Cloud Infrastructure - Chapter 3 & 4

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Iteict.cloud
I
Iteict.cloud
Community Contributor
Quizzes Created: 1 | Total Attempts: 226
| Attempts: 226 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. What does IaaS stands for?

Explanation

IaaS stands for Infrastructure as a Service. This term refers to a cloud computing model where the infrastructure, including servers, storage, and networking components, is provided by a third-party provider. With IaaS, organizations can access and use these resources on-demand, without the need to invest in and manage their own physical infrastructure. This allows for flexibility, scalability, and cost-effectiveness in deploying and managing IT resources.

Submit
Please wait...
About This Quiz
Cloud Infrastructure - Chapter 3 & 4 - Quiz

Explore key aspects of Infrastructure as a Service (IaaS) in this focused quiz. Covering topics from service design to security with Public Key Infrastructure (PKI), and understanding service... see morelevel agreements (SLA), it's ideal for learners aiming to deepen their knowledge in cloud infrastructure management. see less

2. Triple-A elements are the security corner stone of IP based network management and policy administration. 

Explanation

Authentication, Authorization, and Accounting (AAA) are the three essential elements of network security and policy administration. Authentication ensures that only authorized users can access the network. Authorization determines the level of access and permissions granted to authenticated users. Accounting tracks and logs the activities of users on the network for auditing and billing purposes. Together, these three elements form the foundation of secure and efficient IP-based network management and policy administration.

Submit
3. PKI - to sign and encrypt content imported and exported between servers PKI stands for

Explanation

PKI is a system that is used to sign and encrypt content between servers. It provides a secure way to exchange information by using public and private key pairs. The public key is used to encrypt the content, while the private key is used to decrypt it. This ensures that only the intended recipient can access the encrypted data. Additionally, PKI also provides a way to verify the authenticity of the sender through digital signatures. Therefore, PKI is the correct answer for the given question.

Submit
4. Port number for HTTPS

Explanation

Port 443 is the correct answer because it is the standard port number for HTTPS (Hypertext Transfer Protocol Secure). HTTPS is a secure version of HTTP that encrypts data transmitted between a web browser and a website, ensuring the privacy and integrity of the information. Port 443 is commonly used for secure communication, such as online banking, e-commerce, and secure file transfers. By using this port, the data is encrypted and protected from unauthorized access or tampering.

Submit
5. Which of the following is a characteristics of IaaS?

Explanation

IaaS stands for Infrastructure as a Service. It is a cloud computing model where resources such as virtual machines, storage, and networking are provided to users over the internet. The characteristic of IaaS mentioned in the correct answer is that resources are distributed as a service. This means that users can access and use these resources on-demand, without having to worry about managing the underlying infrastructure. They can scale their resources up or down as needed and pay only for what they use. This model allows for flexibility and cost savings for businesses.

Submit
6. Which of the following is the document that list the expectations among two or more parties regarding service quality, priorities, and responsibilities

Explanation

An SLA (Service Level Agreement) is a document that outlines the expectations and agreements between two or more parties regarding service quality, priorities, and responsibilities. It defines the level of service that will be provided, including metrics such as response time, uptime, and resolution time. It also specifies the consequences if the agreed-upon service levels are not met. Therefore, SLA is the correct answer as it accurately describes the document that lists the expectations among parties regarding service quality, priorities, and responsibilities.

Submit
7. Port Number for vCO

Explanation

not-available-via-ai

Submit
8. DRM- to control how exported content might be viewed, edited and redistributed DRM stands for

Explanation

DRM, which stands for Digital Rights Management, is a technology used to control how exported content might be viewed, edited, and redistributed. It is commonly used to protect copyrighted material and ensure that the content is only accessed by authorized users. DRM systems typically employ encryption and access controls to prevent unauthorized copying or sharing of digital files. By implementing DRM, content creators and distributors can have greater control over their intellectual property and protect their rights.

Submit
9. Port Number for SQL Database

Explanation

Port 1433 is the correct answer because it is the default port number for Microsoft SQL Server. When connecting to a SQL Server database, the client application typically uses port 1433 to establish a connection with the server. This port allows the client to send and receive data from the SQL Server instance. Other ports mentioned, such as 389, 443, and 8282, are not commonly associated with SQL databases and are used for other protocols or services.

Submit
10. SSL- encrypted communications between the desktop client and the server SSL stands for

Explanation

SSL stands for Secure Sockets Layer, which is a protocol used for encrypting communications between a desktop client and a server. This encryption ensures that the data transmitted between the client and the server remains secure and cannot be intercepted or tampered with by unauthorized individuals. By using SSL, sensitive information such as login credentials, credit card numbers, and personal data can be transmitted safely over the internet, providing a secure connection for online transactions and communication.

Submit
11. Which of the following are the overabundance cost of IaaS providers? (Choose Three)

Explanation

The overabundance costs of IaaS providers include rental, metering, and licensing. Rental refers to the cost of renting infrastructure from the provider. Metering involves the cost of measuring and monitoring resource usage. Licensing refers to the fees associated with using licensed software or applications provided by the IaaS provider. These three costs contribute to the overall expenses incurred when using IaaS services.

Submit
12. Which layer best define the following description? The modularity of this layered approach dramatically simplifies development, debugging, and maintenance. 

Explanation

The description suggests that the layer being referred to simplifies development, debugging, and maintenance. Automation is the layer that is primarily responsible for automating tasks and processes, which can greatly simplify these activities. Therefore, the layer that best defines the given description is Automation.

Submit
13. Which layer best define the following description? This layer provides the ability to delegate certain aspects of the administration

Explanation

The layer that best defines the ability to delegate certain aspects of the administration is the Self-Service layer. This layer allows users to access and manage resources without the need for direct involvement from administrators. It enables users to perform tasks such as provisioning, monitoring, and configuring resources on their own, providing them with a level of control and autonomy in managing their own resources.

Submit
14. Steps to design and implementation service catalogue
Submit
15. Steps to configure vCenter Orchestrator
Submit
View My Results

Quiz Review Timeline (Updated): Mar 9, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 09, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 24, 2013
    Quiz Created by
    Iteict.cloud
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What does IaaS stands for?
Triple-A elements are the security corner stone of IP based...
PKI - to sign and encrypt content imported and exported between...
Port number for HTTPS
Which of the following is a characteristics of IaaS?
Which of the following is the document that list the expectations...
Port Number for vCO
DRM- to control how exported content might be viewed, edited and...
Port Number for SQL Database
SSL- encrypted communications between the desktop client and the...
Which of the following are the overabundance cost of IaaS providers?...
Which layer best define the following description? ...
Which layer best define the following description? ...
Steps to design and implementation service catalogue
Steps to configure vCenter Orchestrator
Alert!

Advertisement