What is a chief concern of cloud computing

Assignment Help Programming Languages
Reference no: EM13842004

Question 1 You have purchased an Apple desktop computer and want to set it up so that you can access your computer desktop when you are on the road. How might you do this?

A. Install Remote Desktop for Apple on your desktop.

B. Install Apple+ VPN on your desktop.

C. Configure your desktop for Platform as a Service.

D. Install the GoToMyPC client on your desktop.

Question 2 What is a chief concern of cloud computing?

A. Cost

B. Security

C. Redundancy

D. Speed

Question 3 You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is an example of what type of wireless networking?

A. WLAN

B. WPAN

C. WMAN

D. WWIRE

Question 4 Your boss calls you from his home to use the VPN connection you configured for him on his laptop. He has traditionally depended on Remote Desktop to access the server. Your boss tells you that the VPN connection shows that it is connected but the server's desktop is not appearing on his screen. What do you tell him?

A. The firewall on his home router must be blocking the remote connection.

B. His ISP must not allow encrypted connections through their network.

C. He must be running Windows 8 which doesn't support VPN.

D. VPN doesn't bring up a remote desktop on the local computer.

Question 5 Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won't have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

A. Infrastructure as a Service

B. Network as a Service

C. Platform as a Service

D. Software as a Service

Question 6 You are configuring a wireless connection on your home router. Because you live in an apartment complex, the security level of the connection is paramount. Which wireless option below is the most secure?

A. SSID

B. WEP

C. WPA

D. WPA2

Question 7 In order for your laptop to make a wireless connection, it must first find an available __________ to connect to.

A. SSID

B. VPN

C. RSAT

D. WEP

Question 8 Your boss wants to utilize some sort of cloud storage for his files so that all of his computing devices can replicate these files. He installs the client on all of his devices. He asks you where the cloud folder is located within Windows Explorer. What do you tell him?

A. It is located in his local profile.

B. It is located in Program Files.

C. It is located in Program Files. (86)

D. It is located in the Windows System folder.

Question 9 Your boss wants you to devise a way for remote contractors to be able to access the server desktop. There is one stipulation, however, in that your boss wants to ensure that the local user can see everything that the remote contractor is doing in real time. What do you suggest?

A. Install TeamViewer on the server.

B. Configure a VPN connection on the server.

C. Install GoToMyPC on the server.

D. Configure RDP within the server's web browser.

Question 10 You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of your friends and family. What is a "Cloud"-like example of sharing these pictures with them?

A. Upload them to www.flickr.com and share a link with them.

B. Email them to everyone by way of email attachments.

C. Save them to your My Pictures folder on your Windows 8 tablet.

D. Save them to a fractional website that offers file transfer capabilities.

Question 11 Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks you to give him the various advantages of cloud storage. Which of the selections below would not be a reason you give him?

A. He won't have to worry about backing up his files anymore.

B. Cloud storage provides unlimited storage for free.

C. He can keep all of his files replicated and uniform on all of his devices.

D. He can access his files from anywhere he has an Internet connection.

Question 12 When you connect to a remote VPN server with your laptop running Windows 8, what key item is your computer allocated?

A. The desktop of the VPN server

B. The desktop of the logon server

C. An IP address from the remote network

D. A web browser with an SSL connection

Question 13 How does fractional employment differ from the traditional full-time job model of today?

A. Fractional employment demands complete mathematical skills.

B. A work unit in fractional employment is a project or task, not a job.

C. Fractional employment only employs people from outside the United States.

D. Fractional employment is exclusively for IT workers.

Question 14 Your CEO is concerned that too much productivity is lost by having employees call each other, only to be directed to voice mail. He asks you if something can be done to counter this. What do you suggest?

A. Integrate Dropbox into the company network.

B. Integrate RDP into the company network.

C. Integrate Microsoft Lync into the company network.

D. Integrate TeamViewer into the company network.

Question 15 Which of the following is a proper use of the application, NetStumbler?

A. Finding rogue access points within your network

B. Managing multiple access points within a large network

C. Disguising designated broadcast SSIDs on your network

D. Creating open-ended wireless connections for easy access

Question 16 Making a phone call through Lync from your laptop using only your headset is an example of:

A. a PBX phone connection.

B. an encrypted phone conversation.

C. a legacy phone conversation.

D. a peer-to-peer phone conversation.

Question 17 Your mom wants to start using some type of cloud storage so that she can access some of her important business files from anywhere without having to remote into another machine. What do you suggest?

A. TeamViewer

B. GoToMyPC

C. Dropbox

D. Microsoft RT

Question 18 Your sister is considering purchasing a tablet computer that utilizes RT as the operating system. She asks you if RT is any different from her Windows 8 desktop she has at home. What do you tell her?

A. Unlike her Windows 8 PC, RT does not have a tile-based interface.

B. RT is an Android-based operating system so it is completely different.

C. RT isn't touch-enabled so it is a poor choice for a tablet.

D. She won't be able to install regular Windows application on RT.

Question 19 You have set up Remote Desktop for the company server running Server 2008 so that your users can RDP in from their XP workstations. Users are calling you saying that they are being denied the ability to remote in. What is the most likely reason?

A. XP does not support Remote Desktop by default.

B. Network Level Authentication is being enforced on the RDP connection.

C. Server 2008 does not support Remote Desktop by default.

D. Remote Desktop only works through a web browser over the Internet.

Question 20 Which of these devices is usually the default gateway for most home networks?

A. A workstation

B. A server

C. A smartphone

D. A wireless router

Reference no: EM13842004

Questions Cloud

Record the necessary adjusting entries at december : Record the necessary adjusting entries on december 31, 2015 No prior adjustments have been made during 2015 and Record the necessary adjusting entries at December 31, 2015, for Hurricane Company for each of the situations. Assume that no financial ..
Transformational and transactional leadership theories : Reflect on studies of transformational and transactional leadership theories by Burns (1978) and Bass (1985). Explain how traditional models of leadership, which are transactional, may influence leaders and followers
What makes an effective erp system? : What makes an effective ERP system?
Explain the importance of data integrity : Describe strategies that are used to ensure the accuracy and safety of data entered into information systems used in nursing practice. Explain the importance of data integrity for health care institutions. Summarize how information technology contri..
What is a chief concern of cloud computing : What is a chief concern of cloud computing
Create a project transition plan : When a project is ready to be deployed, a transition plan can help the transfer of ownership from the project team to the customer or organization that requested the project. Complete the following: For the given scenario, create a project transiti..
Describe some way that lei could have avoided this situation : Based on the section about Communication Pitfalls in the Bateman and Snell text, describe some ways that Lei could have avoided this situation
Purpose of the boot loader during the boot-up process? : purpose of the boot loader during the boot-up process?
Identify communications problems to avoid : Watching a scenario about Sandwich Blitz, Inc. and composing a paper about communication about a major change in Sandwich Blitz's use of technology to resolve a problem. Identify communications problems to avoid

Reviews

Write a Review

 

Programming Languages Questions & Answers

  Write a recursive boolean function named ismember

Write a recursive Boolean function named isMember . The function should accept two arguments: an array and a value. The function should return true if the value is found in the array, or false if the value is not found in the array. Demonstrate t..

  Implement effective security training

What are the four target audiences that the companys new system security policy must reach and  Discuss a few of the 7 necessary steps to implement effective security training.

  Write a vhdl code for soda vending machine

Write a VHDL code that implements the above soda machine. You have to turn in the following: A state diagram showing the implementation of your design. Clearly show all the states and the conditions on which transitions occur.

  Write down a method which is passed string argument

Write down a method, getFirstLine, which is passed a String argument and that returns first line. (Recall that lines are terminated with the "n" character.)

  Write program which reads in side of a square

Write a program which reads in side of a square and then prints that square out of asterisks. Program must work for hollow squares of all side sizes between 1 and 20.

  Which protocol is using by video game programmers udp or tcp

What protocol do you think video game programmers would use UDP or TCP. Why do you think the game uses one or the other protocols

  Write program which comprises function to compute calories

Write down program which comprises function calories() that is to accept long integer number total and address of integer variables pizza, chips apples and mustard.

  Catch and handle the error thrown by the code

Catch and handle the error thrown by the code. Redirect the user back to the login screen and display a friendly error message stating that the credentials were incorrect

  Write down a program that will randomly generate a number

write a program that will randomly generate a number from 1 to 100. the user will then guess the number via several

  Decrypt all entries of username variable

Need a another cgi file to decrypt all entries of ' username ' variable and restore it to original plain/text, it should be start restoring the inputs to original text the cgi file

  Write recursive function to return maximum element of array

Write down the recursive function which receives three parameters: The recursive function must return maximum element of array.

  Write html page to enter city current temperature

Write HTML page that asks user to enter city current temperature and changes background color depending on that temperature.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd