Which of the following cloud computing mechanisms are directly associated with the realization of the ubiquitous access cloud characteristic? Select the correct answer.
A cloud provider grants cloud consumers administrative access to a virtual server. One of the cloud consumers deploys a cloud service consumer that abuses its administrative access to exploit the underlying physical server. This kind of attack is known as: __________________ . Select the correct answer.
Two redundantly deployed cloud services need to be configured so that they are kept in sync with each other. Which of the following roles would be most suitable for this task? Select the correct answer.
F1. Encryption is a security mechanism used to realize __________________. Select the correct answer.
Cloud computing is a specialized form of ___________________ computing based on ___________________ access to IT resources. Select the correct answer.
REST services share a uniform contract and therefore cannot be deployed in cloud environments without a multi-device broker mechanism. Select the correct answer.
Information that is encrypted is referred to as ___________________. Select the correct answer.
A cloud service can be hosted by a physical server or a virtual server. When using the failover system mechanism, the same cloud service cannot be hosted by more than one physical server. Select the correct answer.
Cloud service consumers typically use HTTP methods to communicate with cloud-based REST services. Select the correct answer.
With cloud-based security groups, a __________________ separation of network segments is performed. Each IT resource then becomes a member of __________________ security group(s). Select the correct answer.
Because non-relational cloud storage avoids the processing overhead that can be imposed by relational databases, it can be more scalable. Select the correct answer.
Performance testing on Software-as-a-Service (SaaS) implementations is almost always carried out with a white box testing approach that does not involve the use of automated testing software. Select the correct answer.