a Cloud Computing I

Cloud Security Specialist Certification Self-Study Kit Bundle

Remote Services. Managing Open Systems with Remote Services

A Survey on Security Issues in Service Delivery Models of Cloud Computing

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Cloud Courses Description

Selecting the right Cloud. Three steps for determining the most appropriate Cloud strategy

Cloud Security. DLT Solutions LLC June #DLTCloud


Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Adopting Cloud Computing with a RISK Mitigation Strategy

Cloud Computing. Bringing the Cloud into Focus

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Troux Hosting Options

Ananthakrishnan J Architect, Sonata Software. Ananth B Product Manager Testing Practice. Sonata Software Limited. Sonata Software Limited

Transcription:

Sample Questions EXIN Cloud Computing Foundation Edition April 2013

Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing system or circulated in any form by print, photo print, microfilm or any other means without written permission by EXIN. 2

Content Introduction 4 Sample exam 5 Answer key 10 Evaluation 18 3

Introduction This set of sample questions consists of 20 multiple-choice questions. The real exam consists of 40 multiple choice questions. Each multiple-choice question has a number of possible answers, of which only one is the correct answer. The maximum number of points that can be obtained for this exam is 20. Each correct answer is worth one point. If you obtain 13 points or more you will pass. The time allowed for these sample questions is 30 minutes. No rights may be derived from this information. Good luck! 4

Sample exam 1 of 20 What is a correct definition of Cloud computing? A. a large pool of usable and accessible virtualized resources B. a network of globally interconnected client computers C. a service architecture based on thin clients D. a service offered by a Service provider, not limited by a Service level agreement (SLA) 2 of 20 Where did the Internet begin? A. a cluster of cooperating universities in the USA B. computer hobbyists C. the CIA D. the Department of Defense of the USA 3 of 20 Why did virtualization boost the emergence of Cloud computing? A. A virtual machine is more secure than a physical machine. B. Virtualization made it easier and cheaper to share resources between users. C. Virtual machines have greater performance than their physical counterparts. D. Virtualization leads to better network utilization. 4 of 20 What is an example of a single purpose environment? A. any application on any server B. interface to large computer C. interface to large storage D. Mainframe 5

5 of 20 What is an important concern for the customer in multi-tenant environments? A. Availability B. Network bandwidth C. Network latency D. Security 6 of 20 What is an important benefit of Cloud? A. highly protected data B. independency from the Internet C. reduced cost D. small bandwidth 7 of 20 What is a Virtual Private Network (VPN)? A. a secured connection for remote access to a local area network B. a secured private cloud for a single user C. a virtual network device for private purposes D. an operating system for private network systems 8 of 20 What can be done to make maximum use of the interoperability principle of Cloud computing? A. Employ multiple system integrators to build your private cloud. B. Only use cloud providers located in Europe. C. Use hardware and software of a single vendor. D. Use standard protocols. 6

9 of 20 What is not a valid reason for the customer asking a Cloud provider where their servers are located? A. Geographical location may tell something about network latency. B. The geographical location may tell something about legislation. C. The number of sites tells you something about disaster recovery possibilities. D. When a server breaks down, the customer wants to send a technician to fix the problem as soon as possible. 10 of 20 Which process is not covered by ISO/IEC 20000? A. Configuration management B. People management C. Service level management D. Supplier management 11 of 20 What is an important requirement for applications to be accessible in the Cloud? A. The application should be compatible with the browser of the users computer. B. The application should use the same programming language as the clients. C. The user should know on which server the application is located. D. The users identity should be known by the application. 12 of 20 Which service model allows the customer to choose more layers in the computing architecture? A. Infrastructure as a Service (IaaS) B. Platform as a Service (PaaS) C. Software as a Service (SaaS) D. There is no difference between the service models. 7

13 of 20 How does Cloud computing change the relationship between provider and customer? A. increased focus on service level agreements (SLAs) B. less compliance to standards C. less focus on service level agreements (SLAs) D. more focus on training 14 of 20 How can confidentiality of information be achieved? A. by ensuring enough resources to make information available for all users B. by preventing unauthorized changes C. by regularly backing up the information D. by restricting access to information 15 of 20 Which of the following is not a mitigating measure against data loss? A. audits B. authentication and authorization C. encryption D. Storage area network (SAN) 16 of 20 What is federation in identity management? A. cloud based identity management enabling single sign-on for multiple systems B. systems in the Cloud sharing information about the identity of users C. the cloud of all systems accessible by a single user D. the identity of a group of users sharing the same cloud resources 17 of 20 What is location information used for in the Cloud? A. to determine the geographic location of the user of an application B. to determine the identity of a user of an application C. to determine whether a user of an application is on-line D. to determine who has accessed a document stored in the cloud 8

18 of 20 What is benefit of storage availability in the Cloud? A. Additional storage does not require budget for new large storage devices. B. Storage in the Cloud has a higher availability than storage devices in the local area network. C. Storage in the Cloud has shorter access times than storage in the local area network. D. Storage in the Cloud is easier to protect against intrusion 19 of 20 What is a benefit of Cloud computing for IT staff? A. higher payment of IT staff involved in Cloud computing B. less interruption of work caused by users asking for support C. less knowledge needed: Cloud computing does not require special skills D. lower stress levels: less worry about normal daily activities like making back-ups 20 of 20 Why is a trial period needed when considering to use Software-as-a-Service? A. to establish the required bandwidth for using the cloud services B. to evaluate whether the cloud services will be useful C. to find out whether the vendor will meet the Service agreement D. to have time to accommodate the local network to use of the new services 9

Answer key 1 of 20 What is a correct definition of Cloud computing? A. a large pool of usable and accessible virtualized resources B. a network of globally interconnected client computers C. a service architecture based on thin clients D. a service offered by a Service provider, not limited by a Service level agreement (SLA) A. Correct. This is a correct definition of Cloud computing. B. Incorrect. A network is not always a Cloud. C. Incorrect. A thin client is a possible but not necessary asset in a Cloud. D. Incorrect. Services offered by a Service provider are not by definition Cloud. 2 of 20 Where did the Internet begin? A. a cluster of cooperating universities in the USA B. computer hobbyists C. the CIA D. the Department of Defense of the USA A. Incorrect. It was not a cluster of universities who developed Internet. B. Incorrect. It was not a group of computer hobbyists who developed the Internet. C. Incorrect. The CIA did not develop Internet. D. Correct. It started as the Arpanet project at the Department of Defense of the USA. 10

3 of 20 Why did virtualization boost the emergence of Cloud computing? A. A virtual machine is more secure than a physical machine. B. Virtualization made it easier and cheaper to share resources between users. C. Virtual machines have greater performance than their physical counterparts. D. Virtualization leads to better network utilization. A. Incorrect. Virtual machines are not less vulnerable than physical machines. B. Correct. Virtualization makes implementing a multi-tenant system easier. C. Incorrect. Virtual machines have some overhead compared to their physical counterparts. D. Incorrect. There is no difference in network usage. 4 of 20 What is an example of a single purpose environment? A. any application on any server B. interface to large computer C. interface to large storage D. Mainframe A. Incorrect. This is an example of a multi-purpose environment. B. Incorrect. This is an example of a multi-purpose environment. C. Incorrect. This is an example of a multi-purpose environment. D. Correct. A mainframe was used for a single purpose. 5 of 20 What is an important concern for the customer in multi-tenant environments? A. Availability B. Network bandwidth C. Network latency D. Security A. Incorrect. Availability is also important in a single-tenant environment. B. Incorrect. Network bandwidth is not a specific aspect of multi-tenancy. C. Incorrect. Network latency is not a specific aspect of multi-tenancy. D. Correct. Multi-tenant environments share data of multiple customers. Security is a key aspect (or risk) of multi-tenancy. 11

6 of 20 What is an important benefit of Cloud? A. highly protected data B. independency from the Internet C. reduced cost D. small bandwidth A. Incorrect. Data protection is something to be worried about. B. Incorrect. The dependency of Internet is high. C. Correct. Cloud computing is saving costs in several ways. D. Incorrect. High bandwidth is needed for Cloud computing. 7 of 20 What is a Virtual Private Network (VPN)? A. a secured connection for remote access to a local area network B. a secured private cloud for a single user C. a virtual network device for private purposes D. an operating system for private network systems A. Correct. VPN allows a remote user to access a local area network via a secured connection. B. Incorrect. VPN can be used by many users to access a local are network. C. Incorrect. VPN is not a device but a way to connect to a local area network and not only for private purposes. D. Incorrect. VPN is not an operating system but a way to connect to a local area network. 8 of 20 What can be done to make maximum use of the interoperability principle of Cloud computing? A. Employ multiple system integrators to build your private cloud. B. Only use cloud providers located in Europe. C. Use hardware and software of a single vendor. D. Use standard protocols. A. Incorrect. Employing multiple system integrators does not guarantee interoperability. B.Incorrect. The geographical location of the provider is not a key factor in interoperability. C. Incorrect. Using a single vendor creates vendor lock-in. D. Correct. Standards ensure interoperability. 12

9 of 20 What is not a valid reason for the customer asking a Cloud provider where their servers are located? A. Geographical location may tell something about network latency. B. The geographical location may tell something about legislation. C. The number of sites tells you something about disaster recovery possibilities. D. When a server breaks down, the customer wants to send a technician to fix the problem as soon as possible. A.Incorrect. This is a valid question, because the geographical location may indeed tell something about network latency. B. Incorrect. This is a valid question, because the geographical location may indeed tell something about legislation. C. Incorrect. This is a valid question, because the disaster recovery possibilities are limited if the provider uses only one site. D. Correct. A server breaking down is the responsibility of the cloud provider. 10 of 20 Which process is not covered by ISO/IEC 20000? A. Configuration management B. People management C. Service level management D. Supplier management A.Incorrect. Configuration management is part of the control processes. B. Correct. People management is not part of ISO/IEC 20000. C. Incorrect. Service level management is part of the service delivery process. D. Incorrect. Supplier management is part of the relationship process. 11 of 20 What is an important requirement for applications to be accessible in the Cloud? A. The application should be compatible with the browser of the users computer. B. The application should use the same programming language as the clients. C. The user should know on which server the application is located. D. The users identity should be known by the application. A. Correct. Because users access the application via their browser, the browser should support the features the application is using. B. Incorrect. Applications do not exchange programming code with clients. C. Incorrect. In the Cloud the user does not need the location of the application. D. Incorrect. This may be a security issue, but in general this is not needed for accessibility. 13

12 of 20 Which service model allows the customer to choose more layers in the computing architecture? A. Infrastructure as a Service (IaaS) B. Platform as a Service (PaaS) C. Software as a Service (SaaS) D. There is no difference between the service models. A. Correct. The customer can choose more layers. B. Incorrect. The platform only allows certain programming languages to be used. C. Incorrect. The software can only be configured by the user. D. Incorrect. IaaS provides more choice of layers to the customer. 13 of 20 How does Cloud computing change the relationship between provider and customer? A. increased focus on service level agreements (SLAs) B. less compliance to standards C. less focus on service level agreements (SLAs) D. more focus on training A. Correct. Providers are virtually running the customer s business processes so the customer needs to define SLAs. B. Incorrect. Standards are even more important with cloud computing. C. Incorrect. SLAs receive even more attention with cloud computing. D. Incorrect. Training requirements do not necessarily change because of cloud computing. 14 of 20 How can confidentiality of information be achieved? A. by ensuring enough resources to make information available for all users B. by preventing unauthorized changes C. by regularly backing up the information D. by restricting access to information A. Incorrect. Providing resources are needed for the availability of information. B. Incorrect. Preventing unauthorized changes secures the integrity of information. C. Incorrect. Back-ups help ensure availability and integrity of information. D. Correct. Protection of information against unauthorized access is the main tool to achieve confidentiality. 14

15 of 20 Which of the following is not a mitigating measure against data loss? A. audits B. authentication and authorization C. encryption D. Storage area network (SAN) A. Incorrect. Audits help identify and remedy weak spots. B. Incorrect. Authentication and authorization help prevent unauthorized access. C. Incorrect. Encryption lowers the consequences of data leakage. D. Correct. A SAN is a way of centralizing data storage, not necessarily mitigating data loss. 16 of 20 What is federation in identity management? A. cloud based identity management enabling single sign-on for multiple systems B. systems in the Cloud sharing information about the identity of users C. the cloud of all systems accessible by a single user D. the identity of a group of users sharing the same cloud resources A. Correct. Federation refers to cloud-based identity management to enable single sign-on. B. Incorrect. Sharing information would not yet provide single sign-on as required in federation. C. Incorrect. Such a group of systems is not a federation in the sense of identity management. D. Incorrect. Such a group of users is not a federation in the sense of identity management. 15

17 of 20 What is location information used for in the Cloud? A. to determine the geographic location of the user of an application B. to determine the identity of a user of an application C. to determine whether a user of an application is on-line D. to determine who has accessed a document stored in the cloud A. Correct. Location data is about the actual location of the user. B. Incorrect. Location data is unreliable for the identification of users. C. Incorrect. In order to see if a user is logged into an application no location data is needed. D. Incorrect. Location data cannot be used for identifying past behavior of a user. 18 of 20 What is benefit of storage availability in the Cloud? A. Additional storage does not require budget for new large storage devices. B. Storage in the Cloud has a higher availability than storage devices in the local area network. C. Storage in the Cloud has shorter access times than storage in the local area network. D. Storage in the Cloud is easier to protect against intrusion A. Correct. Storage in the Cloud requires only investment in the capacity needed. B. Incorrect. Storage in the Cloud can even have a lower availability due to network problems. C. Incorrect. Storage in the Cloud can even have longer access times due to network problems. D. Incorrect. Storage in the Cloud can even be less secure if accessible via the Internet. 16

19 of 20 What is a benefit of Cloud computing for IT staff? A. higher payment of IT staff involved in Cloud computing B. less interruption of work caused by users asking for support C. less knowledge needed: Cloud computing does not require special skills D. lower stress levels: less worry about normal daily activities like making back-ups A. Incorrect. IT staff involved in Cloud computing do normally not get higher salaries. B. Incorrect. Cloud computing does not automatically reduce the need for user support. C. Incorrect. Using Cloud computing may need less staff, but they still need to be skilled professionals. D. Correct. Using Cloud computing may place less stress on IT staff freed from normal daily activities as seen in typical data centers. 20 of 20 Why is a trial period needed when considering to use Software-as-a-Service? A. to establish the required bandwidth for using the cloud services B. to evaluate whether the cloud services will be useful C. to find out whether the vendor will meet the Service agreement D. to have time to accommodate the local network to use of the new services A. Incorrect. The bandwidth during the trial period may not be realistic and bandwidth can be enlarged while using the application. B. Correct. Before investing in the new service the organization will want to know for sure that the selected application is appropriate. C. Incorrect. The trial period will be too short to sufficiently evaluate the SLA with the vendor. D. Incorrect. Changes in the infrastructure will have to wait for a final decision and will not be performed during the trial period. 17

Evaluation The table below shows the correct answers to the questions in this set of sample questions. number answer points 1 A 1 2 D 1 3 B 1 4 D 1 5 D 1 6 C 1 7 A 1 8 D 1 9 D 1 10 B 1 11 A 1 12 A 1 13 A 1 14 D 1 15 D 1 16 A 1 17 A 1 18 A 1 19 D 1 20 B 1 18

Contact EXIN www.exin.com