What is a main challenge for enterprises in using cell phones for collaboration?
A. Applications for collaboration are limited.
B. Collaborative applications are complicated.
C. Employees want to use their private cell phones.
D. Separating business data from personal data.
Why is text messaging in automobiles outlawed in many countries?
A. for financial reasons
B. for safety reasons
C. for security reasons
D. for synchronization reasons
What is an important limitation of Cloud computing?
A. actuality of data
B. inflexibility
C. regulatory concerns
D. volume of waste
What is a major benefit of using applications on mobile devices?
A. Mobile devices are cheaper than personal computers.
B. Mobile devices provide location independence.
C. Mobile devices uniquely identify the user approaching the application
D. Mobile devises are more secure than personal computers.
What is a difference between XML and HTML?
A. XML is used to format many types of documents and structures; HTML formats the display of content in a web-browser.
B. HTML is used to format many types of documents and structures; XML formats the display of content in a web-browser.
C. HTML can be used to format the display of content in a web-browser, XML cannot.
D. XML can be used to format the display of content in a web-browser, HTML cannot.
What does CaaS represent?
A. combining applications in a single access system
B. communication applications provided by an offsite location service provider
C. computer maintenance services provided by an external service provider
D. computing services provided by an offsite location service provider
How can moving to Cloud Computing reduce capital expenses?
A. One can reduce the number of applications in use within the enterprise.
B. One can reduce the number of IT staff in the datacenter.
C. One needs less client computers to access the enterprise applications in the Cloud.
D. One pays for the use of hardware, not for the value of the hardware at the time of purchase.
What is one of the requirements for successfully using a Web-based application?
A. ample client storage capacity
B. control of user identity
C. Service level agreements (SLAs)
D. sufficient bandwidth
In its 2010 Whitepaper the Cloud Security Alliance (CSA) identifies a number of Top threats to Cloud Computing.
What is not identified by the CSA as a threat?
A. abuse and nefarious use of Cloud computing
B. insecure application interfaces
C. lack of good Service level agreements
D. unknown risk profile and account
Restricting access to systems/applications based on time is part of which Triple-A security cornerstone?
A. Accounting
B. Application
C. Authentication
D. Authorization
Why are Service level agreements (SLAs) in Public Clouds highly standardized?
A. They need to be available to and usable by everyone.
B. Cloud providers aim for a single service level for all offered services.
C. They are standardized by the ISO.
D. They are standardized by the US government.
What is considered the first example of shared managed services?
A. Mainframe
B. Applications offered by ASP's (application service providers)
C. Arpanet
D. Virtual Private Network (VPN)
In the 2010 white paper Top Threats to Cloud Computing, what does the Cloud Security Alliance (CSA) identify as remediation for unknown risk profile and account?
A. Good Human Resource vetting procedures
B. Good SLA structures including Cloud provider compliance audits
C. Proper testing methods
D. Strong authentication and access control
What does the abbreviation IPsec mean?
A. Internet Protocol Security
B. Internet Private Section
C. Intelligent Protocol Seconds
D. Second Internet Protocol
In evaluating a Cloud service provider and as part of a proper governance framework, what is required for compliance?
A. Exception reports
B. Management reviews
C. Performance reports
D. Statement on Auditing Standards