How can an organization successfully implement a PaaS strategy?
How can an organization successfully implement a PaaS strategy?A . Open up internal databases with Web service access.B . Take inventory of the application portfolio and select external suppliersC . Standardize on a limited set of virtual machines.D . Continuously execute performance analytics to monitor providersView AnswerAnswer: A
Which of the following does IT outsourcing and cloud computing typically have in common?
Which of the following does IT outsourcing and cloud computing typically have in common?A . Pay as you go agreementsB . Short-term financial commitmentC . Tailor-made applications based on client needsD . Vendor lock-in potentialView AnswerAnswer: D
Which of the following risk results if cloud computing providers limit their Service Level Agreement (SLA) liabilities?
Which of the following risk results if cloud computing providers limit their Service Level Agreement (SLA) liabilities?A . Compliance riskB . Legal riskC . Privacy riskD . Security riskView AnswerAnswer: B
Which represents the MOST important business continuity risk?
Which represents the MOST important business continuity risk?A . Incomplete Service Level Agreements (SLAs)B . Network connectivity interruptionC . Privacy lawsD . Providers going out of businessView AnswerAnswer: D
Why do business users prefer to deal with cloud providers directly, instead of via the IT department?
Why do business users prefer to deal with cloud providers directly, instead of via the IT department?A . It reduces financial risks to the businessB . The IT department does not accommodate variable costsC . They can better measure the provider's qualityD . They can use their own payment optionsView...
Amazon Elastic Cloud Computing (EC2) is a facility for quickly providing virtual servers. This is an example of:
Amazon Elastic Cloud Computing (EC2) is a facility for quickly providing virtual servers. This is an example of:A . SaaSB . IaaSC . PaaSD . QoView AnswerAnswer: B
Digital identities for logging onto SaaS solutions should be issued by all the following EXCEPT:
Digital identities for logging onto SaaS solutions should be issued by all the following EXCEPT:A . A third-party identity provider.B . The customer organization.C . The SaaS provider.D . A user.View AnswerAnswer: D
Which of the following actions should a company take if a cloud computing provider ceases to uphold their contract?
Which of the following actions should a company take if a cloud computing provider ceases to uphold their contract?A . Consult the company's exit plan.B . Move the company data to the backup provider that was selected earlier.C . Re-host all critical applications on the company's internal servers.D . Evaluate...
Privacy is the right of________ to selectively disclose information about _________ and restrict the further use of that information by any party.
Privacy is the right of________ to selectively disclose information about _________ and restrict the further use of that information by any party.A . companies, othersB . companies, themselvesC . individuals, othersD . individuals, themselvesView AnswerAnswer: D
Which of the following is a limitation of owning servers?
Which of the following is a limitation of owning servers?A . Inability to deploy new services quicklyB . Inability to rapidly change to a different technologyC . Capital tied up in hardware that might become obsoleteD . Additional resources must be hired to maintain each serverView AnswerAnswer: C