Karten 112 Karten
Lernende 2 Lernende
Sprache English
Stufe Mittelschule
Erstellt / Aktualisiert 20.09.2020 / 22.09.2020
Lizenzierung Namensnennung - Nicht-kommerziell - Keine Bearbeitung (CC BY-NC-ND)     (LC)
0 Exakte Antworten 0 Text Antworten 112 Multiple Choice Antworten


Fenster schliessen

One of the limitations concerns of Cloud computing is uncertainty about where your data is stored in conjunction with varying national and international legislation on data protection. Which issue does this raise?





Fenster schliessen

Which kinds of audit mechanisms are available in ISQ/IEC 20000:2011?

An internal audit mechanism

. An external audit mechanism

An internal and external audit mechanism

No audit mechanisms

Fenster schliessen

What is a good question to ask a prospective Cloud provider?

How can we access the servers in case of an incident?

How is data partitioning done?

What are the names of the Service desk employees?

What are the provisions when a service ends?

Fenster schliessen

What is the goal of an ISO/IEC 20000 follow-up audit?

. To change procedures and working instructions

To check if the organization still fulfills the ISO/IEC 20000 requirements

To implement additional processes within the Cloud provider’s organization

To pay specific attention to the Change management process

Fenster schliessen

The National Institute of Standards and Technology (NIST) states there are ‘five essential characteristics, three service models and four deployment models’ to Cloud Computing. What is an example of a service model?

Measured service

On-demand self-service

Resource pooling

Software as a Service

Fenster schliessen

Which communication protocol group is generally accepted on the Internet?





Fenster schliessen

What is the simplest way of consuming Cloud services for general purposes?

Communication as a Service Caas

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

Fenster schliessen

What is the international standard for IT Service Management processes?

ISO 9001

. ISO 14001

ISO/IEC 20000

. ISO/IEC 27001

Fenster schliessen

What does the abbreviation IPsec mean?

. Internet Protocol Security

Internet Private Section

. Intelligent Protocol Seconds

. Second Internet Protocol

Fenster schliessen

What is an important environment related benefit of Cloud?

Greater data protection

Reduced dependency on the Internet

. Reduced power requirements

Smaller bandwidth consumption

Fenster schliessen

What do we call the threat of data compromised due to unauthorized access?

Account service and traffic hijacking

Data loss/leakage

Insecure application interfaces

. Shared technology vulnerabilities

Fenster schliessen

What is an important benefit of using a hybrid model for cloud services?

It allows the purchaser to save money in infrastructure and licenses.

. It allows the separation of sensitive data from less sensitive data.

It provides better performance.

It provides the best client/server experience in a cloud environment.

Fenster schliessen

What describes a serious drawback in the early development of networks?

Computers were dedicated to one function.

Computers were too complicated to be connected.

There was low network speed

Vendors developed their own network communication protocols.

Fenster schliessen

In evaluating a Cloud service provider and as part of a proper governance framework, what is required for compliance?

Exception reports

. Management reviews

Performance reports

Statement on Auditing Standards

Fenster schliessen

Who is responsible for securing Cloud user data?

The cloud provider

The cloud user

Both the cloud provider and the cloud user

The Internet provider

Fenster schliessen

What is a specific feature of Network Attached Storage (NAS)?

NAS presents data to the user as if it is stored on a file serve

NAS uses the file system of the client computers

The NAS operating system does not provide security features

With NAS the file system is managed by the servers storing the data

Fenster schliessen

What is OpenID used for?

to connect to multiple web-sites without using a password

. to identify yourself in dealing on-line with government agencies

. to pay on-line via your own bank account

. to use one account to sign in to multiple web sites

Fenster schliessen

How can moving to Cloud computing increase user satisfaction?

by accomplishing quick and efficient release of applications

by increasing the access to information available on the Internet

by moving internal systems with performance problems to the Cloud

by passing problems with applications to the Cloud provider

Fenster schliessen

Why became the Ethernet standard popular for Local Area Networks (LANs)?

because the Ethernet standard was fastest

because the Ethernet standard was released for general use

. because the Ethernet standard was suitable for mainframes

. because the Ethernet standard was used by the largest vendor

Fenster schliessen

What is an example of the use of location information?

to determine the user's native language

to determine whether the user is connected via a mobile platform

to provide advertisements for local restaurants, determined by GPS

. to provide the correct version of the application for the user's operating system

Fenster schliessen

What is the generally accepted communication protocol on the Internet?

. Net BIOS




Fenster schliessen

What is an economic cloud solution for a short term project like a one time application design?


Software as-a-Service



Fenster schliessen

What may be an economic benefit of Cloud computing?

a custom accounting system

acceptance by employees

purchasing thin clients

reduced overhead

Fenster schliessen

What does the integrity of information mean?

It means that the access to the information is limited.

. It means that the information can be accessed by those users who are allowed to access it.

It means that the information is accurate

It means that the information is protected.

Fenster schliessen

What is a main challenge for enterprises in using cell phones for collaboration?

Applications for collaboration are limited

Collaborative applications are complicated

Employees want to use their private cell phones.

Separating business data from personal data

Fenster schliessen

What is the principal function of the Hypervisor?

identity management

responding to client requests

scheduling the sharing of resources

virus protection

Fenster schliessen

How can a protocol analyzer be used?

to analyze errors in the protocol syntax used in a failed message

to distribute messages according to the addressing protocol they use

. to measure the bandwidth required for different types of transactions

to prevent virus infections in the network software

Fenster schliessen

What is specific for public cloud?

It is a client computer connected to a network

It uses both local and remote services in its implementation

It uses services provided by an external service provider.

The services are shared in the organization.

Fenster schliessen

Why is a thin client called 'thin'?

because it has a thin monitor

because it has limited functionality

. because it has no memory

because it has no processor

Fenster schliessen

Providing a user access to an application in the Cloud requires several steps. In which step are the user's permissions determined?

during the auditing phase

during the authentication phase

during the authorization phase

during the verification phase