A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: __________________.
Select the correct answer.
Answer : A
A ___________________ is a mechanism used to temporarily persist certain types of data as an alternative to caching the data in memory.
Select the correct answer.
Answer : B
Which of the following cloud computing mechanisms can exist as a service agent that monitors and keeps track of communication between cloud service consumers and cloud services for load balancing purposes?
Select the correct answer.
Answer : D
The ____________________ is a service agent that can measure the usage of a cloud-based IT resource by a cloud consumer for billing purposes.
Select the correct answer.
Answer : B
Which of the following are primary areas of testing a cloud service in relation to information published in its service level agreement?
Select the correct answer.
Answer : D
We exported data from our on-premise relational database to a cloud-based non-relational database. After the export, we noticed that the size of the cloud-based database was significantly larger than our on-premise database. What is the likely reason that the database size increased?
Select the correct answer.
Answer : B
A ____________________ is a pre-defined cloud-based platform comprised of a set of already installed IT resources that can be used and customized by a cloud consumer.
Select the correct answer.
Answer : C