Cloud Infrastructure - Chapter 3 & 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Iteict.cloud
I
Iteict.cloud
Community Contributor
Quizzes Created: 1 | Total Attempts: 224
Questions: 15 | Attempts: 224

SettingsSettingsSettings
Cloud Infrastructure - Chapter 3 & 4 - Quiz


Questions and Answers
  • 1. 

    Which of the following is a characteristics of IaaS?

    • A.

      Allows for static scaling.

    • B.

      Resources are distributed as a service.

    • C.

      Model that has no variable cost or utility pricing.

    • D.

      Generally includes single user on a single piece of hardware

    Correct Answer
    B. Resources are distributed as a service.
    Explanation
    IaaS stands for Infrastructure as a Service. It is a cloud computing model where resources such as virtual machines, storage, and networking are provided to users over the internet. The characteristic of IaaS mentioned in the correct answer is that resources are distributed as a service. This means that users can access and use these resources on-demand, without having to worry about managing the underlying infrastructure. They can scale their resources up or down as needed and pay only for what they use. This model allows for flexibility and cost savings for businesses.

    Rate this question:

  • 2. 

    What does IaaS stands for?

    • A.

      Import as a Service

    • B.

      Information as a Service

    • C.

      Incorporate as a Service

    • D.

      Infrastructure as a Service

    Correct Answer
    D. Infrastructure as a Service
    Explanation
    IaaS stands for Infrastructure as a Service. This term refers to a cloud computing model where the infrastructure, including servers, storage, and networking components, is provided by a third-party provider. With IaaS, organizations can access and use these resources on-demand, without the need to invest in and manage their own physical infrastructure. This allows for flexibility, scalability, and cost-effectiveness in deploying and managing IT resources.

    Rate this question:

  • 3. 

    Which of the following is the document that list the expectations among two or more parties regarding service quality, priorities, and responsibilities

    • A.

      SLA

    • B.

      COC

    • C.

      COM

    • D.

      LoR

    Correct Answer
    A. SLA
    Explanation
    An SLA (Service Level Agreement) is a document that outlines the expectations and agreements between two or more parties regarding service quality, priorities, and responsibilities. It defines the level of service that will be provided, including metrics such as response time, uptime, and resolution time. It also specifies the consequences if the agreed-upon service levels are not met. Therefore, SLA is the correct answer as it accurately describes the document that lists the expectations among parties regarding service quality, priorities, and responsibilities.

    Rate this question:

  • 4. 

    Which of the following are the overabundance cost of IaaS providers? (Choose Three)

    • A.

      Rental

    • B.

      Metering

    • C.

      Accessing

    • D.

      Licensing

    • E.

      Configuring

    • F.

      Processing

    Correct Answer(s)
    A. Rental
    B. Metering
    D. Licensing
    Explanation
    The overabundance costs of IaaS providers include rental, metering, and licensing. Rental refers to the cost of renting infrastructure from the provider. Metering involves the cost of measuring and monitoring resource usage. Licensing refers to the fees associated with using licensed software or applications provided by the IaaS provider. These three costs contribute to the overall expenses incurred when using IaaS services.

    Rate this question:

  • 5. 

    PKI - to sign and encrypt content imported and exported between servers PKI stands for

    Correct Answer(s)
    Public Key Infrastructure
    Explanation
    PKI is a system that is used to sign and encrypt content between servers. It provides a secure way to exchange information by using public and private key pairs. The public key is used to encrypt the content, while the private key is used to decrypt it. This ensures that only the intended recipient can access the encrypted data. Additionally, PKI also provides a way to verify the authenticity of the sender through digital signatures. Therefore, PKI is the correct answer for the given question.

    Rate this question:

  • 6. 

    DRM- to control how exported content might be viewed, edited and redistributed DRM stands for

    Correct Answer(s)
    Digital Rights Management
    Explanation
    DRM, which stands for Digital Rights Management, is a technology used to control how exported content might be viewed, edited, and redistributed. It is commonly used to protect copyrighted material and ensure that the content is only accessed by authorized users. DRM systems typically employ encryption and access controls to prevent unauthorized copying or sharing of digital files. By implementing DRM, content creators and distributors can have greater control over their intellectual property and protect their rights.

    Rate this question:

  • 7. 

    SSL- encrypted communications between the desktop client and the server SSL stands for

    Correct Answer(s)
    Secure Sockets Layer
    Explanation
    SSL stands for Secure Sockets Layer, which is a protocol used for encrypting communications between a desktop client and a server. This encryption ensures that the data transmitted between the client and the server remains secure and cannot be intercepted or tampered with by unauthorized individuals. By using SSL, sensitive information such as login credentials, credit card numbers, and personal data can be transmitted safely over the internet, providing a secure connection for online transactions and communication.

    Rate this question:

  • 8. 

    Port number for HTTPS

    • A.

      Port 389

    • B.

      Port 443

    • C.

      Port 1433

    • D.

      Port 8282

    Correct Answer
    B. Port 443
    Explanation
    Port 443 is the correct answer because it is the standard port number for HTTPS (Hypertext Transfer Protocol Secure). HTTPS is a secure version of HTTP that encrypts data transmitted between a web browser and a website, ensuring the privacy and integrity of the information. Port 443 is commonly used for secure communication, such as online banking, e-commerce, and secure file transfers. By using this port, the data is encrypted and protected from unauthorized access or tampering.

    Rate this question:

  • 9. 

    Port Number for SQL Database

    • A.

      Port 389

    • B.

      Port 443

    • C.

      Port 1433

    • D.

      Port 8282

    Correct Answer
    C. Port 1433
    Explanation
    Port 1433 is the correct answer because it is the default port number for Microsoft SQL Server. When connecting to a SQL Server database, the client application typically uses port 1433 to establish a connection with the server. This port allows the client to send and receive data from the SQL Server instance. Other ports mentioned, such as 389, 443, and 8282, are not commonly associated with SQL databases and are used for other protocols or services.

    Rate this question:

  • 10. 

    Port Number for vCO

    • A.

      Port 389

    • B.

      Port 443

    • C.

      Port 1433

    • D.

      Port 8282

    Correct Answer
    D. Port 8282
  • 11. 

    Triple-A elements are the security corner stone of IP based network management and policy administration. 

    • A.

      Access, Accounting and Automation

    • B.

      Awareness, Authentication and Alliance

    • C.

      Accounting, Administration and Availability

    • D.

      Authentication, Authorization and Accounting

    Correct Answer
    D. Authentication, Authorization and Accounting
    Explanation
    Authentication, Authorization, and Accounting (AAA) are the three essential elements of network security and policy administration. Authentication ensures that only authorized users can access the network. Authorization determines the level of access and permissions granted to authenticated users. Accounting tracks and logs the activities of users on the network for auditing and billing purposes. Together, these three elements form the foundation of secure and efficient IP-based network management and policy administration.

    Rate this question:

  • 12. 

    Which layer best define the following description? The modularity of this layered approach dramatically simplifies development, debugging, and maintenance. 

    • A.

      Automation

    • B.

      Management

    • C.

      Orchestration

    • D.

      Self-Service

    Correct Answer
    A. Automation
    Explanation
    The description suggests that the layer being referred to simplifies development, debugging, and maintenance. Automation is the layer that is primarily responsible for automating tasks and processes, which can greatly simplify these activities. Therefore, the layer that best defines the given description is Automation.

    Rate this question:

  • 13. 

    Which layer best define the following description? This layer provides the ability to delegate certain aspects of the administration

    • A.

      Automation

    • B.

      Management

    • C.

      Orchestration

    • D.

      Self-Service

    Correct Answer
    D. Self-Service
    Explanation
    The layer that best defines the ability to delegate certain aspects of the administration is the Self-Service layer. This layer allows users to access and manage resources without the need for direct involvement from administrators. It enables users to perform tasks such as provisioning, monitoring, and configuring resources on their own, providing them with a level of control and autonomy in managing their own resources.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 09, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 24, 2013
    Quiz Created by
    Iteict.cloud
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.