What is OpenID used for?
A. to connect to multiple web-sites without using a password
B. to identify yourself in dealing on-line with government agencies
C. to pay on-line via your own bank account
D. to use one account to sign in to multiple web sites
What is a main benefit of a Thin Client?
A. Access to suspicious web sites can be locked.
B. Access to web applications can easily be restricted.
C. Users can login from any location they want.
D. Users cannot install unauthorized or risky software.
How could presence be used to enhance security in the Cloud?
A. by prohibiting users to access cloud applications, except when on their work place
B. by prohibiting users to access cloud applications at their work place
C. by restricting access to applications, depending on the user's physical location
D. by using a web cam to identify the user of a cloud application
What is the benefit of replication of data center sites?
A. data protection
B. disaster recovery
C. extended data storage
D. increased response rate
Which language can be used for running programs on the client side during web access?
A. HTML
B. Java
C. Javascript
D. XML
Which Service Model provides the best environment for testing new software?
A. Infrastructure as a Service (IaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. There is no difference
In the 2010 white paper Top Threats to Cloud Computing, what does the Cloud Security Alliance (CSA) identify as remediation for unknown risk profile and account?
A. Good Human Resource vetting procedures
B. Good SLA structures including Cloud provider compliance audits
C. Proper testing methods
D. Strong authentication and access control
What is an important environment related benefit of Cloud?
A. Greater data protection
B. Reduced dependency on the Internet
C. Reduced power requirements
D. Smaller bandwidth consumption
What is an important benefit of using a hybrid model for cloud services?
A. It allows the purchaser to save money in infrastructure and licenses.
B. It allows the separation of sensitive data from less sensitive data.
C. It provides better performance.
D. It provides the best client/server experience in a cloud environment.
Who is responsible for securing Cloud user data?
A. The cloud provider
B. The cloud user
C. Both the cloud provider and the cloud user
D. The Internet provider