D. There are not as many security options as SaaS within this model.
A. It offers many application-like features.
3. Service levels, governance, compliance and liability are stipulated and enforced in which of the following service models? A. software as a service B. platform as a service C. infrastructure as a service D. all of the above
A. software as a service
4. "Storage as a service" is a sub-offering under which of the following categories? A. software as a service B. platform as a service C. infrastructure as a service D. both A and C
C. infrastructure as a service
5. According to cloud taxonomy, which of the following is NOT a category of infrastructure services? A. storage B. compute C. services management D. integration
D. integration
6. Cloud Taxonomy was developed by: A. Sun Open Cloud B. OpenCrowd Cloud Solutions C. GoGrid D. Open Cloud Working Group
B. OpenCrowd Cloud Solutions
7. According to cloud taxonomy, all of the following are categories of platform services, EXCEPT: A. database B. development and testing C. social networks D. business intelligence
C. social networks
8. According to cloud taxonomy, all of the following are categories of software services, EXCEPT: A. CRM B. document management C. services management D. desktop productivity
C. services management
9. According to cloud taxonomy, all of the following are categories of cloud software, EXCEPT: A. content management B. file storage C. cloud management D. appliances
A. content management
B. how cloud services are deployed with where they are provided.
11. When talking about cloud computing, the concept of a well-demarcated perimeter is: A. a limited concept. B. an outdated concept. C. an important security concept. D. a useful privacy concept.
B. an outdated concept.
D. all of the above
13. Risk depends upon: A. who manages assets/resources B. the controls that are selected C. the types of assets/resources being managed D. all of the above
D. all of the above
14. A LAMP stack deployed on Amazon's AWS EC2 would be classified as all of the following, EXCEPT: A. self-managed B. public C. off-premise D. infrastructure as a service (IaaS)
A. self-managed
B. off-premise
16. Which of the following would be considered a trusted consumer of a cloud service? A. business partners B. employees C. contractors D. all of the above
D. all of the above
17. Consumers authorized to consume some/all services, but are not logical extensions of an organization are referred to as: A. affiliated consumers B. trusted consumers C. authorized consumers D. untrusted consumers
D. untrusted consumers
18. Hybrid deployment models provide services that are accessible and consumable by: A. authorized consumers B. authorized and unauthorized consumers C. trusted consumers D. trusted and untrusted consumers
D. trusted and untrusted consumers
19. Which of the following deployment models provide services that are accessible and consumable by trusted consumers only? A. hybrid deployment models B. private deployment models C. community deployment models D. both B and C
D. both B and C
20. Public deployment models provide services that are accessible and consumable by A. trusted consumers B. community consumers C. untrusted consumers D. authorized consumers
C. untrusted consumers
A. third party providers
C. either the organization OR a third party provider
C. either the organization OR a third party provider
D. both the organization AND the third party provider