Week 1
Week 1
Week 1 & 2
Week 2
Week 2
100

The _____ specifies the oldest that data can be to be acceptable to restore for business use.

RPO

100

The ________ cloud deployment model places all security responsibilities on the company that owns it.

Private

100

cloud service model that best supports a software development team with members in the United States and Japan.

PaaS

100

Which cloud networking server functions as a security gateway?

Firewall

100

Which protocol is used with a web browser to securely access cloud storage?

HTTPS

200

Microsoft Office 365 is an example of the _____ cloud service model.

SAAS

200

Thanks to the concept of pooled resources, cloud resources are said to be _____.

Elastic

200

Which of cloud deployment models offers the best scalability and cost effectiveness?

Public

200

To save space on a cloud storage volume, __________ is used to remove multiple copies of the same file.

Deduplication

200

Which access method should a network administrator use to access a cloudbased Linux server?

RDP

300

_____ is responsible for security within the cloud.

Client

300

An SLA that specifies five nines is referring to ______.

High availability

300

The company CIO asks you to ensure that the new cloud solution provides fault tolerance. Which aspect of cloud design does this refer to?

Redundancy.

300

Windows 10 natively uses the ________ storage type.

file

300

Which solution should you use to handle spikes in the need for compute resources?

Load balancing.

400

________ is responsible for the security of the cloud.

CSP.

400

One month, a cloud client uses twice as many resources as they normally do. The next month, they use their normal amount. They pay for only what they used. This is called___________.

Pay as you go

400

A user wanting to log in and remotely manage a virtual instance of Windows Server 2019 would use the ________ access type.

VPN

400

__________ use a point of presence to locate servers nearer to potential users.

CDNs

400

Which technology is used to create a secure point-to-point tunneled connection over the Internet?

VPN

500

Cloud clients can get more compute power without CSP intervention based on the _______ characteristic.

Self-service

500

The two recovery objectives that should be in a disaster recovery plan are _____ and _____.

RPO and RTO

500

A DNS server is responsible for what?

Translating domain names into IP addresses.

500

_________ storage is the best type for large data backups.

Block

500

Which cloud technology makes use of an edge server?

CDN

M
e
n
u