Question 51 are event driven programs designed to

This preview shows page 23 - 28 out of 42 pages.

QUESTION 51 _________________________are event-driven programs designed to intercept messages at runtime. A. REST Services B. Web Services C. Service Agents D. SET Services
2 points QUESTION 52 The logical perimeter that typically spans beyond physical boundaries to represent the extent to which IT resources are trusted is called a ____________________________.
2 points QUESTION 53 The ______________________________ mechanism can help counter the traffic eavesdropping, malicious intermediary, insufficient authorization, and overlapping trust boundaries security threats.
2 points QUESTION 54 The programmatic and management interfaces that establish administration environments for a virtualization program to operate with various virtualization solutions can introduce __________________ due to incompatibilities.
C. software glitches D. special hardware compatibilities 2 points QUESTION 55 The ___________________________ constitutes the internal LAN and provides high-performance and redundant connectivity for all of the data center’s network-enabled IT resources. A. Storage Area Network (SAN) B. LAN Fabric C. Fast Data Replication Mechanisms D. Hot-Swappable Hard Disks
2 points QUESTION 56 A specialized storage program that is used to move LUNs from one storage device to another without interruption, while remaining transparent to cloud consumers.
2 points QUESTION 57 The _________________________mechanism supplies cloud consumers with the tools and permission management options for administering resource pools.
2 points QUESTION 58 The _____________________threat arises when messages are intercepted and altered by a malicious service agent, thereby potentially compromising the message’s confidentiality and/or integrity.
2 points QUESTION 59 The ____________________ architecture establishes a sophisticated failover system that allows virtual
servers to be dynamically moved to different physical server hosts, in the event that their original physical server host fails. A. Zero Downtime Architecture B. Cloud Balancing Architecture C. Dynamic Failure Detection and Recovery Architecture D. Bare-Metal Provisioning Architecture
2 points

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture