• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/68

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

68 Cards in this Set

  • Front
  • Back

a way to build applications and have them hosted by the cloud provider.

PaaS

using the cloud provider ’s machines to run your software and applications

IaaS

A piece of software you want to use, located in the cloud provider

SaaS

One of the operational benefits is

automation

In cloud computing, one of the operational benefits is

reduced cost

In cloud computing, one of the economic benefits

less staff

One of the economic benefits, according to cloud computing:

pay as you go

One of the economic benefits you learned

Time to market

one of the great benefits of using cloud services is the ability to shorten the time it takes to get a new system is called

time to value

Most SaaS providers offer a 30-day trial of their service is called

trail period

Rather than laying out an enormous amount of money, you can get started relatively inexpensively is called

Low entry costs

Using an SaaS provider eliminates the need for buying hardware and software is called

reduced captial expense,

Rather than buy new hardware to deal with your sudden capacity needs, an SaaS provider can instantly expand is called

meet short-term needs

one of the staffing benefits is found in cloud computing is

no more 1,000-page planning and implementation guides

one of the staffing benefits is what?

Shorter deployment time

clients run the range from laptops to PDAs and smartphones, like an iPhone

Mobile

are client computers that have no hard drives

Thin

Using thin clients creates a better chance for centralized data storage. As such, there’s less chance for

Data Leakage

If your connection with the cloud is ________________, then that means you are sending and receiving data at the same rate.

Symmetric

If your connection is _________, then data is sent from your organization at a slower rate than you’re receiving it

Asymmetric

ADSL is considered as a symmetric or asymmetric

Asymmetric

In your LAN, _______________ used to mean that another server or two were added to the datacenter in case there was a problem

Redundancy

An OpenID is in the form of a uniform resource locator (URL) and does not rely on a central authority to __________________________.

Authenticat a user's identity

________________ means that a third-party provider rents space on their storage to end users who lack the budget or capital budget to pay for it on their own

Storage as a Service

are the foundational component of virtual infrastructure and enable computer system partitioning is called

Hypervisors

Which is typiccally not included in problem management?


A. Installing new software


B. Giving Instructions on how to use a supported product


C. Answering inquiries regarding the status of a current call


D. Recovering Lost data

C. Answering inquiries regarding the status of a current call

"Good morning, thank you for calling ABC Company. This is Alisha, How may I help you? If your receptionist answers every call this way, she is using a:


A. Script


B. Automated Response


C. Automated recording


D. Customer Survey

A. Script

Which is an example of fogging?


A. Acknowledging criticism without agreeing or disagreeing


B. Imagining yourself in a bitter one-on-one battle with you customer


C. Replacing an image of an angry customer with someone you know


D. Mentalling telling yourself that you know how to successfully handle this situation.

A. Acknowledging criticism without agreeing or disagreeing

An Analyst's calling a customer to say that he is going to be late arriving at the customer's site is an example of _____.


A. Follow-through


B. Surveying


C. Active Listening

A. Follow-through

A customer's name, phone, address, and other identifing information is referred to as:


A. Customer data


B. Customer incident


C. Status Report


D. Status Incident

A. Customer data

To win over a difficult customer, what should an analyst do?


A. Listen to the customer passively


B. Answer the call as quickly as possible, even if the analyst is not ready


C. Restated the situation and gain the customer agreement


D. Let the customer control the call

C. Restated the situation and gain the customer agreement

Which is true about using calming techniques to handle difficult customer situations?


A. Difficult situations arise outside of work too, practice calming techniques whenever the opportunity arises


C. Role-Plat a difficult situation with another analyst


D. All of the above

D. All of the above

a method of partitioning a physical server computer into multiple servers so that each has the appearance and capabilities of running on its own dedicated machine is called

Server Virtualization

a method that describes software technologies that separate them from the underlying operating system on which they are executed is called

Application Virtualization

can help companies maximize the value of IT investments, decreasing the server hardware footprint, energy consumption, and cost and complexity of managing IT systems by using

Virtualization

Which applications are not well suited for today’s virtual environment?

Graphic Intensive

There are two (major) components of a virtualized environment are

Clients and Servers

____________ refers to the prevention of intentional or unintentional unauthorized disclosure of information

Confidentiality

Modifications are not made to data by unauthorized personnel or processes is a concept of

Integrity

________


ensures the reliable and timely access to cloud data or cloud computing /resources by the appropriate personnel

Availiability

the testing or reconciliation of evidence of a user’s identity is called

Authentication

refers to rights and privileges granted to an individual or process that enable account access to resources is called _____

Authorization

the ability to determine the actions and behaviors of a single individual within a cloud system and to identify that particular individual is called

Accountability

the application of multiple layers of protection wherein a subsequent layer will provide protection if a previous layer is breached is called

Defense in Depth

If a cloud system fails it should fail to a state in which the security of the system and its data are not compromised is called_____________

Fail Safe

the process of determining customer software expectations and needs, and it is conducted before the software design phase is called

Software Requirements Engineering

a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources is called

DRP

A ____________ addresses the means for a business to recover from disruptions and continue support for critical business functions

Business Continuity Plan

A_____________is a process used to help business units understand the impact of a disruptive event

BIA

One of BIA important steps:-

Gathering the needed assesment materials

One of BIA steps is

Documenting the resuts and presenting recommendations

BIA steps include:

Analyzing the information compiled

virtual environments are considered “full virtualization” environments and have VMs running on a hypervisor that interacts with the hardware is type

One

virtual environments are also considered “full virtualization” but work with a host OS instead of a hypervisor is type

Two

An environments offer performance gains by eliminating some of the emulation that occurs in full virtualization environments is called

Para-Virtualized

an threat that allow a shared clipboard technology allows data to be transferred between VMs and the host is called

Shared Clipboard Attack

capturing keystrokes and screen updates to be passed across virtual terminals in the virtual machine os called

Keystroke Logging Attack

a covert communications channel between the guest and host could allow intruders to perform potentially dangerous operations is called

Virtual Machine Backdoors

can hide from normal malware detection systems by initiating a “rogue” hypervisor and creating a cover channel to dump unauthorized code into the system is called

Rogue Root Kits

A self-protected virtual machine may allow direct modification of its hypervisor by an external intruder is called

External Modification of the hypervisor

an improperly configured VM could allow code to completely bypass the virtual environment, and obtain full root or kernel access to the physical host is called

VM Escape

Requiring the system administrator to access virtualized system remotely for management task is called

Securing VM Remote Access

Software as a service

offered by a third party provider, available on demand, usually via the Internet configurable remotely

Platform as a service

allows customers to develop new applications using APIs deployed and configurable remotely

Infrastructure as service

provides virtual machines and other abstracted hardware and operating systems

The most common applications in cloud computing:

storage and database

Database as a Service

paradigm where end users can request database services, consume it for the lifetime of the project, and then have then automatically de-provisioned and returned to the resource pool

One of the first companies to offer cloud services to the public

Amazon