Title | |
---|---|
_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand
The answer is:
B. Pooling
|
|
Point out the correct statement:Point out the correct statement:
The answer is:
B. A cloud computing platform extends the company’s products and defends their franchise
|
|
A _____ is a facility that is a self-contained semiconductor assembly lineA _____ is a facility that is a self-contained semiconductor assembly line.
The answer is:
A. fab
|
|
How many laws exist for Cloudonomics by Wienman |
|
Cutting latency in half requires ______ times the number of nodes in a systemCutting latency in half requires ______ times the number of nodes in a system.
The answer is:
C. four
|
|
Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems doWeinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems do.
The answer is:
B. botnets
|
|
The reliability of a system with n redundant components and a reliability of r isThe reliability of a system with n redundant components and a reliability of r is :
The answer is:
A. 1-(1-r)n
|
|
A __________ site is one that is environmentally friendly: locations that are on a network backboneA __________ site is one that is environmentally friendly: locations that are on a network backbone.
The answer is:
A. greenfield
|
|
The peak of the sum is never ________ than the sum of the peaksThe peak of the sum is never ________ than the sum of the peaks.
The answer is:
B. greater
|
|
Which of the following subject area deals with pay-as-you-go usage modelWhich of the following subject area deals with pay-as-you-go usage model ?
The answer is:
A. Accounting Management
|
|
________ captive requires that the cloud accommodate multiple compliance regimes________ captive requires that the cloud accommodate multiple compliance regimes.
The answer is:
B. Policy-based
|
|
Security methods such as private encryption, VLANs and firewalls comes under __________ subject areaSecurity methods such as private encryption, VLANs and firewalls comes under __________ subject area.
The answer is:
C. Data Privacy
|
|
Point out the wrong statementPoint out the wrong statement :
The answer is:
C. A network backbone is a very low-capacity network connection
|
|
Which of the following captive area deals with monitoringWhich of the following captive area deals with monitoring ?
The answer is:
B. Variable but under control
|
|
Network bottlenecks occur when ______ data sets must be transferredNetwork bottlenecks occur when ______ data sets must be transferred.
The answer is:
A. large
|
|
The reputation for cloud computing services for the quality of those services is shared by _________The reputation for cloud computing services for the quality of those services is shared by _________
The answer is:
C. tenants
|
|
Cloud ________ are standardized in order to appeal to the majority of its audienceCloud ________ are standardized in order to appeal to the majority of its audience.
The answer is:
B. SLAs
|
|
___________ is a function of the particular enterprise and application in an on-premises deployment___________ is a function of the particular enterprise and application in an on-premises deployment.
The answer is:
B. Vendor lock-in
|
|
The cost of a cloud computing deployment is roughly estimated to beThe cost of a cloud computing deployment is roughly estimated to be :
The answer is:
C. CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
|
|
Point out the correct statementPoint out the correct statement :
The answer is:
B. Cloud computing abstracts systems by pooling and sharing resources
|
MCQs
Views
Best Answers
Points