Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
68 Cards in this Set
- Front
- Back
a way to build applications and have them hosted by the cloud provider. |
PaaS |
|
using the cloud provider ’s machines to run your software and applications |
IaaS |
|
A piece of software you want to use, located in the cloud provider |
SaaS |
|
One of the operational benefits is |
automation |
|
In cloud computing, one of the operational benefits is |
reduced cost |
|
In cloud computing, one of the economic benefits |
less staff |
|
One of the economic benefits, according to cloud computing: |
pay as you go |
|
One of the economic benefits you learned |
Time to market |
|
one of the great benefits of using cloud services is the ability to shorten the time it takes to get a new system is called |
time to value |
|
Most SaaS providers offer a 30-day trial of their service is called |
trail period |
|
Rather than laying out an enormous amount of money, you can get started relatively inexpensively is called |
Low entry costs |
|
Using an SaaS provider eliminates the need for buying hardware and software is called |
reduced captial expense, |
|
Rather than buy new hardware to deal with your sudden capacity needs, an SaaS provider can instantly expand is called |
meet short-term needs |
|
one of the staffing benefits is found in cloud computing is |
no more 1,000-page planning and implementation guides |
|
one of the staffing benefits is what? |
Shorter deployment time |
|
clients run the range from laptops to PDAs and smartphones, like an iPhone |
Mobile |
|
are client computers that have no hard drives |
Thin |
|
Using thin clients creates a better chance for centralized data storage. As such, there’s less chance for |
Data Leakage |
|
If your connection with the cloud is ________________, then that means you are sending and receiving data at the same rate. |
Symmetric |
|
If your connection is _________, then data is sent from your organization at a slower rate than you’re receiving it |
Asymmetric |
|
ADSL is considered as a symmetric or asymmetric |
Asymmetric |
|
In your LAN, _______________ used to mean that another server or two were added to the datacenter in case there was a problem |
Redundancy |
|
An OpenID is in the form of a uniform resource locator (URL) and does not rely on a central authority to __________________________. |
Authenticat a user's identity |
|
________________ means that a third-party provider rents space on their storage to end users who lack the budget or capital budget to pay for it on their own |
Storage as a Service |
|
are the foundational component of virtual infrastructure and enable computer system partitioning is called |
Hypervisors |
|
Which is typiccally not included in problem management? A. Installing new software B. Giving Instructions on how to use a supported product C. Answering inquiries regarding the status of a current call D. Recovering Lost data |
C. Answering inquiries regarding the status of a current call |
|
"Good morning, thank you for calling ABC Company. This is Alisha, How may I help you? If your receptionist answers every call this way, she is using a: A. Script B. Automated Response C. Automated recording D. Customer Survey |
A. Script |
|
Which is an example of fogging? A. Acknowledging criticism without agreeing or disagreeing B. Imagining yourself in a bitter one-on-one battle with you customer C. Replacing an image of an angry customer with someone you know D. Mentalling telling yourself that you know how to successfully handle this situation. |
A. Acknowledging criticism without agreeing or disagreeing |
|
An Analyst's calling a customer to say that he is going to be late arriving at the customer's site is an example of _____. A. Follow-through B. Surveying C. Active Listening |
A. Follow-through |
|
A customer's name, phone, address, and other identifing information is referred to as: A. Customer data B. Customer incident C. Status Report D. Status Incident |
A. Customer data |
|
To win over a difficult customer, what should an analyst do? A. Listen to the customer passively B. Answer the call as quickly as possible, even if the analyst is not ready C. Restated the situation and gain the customer agreement D. Let the customer control the call |
C. Restated the situation and gain the customer agreement |
|
Which is true about using calming techniques to handle difficult customer situations? A. Difficult situations arise outside of work too, practice calming techniques whenever the opportunity arises C. Role-Plat a difficult situation with another analyst D. All of the above |
D. All of the above |
|
a method of partitioning a physical server computer into multiple servers so that each has the appearance and capabilities of running on its own dedicated machine is called |
Server Virtualization |
|
a method that describes software technologies that separate them from the underlying operating system on which they are executed is called |
Application Virtualization |
|
can help companies maximize the value of IT investments, decreasing the server hardware footprint, energy consumption, and cost and complexity of managing IT systems by using |
Virtualization |
|
Which applications are not well suited for today’s virtual environment? |
Graphic Intensive |
|
There are two (major) components of a virtualized environment are |
Clients and Servers |
|
____________ refers to the prevention of intentional or unintentional unauthorized disclosure of information |
Confidentiality |
|
Modifications are not made to data by unauthorized personnel or processes is a concept of |
Integrity |
|
________ ensures the reliable and timely access to cloud data or cloud computing /resources by the appropriate personnel |
Availiability |
|
the testing or reconciliation of evidence of a user’s identity is called |
Authentication |
|
refers to rights and privileges granted to an individual or process that enable account access to resources is called _____ |
Authorization |
|
the ability to determine the actions and behaviors of a single individual within a cloud system and to identify that particular individual is called |
Accountability |
|
the application of multiple layers of protection wherein a subsequent layer will provide protection if a previous layer is breached is called |
Defense in Depth |
|
If a cloud system fails it should fail to a state in which the security of the system and its data are not compromised is called_____________ |
Fail Safe |
|
the process of determining customer software expectations and needs, and it is conducted before the software design phase is called |
Software Requirements Engineering |
|
a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources is called |
DRP |
|
A ____________ addresses the means for a business to recover from disruptions and continue support for critical business functions |
Business Continuity Plan |
|
A_____________is a process used to help business units understand the impact of a disruptive event |
BIA |
|
One of BIA important steps:- |
Gathering the needed assesment materials |
|
One of BIA steps is |
Documenting the resuts and presenting recommendations |
|
BIA steps include: |
Analyzing the information compiled |
|
virtual environments are considered “full virtualization” environments and have VMs running on a hypervisor that interacts with the hardware is type |
One |
|
virtual environments are also considered “full virtualization” but work with a host OS instead of a hypervisor is type |
Two |
|
An environments offer performance gains by eliminating some of the emulation that occurs in full virtualization environments is called |
Para-Virtualized |
|
an threat that allow a shared clipboard technology allows data to be transferred between VMs and the host is called |
Shared Clipboard Attack |
|
capturing keystrokes and screen updates to be passed across virtual terminals in the virtual machine os called |
Keystroke Logging Attack |
|
a covert communications channel between the guest and host could allow intruders to perform potentially dangerous operations is called |
Virtual Machine Backdoors |
|
can hide from normal malware detection systems by initiating a “rogue” hypervisor and creating a cover channel to dump unauthorized code into the system is called |
Rogue Root Kits |
|
A self-protected virtual machine may allow direct modification of its hypervisor by an external intruder is called |
External Modification of the hypervisor |
|
an improperly configured VM could allow code to completely bypass the virtual environment, and obtain full root or kernel access to the physical host is called |
VM Escape |
|
Requiring the system administrator to access virtualized system remotely for management task is called |
Securing VM Remote Access |
|
Software as a service |
offered by a third party provider, available on demand, usually via the Internet configurable remotely |
|
Platform as a service |
allows customers to develop new applications using APIs deployed and configurable remotely |
|
Infrastructure as service |
provides virtual machines and other abstracted hardware and operating systems |
|
The most common applications in cloud computing: |
storage and database |
|
Database as a Service |
paradigm where end users can request database services, consume it for the lifetime of the project, and then have then automatically de-provisioned and returned to the resource pool |
|
One of the first companies to offer cloud services to the public |
Amazon |