11
Cloud Computing Pocket Guide Version 2011.11.20 Tom Segers www.trainingcloud.be/cloud Cloud Computing Pocket Guide 2 Introduction The Cloud brings a new tool to the toolbox of today's Chief Information Officer. Computing is delivered as a packaged service rather than products. Shared resources, software and information are delivered in a flexible way to the client through the Internet. Almost in a utility like way, like water or electricity, Cloud computing provides IT solutions for the business as a black box service. The service is just there, somewhere from the global network. Without the customer having to worry about the technical and operational aspects of keeping it running. This Pocket Guide provides you a general high-level introduction to Cloud computing. Its contents has been aligned with the topics for the EXIN Cloud computing Foundation exam. More information about the EXIN exam can be found at the end of this Pocket Guide. For more info, go to www.exin.com.

Cloud Computing Pocket Guide

Embed Size (px)

Citation preview

Page 1: Cloud Computing Pocket Guide

Clo

ud C

om

puting

Po

cke

t G

uid

e

Ve

rsio

n 2

01

1.1

1.2

0

To

m S

eg

ers

ww

w.t

rain

ing

clo

ud.b

e/c

loud

Clo

ud C

om

putin

g P

ocket

Guid

e

2

Intr

od

uc

tio

n

w T

he

Clo

ud

bring

s a

ne

w t

ool to

th

e t

oo

lbox o

f to

da

y's

Ch

ief

Info

rma

tio

n O

ffic

er.

C

om

pu

tin

g is

d

eliv

ere

d a

s a

p

acka

ge

d

se

rvic

e r

ath

er

than

pro

ducts

. S

hare

d r

eso

urc

es,

so

ftw

are

an

d

info

rma

tio

n a

re d

eliv

ere

d in

a f

lexib

le w

ay t

o t

he

clie

nt

thro

ug

h

the I

nte

rne

t.

Alm

ost

in a

u

tilit

y lik

e w

ay,

like

w

ate

r o

r e

lectr

icity,

Clo

ud

com

putin

g p

rovid

es I

T s

olu

tio

ns f

or

the b

usin

ess a

s a

bla

ck

box se

rvic

e.

Th

e s

erv

ice

is

ju

st

there

, so

me

wh

ere

fr

om

th

e

glo

bal

ne

two

rk.

With

ou

t th

e c

usto

me

r h

avin

g t

o w

orr

y a

bou

t

the t

ech

nic

al a

nd o

pe

ratio

na

l a

sp

ects

of

ke

ep

ing it

run

nin

g.

w

Th

is

Po

cke

t G

uid

e

pro

vid

es

yo

u

a

ge

ne

ral

hig

h-le

ve

l

intr

od

uctio

n

to

Clo

ud

co

mp

utin

g.

Its

co

nte

nts

h

as

bee

n

alig

ne

d

with

th

e

top

ics

for

the

EX

IN

Clo

ud

co

mp

utin

g

Fo

un

da

tio

n e

xa

m.

More

in

form

atio

n a

bo

ut

the E

XIN

exam

ca

n

be f

oun

d a

t th

e e

nd

of

this

Po

cke

t G

uid

e.

Fo

r m

ore

in

fo, g

o t

o w

ww

.exin

.co

m.

Page 2: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

3

Ta

ble

of

Co

nte

nts

In

troduction

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

2

Princip

les o

f C

loud c

om

puting

....

....

....

....

....

....

....

....

....

....

....

4

Usin

g the C

loud

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

5

Benefits

and lim

itations

...

....

....

....

....

....

....

....

....

....

....

....

....

....

7

Basic

backg

round r

eadin

g .

....

....

....

....

....

....

....

....

....

....

....

....

. 9

Clo

ud a

rchitectu

res a

nd s

ecurity

...

....

....

....

....

....

....

....

....

.. 1

3

Evalu

ating

Clo

ud c

om

puting

....

....

....

....

....

....

....

....

....

....

....

. 16

Refe

rences

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

.. 1

7

Test

yours

elf

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

18

Clo

ud c

om

puting F

oundation e

xam

....

....

....

....

....

....

....

....

. 22

Clo

ud C

om

putin

g P

ocket

Guid

e

4

Pri

ncip

les o

f C

lou

d c

om

pu

tin

g

Th

e

Clo

ud

is

d

efin

ed

a

s

a

larg

e

po

ol

of

us

ab

le

an

d

acc

es

sib

le

vir

tua

lize

d

reso

urc

es

. It

co

ve

rs

a

dyn

am

ic

deliv

ery

m

ode

l fo

r IT

se

rvic

es b

ase

d o

n In

tern

et

pro

toco

ls.

Sca

lab

le a

nd t

yp

ica

lly v

irtu

aliz

ed

re

so

urc

es a

re p

rovis

ion

ed a

t

the a

pp

lica

tio

n,

pla

tfo

rm o

r in

fra

str

uctu

re le

ve

l.

Ap

pro

pria

tely

, th

ese

se

rvic

es

are

a

lso

re

ferr

ed

to

a

s

So

ftw

are

-as

-a-S

erv

ice

(Sa

aS

),

Pla

tfo

rm-a

s-a

-Se

rvic

e

(Pa

aS

) a

nd

In

fra

str

uc

ture

-as

-a-S

erv

ice (

IaaS

):

·

A S

aa

S s

erv

ice

pro

vid

es a

pplic

atio

n f

unctio

na

lity t

hat

a u

se

r ca

n d

ire

ctly u

se

, e

.g.

Cu

sto

me

r R

ela

tio

nsh

ip

Man

ag

em

ent

(CR

M)

functio

na

lity,

e-m

ail

functio

na

lity,

Off

ice

fu

nctio

na

lity.

·

A P

aa

S se

rvic

e p

rovid

es th

e p

latf

orm

fo

r ru

nn

ing a

cu

sto

m

app

lica

tio

n,

e.g

. a

.N

ET

F

ram

ew

ork

o

n

a

se

rve

r w

ith

a

cce

ss

to

a

num

ber

of

libra

ries

an

d

rela

ted

se

rvic

es.

·

An

Ia

aS

se

rvic

e

co

ve

rs

the

infr

astr

uctu

re

like

a

Win

do

ws

se

rve

r o

r L

inux

se

rve

r fr

om

th

e

Clo

ud

,

inclu

din

g re

qu

ire

d u

nde

rlyin

g re

so

urc

es lik

e sto

rag

e

and

co

nne

ctivity.

Va

rio

us o

ther

functio

na

lity is a

va

ilable

"a

s a

Se

rvic

e"

fro

m t

he

Clo

ud

. E

.g.,

Co

mm

un

ica

tio

n a

s a

Se

rvic

e (

Ca

aS

) is

an

outs

ourc

ed E

nte

rprise

Co

mm

unic

atio

ns s

olu

tio

n t

hat

ca

n b

e

hire

d f

rom

an e

xte

rna

l p

rovid

er.

Su

ch

a C

aa

S s

olu

tio

n c

an

co

ve

r fu

nctio

na

lity f

or

vo

ice

ove

r IP

, In

sta

nt M

essa

gin

g (

IM),

and v

ideo

co

nfe

ren

ce. C

aa

S c

an a

lso

sta

nd f

or

Co

mp

liance-

as-a

-se

rvic

e. O

the

r e

xa

mp

les:

Ide

ntity

-as-a

-Se

rvic

e (

IDa

aS

),

Mon

ito

rin

g-a

s-a

-Se

rvic

e (

Ma

aS

), S

tora

ge

-as-a

-Se

rvic

e.

Page 3: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

5

Us

ing

th

e C

lou

d

Us

ing

a W

eb

br

ow

se

r

A t

yp

ica

l e

xa

mp

le o

f u

sin

g t

he C

lou

d is a

cce

ssin

g a

nd

us

ing

we

b-b

ase

d t

oo

ls o

r a

pp

lica

tio

ns

th

rou

gh

a W

eb

bro

ws

er

as

if

the

pro

gra

ms

we

re

insta

lled

o

n

the

clie

nt.

T

he

y

are

acce

sse

d

from

a

W

eb

bro

wse

r o

r a

d

eskto

p

or

mo

bile

app

lica

tio

ns.

Th

e s

oft

wa

re a

nd

data

are

sto

red

on

a s

erv

er

at

a r

em

ote

lo

ca

tio

n,

acce

sse

d a

nd

use

d v

ia t

he I

nte

rne

t.

Use

rs c

an a

cce

ss W

eb

Ap

plic

atio

ns t

hro

ug

h a

We

b b

row

ser.

Of

co

urs

e,

the b

row

se

r o

n t

he c

lien

t m

ust

be c

om

patib

le w

ith

the

ap

plic

atio

n.

Pro

gra

mm

ing

co

de

ru

ns

on

the

se

rve

r,

ind

epe

nde

ntly f

rom

th

e c

lien

t, a

nd

use

rs d

o n

ot

eve

n n

ee

d t

o

kn

ow

th

e lo

ca

tio

n o

f th

e a

pp

lica

tio

n.

Us

ing

Fa

t C

lie

nts

or

Th

in C

lie

nts

D

iffe

ren

t ty

pes o

f d

evic

es c

an b

e u

se

d t

o a

cce

ss t

he

clo

ud

.

De

pe

ndin

g o

n t

he s

itu

atio

n,

it is p

ossib

le t

o u

se

a T

hin

Cli

en

t,

a c

lien

t co

mp

ute

r w

ith

ou

t a

hard

dri

ve

. M

ultip

le u

se

rs w

ork

on

the s

am

e s

erv

er

ma

ch

ine,

acce

sse

d t

hro

ug

h t

he

ir T

hin

Clie

nt

as a

co

nso

le.

A T

hin

Clie

nt

en

viro

nm

ent

typ

ica

lly a

llow

s f

or

les

s f

reed

om

for

the

use

r to

cu

sto

miz

e

an

d

co

ntr

ol

the

so

ftw

are

a

nd

se

ttin

gs o

n h

is d

eskto

p.

On

a V

irtu

al

De

skto

p I

nfr

astr

uctu

re,

the u

se

r h

as i

ts o

wn

virtu

al

ma

ch

ine o

n t

he s

erv

er,

an

d h

as

alm

ost

the s

am

e c

ontr

ol

an

d s

pecific

ity a

s o

n a

lo

ca

l d

eskto

p

PC

.

Clo

ud C

om

putin

g P

ocket

Guid

e

6

Us

ing

mo

bil

e d

ev

ice

s

Incre

asin

gly

, va

rio

us

mo

bil

e

de

vic

es

ca

n

als

o

be

u

se

d.

To

da

y,

mo

st

ce

ll p

ho

ne

s

have

su

ffic

ient

mem

ory

, a

nd

app

lica

tio

ns in

th

e clo

ud

o

fte

n d

o n

ot

ne

ed

sto

rag

e o

n th

e

clie

nt.

T

hou

sa

nd

s

of

app

lica

tio

ns

are

a

va

ilab

le

for

mo

bile

pla

tfo

rms.

Ad

ditio

na

lly,

sp

ecific

app

lica

tio

ns c

an b

e t

ailo

red f

or

use

on t

he m

obile

de

vic

e.

Diffe

ren

t p

latf

orm

s a

re a

va

ilab

le f

or

mo

bile

d

evic

es,

so

sta

nda

rdiz

atio

n

of

ap

plic

atio

ns

is

imp

ort

ant.

N

ot

all

ap

plic

atio

ns

are

a

va

ilab

le

for

all

mo

bile

pla

tfo

rms.

Esp

ecia

lly w

he

n w

ork

ing o

n m

obile

d

evic

es,

the

re m

ust

be

su

ffic

ient

atte

ntio

n fo

r s

afe

ty.

Fo

r in

sta

nce

, te

xt

messa

gin

g

wh

ile d

rivin

g a

ca

r m

ay b

e d

an

ge

rous.

Lo

okin

g a

t a

scre

en

wh

ile w

ork

ing i

n a

d

an

gero

us e

nvir

onm

ent

ma

y d

istr

act

the

use

r fr

om

ta

kin

g a

pp

rop

ria

te m

easu

res.

In som

e co

un

trie

s,

regu

latio

ns e

xis

t -

e.g

. fo

r p

roh

ibitin

g t

he u

se

of

a c

ell

ph

on

e

wh

ile d

rivin

g.

Page 4: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

7

Be

ne

fits

an

d lim

ita

tio

ns

Be

ne

fits

C

lou

d c

om

putin

g c

om

es w

ith

th

e p

rom

ise

of

the

pote

ntia

l fo

r

red

uc

ed

co

st.

As l

arg

e s

ca

le d

ata

ce

nte

rs b

en

efit

fro

m t

he

inve

stm

ents

by t

he

Se

rvic

e P

rovid

er,

th

ey h

old

th

e p

ote

ntia

l o

f

off

ering

su

bsta

ntia

l e

co

no

mie

s o

f sca

le.

Usin

g

reso

urc

es

like

sto

rage

in

th

e

Clo

ud

re

qu

ire

s

only

inve

stm

ent

in t

he

ca

pa

city n

ee

de

d.

Ad

ditio

na

l n

ee

ds d

o n

ot

requ

ire

bud

get

for

ne

w la

rge

devic

es.

Re

so

urc

es a

nd

se

rvic

es

ca

n b

e a

ctiva

ted a

nd

d

ea

ctiva

ted o

ve

r tim

e in

a

sca

lab

le,

fle

xib

le a

nd

co

st-

eff

icie

nt

wa

y.

Th

e C

lou

d i

nd

eed

allo

ws f

or

a

pa

y-a

s-y

ou

-go

mo

de

l (p

ay-f

or-

use

).

Fo

r in

sta

nce

, im

agin

e

the

ne

ed

a

te

st

and

d

eve

lopm

ent

pla

tfo

rm o

r in

fra

str

uctu

re f

or

a n

ew

ap

plic

atio

n p

roje

ct

for

only

a l

imite

d p

eri

od o

f tim

e.

Ra

the

r th

an

bu

yin

g n

ew

se

rve

r a

nd

sto

rag

e h

ard

wa

re a

nd

data

base

and

syste

m s

oft

wa

re f

or

this

pro

ject,

yo

u c

an

als

o u

se

th

e t

em

po

rary

cap

ac

ity f

rom

th

e

Clo

ud

fo

r th

e t

ime

yo

u n

ee

d it.

Oth

er

typ

ica

l ca

nd

ida

tes

for

the

Clo

ud

in

clu

de

th

ose

app

lica

tio

ns

or

se

rvic

es

wh

ere

d

em

an

d

for

ca

pa

cit

y

is

dif

fic

ult

to

pre

dic

t. T

his

ca

n a

lso

be

beca

use

it

is i

ncre

asin

g

or

decre

asin

g a

t a

ra

pid

sp

ee

d,

be

ca

use

it

ca

n v

ary

or

burs

t

ve

ry h

ea

vily

ove

r tim

e,

or

is lin

ke

d t

o a

cyclic

al e

vo

lutio

n.

Als

o,

go

ing liv

e w

ith

a

n

ew

a

pp

lica

tio

n o

r se

rvic

e m

ay

be

possib

le in

h

ours

ra

the

r th

an

w

ee

ks o

r m

onth

s.

Th

is m

ay

su

pp

ort

a

m

ore

fle

xib

le a

nd p

lan

nin

g fo

r n

ew

re

lea

se

s a

nd

there

fore

im

pro

ve

th

e T

ime

-to

-ma

rke

t a

nd

Tim

e t

o V

alu

e.

Clo

ud C

om

putin

g P

ocket

Guid

e

8

Lim

ita

tio

ns

O

n

the

oth

er

ha

nd,

Clo

ud

co

mp

utin

g

co

me

s

with

a

de

pe

nd

en

cy

fro

m

Inte

rne

t c

on

ne

cti

vit

y.

Su

ffic

ient

ban

dw

idth

is n

ee

ded

. In

ca

se

of

netw

ork

pro

ble

ms,

reso

urc

es

in t

he

Clo

ud

ma

y h

ave

lo

we

r a

va

ilab

ility

a

nd

lo

ng

er

acce

ss

tim

es.

De

pen

din

g o

n t

he

ap

plic

atio

n n

ee

ds,

late

ncy o

n t

he lin

e

ma

y d

ire

ctly in

flu

en

ce

ap

plic

atio

n p

erf

orm

ance

.

Re

gu

lati

on

s a

nd

co

mp

lia

nc

y r

eq

uir

em

en

ts m

ay v

ary

fro

m

co

un

try t

o c

oun

try a

nd

fro

m s

itu

atio

n t

o s

itu

atio

n.

Esp

ecia

lly

gove

rnm

ent

entitie

s m

ay b

e s

ubje

ct

to a

dd

itio

nal

restr

ictio

ns

on w

here

th

e d

ata

is l

oca

ted.

Th

is m

ay m

ake

it

mo

re d

ifficu

lt

to re

ly o

n a

p

ub

lic clo

ud

p

rovid

er

with

d

ata

ce

nte

rs in

o

the

r

co

un

trie

s.

Clo

ud

co

mp

utin

g

co

me

s

with

in

here

nt

nee

ds

to

co

ntr

ol

sec

uri

ty a

ppro

pri

ate

ly.

Re

so

urc

es i

n t

he C

lou

d m

ay in

de

ed

be

mo

re

difficu

lt

to

pro

tect

ag

ain

st

intr

usio

ns

an

d

oth

er

se

cu

rity

risks.

Pa

rt

of

the

se

cu

rity

ch

alle

ng

e

is

linke

d

to

runn

ing

ap

plic

atio

ns

ove

r a

p

ub

licly

a

cce

ssib

le

ne

two

rk.

Ad

ditio

na

lly,

lea

vin

g co

ntr

ol

to a

n e

xte

rna

l se

rvic

e p

rovid

er,

ope

ratin

g o

n a

la

rge

sh

are

d e

nvir

onm

ent,

co

me

s w

ith

a n

ee

d

to p

ut

tru

st

in th

e s

erv

ice

pro

vid

er.

Po

ssib

ly

eve

n

mo

re

tha

n

for

tra

ditio

n

se

rvic

e

co

ntr

acts

,

co

ntr

actu

al

co

mm

itm

en

ts f

rom

th

e e

xte

rna

l p

rovid

er

as w

ell

as

role

s

and

re

sp

on

sib

ilitie

s

nee

d

to

be

ve

ry

cle

ar

to

all

part

ies in

vo

lve

d.

Co

ntr

acts

co

me

with

a c

lea

r S

erv

ice

Le

ve

l

Ag

ree

me

nt

and

so

me

tim

es

als

o

a

pen

alty

me

ch

an

ism

fo

r

bre

ach

es.

Page 5: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

9

Ba

sic

ba

ck

gro

un

d r

ea

din

g

His

tor

ica

l b

ac

kg

ro

un

d

Clo

ud

co

mp

utin

g c

an b

e s

itu

ate

d w

ith

in a

n e

vo

luti

on

of

IT.

Ea

rly m

ain

fram

e c

om

pute

rs w

ere

la

rge a

cco

un

tin

g m

ach

ine

s,

se

rvin

g a

sin

gle

pu

rpo

se

, lo

ng b

efo

re o

ther

functio

ns lik

e w

ord

pro

ce

ssin

g,

de

sig

nin

g

an

d

gam

ing

we

re

ava

ilab

le.

Th

e

Pe

rso

na

l C

om

pute

r b

rou

gh

t IT

re

so

urc

es c

lose

r to

th

e u

se

r.

Th

en

, th

e C

lient

/ S

erv

er

mo

de

l b

rou

ght

a c

om

bin

atio

n o

f th

e

use

of

a C

lien

t a

nd

Se

rve

r re

so

urc

es a

cce

sse

d t

hro

ugh

th

e

netw

ork

. T

oda

y,

va

rio

us I

T r

eso

urc

es a

re u

se

d o

n t

he l

oca

l

clie

nt

an

d o

ve

r th

e n

etw

ork

on a

wid

e r

an

ge o

f d

evic

es.

Se

rve

r in

fra

str

uctu

res u

se

virtu

aliz

atio

n a

nd h

igh

-pe

rfo

rma

nce

netw

ork

s

to

off

er

eve

r in

cre

asin

g

fle

xib

ility

. O

ve

r th

e

past

deca

de

s,

ne

two

rks h

ave

be

co

me

in

terc

onn

ecte

d t

hro

ugh

th

e

Inte

rne

t, w

hic

h e

vo

lve

d f

rom

an

in

itia

tive

of

the

US

Min

istr

y o

f

De

fense

. R

elia

bili

ty

an

d

ban

dw

idth

o

f co

nn

ectio

ns

ha

ve

imp

rove

d,

an

d c

osts

are

de

cre

asin

g.

Th

is h

as o

pen

ed n

ew

tech

nic

al

po

ssib

ilit

ies

to

a

cce

ss

app

lica

tio

ns

an

d

oth

er

reso

urc

es o

ve

r th

e I

nte

rne

t.

At

the s

am

e t

ime

, o

rga

niz

atio

ns h

ave

op

ted

to

fo

cu

s o

n t

he

Co

re B

us

ine

ss

. S

om

e a

sp

ects

of

IT h

ave t

urn

ed o

ut

to b

e

str

ate

gic

to

th

e

bu

sin

ess,

and

h

ave

b

ee

n

co

nsid

ere

d

ke

y

asse

ts f

or

the o

rga

niz

atio

n.

Bu

t o

ve

r tim

e,

oth

er

asp

ects

of

IT

have

b

ee

n

co

nsid

ere

d

co

mm

odity

se

rvic

es

tha

t ca

n

be

outs

ourc

ed

o

r o

pe

rate

d

with

p

art

ne

rs.

So

me

o

rga

niz

atio

ns

decid

ed t

o r

ely

on M

an

age

d S

erv

ice

s f

or

the

ma

na

ge

me

nt

of

their IT

se

rvic

es.

Su

ch

o

rgan

iza

tio

ns h

ave

e

vo

lve

d to

wa

rds

not

wa

ntin

g t

o c

are

ab

out

the t

ech

nic

al a

nd

op

era

tio

na

l d

eta

ils

of

the

ir I

T r

eso

urc

es a

nd

IT

in

fra

str

uctu

re a

nym

ore

.

Clo

ud C

om

putin

g P

ocket

Guid

e

10

Ne

two

rk

ing

te

ch

no

log

ies

E

ve

n

thou

gh

a

ne

two

rk

is

not

alw

ays

a

Clo

ud

, it

is

an

imp

ort

ant

ele

me

nt

for

it.

Ne

two

rks h

ave

e

vo

lve

d fr

om

e

arl

y

inco

mp

atib

le

pro

prieta

ry

netw

ork

s

into

to

da

y's

sta

nd

ard

s

wh

ich

in

clu

de

Eth

ern

et,

TC

P/I

P a

nd

HT

TP

.

·

Th

e E

the

rne

t is

th

e l

ead

ing

netw

ork

le

ve

l p

roto

co

l fo

r

runn

ing t

he

Loca

l A

rea

Ne

two

rk.

Ea

rly s

tan

dard

iza

tio

n

by

the

In

stitu

te

for

Ele

ctr

ica

l a

nd

E

lectr

on

ics

En

gin

eers

(I

EE

E)

has

en

able

d

its

su

cce

ss

aga

inst

com

petin

g te

ch

nolo

gie

s.

·

Th

e

Inte

rne

t p

roto

co

l su

ite

(T

CP

/IP

) is

th

e

se

t o

f

com

mu

nic

atio

ns p

roto

co

ls u

se

d f

or

the

In

tern

et.

Th

e

Tra

nsm

issio

n C

on

tro

l P

roto

co

l (T

CP

) a

nd

the I

nte

rne

t

Pro

toco

l (I

P)

pro

toco

ls a

re p

art

of

it.

·

Th

e H

yp

ert

ext

Tra

nsfe

r P

roto

co

l (H

TT

P)

is t

he b

asis

for

data

co

mm

unic

atio

n o

n th

e W

orld W

ide W

eb

. It

no

w

is

an

off

icia

l sta

nd

ard

fr

om

th

e

Inte

rne

t

En

gin

eerin

g T

ask F

orc

e (

IET

F)

and

th

e W

orld W

ide

Web

C

on

so

rtiu

m

(W3

C),

d

ocu

me

nte

d

in

so

-ca

lled

Re

qu

ests

fo

r C

om

me

nts

(R

FC

s).

HT

TP

defin

es n

ine

actio

ns o

n d

ata

, in

clu

din

g H

EA

D,

GE

T a

nd

PO

ST

.

Ne

two

rkin

g p

roto

co

ls a

re c

om

mo

nly

ma

pp

ed

on

th

e 7

la

ye

rs

of

the O

pe

n S

yste

ms

In

terc

on

ne

cti

on

mo

de

l (O

SI

mo

de

l).

Alth

ou

gh n

o e

nd

-use

r w

ou

ld t

yp

ica

lly n

ee

d t

o d

eb

ug

th

e u

se

of

these

sta

nd

ard

p

roto

co

ls,

tro

ub

lesh

ootin

g

is

ce

rta

inly

possib

le b

y u

sin

g p

roto

co

l a

na

lyze

rs (s

niffe

rs).

D

ep

en

din

g

on t

he c

onfig

ura

tio

n o

f th

e n

etw

ork

, su

ch

to

ols

ma

y a

lso

be

use

d

to

reco

nstr

uct

co

nfid

en

tia

l d

ata

b

ein

g

tra

nsfe

rre

d.

Th

ere

fore

th

e u

se

of

them

ma

y b

e p

roh

ibite

d o

r co

nsid

ere

d a

se

cu

rity

th

rea

t.

Page 6: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

11

Fo

rm

att

ing

sta

nd

ar

ds

W

he

n su

pp

ort

ing

C

lou

d co

mp

utin

g,

so

me

u

nd

ers

tan

din

g o

f

scrip

tin

g a

nd

co

nte

nt-

form

attin

g la

ng

ua

ges a

nd a

pp

roach

es

for

ba

ck-u

p a

nd r

eco

very

ca

n b

e u

se

ful.

Th

e W

eb s

erv

er

typ

ica

lly c

ove

rs m

ost

of

the c

om

putin

g t

o b

e

don

e,

in

se

rve

r-sid

e

pro

gra

mm

ing

lang

uag

es

Th

e

clie

nt

typ

ica

lly r

ece

ive

s p

ag

es i

n t

he H

yp

ert

ext

Ma

rku

p L

an

gu

ag

e

and

add

itio

na

l co

nte

nt

that

ca

n b

e d

isp

laye

d t

hro

ug

h b

row

se

r-

plu

gin

s.

Su

ch

p

ag

es ca

n co

nta

in scrip

tin

g th

at

run

s o

n th

e

clie

nt,

w

ritt

en

in

Ja

va

Scrip

t.

Ja

va

Scrip

t O

bje

ct

No

tatio

n

(JS

ON

) is

a s

ub

se

t o

f Ja

va

Scrip

t ty

pic

ally

use

d t

o e

xch

an

ge

data

. E

xte

nsib

le M

ark

up L

an

gu

ag

e (

XM

L)

is a

sta

nd

ard

of

the

World

W

ide

We

b

Co

nso

rtiu

m

for

the

syn

tax

of

ma

rkup

lan

gua

ges f

or

str

uctu

red

da

ta.

XM

L c

an

be r

ea

d i

n a

num

ber

of

pro

gra

ms,

inclu

din

g t

he b

row

se

r.

It

is

use

ful

to

ha

ve

a

b

asic

u

nd

ers

tan

din

g

of

sto

rag

e

co

nce

pts

. N

etw

ork

-atta

ch

ed

sto

rag

e (

NA

S)

refe

rs t

o a

sto

rag

e

devic

e t

hat

is c

onn

ecte

d t

o t

he

netw

ork

. N

AS

de

vic

es a

re i

n

fact

com

ple

te

file

se

rve

rs.

Co

mm

on

Inte

rne

t F

ile

Syste

m

(CIF

S)

or

Se

rve

r M

essa

ge

Blo

ck (

SM

B),

is a

netw

ork

pro

toco

l

for

sh

are

d a

cce

ss t

o f

iles a

nd

oth

er

reso

urc

es.

More

in

g

en

era

l,

sta

nd

ard

s

are

im

port

ant.

A

pp

lica

tio

n

of

sta

nd

ard

s

pro

vid

es

un

ifo

rmity

an

d

port

ab

ility

. S

tand

ard

org

an

iza

tio

ns

inclu

de

th

e

Inte

rna

tio

nal

Org

an

iza

tio

n

for

Sta

nd

ard

iza

tio

n (

ISO

) a

nd

in

du

str

ial

org

an

iza

tio

ns.

Th

e O

pen

Clo

ud

C

onso

rtiu

m

(OC

C)

is

a

no

t-fo

r-p

rofit

su

pp

ort

ing

th

e

clo

ud

co

mm

unity b

y o

pe

ratin

g c

lou

d in

fra

str

uctu

re.

Clo

ud C

om

putin

g P

ocket

Guid

e

12

Co

nc

ep

ts o

f V

irtu

ali

za

tio

n a

nd

Ma

na

ge

me

nt

Vir

tua

liza

tio

n is t

he

cre

atio

n o

f a

virtu

al ve

rsio

n o

f so

me

thin

g,

su

ch

a

s a

h

ard

wa

re p

latf

orm

, o

pe

ratin

g syste

m,

a sto

rag

e

devic

e o

r n

etw

ork

re

so

urc

es.

Se

rve

r h

ard

wa

re virtu

aliz

atio

n

invo

lve

s r

un

nin

g s

eve

ral

vir

tual

ma

ch

ines (

als

o c

alle

d g

ue

st

mach

ines)

on t

he

sa

me

physic

al

se

rve

r (a

lso

ca

lled

th

e h

ost

mach

ine).

Th

e s

erv

er

runs a

hyp

erv

iso

r, w

hic

h l

ies b

en

ea

th

the g

ue

st

op

era

tin

g s

yste

ms a

nd

ma

na

ge

s t

he

exe

cu

tio

n o

f

them

.

Be

ne

fits

of

tod

ay's

virtu

aliz

atio

n te

ch

no

logie

s i

nclu

de

bett

er

usa

ge

o

f a

va

ilab

le

hard

wa

re,

mo

re

fle

xib

ility

in

u

sin

g

hard

wa

re a

nd

oth

er

reso

urc

es,

hig

h-a

va

ilab

ility

by p

erf

orm

ed

both

p

lann

ed

an

d

unp

lan

ne

d

fail-

ove

r b

etw

ee

n

ph

ysic

al

mach

ines,

an

d

the

pote

ntia

l fo

r sp

ecific

m

ana

ge

me

nt

functio

na

lity o

n t

he v

irtu

aliz

atio

n la

ye

r.

Th

e h

yp

erv

iso

r d

oe

s n

ot

run

an a

ntiviru

s s

oft

wa

re.

Wh

en

one

of

the v

irtu

al m

ach

ines is a

ffe

cte

d b

y a

vir

us

, o

nly

th

at

virtu

al

mach

ine is in

fecte

d.

Op

en

Vir

tua

liza

tio

n F

orm

at

(OV

F)

is a

n o

pe

n s

tan

dard

fo

r

packa

gin

g

an

d

dis

trib

utin

g

virtu

al

app

liance

s

or

mo

re

gen

era

lly s

oft

wa

re t

o b

e r

un

in

virtu

al m

ach

ines.

Re

leva

nt

sta

nd

ard

s a

nd

pro

toco

ls f

or

sys

tem

s m

an

ag

em

en

t

inclu

de t

he f

ollo

win

g:

·

WB

EM

: W

eb

-Ba

se

d E

nte

rprise

Ma

nag

em

ent

·

DM

TF

: D

istr

ibute

d M

an

age

me

nt T

ask F

orc

e

·

SM

I-S

: S

tora

ge

Ma

na

gem

ent

Initia

tive

Sp

ecific

atio

n

·

SM

AS

H:

Syste

m M

an

ag

em

ent

Arc

hite

ctu

re f

or

Syste

m H

ard

wa

re

Page 7: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

13

Clo

ud

arc

hit

ec

ture

s a

nd

se

cu

rity

Clo

ud

ar

ch

ite

ctu

re

s

Clo

ud

co

mp

utin

g c

om

es a

s a

lo

gic

al

evo

lutio

n f

rom

co

nce

pts

like

Se

rvic

e O

rie

nte

d A

rch

ite

ctu

re,

dis

trib

ute

d c

om

putin

g a

nd

virtu

aliz

atio

n.

To

da

y,

Tie

red

, M

ult

ipu

rpo

se a

nd

Da

tace

nte

r

arc

hit

ec

ture

s a

re u

se

d.

·

Th

e W

eb fr

ont-

end

is

re

sp

on

sib

le fo

r re

sp

on

din

g to

clie

nt

req

uests

.

·

Th

e

Bu

sin

ess

log

ic

tie

r e

nab

les

mu

ltip

le

back-e

nd

app

lica

tio

n s

erv

ers

.

·

Th

e D

ata

base

tie

r e

nsu

res lo

ad

ba

lan

ce

d d

ata

base

s.

A

loa

d

ba

lance

r m

ake

s

su

re

that

the

ba

ck-e

nd

se

rve

rs

pro

pe

rly d

istr

ibute

the

wo

rklo

ad

.

With

a P

riva

te C

lou

d o

r L

oc

al

Clo

ud

im

ple

me

nta

tio

n,

se

rve

rs

are

ke

pt

in-h

ou

se

. S

erv

ers

in

lo

ca

l clo

ud

s m

ay b

e a

cce

sse

d

by

both

u

se

rs

at

the

lo

ca

tio

n

of

the

d

ata

ce

nte

r a

nd

fro

m

outs

ide

th

e lo

ca

tio

n o

f th

e d

ata

ce

nte

r. S

erv

ers

and

th

e c

lients

usin

g t

he

m a

re n

ot

nece

ssa

rily

on t

he

sa

me

lo

ca

tio

n o

r e

ve

n

in t

he s

am

e c

oun

try.

Th

e

Priva

te

Clo

ud

im

ple

me

nta

tio

n

is

to

be

se

en

a

ga

inst

Pu

bli

c C

lou

d a

nd H

yb

rid

Clo

ud

im

ple

me

nta

tio

ns.

Th

e w

ord

Pa

rtn

er

Clo

ud

is

so

me

tim

es

use

d

for

hoste

d

so

lutio

n

that

pro

vid

es

a

hig

he

r le

ve

l o

f co

ntr

ol

than

P

ub

lic

Clo

ud

imp

lem

enta

tio

ns

bu

t ye

t ru

ns

off

p

rem

ise

s

and

w

ith

th

e

eco

no

mie

s

of

sca

le

that

co

me

with

a

(s

em

i-)s

hare

d

enviro

nm

ent.

Clo

ud C

om

putin

g P

ocket

Guid

e

14

Se

cu

rit

y p

rin

cip

les

C

lou

d

co

mp

utin

g

co

me

s

with

s

ecu

rity

ri

sk

s,

inclu

din

g

co

nce

rns

ove

r p

rote

ctio

n

of

data

. A

ppro

pri

ate

m

itig

atin

g

me

asu

res

nee

d

to

be

ta

ke

n.

Th

ere

m

ust

be

app

ropria

te

atte

ntio

n f

or

priva

cy a

nd

co

mp

liance

issu

es a

nd s

afe

gu

ard

s -

e.g

. th

e

He

alth

P

ort

ab

ility

a

nd

A

cco

un

tab

ility

A

ct

(HIP

AA

)

priva

cy r

ule

pro

vid

es p

rote

ctio

n o

f h

ea

lth

in

form

atio

n.

The

e

sse

ntia

l e

lem

ents

o

f se

cu

rity

a

re

Co

nfi

de

nti

ali

ty,

Inte

gri

ty

an

d

Av

ail

ab

ilit

y.

Da

ta

sh

ou

ld

ind

eed

o

nly

b

e

acce

sse

d

by

au

tho

rize

d

pe

op

le

(co

nfid

en

tia

lity)

an

d

mo

dific

atio

ns s

hou

ld o

nly

com

e f

rom

auth

ori

ze

d p

eo

ple

an

d

pro

ce

sse

s

(in

teg

rity

).

Ba

cku

ps

help

e

nsu

re

ava

ilab

ility

a

nd

inte

grity

of

info

rma

tio

n.

Me

asu

res

for

auth

ori

ze

d

use

in

clu

de

A

uth

en

tic

ati

on

,

Au

tho

riza

tio

n a

nd

A

cco

un

tab

ilit

y (A

AA

). A

uth

en

tica

tio

n is

wh

ere

so

me

on

e's

id

en

tity

is

a

uth

entica

ted

, e

.g.

with

a

use

rna

me

a

nd

p

assw

ord

. A

uth

ori

za

tio

n d

ete

rmin

es w

he

the

r

som

eon

e is a

uth

ori

ze

d t

o p

erf

orm

a g

ive

n a

ctivity.

Acco

un

tin

g

invo

lve

s t

he t

rackin

g o

f re

so

urc

e u

sa

ge

fo

r d

iffe

ren

t pu

rpose

s.

On

e

asp

ect

of

se

cu

rity

m

ana

ge

me

nt

is

ne

two

rk

sec

uri

ty.

We

ll-kn

ow

n

typ

es

of

atta

cks

inclu

de

D

en

ial-

of-

se

rvic

e

and

Dis

trib

ute

d D

en

ial o

f S

erv

ice

an

d M

an

-in-t

he-m

iddle

att

ack.

A V

irtu

al

Pri

va

te N

etw

ork

ca

n b

e u

se

d t

o p

rovid

e a

cce

ss t

o

a L

oca

l A

rea

Ne

two

rk.

A V

irtu

al

Pri

va

te N

etw

ork

(V

PN

) is

a

se

cu

red

co

nn

ectio

n f

or

rem

ote

acce

ss t

o a

lo

ca

l a

rea

ne

two

rk.

Inte

rne

t P

roto

co

l S

ecu

rity

(IP

Se

c)

is a

typ

ica

l se

cu

rity

pro

toco

l

use

d fo

r b

uild

ing

su

ch

a

V

PN

. P

rett

y G

ood

P

riva

cy (P

GP

)

pro

vid

es d

ata

encry

ptio

n a

nd d

ecry

ptio

n f

or

com

mu

nic

atio

n.

Page 8: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

15

Ide

nti

ty M

an

ag

em

en

t in

th

e C

lou

d

Iden

tity

m

ana

ge

me

nt

in

the

Clo

ud

co

me

s

with

th

e

use

o

f

Fe

de

ratio

n a

nd

th

e u

se

of

pre

se

nce

da

ta.

Fe

de

rati

on

re

fers

to c

lou

d b

ase

d i

de

ntity

ma

na

ge

me

nt

en

ablin

g s

ing

le s

ign

-on

for

mu

ltip

le s

yste

ms.

·

·

·

·

Pre

sen

ce

da

ta i

nd

ica

te w

he

the

r a

use

r is

ava

ilab

le,

an

d m

ay

als

o in

dic

ate

pers

on

al in

form

atio

n p

rovid

ed

by t

he

use

r o

n h

is

or

her

mo

od

, lo

ca

tio

n

or

activity.

A

sta

nd

ard

p

roto

co

l fo

r

pre

se

nce

is t

he E

xte

nsib

le M

essa

gin

g a

nd

Pre

se

nce

Pro

toco

l

(XM

PP

). I

t ca

n b

e p

art

of

an

In

sta

nt

Messa

gin

g a

nd P

rese

nce

Se

rvic

e (

IMP

S).

Lo

cati

on

in

form

ati

on

is

u

se

d to

d

ete

rmin

e th

e g

eo

gra

ph

ic

loca

tio

n o

f th

e u

se

r o

f a

n a

pplic

atio

n.

Lo

ca

tio

n d

ata

ca

nno

t b

e

use

d t

o i

de

ntify

or

tra

ck a

n i

nd

ivid

ua

l u

se

r n

or

to d

ete

rmin

e

wh

o h

as a

cce

sse

d a

docu

me

nt

sto

red

in

th

e c

lou

d.

Th

e u

se

r's

ide

ntity

m

ay

or

ma

y

no

t b

e

kn

ow

n

to

the

app

lica

tio

n,

dep

en

din

g o

n t

he a

pp

lica

tio

n.

Se

cu

rity

pro

toco

ls l

ike

an

d O

pen

ID c

an b

e u

se

d.

Th

an

ks t

o

the u

se

of

the

Op

en

ID s

tan

dard

, u

se

rs c

an c

reate

an

acco

un

t

once

a

nd

th

en

use

th

ose

a

cco

un

ts

for

sig

nin

g

on

to

a

ny

we

bsite

w

hic

h a

cce

pts

O

pen

ID a

uth

entica

tio

n.

Op

en

ID h

as

beco

me

m

ore

a

nd

m

ore

com

mo

n o

ve

r th

e p

revio

us ye

ars

,

and

ado

ptio

n is s

till

gro

win

g.

Clo

ud C

om

putin

g P

ocket

Guid

e

16

Eva

lua

tin

g C

lou

d c

om

pu

tin

g

Whe

n e

va

lua

tin

g c

lou

d c

om

pu

tin

g i

mp

lem

en

tati

on

s,

both

perf

orm

ance

fa

cto

rs,

ma

na

ge

me

nt

requ

ire

me

nts

a

nd

sa

tisfa

ctio

n

facto

rs

as

we

ll a

s

se

rvic

e

pro

vid

ers

a

nd

the

ir

se

rvic

es in

Clo

ud

co

mp

utin

g a

re r

ele

va

nt.

E.g

., w

he

n c

onsid

eri

ng t

o u

se

So

ftw

are

-as-a

-Se

rvic

e,

a t

ria

l

pe

rio

d c

an h

elp

to

eva

lua

te t

hat

the s

ele

cte

d a

pp

lica

tio

n i

s

app

rop

riate

. C

ha

ng

es i

n t

he

in

fra

str

uctu

re c

an b

e p

erf

orm

ed

aft

er

the

tria

l p

eri

od.

Oth

er

asp

ects

a

re

mo

re

difficu

lt

to

asse

ss.

Th

e b

an

dw

idth

d

uring

th

e tr

ial

peri

od m

ay n

ot

be

realis

tic

and

b

an

dw

idth

ca

n

be

en

larg

ed

w

hile

u

sin

g

the

app

lica

tio

n.

Als

o,

the t

ria

l p

erio

d w

ill t

yp

ica

lly b

e t

oo s

hort

to

su

ffic

iently e

va

lua

te t

he S

LA

with

th

e v

en

dor.

The b

us

ine

ss c

as

e fo

r C

loud

co

mp

utin

g ca

n b

e b

uilt

on a

com

pariso

n

betw

ee

n

co

sts

a

nd

p

ossib

le

sa

vin

gs

of

Clo

ud

com

putin

g.

Usin

g C

lou

d c

om

putin

g m

ay n

ee

d l

ess s

taff

, b

ut

usin

g C

lou

d co

mp

utin

g d

oes a

lso

co

me

w

ith

th

e n

ee

d fo

r

sp

ecia

lize

d

skill

s.

Usin

g

Clo

ud

co

mp

utin

g

ma

y

pla

ce

le

ss

str

ess o

n I

T s

taff

fre

ed

fro

m n

orm

al

daily

activitie

s a

s s

een

in

typ

ica

l d

ata

ce

nte

rs.

E.g

.,

there

m

ay

be

less

wo

rry

abo

ut

norm

al d

aily

activitie

s lik

e m

akin

g b

acku

ps.

Whe

n co

nsid

erin

g th

e T

ota

l C

os

t o

f O

wn

ers

hip

(T

CO

) of

both

a p

ote

ntia

l C

loud

se

rvic

e a

nd

th

e a

lte

rna

tive

, a

ll re

leva

nt

asp

ects

nee

d t

o b

e t

ake

n i

nto

acco

un

t. F

or

insta

nce

, fa

cili

tie

s

and

e

nviro

nm

ent

asp

ects

in

clu

din

g

ele

ctr

icity

pla

y

a

role

.

Pra

ctice

has le

arn

ed

th

at

the C

lou

d i

s n

ot

an

a

ll-or-

noth

ing

sce

na

rio fo

r th

e e

ntire

IT

. R

ece

nt

ado

pte

rs h

ave

se

en

th

e

ben

efits

of

a m

ixe

d (

hyb

rid

) e

nvir

onm

ent

base

d o

n a

th

oro

ug

h

und

ers

tan

din

g o

f th

eir b

usin

ess a

nd

th

eir s

pecific

ne

ed

s.

Page 9: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

17

Re

fere

nc

es

EX

IN (

ed)

Clo

ud

co

mp

utin

g F

ou

nda

tio

n -

Pre

pa

ratio

n G

uid

e

EX

IN,

20

11

EX

IN (

ed)

Clo

ud

co

mp

utin

g F

ou

nda

tio

n -

Sa

mp

le Q

ue

stio

ns

EX

IN,

20

11

EX

IN (

ed)

Clo

ud

co

mp

utin

g F

ou

nda

tio

n, b

asic

tra

inin

g m

ate

ria

l

EX

IN,

20

11

Ch

ris H

ard

ing

Clo

ud

Co

mp

utin

g F

or

Bu

sin

ess,

Th

e O

pe

n G

rou

p G

uid

e

Va

n H

are

n P

ublis

hin

g,

20

11

ISB

N:

97

8 9

0 8

753

657

2

Clo

ud C

om

putin

g P

ocket

Guid

e

18

Te

st

yo

urs

elf

Pa

rt

1

1. W

hic

h f

un

cti

on

ality

is

be

st

su

ite

d t

o p

rov

ide

sin

gle

sig

n-o

n o

n a

clo

ud

ap

pli

ca

tio

n u

sin

g y

ou

r o

wn

Ac

tiv

e

Dir

ecto

ry s

erv

er?

A.

Fe

dera

tio

n s

erv

ice

s

B.

Virtu

al P

riva

te N

etw

ork

C. H

yp

ert

ext

Tra

nsfe

r P

roto

co

l

D.

No

ne

of

the

ab

ove

2. W

hic

h o

f th

e f

oll

ow

ing

is m

os

t ty

pic

al o

f a

Lo

cal

Clo

ud

imp

lem

en

tati

on

?

A.

It is n

ot

sh

are

d w

ith

oth

er

use

rs

B. S

erv

ers

are

ke

pt

in-h

ouse

C. T

he a

pp

lica

tio

n r

un

s a

s a

se

rvic

e

D. T

he S

erv

ice

Pro

vid

er

en

su

res e

nd-t

o-e

nd c

ove

rag

e

3. W

hic

h o

f th

e f

oll

ow

ing

ma

y t

yp

ica

lly

ha

ve

a n

eg

ati

ve

imp

act

on

th

e b

us

ine

ss c

ase

fo

r C

lou

d c

om

pu

tin

g?

A.

Co

sts

of

ba

nd

wid

th a

nd n

etw

ork

ing

B.

Co

sts

of

op

era

tio

na

l sta

ffin

g

C.

Co

sts

of

ne

w h

ard

wa

re in

ve

stm

ents

D.

Te

ch

nic

al kn

ow

ledg

e o

f th

e S

erv

ice

De

sk

Page 10: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

19

4. W

he

n r

ea

d a

cce

ss t

o d

ata

by u

na

uth

ori

ze

d p

eo

ple

fro

m

the

In

tern

et

is a

th

rea

t, w

hic

h a

sp

ec

t o

f s

ec

uri

ty i

s a

t

ris

k?

A.

Co

nfid

en

tia

lity

B.

Inte

gri

ty

C.

Ava

ilab

ility

D.

Au

the

ntica

tio

n

5. W

ha

t is

th

e h

yp

erv

iso

r u

sed

fo

r?

A.

Lin

kin

g b

etw

ee

n a

pp

lica

tio

ns

B.

Str

ong

auth

en

tica

tio

n

C.

Pri

va

cy r

eg

ula

tio

ns

D.

Virtu

aliz

atio

n

Clo

ud C

om

putin

g P

ocket

Guid

e

20

Pa

rt

2

1. O

n w

hic

h p

art

of

the

OS

I re

fere

nc

e m

od

el w

ou

ld

ap

pli

ca

tio

n p

roto

co

ls lik

e H

TT

P,

FT

P,

SS

H,

Te

lne

t b

e

ma

pp

ed

?

A.

Fra

me

Rela

y

B.

La

ye

r 7

C.

La

ye

r 1

0

D.

Co

re p

roto

co

ls

2. W

hic

h o

f th

e f

oll

ow

ing

is N

OT

a b

en

efi

t o

f

vir

tua

liza

tio

n?

A.

Imp

rove

d d

ata

ba

se

perf

orm

ance

B.

Fa

il-o

ve

r b

etw

ee

n m

ach

ines

C.

Mu

ltip

le g

uest

op

era

tin

g s

yste

ms r

unn

ing o

n th

e p

hysic

al

mach

ine

D.

Be

tter

ha

rdw

are

ca

pa

city u

sa

ge

3. W

ha

t c

ou

ld b

e t

he

im

pa

ct

of

ne

two

rk d

ow

nti

me

wh

en

us

ing

Clo

ud

co

mp

uti

ng

?

A. In

tegri

ty o

f d

ata

ca

n b

e c

om

pro

mis

ed

B. A

pp

lica

tio

n a

va

ilable

ma

y b

e lo

we

r fo

r th

e u

se

r

C. S

erv

ice

pro

vid

er

assu

me

s r

esp

on

sib

ility

fo

r S

erv

ice

Le

ve

l

D. F

ail-

ove

r to

a lo

ca

l n

etw

ork

is r

equ

ire

d

Page 11: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

21

4. W

hic

h o

f th

e f

oll

ow

ing

is t

he

BE

ST

de

fin

itio

n f

or

the

Clo

ud

?

A.

A la

rge

po

ol o

f u

sa

ble

an

d a

cce

ssib

le v

irtu

aliz

ed r

eso

urc

es

B.

A s

oft

wa

re p

ack

ag

e f

rom

Go

og

le f

or

Off

ice

use

C.

A s

eri

es

of

inte

rco

nn

ect

ed

We

b s

ite

s

D.

Eth

ern

et

ba

sed

acc

ess

to

vir

tua

lize

d a

pp

lica

tio

ns

5.

Wh

at

wo

uld

be

a t

yp

ica

l u

se f

or

the

XM

PP

pro

toco

l?

A. In

sta

nt

Messa

gin

g a

nd

Pre

se

nce

Se

rvic

e

B. N

etw

ork

An

aly

ze

r

C.

An

tiviru

s f

unctio

na

lity f

or

fire

wa

lls

D.

Syste

ms m

ana

ge

me

nt

of

virtu

al se

rve

rs

An

swe

r k

ey

s

Pa

rt 1

: 1

A -

2B

- 3

A -

4A

- 5

D

Pa

rt 2

: 1

B -

2A

- 3

B -

4A

- 5

A

Clo

ud C

om

putin

g P

ocket

Guid

e

22

Clo

ud

co

mp

uti

ng

Fo

un

da

tio

n e

xam

E

XIN

off

ers

an e

xam

inatio

n a

nd

ce

rtific

atio

n p

rog

ram

a

bo

ut

Clo

ud

co

mp

utin

g e

sse

ntia

ls.

Th

e e

xam

take

s 6

0 m

inu

tes a

nd

co

nta

ins 4

0 m

ultip

le-c

ho

ice

que

stio

ns.

Use

of

note

s,

bo

oks o

r

oth

er

aid

s is n

ot

allo

we

d.

In o

rde

r to

pa

ss t

he e

xa

m,

yo

u n

ee

d

to h

ave

26 c

orr

ect

answ

ers

out

of

40 q

ue

stio

ns.

Th

ere

are

no

re

qu

ire

me

nts

to

be

allo

we

d t

o t

his

exa

m.

It w

ill

co

st

yo

u a

rou

nd

€ 1

40

,00

. A

tte

ndin

g t

rain

ing is r

eco

mm

end

ed

but

not

req

uire

d.

Mo

st

exa

m l

oca

tio

ns w

ill o

ffe

r th

e e

xam

on

the c

om

pute

r-b

ase

d e

nviro

nm

ent.

Fo

r m

ore

in

form

atio

n,

vis

it t

he E

XIN

We

b s

ite

:

ww

w.e

xin

-exa

ms.c

om