University of Maryland, University College CMIT 321 quiz 6
Disclaimer: This is not the exact answers, if you know answers are wrong please let me know so
... [Show More] I can correct them.
Some of the Virtualization vendors include (select all that apply):
Question 1 options:
VMware vCloud Suite
VMware vSphere
Microsoft
Virtual Box
Examples of companies that offer Cloud Computing services include (select all that apply):
Question 2 options:
Google
Facebook
Salesforce
Dropbox
According to your text, which of the following are Cloud Deployment Models? (choose all that apply)
Question 3 options:
Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud
Some of the main functions of an Intrusion Detection System (IDS) include (choose all that apply):
Question 4 options:
Performs packet analysis
Gathers and analyses information from a network
Blocks rule-based traffic
Performs packet sniffing
According to the text, characteristics of Virtualization in cloud computing technology include (select all that apply):
Question 5 options:
Isolation
Wireless Capable
Encapsulation
Partitioning
In this Cloud Deployment model, the provider makes services such as applications, servers, and data storage available.
Question 6 options:
Hybrid Cloud
Public Cloud
Private Cloud
Community Cloud
Services models available to Cloud Consumers include which of the following models? (choose all that apply)
Question 7 options:
SAN
PaaS
SaaS
IaaS
What are the advantages of Software as a Service (SaaS)? (choose all that apply)
Question 8 options:
Security
Low Cost
Easy Administration
Internet Dependency
According to the text, the three different types of Virtualization include which of the following?
Question 9 options:
Storage Virtualization
Server Virtualization
Network Virtualization
SAN Virtualization
Some of the Infrastructure as a service vendors include (select all that apply):
Question 10 options:
Windows SkyDrive
Sungrid
Go Grid
Amazon EC2
You should place your Intrusion Detection System (IDS) in this location on the network (choose all that apply):
Question 11 options:
At the ISP Location
Inside the Firewall
DMZ
Outside the Firewall
According to your text, components of a Cloud Broker include which of the following? (choose all that apply)
Question 12 options:
Service Arbitration
Service Negotiation
Service Intermediation
Service Aggregation
Which of the following is a Cloud Consumer model that includes storage, service management, and content delivery?
Question 13 options:
SaaS
IaaS
PaaS
SAN
Which of the following is a Cloud Consumer model that includes database, business intelligence, and application deployment?
Question 14 options:
SaaS
IaaS
PaaS
SAN
According to your text, these are the 3 types of cloud services.
Question 15 options:
Virtualization as a Service
Infrastructure as a Service
Software as a Service
Platform as a Service
Which of the following is a Cloud Consumer model that includes human resources and Enterprise Resources Management?
Question 16 options:
SaaS
SAN
IaaS
PaaS
An organization can implement this Cloud Deployment model within the corporate firewall.
Question 17 options:
Private Cloud
Public Cloud
Hybrid Cloud
Community Cloud
Some of the Characteristics of Cloud Computing services include (select all that apply):
Question 18 options:
Measured Services
Distributed Storage
Resource Pooling
Virtualization Technology
Select the three IP Protocols that Snort Supports for Suspicions behavior according to your text.
Question 19 options:
TCP
ICMP
ARP
UDP
Which of the following is a tool that can be used to check for modified or trojanzied file?
Question 20 options:
chkdsk
tripwire
scandisk
fsck [Show Less]