- The 1980s and early 1990s saw the rise of __. architecture, in which computing workloads were partitioned between desktop applications running on networked workstations and service-providing applications hosted on centralized servers.
- In a typical IaaS stack, all of the following components are managed by the provider except for:
A. Data storage subsystems
B. Local-area networking
C. Application server runtimes
D. Server hardware
E. Hypervisors
- The service-providing model in which the provider makes resources and services available to the consumer at the time they are needed and charges the consumer for the actual metered usage of those resources is known as:
A. Utility computing
B. Grid computing
C. Heterogeneous computing
D. Edge computing
E. Jungle computing - Which of the following characteristics of an application integration architecture would lead to it being considered to be tightly-coupled?
A. Individual software components can be upgraded in isolation without disrupting functionality
B. Applications run in a purely-virtualized environment
C. The integrated applications share a common database and directly manipulate each other’s data structures
D. Components communicate using simple APIs that are designed for forward- and backward-compatibility
E. Applications run on a mainframe. - During selection and implementation of a SaaS solution, the formal IT department may be responsible for:
A. Leading a pilot deployment with participation from user representatives
B. Researching potential providers and evaluating their ability to meet the business requirements
C. Conducting a review of the providers’ security procedures and capabilities
D. All of the above
E. None of the above
- _ is a technique by which a horizontally-scalable application automatically provisions and deprovisions resources as needed to respond to shifts in observed demand.
- Benefits of a source control management system include:
A. Efficient prioritization and tracking of software development tasks
B. Maintaining a reproducible and traceable history of codebase changes
C. Automatic detection of security vulnerabilities in your codebase
D. a) and b)
E. b) and c) - __ is a traditional software development methodology in which analysis, design, implementation, testing, and deployment are organized into a sequence of discrete stages, each of which should be completed before the next begin
- Which of the following are common interfaces for integrating SaaS applications?
A. CORBA stub
B. REST API
C. Java RMI
D. a) and b)
E. b) and c) - Which of the following is not a common practice in Agile software development?
A. Frequent deployment of small changes
B. Rapid iteration cycles with continuous involvement of business stakeholders
C. Creation of a comprehensive system design before any code is written
D. Comprehensive automated testing.
E. Continuous Integration - Software tests intended to detect reoccurrence of failure conditions that were previously identified and fixed are known as:
A. Unit tests
B. Integration tests
C. Emotional tests
D. Manual tests
E. Regression tests - Reasons for implementing Immutable Infrastructure patterns include:
A. Software components behave predictably over time because their execution environments do not change unexpectedly
B. Rolling back a problem deployment is safer and easier
C. There is no need to maintain application code under source control
D. a) and b)
E. b) and c) - _ architecture is an approach to software development in which applications are broken up into many small, simple components that are developed separately, run in isolated environments (typically containers), and communicate with each other over simple protocols such as HTTP/REST
- Which of the following is not an advantage of Docker containers over traditional virtual machines?
A. The use of a union filesystem allows many containers with small differences to be stored efficiently together on persistent storage
B. Containers run a complete operating system and can be managed using the same tools that would be used to control physical servers
C. Different containers based on different operating system releases can be run on top of the same host
D. Containers do not need to devote CPU and memory resources to system processes such as an init daemon, a logging daemon, or a mail transfer agent
E. Containers are much faster to deploy and launch - Responsibilities of a container orchestration framework include:
A. Scheduling tasks to run in containers
B. Building container images and deploying them to an artifact repository
C. Tracking development tasks and software bugs
D. a) and b)
E. b) and c) - Which of the following is a possible reason to maintain substantial assets in liquid form rather than committing them to potentially-lucrative projects?
A. Earning a substantial return on these assets would expose you to additional taxation
B. Business growth may create a need for more working capital to support ongoing operations
C. You may need the funds to invest in future opportunities that are more lucrative than the projects that are currently available
D. a) and b)
E. b) and c) - Your department is choosing between two technology projects to launch in the upcoming quarter. Project A requires an immediate $550,000 investment and will generate $120,000 in net revenue at the end of year 1 and for eight more years (nine total) after that. Project B requires an immediate investment of $400,000 and another $300,000 at the end of year 1, with net revenues of $200,000 at the end of years 2, 3, 4, 5, and 6. The company’s calculated discount rate for major initiatives is 13% per year. From a Net Present Value perspective, which of the two projects is most attractive financially? Show all work for full/partial credit.
- _ cost is the value of the best alternative decision that must be foregone in order to commit resources to a chosen project.
- An advantage of paying for virtual server use with monthly funds from your OpEx budget rather than buying physical servers using your CapEx budget is:
A. The virtual servers will have better performance
B. You can develop your applications in PHP
C. Short-term cash expenditures may be substantially reduced
D. All of the above
E. None of the above - Your organization is planning to move nearly all server-based applications into an IaaS public cloud. One of your sysadmins is primarily experienced in rackmount server installations and structured cabling, and is concerned that these skills will not translate well into a cloud environment. In which of the following skill areas could you offer training in order to ease the transition and improve your department’s cloud readiness?
A. Docker administration
B. System configuration automation
C. Server hardware maintenance and repair
D. a) and b)
E. b) and c) - __ is an attack pattern in which an Internet-hosted service is overwhelmed by a massive volume of requests coming from a distributed set of compromised hosts.
- An attacker may attempt to compromise your security audit logs in order to cover his tracks. This can be prevented through the use of:
A. Containerization
B. Machine learning
C. An event correlation engine
D. Write-once archival storage
E. A cloud access security broker - _ authentication is a technique that can prevent an attacker from gaining access to s system even after stealing the username and password of one of the system’s users.
- Which of the following are ways in which a SaaS application is potentially more vulnerable to attack than an application that you host on your own internal servers?
A. The application is accessed by clients across the public Internet and cannot be completely isolated from external attack
B. If the application is multitenant, another customer on the same instance could theoretically take advantage of a privilege escalation exploit to gain access to your data
C. In a SaaS environment, your data cannot be encrypted at rest
D. a) and b)
E. b) and c)
Sample Solution