Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CLOUDF Sample Questions Answers

Questions 4

What is the purpose of failover?

Options:

A.

to automatically restart the system in case of a failure

B.

to build up a back-up while the system is active

C.

to switch over automatically to another system

D.

to work on two systems at the same time

Buy Now
Questions 5

What does the abbreviation IPsec mean?

Options:

A.

Internet Protocol Security

B.

Internet Private Section

C.

Intelligent Protocol Seconds

D.

Second Internet Protocol

Buy Now
Questions 6

What is meant by data partitioning in the Cloud?

Options:

A.

formatting a hard disk to allow for very big files

B.

keeping data from one Cloud user on a single hard disk

C.

keeping data from one Cloud user safe from other users

D.

splitting data into small parts so they fit more easily on a solid state disk

Buy Now
Questions 7

In identity management, how might location information be used?

Options:

A.

to determine the user’s native language

B.

to determine whether the user is connected via a mobile platform

C.

to provide advertisements for local restaurants, determined by GPS

D.

to provide the correct version of the application for the user’s operating system

Buy Now
Questions 8

What is not a staffing benefit of Cloud computing?

Options:

A.

Fewer IT-staff

B.

Lower employee benefits

C.

Lower recruitment costs

D.

Lower self-service costs

Buy Now
Questions 9

What does 'loosely coupled' mean?

Options:

A.

An object implementing only a single method or function.

B.

The application from one organization can use the service of another organization.

C.

The services in the cloud can be ordered when needed.

D.

The thin clients can be disconnected anytime.

Buy Now
Questions 10

What do we call the threat of data compromised due to unauthorized access?

Options:

A.

Account service and traffic hijacking

B.

Data loss/leakage

C.

Insecure application interfaces

D.

Shared technology vulnerabilities

Buy Now
Questions 11

What advantage does PaaS have compared to IaaS?

Options:

A.

The provider takes care of scalability.

B.

The user is free to choose the server the application runs on.

C.

The user may choose any programming language to write an application.

D.

The dependency on the network is lower.

Buy Now
Questions 12

What is one of the main risks associated with using Cloud solutions?

Options:

A.

Bankruptcy of the Cloud provider

B.

Constant updates to Cloud applications

C.

Having to use a password to access Cloud applications and then losing it.

D.

Having no direct access to applications or infrastructure in case of an incident.

Buy Now
Questions 13

What is a benefit of virtual client operating systems in protection against virus infections?

Options:

A.

A virus infection in one operating system will not infect the other operating systems.

B.

One virus scanner on a client operating system will protect all other operating systems.

C.

The client operating systems are virtual and cannot be infected from outside.

D.

The client operating systems can be protected by the virus scanner of the host operating system.

Buy Now
Questions 14

The three elements that form the security corner stone of IP based network management and policy administration are the so-called Triple-A.

What is not one of the Triple-A elements?

Options:

A.

Accounting

B.

Application

C.

Authentication

D.

Authorization

Buy Now
Questions 15

How could presence be used to enhance security in the Cloud?

Options:

A.

by prohibiting users to access cloud applications, except when on their work place

B.

by prohibiting users to access cloud applications at their work place

C.

by restricting access to applications, depending on the user's physical location

D.

by using a web cam to identify the user of a cloud application

Buy Now
Questions 16

What is an example of the use of location information?

Options:

A.

to determine the user's native language

B.

to determine whether the user is connected via a mobile platform

C.

to provide advertisements for local restaurants, determined by GPS

D.

to provide the correct version of the application for the user's operating system

Buy Now
Questions 17

Which kinds of audit mechanisms are available in ISQ/IEC 20000:2011?

Options:

A.

An internal audit mechanism

B.

An external audit mechanism

C.

An internal and external audit mechanism

D.

No audit mechanisms

Buy Now
Questions 18

Why are Service level agreements (SLAs) in Public Clouds highly standardized?

Options:

A.

They need to be available to and usable by everyone.

B.

Cloud providers aim for a single service level for all offered services.

C.

They are standardized by the ISO.

D.

They are standardized by the US government.

Buy Now
Questions 19

What is a good question to ask a prospective Cloud provider?

Options:

A.

How can we access the servers in case of an incident?

B.

How is data partitioning done?

C.

What are the names of the Service desk employees?

D.

What are the provisions when a service ends?

Buy Now
Questions 20

How can backups be generated without interrupting ongoing processes?

Options:

A.

by using Network Attached Storage (NAS)

B.

by using replicated data

C.

by using storage in the cloud

D.

by using storage virtualization

Buy Now
Questions 21

Why are standards important?

Options:

A.

Standards provide interoperability.

B.

Standards provide legal compliance.

C.

Standards provide security.

D.

Standards provide the most user-friendly solution.

Buy Now
Questions 22

What is the international standard for IT Service Management processes?

Options:

A.

ISO 9001

B.

ISO 14001

C.

ISO/IEC 20000

D.

ISO/IEC 27001

Buy Now
Questions 23

What is OpenID used for?

Options:

A.

to connect to multiple web-sites without using a password

B.

to identify yourself in dealing on-line with government agencies

C.

to pay on-line via your own bank account

D.

to use one account to sign in to multiple web sites

Buy Now
Questions 24

What is a major benefit of using applications on mobile devices?

Options:

A.

Mobile devices are cheaper than personal computers.

B.

Mobile devices provide location independence.

C.

Mobile devices uniquely identify the user approaching the application

D.

Mobile devises are more secure than personal computers.

Buy Now
Questions 25

What is the operational benefit of software licensing for a Cloud solution?

Options:

A.

Operational costs are part of capital expenditure.

B.

Platform costs are much more stable.

C.

Server costs are lower.

D.

Software licensing may no longer impact capital expenditure.

Buy Now
Questions 26

Failover is the capacity to switch, often automatically, to another system or resource in the event of a failure. How does failover assist in the provision of cloud services?

Options:

A.

It assists providers in ensuring continuity of service when there is a problem.

B.

It automatically restarts the system in case of a failure.

C.

It builds a back-up while the system is active.

D.

It provides hidden storage to be used when needed.

Buy Now
Questions 27

What is the principal function of the Hypervisor?

Options:

A.

identity management

B.

responding to client requests

C.

scheduling the sharing of resources

D.

virus protection

Buy Now
Questions 28

What is the single point of truth in a Claim-based identity management solution?

Options:

A.

the cloud application

B.

the Hypervisor

C.

the identity provider

D.

the server hosting the application

Buy Now
Questions 29

In evaluating a Cloud service provider, which security issue is important?

Options:

A.

how the service provider implements and maintains security

B.

the compatibility of the virus scanners used by the vendor and in your organization

C.

the protection provided by your organization's firewall

D.

the security protocols used by other customers of the services

Buy Now
Questions 30

Presenting a user with a logical space for storing data and mapping this to the physical location where it is stored allows many systems to share the same storage device.

What is this called?

Options:

A.

Dynamic scaling

B.

Load balancing

C.

Managed services

D.

Storage virtualization

Buy Now
Questions 31

Restricting access to systems/applications based on time is part of which Triple-A security cornerstone?

Options:

A.

Accounting

B.

Application

C.

Authentication

D.

Authorization

Buy Now
Questions 32

What is specific for public cloud?

Options:

A.

It is a client computer connected to a network.

B.

It uses both local and remote services in its implementation

C.

It uses services provided by an external service provider.

D.

The services are shared in the organization.

Buy Now
Questions 33

What is considered the first example of shared managed services?

Options:

A.

Mainframe

B.

Applications offered by ASP’s (application service providers)

C.

Arpanet

D.

Virtual Private Network (VPN)

Buy Now
Exam Code: CLOUDF
Exam Name: EXIN Cloud Computing Foundation
Last Update: Jun 16, 2024
Questions: 112
$64  $159.99
$48  $119.99
$40  $99.99
buy now CLOUDF