Page 182 - Cloud Essentials
P. 182
A. Proprietary data formats
B. Lack of security
C. Vendor lock-in
D. User authentication
A and C. If cloud data is stored in a proprietary format and you
decide to have that data hosted in-house or you decide to switch cloud
providers, your data will be inaccessible. Vendor lock-in occurs when
cloud customers are stuck with using a specific cloud provider’s
management tools.
B and D are incorrect. There is no further security risk with cloud
solutions than there otherwise would be. User authentication is not a
risk; it is required for users to be authorized to various cloud services.
34. Which item usually presents a single point of failure in regard to cloud
computing?
A. Network connection
B. Hard disk
C. Cloud backup
D. Virtual server
A. Because cloud services are accessible over a network, it is
important to have redundant network links.
B, C, and D are incorrect. Cloud providers always ensure that hard
disks used for cloud storage and backup, as well as virtual server files,
are on-disk arrays that are mirrored. In addition, all of this data might
be replicated to another data center run by the cloud provider.
35. Which of the following statements regarding a change in IT roles as a
result of cloud adoption is accurate?
A. In-house IT personnel are no longer required.
B. There will be an emphasis on managing operating expenses
instead of capital expenses.
C. There is no longer a need to back up business data.
D. Private clouds could require IT personnel to provision services.
D. Provisioning services, and not servers, will be a skill that IT
staff members must possess.
182