Cloud system from SGI is functionally considered as an ________.

Question:

Cloud system from SGI is functionally considered as an ________.

A.

on-demand cloud computing service

B.

on-demand cloud storage service

C.

on-demand cloud accessing service

D.

on-demand

Answer» a. on-demand cloud computing service

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following backup create a cloned copy of your current data or drive ?

Question:

Which of the following backup create a cloned copy of your current data or drive ?

A.

Continuous Data Protection

B.

Open file backup

C.

Reverse Delta backup

D.

None of the mentioned

Answer» a. Continuous Data Protection

Note: The above multiple-choice question is for all general and Competitive Exams in India

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Question:

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A.

Cross-site scoring scripting

B.

Cross-site request forgery

C.

Two-factor authentication

D.

Cross-site scripting

Answer» d. Cross-site scripting

Note: The above multiple-choice question is for all general and Competitive Exams in India

The technology used to distribute service requests to resources is referred to as _____________

Question:

The technology used to distribute service requests to resources is referred to as _____________

A.

load performing

B.

load scheduling

C.

load balancing

D.

all of the mentioned

Answer» c. load balancing

Note: The above multiple-choice question is for all general and Competitive Exams in India

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.

Question:

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.

A.

table caching

B.

geocaching

C.

index caching

D.

windows Media Server

Answer» b. geocaching

Note: The above multiple-choice question is for all general and Competitive Exams in India

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

Question:

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A.

Making infrastructure vulnerable to malware

B.

Potential for noncompliance

C.

Data Loss

D.

All of the above

Answer» d. All of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India