What can the consumer manage and control when subscribing to cloud Software as a Service (SaaS)?
C
What would you describe is a key characteristic of cloud platform as a Service (PaaS)?
B
Which properties define a cloud environment?
D
Which services are typically offered by cloud service providers?
C
What is a key attribute of cloud services?
C
What is a key benefit to consumers of cloud services?
A
Which benefits might be realized by designing a separate infrastructure pool to host network
functions?
D
Ian organization wants to protect the cloud management platform (CMP) from loss due to a site
disaster. To support this requirement, the completed cloud design deliverables include the processes
and procedures for restoring CMP functionality.
What other item should be included in the deliverables to support this requirement?
A
What are key benefits of ITaaS compared to traditional IT processes?
A. Tiered services, integrated inventory management, and SLA-driven profit model
B. Service catalog, SLA-driven management, and chargeback
C. Strong policies, DevOps, and software licensing
D. Ticket-based service model, cost, and chargeback
B
* In the ITaas model, corporate IT offers a menu of SaaS, PaaS and IaaS options for business users via
a centralized service catalog. Business users are free to pick and choose cloud services that corporate
IT has vetted, or provide themselves. These users can make informed decisions based on service
pricing and SLAs, and can in many cases can provision services on their own.
* ITaas can be implemented through new consumption models leveraging self-service catalogs
offering both internal and external services; providing IT financial transparency for costs and pricing;
offering consumerized IT such as bring your own device (BYoD) to meet the needs of users. All of
which simplify and encourage consumption of services.
* A service-level agreement (SLA) is a part of a standardized service contract where a service is
formally defined. Particular aspects of the service scope, quality, responsibilities are agreed
between the service provider and the service user.
//leverhawk.com/is-itaas-really-a-new-concept-20130628321
A cloud design contains multiple hosts that are running a hypervisor. Each host has only two physical
10 Gb network adapters that are aggregated for bandwidth and failover. The physical switch ports for
each host are configured as access ports. Each host will support numerous virtual machines and
network segments. These virtual machines will communicate with other virtual machines on the
same network segments.
Why would overlay networks be required for this design?
A. Support for more than two virtual switches
B. Support for more than one virtual segment
C. Support for more than two virtual machines
D. Support for more than one distributed virtual switch
B
An overlay network is a computer network that is built on top of another network. Nodes in the
overlay network can be thought of as being connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying network.
Virtual overlay networks use tunneling protocols to extend isolated network segments between
servers for multi-tenant data center networks.
//searchsdn.techtarget.com/tip/Virtual-overlay-networks-Tunneling-protocols-enable-multi-
tenancy
An organization uses Microsoft Active Directory (AD) for service authentication in their private cloud.
They want to use the same authentication source for services in the public cloud. External employees
access services in both clouds and need to authenticate with AD.
The organization wants to minimize and secure network traffic. Which solution will address these
requirements?
A. Connect the two clouds through IPsec VPNPlace AD controllers in the private cloud only
B. Connect the two clouds through IPsec VPNPlace AD controllers in the private and public clouds
C. Configure perimeter firewalls to allow AD trafficPlace AD controllers in the private and public
clouds
D. External users connect with IPsec VPNPlace AD controllers in the private cloud only
B
//blogs.technet.microsoft.com/keithmayer/2013/01/20/step-by-step-extending-on-premise-
active-directory-to-the-cloud-with-windows-azure-31-days-of-servers-in-the-cloud-part-20-of-31/
Which authentication and authorization feature is critical for service providers when supporting
multi-tenancy?
A
An organization wants to have showback capability in their private cloud. Which cloud management
platform component should be included in the cloud design to support this requirement?
A. SSO
B. Service catalog
C. Metering application
D. Monitoring application
C
IT chargeback is an accounting strategy that applies the costs of IT hardware, software, cloud
services or shared services to the business unit in which they are used. IT showback is similar to IT
chargeback, but the prices are for informational purposes only and no one is billed.
//searchaws.techtarget.com/definition/IT-chargeback-showback
If the metering tool supports multi-tenancy and integrates with the cloud portal, what should be
considered?
A. Only permit local user access for security reasons
B. Metering tool should not integrate with tenant authentication
C. Metering server access should be allowed for all tenants
D. Role-based access for security reasons
D
The cost of collecting the metrics, and the balance between the value they provide and the impact
on application operation. If metering code cannot be incorporated into existing components or roles,
and you need to increase the number of instances of components or roles just to carry out metering,
you might increase costs beyond the savings or income available from metering.
//msdn.microsoft.com/en-us/library/dn589796.aspx
Case 1
Refer to the exhibit.
Your company recently negotiated several contracts with new customers to use its proprietary
eCommerce system. As a result, the customer base has grown rapidly, which has introduced several
challenges and requirements.
Business requirements:
Applications need to scale quickly
Metrics and reporting to anticipate business trends and efficient use of resources
External customers are looking to license the eCommerce application
Other considerations:
Applications need to be recorded for the public cloud
Address security vulnerabilities for customer data in the cloud
Refer to Case 1.
You are sizing the compute capacity of blade servers in a converged infrastructure solution with the
following specifications:
Number of cores: 16
Processor speed: 3.5 GHz
Utilization percentage: 75%
What is the total GHz processing capability of one blade server?
C