1.
Having a reservation in a cloud environment can ensure operations continue in the event of high utilization across the cloud. Which of the following would NOT be a capability covered by reservations?
2.
What must SOAP rely on for security since it does not provide security as a built-in capability?
3.
With a federated identity system, what does the identity provider send information to after a successful authentication?
4.
Which of the following technologies is NOT commonly used for accessing systems and services in a cloud environment in a secure manner?
5.
Which component of ITIL involves handling anything that can impact services for either internal or public users?
6.
Which protocol, as a part of TLS, handles the actual secure communications and transmission of data?
7.
Which of the following terms is NOT a commonly used category of risk acceptance?
8.
Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually. Which of the following concepts does this describe?
9.
Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed. Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?
10.
Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components. Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?