Which aspect of cloud computing would be the MOST complicating factor?
Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly. Which aspect of cloud computing would be the MOST complicating factor?A . Measured serviceB . Broad network accessC . MultitenancyD . PortabilityView AnswerAnswer: C Explanation: With multitenancy, multiple customers share the same physical hardware and...
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?A . Resource poolingB . VirtualizationC . MultitenancyD . RegulationView AnswerAnswer: C Explanation: With cloud providers hosting a number of different customers, it would be impractical for them to pursue...
Which of the following statements best describes a Type 1 hypervisor?
Which of the following statements best describes a Type 1 hypervisor?A . The hypervisor software runs within an operating system tied to the hardware.B . The hypervisor software runs as a client on a server and needs an external service to administer it.C . The hypervisor software runs on top...
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?A . Inter-cloud providerB . Cloud service brokerC . Cloud auditorD . Cloud service developerView AnswerAnswer: B Explanation: The cloud service broker is responsible for obtaining new customers, analyzing the marketplace, and securing contracts and...
What are the two protocols that TLS uses?
What are the two protocols that TLS uses?A . Handshake and recordB . Transport and initiateC . Handshake and transportD . Record and transmitView AnswerAnswer: A Explanation: TLS uses the handshake protocol to establish and negotiate the TLS connection, and it uses the record protocol for the secure transmission of...
Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?
Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?A . AvailabilityB . InteroperabilityC . ReversibilityD . PortabilityView AnswerAnswer: B Explanation: Interoperability is the ease with which one can move or reuse components of an application or service. This is...
Which of the following is NOT a regulatory system from the United States federal government?
Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations. Which of the following is NOT a regulatory system from the United States federal government?A . HIPAAB . SOXC . FISMAD . PCI DSSView...
Which of the following is considered an external redundancy for a data center?
Which of the following is considered an external redundancy for a data center?A . Power feeds to rackB . GeneratorsC . Power distribution unitsD . Storage systemsView AnswerAnswer: B Explanation: Generators are considered an external redundancy to a data center. Power distribution units (PDUs), storage systems, and power feeds to...
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?A . ArchiveB . ShareC . StoreD . DestroyView AnswerAnswer: A Explanation: In order to ensure compliance with regulations, it is important for an organization to regularly test the restorability of...
Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?
Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?A . IDCAB . BICSIC . Uptime InstituteD . NFPAView AnswerAnswer: A Explanation: The Infinity Paradigm of the...