Arcitura Education C90.03 Cloud Technology Lab Exam Practice Test

Page: 1 / 14
Total 21 questions
Question 1

A cloud consumer is interested in leasing cloud-based virtual servers. It compares the virtual servers offered by Cloud Provider X and Cloud Provider Y. Cloud X (owned by Cloud Provider X) and Cloud Y (owned by Cloud Provider Y) both provide shared physical servers that host multiple virtual servers for other cloud consumers. The virtual servers on Cloud X are accessed directly, whereas the virtual servers on Cloud Y are accessed via an automated scaling listener. On Cloud X, virtual servers are pre-configured to support a specific amount of concurrent cloud service consumers. When this threshold is exceeded, cloud service consumer requests are rejected. Due to the use of the automated scaling listener, virtual servers on Cloud Y can provide a greater level of elasticity.

The hourly cost to the cloud consumer to use a virtual server on Cloud X is half that of the cost to use a virtual server on Cloud Y. Within a one month period, Cloud Provider X bases its hourly charge on the maximum number of virtual servers used. Within a one month period, Cloud Provider Y bases its hourly charges on actual virtual server usage. Cloud Provider Y charges $20 for each hour that a cloud consumer uses a virtual server. The cloud consumer predicts its monthly usage requirements to be as follows:

Number Of Virtual Servers

Usage

3

20 Hours

4

30 Hours

5

50 Hours

The cloud consumer is required to choose the cloud provider with the lowest on-going cost, based on its predicted usage. Which of the following statements accurately calculates the on-going usage costs of Cloud Providers X and Y and correctly states the cloud provider that the cloud consumer must choose?



Answer : D


Question 2

Cloud Service Consumer A accesses Cloud Service A (1) that resides in Cloud X. a private cloud owned by the same organization acting as Cloud Consumer A . Cloud Service A processes the message from Cloud Service Consumer A and then sends back a response with the requested data (2). Next, Cloud Service Consumer A sends a message containing some of this data to Cloud Service B (3), which resides in public Cloud Y that is owned by Cloud Provider Y. After processing the message, Cloud Service B sends back a response with additional data to Cloud Service Consumer A (4). Finally, Cloud Service Consumer A writes the data it collected from Cloud Services A and B to Database A (5).

Recently, Cloud Service Consumer A has been required to access Cloud Services A and B at a significantly higher rate, sometimes over 1,000 times within a given workday. This increased usage has not affected Cloud Service B's performance. Cloud Service A, however, has been generating runtime exceptions and responses to Cloud Service Consumer A have become increasingly slow and unreliable. It is determined that this decline in performance is due to infrastructure limitations within private Cloud X's environment. Instead of investing in new infrastructure for Cloud X, it is decided to explore the feasibility of moving Cloud Service A to Cloud Y instead. Which of the following statements describe valid financial considerations that can be taken into account for assessing the feasibility of this move?



Answer : B, D


Question 3

Cloud Provider X has deployed a virtualization environment in Cloud X comprised of Physical Server A hosting Virtual Servers A and B. Cloud Provider X implements Cloud Service A on Virtual Server A and makes it available to Cloud Service Consumer A, which interacts with Cloud Service A by sending and receiving messages (1, 2). Cloud Provider Y has deployed a virtualization environment comprised of Physical Server B hosting Virtual Servers C and D. Virtual Server C is made available to Cloud Service Consumer B, which interacts with Virtual Server C (3,4) in order to prepare for the deployment of a new cloud service that will be used internally by Cloud Provider Y to process data obtained from Cloud Service A .

Cloud X is administered by a group of organizations and makes Cloud Service A available only to cloud service consumers from that group. Cloud Consumer Z belongs to one of the organizations within this group. Cloud Y and Cloud Consumer Z are owned by the same organization. Which of the following statements provides a valid scenario that accurately describes the involvement of cloud deployment models, cloud delivery models, roles and/or boundaries? (Note that the correct answer represents one of multiple valid scenarios that can exist.)



Answer : C


Question 4

Cloud X (owned by Cloud Provider X) provides Physical Server A which hosts Virtual Servers A and B. Virtual Server B hosts Ready-Made Environments A and B . Cloud Service Consumer A uses Virtual Server A as part of an IaaS leasing agreement in which Cloud Consumer A is charged a fixed monthly fee for unlimited access. Cloud Service Consumers B and C use Ready-Made Environments A and B respectively as part of a PaaS leasing agreement based on per-minute usage fees. In both cases, access is monitored via Pay-For-Use Monitor A, which keeps track of log-in and log-out times in order to calculate the usage charges that are billed to Cloud Consumers B and C .

Physical Server A begins to become unstable. Over the course of a 24 hour period, the server shuts down three times, taking down Virtual Servers A and B with it. This causes numerous problems for Cloud Service Consumers A, B and C, which lose connections and encounter a variety of exceptions. A subsequent investigation of the log files generated by Pay-For-Use Monitor A reveals that the three server crashes coincided with the usage periods of Ready-Made Er n'ronment B b> Cloud Service Consumer B. De 'elopers at the Cloud Consumer 3 organization confirm they did not actually log in during those periods, which leads Cloud Provider X to discover that another cloud service consumer has been posing as Cloud Service Consumer B in order to maliciously access Ready-Made Environment B, Virtual Server B, and Physical Server B on Cloud X. The investigation concludes that the malicious cloud service consumer was able to carry out the attack successfully by obtaining a weak password being used by developers from Cloud Consumer B . Which of the following statements accurately identifies the type of security threat that corresponds to the described attack - and -provides a solution that can directly mitigate this type of security threat within Cloud X?



Answer : A


Question 5

Organization A has been expanding and, as a result, is outgrowing the processing capacity of its on-premise Service A implementation. It is determined that this is due to usage thresholds of Service A and complex data processing limitations in Database A . The diagram depicts Organization A's current on-premise environment, where Service Consumers A . B and C attempt to access Service A at the same time. Service Consumer A successfully accesses Service A, which then successfully retrieves the requested data (1). Service Consumer B successfully accesses Service A, but due to the complex data structure, the request for the data times out and fails (2). Finally, Service Consumer C attempts to access Service A, but is rejected because Service A is unable to accept more concurrent requests.

Organization A is required to continue using its on-premise Service A implementation, with the exception of Database A, which does not need to remain on-premise. Database A is dedicated to Service A and is comprised of relational data. Which of the following statements provides a solution that uses cloud-based IT resources to solve the performance limitations of Service A and Database A?



Answer : C


Question 6

Cloud Provider X (which owns Cloud X) deploys two physical servers (Physical Servers A and B) and two databases (Databases A and B). Virtual Servers A and B are hosted by Physical Server A and Ready-Made Environments A and B are hosted by Virtual Server B . Virtual Servers C and D are hosted by Physical Server B . Cloud Service Consumer A regularly accesses Virtual Server D in order to test and deploy a new cloud service that was developed on-premise by the cloud consumer organization operating Cloud Service Consumer A . Cloud Service Consumer B (operated by a different cloud consumer organization) has been regularly accessing Ready-Made Environment A in order to develop and deploy a different new cloud service.

Cloud X is a private cloud that, to-date, has been set up within the cloud provider company to provision IT resources free of charge to internal cloud consumers, via PaaS and IaaS delivery models. The cloud consumers that have been operating Cloud Service Consumers A and B represent different IT departments within the company that have been working separately on the development of new cloud services. Cloud Service Consumer A has been accessing Virtual Server D to make necessary configurations and administration settings for the upcoming deployment of a new cloud service that was previously developed outside of Cloud X. Cloud Service Consumer B has been accessing Ready-Made Environment A to develop and now deploy a different new cloud service. Cloud Provider X (which is represented by a separate IT department dedicated to governing and administering Cloud X) determines that it will need to introduce three specific enhancements to Cloud X in order to accommodate both upcoming cloud services. First, it needs to add a way to charge cloud consumers for the usage of cloud services. Secondly, it needs to add a way for new cloud services to be automatically scaled. Finally, it needs to add a way for a cloud consumer to be automatically notified when a cloud service encounters runtime loads that exceed its allocated usage threshold. Which of the following statements accurately describes a solution that fulfills all three identified requirements?



Answer : B


Question 7

Cloud Provider Y owns Cloud Y, which provides a set of cloud services, virtual servers, and one physical server. Cloud Services A and B are hosted on Virtual Server A, which is hosted by Physical Server A . Physical Server A also hosts Virtual Server B, which hosts redundant implementations of Cloud Services A and B for load balancing purposes. Cloud Service Consumer A is accessing Cloud Service A located on Virtual Server A . Cloud Service Consumer B is accessing Cloud Service B located on Virtual Server B . Cloud Service Consumers A and B are both owned by Cloud Consumer X. Cloud Consumer X has recently complained that Cloud Service A is becoming increasingly unreliable. Cloud Provider Y launches an investigation that reveals that Virtual Server A has been crashing sporadically due to successful malicious intermediary attacks where malicious service agents have been inserting harmful data into messages sent by Cloud Service Consumer A to Cloud Service A

Which of the following statements describes a solution that can mitigate the malicious intermediary attacks that have been occurring on Virtual Server A - and - can further help prevent the same types of attacks from occurring on Virtual Server B?



Answer : B


Page:    1 / 14   
Total 21 questions