Free Cloud Technology Concepts Exam C90.02 Exam Practice Test

UNLOCK FULL
C90.02 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 5
Total Questions: 0
  • Which of the following IT resources are examples of multi-device brokers?

    Answer: D Next Question
  • Information that is encrypted is referred to as .

    Answer: B Next Question
  • Which of the following can be the result of a successful malicious intermediary attack?

    Answer: A,B,C,D Next Question
  • Messages being sent from a cloud service consumer to a cloud service are intercepted and maliciously altered by an intermediary service. This is an example of which cloud security threat?

    Answer: D Next Question
  • A is a mechanism used to temporarily persist certain types of data as an alternative to caching the data in memory.

    Answer: B Next Question
  • Which of the following statements are true about the state management database mechanism?

    Answer: A,B Next Question
  • A cloud service built as a SOAP-based Web service will have a service contract that is physically decoupled from the service's logic.

    Answer: A Next Question
  • A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual servers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: .

    Answer: A Next Question
  • We are building a new service composition comprised of two on-premise services and two cloud services. What type of testing should we perform in order to ensure specifically that the on-premise and cloud-based services can interact as required?

    Answer: B Next Question
  • REST services share a uniform contract and therefore cannot be deployed in cloud environments without a multi-device broker mechanism.

    Answer: B Next Question
Page: 1 / 5
Total Questions: 0