1.
Depending on the cloud deployment model and cloud delivery model being considered by an organization, there may be the need to further allocate funds to carry out integration testing, as well as the need for
additional labor to enable interoperability between cloud service consumers and cloud services. These expenses are referred to as ___________________.
2.
Once configured, usage of self-provisioned IT resources can be automated, requiring no further human involvement by the cloud consumer or cloud provider. This results in __________________.
3.
A cloud consumer may choose to have a solution span two clouds, as follows: It deploys cloud services that process sensitive data to a private cloud and it deploys cloud services that process non-sensitive data to a
public cloud. The result is a __________________ cloud deployment model. 
4.
Within cloud computing, resiliency refers to redundant IT resources within the same cloud (but in different physical locations) or across multiple clouds.
5.
Which of the following are cloud deployment models?
6.
The Multi-Regional Compliance and Legal Issues challenge of cloud computing can occur when an organization's data is hosted in a geographically different location than the organization itself. In this case,
there may be important government regulations that do not apply in one of the regions, or they apply differently in the different regions.
7.
Over the past 3 years, a cloud service has been unavailable for a total of 48 hours. Additionally, the physical server hosting the cloud service needed to be replaced, during which it was unavailable for 4 days. Based
on these statistics over the past 3 years, the availability rating of the cloud service is ___________________ (rounded to one decimal).
8.
The ____________________ boundary represents the physical perimeter that surrounds a set of IT resources owned by a specific organization. The ___________________ boundary establishes a logical
perimeter wherein IT resources are trusted from a security perspective. To use cloud- based IT resources, the cloud consumer will generally need to trust them with the result that the
cloud consumer's ___________________ boundary is expanded beyond its___________________ boundary to encompass the cloud-based IT resources. 
9.
Which of the following roles are assumed by software programs?
10.
Which of the following are technology innovations that contributed to the emergence of cloud computing?