1. Which of the following allows a distributed ID system to write and enforce custom policy expressions?
a) XACML
b) XML
c) SOAP
d) None of the mentioned
Explanation: This is a general-purpose authorization policy language.
2. Which of the following is a man-in-the-middle type of service?
a) CaaS
b) IaaS
c) AaaS
d) All of the mentioned
Explanation: A CaaS would need to be able to manage cloud relationships, understand security policies and procedures.
3. Point out the correct statement.
a) Cloud computing by its very nature spans same jurisdictions
b) SaaS is much more than simply providing an anonymous service token to an identity
c) A Compliance as a Service application would need to serve as a trusted third party
d) All of the mentioned
Explanation: CaaS may need to be architected as its own layer of an SOA architecture in order to be trusted.
4. Which of the following can be used for the banking industry?
a) athenahealth
b) bankserve
c) bankingsol
d) all of the mentioned
Explanation: Athenahealth is used for the medical industry.
5. ________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
a) Software
b) Platform
c) Analytics
d) Compliance
Explanation: Most of the cloud computing compliance systems to date have been built using private clouds.
6. Which of the following is a PCI CaaS service?
a) FedCloud
b) ClearSoln
c) Rackserve PCI
d) All of the mentioned
Explanation: FedCloud is used for government.
7. _________ is used for merchant transactions under the Payment Card Industry Data Security Standard.
a) ClearPoint PCI
b) ClearSoln
c) Rackserve PCI
d) All of the mentioned
Explanation: Organizations can manage PCI compliance risk more effectively with the help of ClearPoint PCI.
8. ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.
a) Software
b) Platform
c) Analytics
d) Compliance
Explanation: Service types are models upon which distributed applications are created and hosted.
9. Point out the wrong statement.
a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
b) Virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be assigned on demand to users
d) All of the mentioned
Explanation: Several important cloud computing approaches use a strictly hardware-based approach to abstraction.
10. Which of the following type of virtualization is also characteristic of cloud computing?
a) Storage
b) Application
c) CPU
d) All of the mentioned
Explanation: To enable these characteristics, resources must be highly configurable and flexible.