What does the integrity of information mean?
A. It means that the access to the information is limited.
B. It means that the information can be accessed by those users who are allowed to access it.
C. It means that the information is accurate.
D. It means that the information is protected.
Providing a user access to an application in the Cloud requires several steps. In which step are the user's permissions determined?
A. during the auditing phase
B. during the authentication phase
C. during the authorization phase
D. during the verification phase
What is a main benefit of a Thin Client?
A. Access to suspicious web sites can be locked.
B. Access to web applications can easily be restricted.
C. Users can login from any location they want.
D. Users cannot install unauthorized or risky software.
What does CaaS represent?
A. combining applications in a single access system
B. communication applications provided by an offsite location service provider
C. computer maintenance services provided by an external service provider
D. computing services provided by an offsite location service provider
What is a specific advantage of a Community Cloud?
A. It is tailored to the needs of a single community.
B. It is more secure than a Private Cloud.
C. It is cheaper than a Public Cloud.
D. It can form a Hybrid Cloud with a Private Cloud.
Which security issue is important to your organization as you evaluate Cloud service providers?
A. How the service provider implements and maintains security
B. The compatibility of the virus scanners used by the vendor and in your organization
C. The protection provided by your organization's firewall
D. The security protocols used by other customers of the services
What is currently the most common network topology?
A. Hybrid
B. Point-to-point
C. Ring
D. Star
Why are multiple sites often used in Cloud computing environments?
A. They make network configuration easier.
B. They can help in disaster prevention and recovery.
C. They make it easier to virtualize IT resources.
D. They are less vulnerable to security attacks.
Which communication protocol group is generally accepted on the Internet?
A. NetBIOS
B. OSI
C. SNA
D. TCP/IP
What is the international standard for IT Service Management processes?
A. ISO 9001
B. ISO 14001
C. ISO/IEC 20000
D. ISO/IEC 27001