The ____________________ boundary represents the physical perimeter that surrounds a set of IT resources owned by a specific organization. The ___________________ boundary establishes a logical perimeter wherein IT resources are trusted from a security perspective. To use cloud-based IT resources, the cloud consumer will generally need to trust them with the result that the cloud consumer's ___________________ boundary is expanded beyond its ___________________ boundary to encompass the cloud-based IT resources. Select the correct answer.
Over the past two years a cloud service consumers have made 123,456 attempts to invoke a cloud service. Of those attempts, 122,987 resulted in the successful execution of the cloud service. Based on these statistics, the reliability rating of the cloud service is __________________ (rounded to one decimal).Select the correct answer.
Which of the following combinations of cloud delivery models are possible? Select the correct answer.
A private cloud is owned by __________________.Select the correct answer.
The Multi-Regional Compliance and Legal Issues challenge of cloud computing can occur when an organization's data is hosted in a geographically different location than the organization itself. In this case, there may be important government regulations that do not apply in one of the regions, or they apply differently in the different regions. Select the correct answer.
A(n) ___________________ cloud is a cloud environment owned by a third-party cloud provider that provisions a public cloud with limited access to only a specific set of cloud consumers. Select the correct answer.
A typical service level agreement (SLA) document for a cloud service will cover which of the following characteristics? Select the correct answer.
An IT resource with increased __________________ is available for longer periods of time. Cloud providers generally offer resilient IT resources for which they are able to guarantee high levels of _________________.Select the correct answer.
When an IT resource is replaced by another IT resource with a higher capacity, what kind of scaling is being performed? Select the correct answer.