Transcript
Page 1: Cloud Computing Pocket Guide

Clo

ud C

om

puting

Po

cke

t G

uid

e

Ve

rsio

n 2

01

1.1

1.2

0

To

m S

eg

ers

ww

w.t

rain

ing

clo

ud.b

e/c

loud

Clo

ud C

om

putin

g P

ocket

Guid

e

2

Intr

od

uc

tio

n

w T

he

Clo

ud

bring

s a

ne

w t

ool to

th

e t

oo

lbox o

f to

da

y's

Ch

ief

Info

rma

tio

n O

ffic

er.

C

om

pu

tin

g is

d

eliv

ere

d a

s a

p

acka

ge

d

se

rvic

e r

ath

er

than

pro

ducts

. S

hare

d r

eso

urc

es,

so

ftw

are

an

d

info

rma

tio

n a

re d

eliv

ere

d in

a f

lexib

le w

ay t

o t

he

clie

nt

thro

ug

h

the I

nte

rne

t.

Alm

ost

in a

u

tilit

y lik

e w

ay,

like

w

ate

r o

r e

lectr

icity,

Clo

ud

com

putin

g p

rovid

es I

T s

olu

tio

ns f

or

the b

usin

ess a

s a

bla

ck

box se

rvic

e.

Th

e s

erv

ice

is

ju

st

there

, so

me

wh

ere

fr

om

th

e

glo

bal

ne

two

rk.

With

ou

t th

e c

usto

me

r h

avin

g t

o w

orr

y a

bou

t

the t

ech

nic

al a

nd o

pe

ratio

na

l a

sp

ects

of

ke

ep

ing it

run

nin

g.

w

Th

is

Po

cke

t G

uid

e

pro

vid

es

yo

u

a

ge

ne

ral

hig

h-le

ve

l

intr

od

uctio

n

to

Clo

ud

co

mp

utin

g.

Its

co

nte

nts

h

as

bee

n

alig

ne

d

with

th

e

top

ics

for

the

EX

IN

Clo

ud

co

mp

utin

g

Fo

un

da

tio

n e

xa

m.

More

in

form

atio

n a

bo

ut

the E

XIN

exam

ca

n

be f

oun

d a

t th

e e

nd

of

this

Po

cke

t G

uid

e.

Fo

r m

ore

in

fo, g

o t

o w

ww

.exin

.co

m.

Page 2: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

3

Ta

ble

of

Co

nte

nts

In

troduction

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

2

Princip

les o

f C

loud c

om

puting

....

....

....

....

....

....

....

....

....

....

....

4

Usin

g the C

loud

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

5

Benefits

and lim

itations

...

....

....

....

....

....

....

....

....

....

....

....

....

....

7

Basic

backg

round r

eadin

g .

....

....

....

....

....

....

....

....

....

....

....

....

. 9

Clo

ud a

rchitectu

res a

nd s

ecurity

...

....

....

....

....

....

....

....

....

.. 1

3

Evalu

ating

Clo

ud c

om

puting

....

....

....

....

....

....

....

....

....

....

....

. 16

Refe

rences

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

.. 1

7

Test

yours

elf

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

....

18

Clo

ud c

om

puting F

oundation e

xam

....

....

....

....

....

....

....

....

. 22

Clo

ud C

om

putin

g P

ocket

Guid

e

4

Pri

ncip

les o

f C

lou

d c

om

pu

tin

g

Th

e

Clo

ud

is

d

efin

ed

a

s

a

larg

e

po

ol

of

us

ab

le

an

d

acc

es

sib

le

vir

tua

lize

d

reso

urc

es

. It

co

ve

rs

a

dyn

am

ic

deliv

ery

m

ode

l fo

r IT

se

rvic

es b

ase

d o

n In

tern

et

pro

toco

ls.

Sca

lab

le a

nd t

yp

ica

lly v

irtu

aliz

ed

re

so

urc

es a

re p

rovis

ion

ed a

t

the a

pp

lica

tio

n,

pla

tfo

rm o

r in

fra

str

uctu

re le

ve

l.

Ap

pro

pria

tely

, th

ese

se

rvic

es

are

a

lso

re

ferr

ed

to

a

s

So

ftw

are

-as

-a-S

erv

ice

(Sa

aS

),

Pla

tfo

rm-a

s-a

-Se

rvic

e

(Pa

aS

) a

nd

In

fra

str

uc

ture

-as

-a-S

erv

ice (

IaaS

):

·

A S

aa

S s

erv

ice

pro

vid

es a

pplic

atio

n f

unctio

na

lity t

hat

a u

se

r ca

n d

ire

ctly u

se

, e

.g.

Cu

sto

me

r R

ela

tio

nsh

ip

Man

ag

em

ent

(CR

M)

functio

na

lity,

e-m

ail

functio

na

lity,

Off

ice

fu

nctio

na

lity.

·

A P

aa

S se

rvic

e p

rovid

es th

e p

latf

orm

fo

r ru

nn

ing a

cu

sto

m

app

lica

tio

n,

e.g

. a

.N

ET

F

ram

ew

ork

o

n

a

se

rve

r w

ith

a

cce

ss

to

a

num

ber

of

libra

ries

an

d

rela

ted

se

rvic

es.

·

An

Ia

aS

se

rvic

e

co

ve

rs

the

infr

astr

uctu

re

like

a

Win

do

ws

se

rve

r o

r L

inux

se

rve

r fr

om

th

e

Clo

ud

,

inclu

din

g re

qu

ire

d u

nde

rlyin

g re

so

urc

es lik

e sto

rag

e

and

co

nne

ctivity.

Va

rio

us o

ther

functio

na

lity is a

va

ilable

"a

s a

Se

rvic

e"

fro

m t

he

Clo

ud

. E

.g.,

Co

mm

un

ica

tio

n a

s a

Se

rvic

e (

Ca

aS

) is

an

outs

ourc

ed E

nte

rprise

Co

mm

unic

atio

ns s

olu

tio

n t

hat

ca

n b

e

hire

d f

rom

an e

xte

rna

l p

rovid

er.

Su

ch

a C

aa

S s

olu

tio

n c

an

co

ve

r fu

nctio

na

lity f

or

vo

ice

ove

r IP

, In

sta

nt M

essa

gin

g (

IM),

and v

ideo

co

nfe

ren

ce. C

aa

S c

an a

lso

sta

nd f

or

Co

mp

liance-

as-a

-se

rvic

e. O

the

r e

xa

mp

les:

Ide

ntity

-as-a

-Se

rvic

e (

IDa

aS

),

Mon

ito

rin

g-a

s-a

-Se

rvic

e (

Ma

aS

), S

tora

ge

-as-a

-Se

rvic

e.

Page 3: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

5

Us

ing

th

e C

lou

d

Us

ing

a W

eb

br

ow

se

r

A t

yp

ica

l e

xa

mp

le o

f u

sin

g t

he C

lou

d is a

cce

ssin

g a

nd

us

ing

we

b-b

ase

d t

oo

ls o

r a

pp

lica

tio

ns

th

rou

gh

a W

eb

bro

ws

er

as

if

the

pro

gra

ms

we

re

insta

lled

o

n

the

clie

nt.

T

he

y

are

acce

sse

d

from

a

W

eb

bro

wse

r o

r a

d

eskto

p

or

mo

bile

app

lica

tio

ns.

Th

e s

oft

wa

re a

nd

data

are

sto

red

on

a s

erv

er

at

a r

em

ote

lo

ca

tio

n,

acce

sse

d a

nd

use

d v

ia t

he I

nte

rne

t.

Use

rs c

an a

cce

ss W

eb

Ap

plic

atio

ns t

hro

ug

h a

We

b b

row

ser.

Of

co

urs

e,

the b

row

se

r o

n t

he c

lien

t m

ust

be c

om

patib

le w

ith

the

ap

plic

atio

n.

Pro

gra

mm

ing

co

de

ru

ns

on

the

se

rve

r,

ind

epe

nde

ntly f

rom

th

e c

lien

t, a

nd

use

rs d

o n

ot

eve

n n

ee

d t

o

kn

ow

th

e lo

ca

tio

n o

f th

e a

pp

lica

tio

n.

Us

ing

Fa

t C

lie

nts

or

Th

in C

lie

nts

D

iffe

ren

t ty

pes o

f d

evic

es c

an b

e u

se

d t

o a

cce

ss t

he

clo

ud

.

De

pe

ndin

g o

n t

he s

itu

atio

n,

it is p

ossib

le t

o u

se

a T

hin

Cli

en

t,

a c

lien

t co

mp

ute

r w

ith

ou

t a

hard

dri

ve

. M

ultip

le u

se

rs w

ork

on

the s

am

e s

erv

er

ma

ch

ine,

acce

sse

d t

hro

ug

h t

he

ir T

hin

Clie

nt

as a

co

nso

le.

A T

hin

Clie

nt

en

viro

nm

ent

typ

ica

lly a

llow

s f

or

les

s f

reed

om

for

the

use

r to

cu

sto

miz

e

an

d

co

ntr

ol

the

so

ftw

are

a

nd

se

ttin

gs o

n h

is d

eskto

p.

On

a V

irtu

al

De

skto

p I

nfr

astr

uctu

re,

the u

se

r h

as i

ts o

wn

virtu

al

ma

ch

ine o

n t

he s

erv

er,

an

d h

as

alm

ost

the s

am

e c

ontr

ol

an

d s

pecific

ity a

s o

n a

lo

ca

l d

eskto

p

PC

.

Clo

ud C

om

putin

g P

ocket

Guid

e

6

Us

ing

mo

bil

e d

ev

ice

s

Incre

asin

gly

, va

rio

us

mo

bil

e

de

vic

es

ca

n

als

o

be

u

se

d.

To

da

y,

mo

st

ce

ll p

ho

ne

s

have

su

ffic

ient

mem

ory

, a

nd

app

lica

tio

ns in

th

e clo

ud

o

fte

n d

o n

ot

ne

ed

sto

rag

e o

n th

e

clie

nt.

T

hou

sa

nd

s

of

app

lica

tio

ns

are

a

va

ilab

le

for

mo

bile

pla

tfo

rms.

Ad

ditio

na

lly,

sp

ecific

app

lica

tio

ns c

an b

e t

ailo

red f

or

use

on t

he m

obile

de

vic

e.

Diffe

ren

t p

latf

orm

s a

re a

va

ilab

le f

or

mo

bile

d

evic

es,

so

sta

nda

rdiz

atio

n

of

ap

plic

atio

ns

is

imp

ort

ant.

N

ot

all

ap

plic

atio

ns

are

a

va

ilab

le

for

all

mo

bile

pla

tfo

rms.

Esp

ecia

lly w

he

n w

ork

ing o

n m

obile

d

evic

es,

the

re m

ust

be

su

ffic

ient

atte

ntio

n fo

r s

afe

ty.

Fo

r in

sta

nce

, te

xt

messa

gin

g

wh

ile d

rivin

g a

ca

r m

ay b

e d

an

ge

rous.

Lo

okin

g a

t a

scre

en

wh

ile w

ork

ing i

n a

d

an

gero

us e

nvir

onm

ent

ma

y d

istr

act

the

use

r fr

om

ta

kin

g a

pp

rop

ria

te m

easu

res.

In som

e co

un

trie

s,

regu

latio

ns e

xis

t -

e.g

. fo

r p

roh

ibitin

g t

he u

se

of

a c

ell

ph

on

e

wh

ile d

rivin

g.

Page 4: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

7

Be

ne

fits

an

d lim

ita

tio

ns

Be

ne

fits

C

lou

d c

om

putin

g c

om

es w

ith

th

e p

rom

ise

of

the

pote

ntia

l fo

r

red

uc

ed

co

st.

As l

arg

e s

ca

le d

ata

ce

nte

rs b

en

efit

fro

m t

he

inve

stm

ents

by t

he

Se

rvic

e P

rovid

er,

th

ey h

old

th

e p

ote

ntia

l o

f

off

ering

su

bsta

ntia

l e

co

no

mie

s o

f sca

le.

Usin

g

reso

urc

es

like

sto

rage

in

th

e

Clo

ud

re

qu

ire

s

only

inve

stm

ent

in t

he

ca

pa

city n

ee

de

d.

Ad

ditio

na

l n

ee

ds d

o n

ot

requ

ire

bud

get

for

ne

w la

rge

devic

es.

Re

so

urc

es a

nd

se

rvic

es

ca

n b

e a

ctiva

ted a

nd

d

ea

ctiva

ted o

ve

r tim

e in

a

sca

lab

le,

fle

xib

le a

nd

co

st-

eff

icie

nt

wa

y.

Th

e C

lou

d i

nd

eed

allo

ws f

or

a

pa

y-a

s-y

ou

-go

mo

de

l (p

ay-f

or-

use

).

Fo

r in

sta

nce

, im

agin

e

the

ne

ed

a

te

st

and

d

eve

lopm

ent

pla

tfo

rm o

r in

fra

str

uctu

re f

or

a n

ew

ap

plic

atio

n p

roje

ct

for

only

a l

imite

d p

eri

od o

f tim

e.

Ra

the

r th

an

bu

yin

g n

ew

se

rve

r a

nd

sto

rag

e h

ard

wa

re a

nd

data

base

and

syste

m s

oft

wa

re f

or

this

pro

ject,

yo

u c

an

als

o u

se

th

e t

em

po

rary

cap

ac

ity f

rom

th

e

Clo

ud

fo

r th

e t

ime

yo

u n

ee

d it.

Oth

er

typ

ica

l ca

nd

ida

tes

for

the

Clo

ud

in

clu

de

th

ose

app

lica

tio

ns

or

se

rvic

es

wh

ere

d

em

an

d

for

ca

pa

cit

y

is

dif

fic

ult

to

pre

dic

t. T

his

ca

n a

lso

be

beca

use

it

is i

ncre

asin

g

or

decre

asin

g a

t a

ra

pid

sp

ee

d,

be

ca

use

it

ca

n v

ary

or

burs

t

ve

ry h

ea

vily

ove

r tim

e,

or

is lin

ke

d t

o a

cyclic

al e

vo

lutio

n.

Als

o,

go

ing liv

e w

ith

a

n

ew

a

pp

lica

tio

n o

r se

rvic

e m

ay

be

possib

le in

h

ours

ra

the

r th

an

w

ee

ks o

r m

onth

s.

Th

is m

ay

su

pp

ort

a

m

ore

fle

xib

le a

nd p

lan

nin

g fo

r n

ew

re

lea

se

s a

nd

there

fore

im

pro

ve

th

e T

ime

-to

-ma

rke

t a

nd

Tim

e t

o V

alu

e.

Clo

ud C

om

putin

g P

ocket

Guid

e

8

Lim

ita

tio

ns

O

n

the

oth

er

ha

nd,

Clo

ud

co

mp

utin

g

co

me

s

with

a

de

pe

nd

en

cy

fro

m

Inte

rne

t c

on

ne

cti

vit

y.

Su

ffic

ient

ban

dw

idth

is n

ee

ded

. In

ca

se

of

netw

ork

pro

ble

ms,

reso

urc

es

in t

he

Clo

ud

ma

y h

ave

lo

we

r a

va

ilab

ility

a

nd

lo

ng

er

acce

ss

tim

es.

De

pen

din

g o

n t

he

ap

plic

atio

n n

ee

ds,

late

ncy o

n t

he lin

e

ma

y d

ire

ctly in

flu

en

ce

ap

plic

atio

n p

erf

orm

ance

.

Re

gu

lati

on

s a

nd

co

mp

lia

nc

y r

eq

uir

em

en

ts m

ay v

ary

fro

m

co

un

try t

o c

oun

try a

nd

fro

m s

itu

atio

n t

o s

itu

atio

n.

Esp

ecia

lly

gove

rnm

ent

entitie

s m

ay b

e s

ubje

ct

to a

dd

itio

nal

restr

ictio

ns

on w

here

th

e d

ata

is l

oca

ted.

Th

is m

ay m

ake

it

mo

re d

ifficu

lt

to re

ly o

n a

p

ub

lic clo

ud

p

rovid

er

with

d

ata

ce

nte

rs in

o

the

r

co

un

trie

s.

Clo

ud

co

mp

utin

g

co

me

s

with

in

here

nt

nee

ds

to

co

ntr

ol

sec

uri

ty a

ppro

pri

ate

ly.

Re

so

urc

es i

n t

he C

lou

d m

ay in

de

ed

be

mo

re

difficu

lt

to

pro

tect

ag

ain

st

intr

usio

ns

an

d

oth

er

se

cu

rity

risks.

Pa

rt

of

the

se

cu

rity

ch

alle

ng

e

is

linke

d

to

runn

ing

ap

plic

atio

ns

ove

r a

p

ub

licly

a

cce

ssib

le

ne

two

rk.

Ad

ditio

na

lly,

lea

vin

g co

ntr

ol

to a

n e

xte

rna

l se

rvic

e p

rovid

er,

ope

ratin

g o

n a

la

rge

sh

are

d e

nvir

onm

ent,

co

me

s w

ith

a n

ee

d

to p

ut

tru

st

in th

e s

erv

ice

pro

vid

er.

Po

ssib

ly

eve

n

mo

re

tha

n

for

tra

ditio

n

se

rvic

e

co

ntr

acts

,

co

ntr

actu

al

co

mm

itm

en

ts f

rom

th

e e

xte

rna

l p

rovid

er

as w

ell

as

role

s

and

re

sp

on

sib

ilitie

s

nee

d

to

be

ve

ry

cle

ar

to

all

part

ies in

vo

lve

d.

Co

ntr

acts

co

me

with

a c

lea

r S

erv

ice

Le

ve

l

Ag

ree

me

nt

and

so

me

tim

es

als

o

a

pen

alty

me

ch

an

ism

fo

r

bre

ach

es.

Page 5: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

9

Ba

sic

ba

ck

gro

un

d r

ea

din

g

His

tor

ica

l b

ac

kg

ro

un

d

Clo

ud

co

mp

utin

g c

an b

e s

itu

ate

d w

ith

in a

n e

vo

luti

on

of

IT.

Ea

rly m

ain

fram

e c

om

pute

rs w

ere

la

rge a

cco

un

tin

g m

ach

ine

s,

se

rvin

g a

sin

gle

pu

rpo

se

, lo

ng b

efo

re o

ther

functio

ns lik

e w

ord

pro

ce

ssin

g,

de

sig

nin

g

an

d

gam

ing

we

re

ava

ilab

le.

Th

e

Pe

rso

na

l C

om

pute

r b

rou

gh

t IT

re

so

urc

es c

lose

r to

th

e u

se

r.

Th

en

, th

e C

lient

/ S

erv

er

mo

de

l b

rou

ght

a c

om

bin

atio

n o

f th

e

use

of

a C

lien

t a

nd

Se

rve

r re

so

urc

es a

cce

sse

d t

hro

ugh

th

e

netw

ork

. T

oda

y,

va

rio

us I

T r

eso

urc

es a

re u

se

d o

n t

he l

oca

l

clie

nt

an

d o

ve

r th

e n

etw

ork

on a

wid

e r

an

ge o

f d

evic

es.

Se

rve

r in

fra

str

uctu

res u

se

virtu

aliz

atio

n a

nd h

igh

-pe

rfo

rma

nce

netw

ork

s

to

off

er

eve

r in

cre

asin

g

fle

xib

ility

. O

ve

r th

e

past

deca

de

s,

ne

two

rks h

ave

be

co

me

in

terc

onn

ecte

d t

hro

ugh

th

e

Inte

rne

t, w

hic

h e

vo

lve

d f

rom

an

in

itia

tive

of

the

US

Min

istr

y o

f

De

fense

. R

elia

bili

ty

an

d

ban

dw

idth

o

f co

nn

ectio

ns

ha

ve

imp

rove

d,

an

d c

osts

are

de

cre

asin

g.

Th

is h

as o

pen

ed n

ew

tech

nic

al

po

ssib

ilit

ies

to

a

cce

ss

app

lica

tio

ns

an

d

oth

er

reso

urc

es o

ve

r th

e I

nte

rne

t.

At

the s

am

e t

ime

, o

rga

niz

atio

ns h

ave

op

ted

to

fo

cu

s o

n t

he

Co

re B

us

ine

ss

. S

om

e a

sp

ects

of

IT h

ave t

urn

ed o

ut

to b

e

str

ate

gic

to

th

e

bu

sin

ess,

and

h

ave

b

ee

n

co

nsid

ere

d

ke

y

asse

ts f

or

the o

rga

niz

atio

n.

Bu

t o

ve

r tim

e,

oth

er

asp

ects

of

IT

have

b

ee

n

co

nsid

ere

d

co

mm

odity

se

rvic

es

tha

t ca

n

be

outs

ourc

ed

o

r o

pe

rate

d

with

p

art

ne

rs.

So

me

o

rga

niz

atio

ns

decid

ed t

o r

ely

on M

an

age

d S

erv

ice

s f

or

the

ma

na

ge

me

nt

of

their IT

se

rvic

es.

Su

ch

o

rgan

iza

tio

ns h

ave

e

vo

lve

d to

wa

rds

not

wa

ntin

g t

o c

are

ab

out

the t

ech

nic

al a

nd

op

era

tio

na

l d

eta

ils

of

the

ir I

T r

eso

urc

es a

nd

IT

in

fra

str

uctu

re a

nym

ore

.

Clo

ud C

om

putin

g P

ocket

Guid

e

10

Ne

two

rk

ing

te

ch

no

log

ies

E

ve

n

thou

gh

a

ne

two

rk

is

not

alw

ays

a

Clo

ud

, it

is

an

imp

ort

ant

ele

me

nt

for

it.

Ne

two

rks h

ave

e

vo

lve

d fr

om

e

arl

y

inco

mp

atib

le

pro

prieta

ry

netw

ork

s

into

to

da

y's

sta

nd

ard

s

wh

ich

in

clu

de

Eth

ern

et,

TC

P/I

P a

nd

HT

TP

.

·

Th

e E

the

rne

t is

th

e l

ead

ing

netw

ork

le

ve

l p

roto

co

l fo

r

runn

ing t

he

Loca

l A

rea

Ne

two

rk.

Ea

rly s

tan

dard

iza

tio

n

by

the

In

stitu

te

for

Ele

ctr

ica

l a

nd

E

lectr

on

ics

En

gin

eers

(I

EE

E)

has

en

able

d

its

su

cce

ss

aga

inst

com

petin

g te

ch

nolo

gie

s.

·

Th

e

Inte

rne

t p

roto

co

l su

ite

(T

CP

/IP

) is

th

e

se

t o

f

com

mu

nic

atio

ns p

roto

co

ls u

se

d f

or

the

In

tern

et.

Th

e

Tra

nsm

issio

n C

on

tro

l P

roto

co

l (T

CP

) a

nd

the I

nte

rne

t

Pro

toco

l (I

P)

pro

toco

ls a

re p

art

of

it.

·

Th

e H

yp

ert

ext

Tra

nsfe

r P

roto

co

l (H

TT

P)

is t

he b

asis

for

data

co

mm

unic

atio

n o

n th

e W

orld W

ide W

eb

. It

no

w

is

an

off

icia

l sta

nd

ard

fr

om

th

e

Inte

rne

t

En

gin

eerin

g T

ask F

orc

e (

IET

F)

and

th

e W

orld W

ide

Web

C

on

so

rtiu

m

(W3

C),

d

ocu

me

nte

d

in

so

-ca

lled

Re

qu

ests

fo

r C

om

me

nts

(R

FC

s).

HT

TP

defin

es n

ine

actio

ns o

n d

ata

, in

clu

din

g H

EA

D,

GE

T a

nd

PO

ST

.

Ne

two

rkin

g p

roto

co

ls a

re c

om

mo

nly

ma

pp

ed

on

th

e 7

la

ye

rs

of

the O

pe

n S

yste

ms

In

terc

on

ne

cti

on

mo

de

l (O

SI

mo

de

l).

Alth

ou

gh n

o e

nd

-use

r w

ou

ld t

yp

ica

lly n

ee

d t

o d

eb

ug

th

e u

se

of

these

sta

nd

ard

p

roto

co

ls,

tro

ub

lesh

ootin

g

is

ce

rta

inly

possib

le b

y u

sin

g p

roto

co

l a

na

lyze

rs (s

niffe

rs).

D

ep

en

din

g

on t

he c

onfig

ura

tio

n o

f th

e n

etw

ork

, su

ch

to

ols

ma

y a

lso

be

use

d

to

reco

nstr

uct

co

nfid

en

tia

l d

ata

b

ein

g

tra

nsfe

rre

d.

Th

ere

fore

th

e u

se

of

them

ma

y b

e p

roh

ibite

d o

r co

nsid

ere

d a

se

cu

rity

th

rea

t.

Page 6: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

11

Fo

rm

att

ing

sta

nd

ar

ds

W

he

n su

pp

ort

ing

C

lou

d co

mp

utin

g,

so

me

u

nd

ers

tan

din

g o

f

scrip

tin

g a

nd

co

nte

nt-

form

attin

g la

ng

ua

ges a

nd a

pp

roach

es

for

ba

ck-u

p a

nd r

eco

very

ca

n b

e u

se

ful.

Th

e W

eb s

erv

er

typ

ica

lly c

ove

rs m

ost

of

the c

om

putin

g t

o b

e

don

e,

in

se

rve

r-sid

e

pro

gra

mm

ing

lang

uag

es

Th

e

clie

nt

typ

ica

lly r

ece

ive

s p

ag

es i

n t

he H

yp

ert

ext

Ma

rku

p L

an

gu

ag

e

and

add

itio

na

l co

nte

nt

that

ca

n b

e d

isp

laye

d t

hro

ug

h b

row

se

r-

plu

gin

s.

Su

ch

p

ag

es ca

n co

nta

in scrip

tin

g th

at

run

s o

n th

e

clie

nt,

w

ritt

en

in

Ja

va

Scrip

t.

Ja

va

Scrip

t O

bje

ct

No

tatio

n

(JS

ON

) is

a s

ub

se

t o

f Ja

va

Scrip

t ty

pic

ally

use

d t

o e

xch

an

ge

data

. E

xte

nsib

le M

ark

up L

an

gu

ag

e (

XM

L)

is a

sta

nd

ard

of

the

World

W

ide

We

b

Co

nso

rtiu

m

for

the

syn

tax

of

ma

rkup

lan

gua

ges f

or

str

uctu

red

da

ta.

XM

L c

an

be r

ea

d i

n a

num

ber

of

pro

gra

ms,

inclu

din

g t

he b

row

se

r.

It

is

use

ful

to

ha

ve

a

b

asic

u

nd

ers

tan

din

g

of

sto

rag

e

co

nce

pts

. N

etw

ork

-atta

ch

ed

sto

rag

e (

NA

S)

refe

rs t

o a

sto

rag

e

devic

e t

hat

is c

onn

ecte

d t

o t

he

netw

ork

. N

AS

de

vic

es a

re i

n

fact

com

ple

te

file

se

rve

rs.

Co

mm

on

Inte

rne

t F

ile

Syste

m

(CIF

S)

or

Se

rve

r M

essa

ge

Blo

ck (

SM

B),

is a

netw

ork

pro

toco

l

for

sh

are

d a

cce

ss t

o f

iles a

nd

oth

er

reso

urc

es.

More

in

g

en

era

l,

sta

nd

ard

s

are

im

port

ant.

A

pp

lica

tio

n

of

sta

nd

ard

s

pro

vid

es

un

ifo

rmity

an

d

port

ab

ility

. S

tand

ard

org

an

iza

tio

ns

inclu

de

th

e

Inte

rna

tio

nal

Org

an

iza

tio

n

for

Sta

nd

ard

iza

tio

n (

ISO

) a

nd

in

du

str

ial

org

an

iza

tio

ns.

Th

e O

pen

Clo

ud

C

onso

rtiu

m

(OC

C)

is

a

no

t-fo

r-p

rofit

su

pp

ort

ing

th

e

clo

ud

co

mm

unity b

y o

pe

ratin

g c

lou

d in

fra

str

uctu

re.

Clo

ud C

om

putin

g P

ocket

Guid

e

12

Co

nc

ep

ts o

f V

irtu

ali

za

tio

n a

nd

Ma

na

ge

me

nt

Vir

tua

liza

tio

n is t

he

cre

atio

n o

f a

virtu

al ve

rsio

n o

f so

me

thin

g,

su

ch

a

s a

h

ard

wa

re p

latf

orm

, o

pe

ratin

g syste

m,

a sto

rag

e

devic

e o

r n

etw

ork

re

so

urc

es.

Se

rve

r h

ard

wa

re virtu

aliz

atio

n

invo

lve

s r

un

nin

g s

eve

ral

vir

tual

ma

ch

ines (

als

o c

alle

d g

ue

st

mach

ines)

on t

he

sa

me

physic

al

se

rve

r (a

lso

ca

lled

th

e h

ost

mach

ine).

Th

e s

erv

er

runs a

hyp

erv

iso

r, w

hic

h l

ies b

en

ea

th

the g

ue

st

op

era

tin

g s

yste

ms a

nd

ma

na

ge

s t

he

exe

cu

tio

n o

f

them

.

Be

ne

fits

of

tod

ay's

virtu

aliz

atio

n te

ch

no

logie

s i

nclu

de

bett

er

usa

ge

o

f a

va

ilab

le

hard

wa

re,

mo

re

fle

xib

ility

in

u

sin

g

hard

wa

re a

nd

oth

er

reso

urc

es,

hig

h-a

va

ilab

ility

by p

erf

orm

ed

both

p

lann

ed

an

d

unp

lan

ne

d

fail-

ove

r b

etw

ee

n

ph

ysic

al

mach

ines,

an

d

the

pote

ntia

l fo

r sp

ecific

m

ana

ge

me

nt

functio

na

lity o

n t

he v

irtu

aliz

atio

n la

ye

r.

Th

e h

yp

erv

iso

r d

oe

s n

ot

run

an a

ntiviru

s s

oft

wa

re.

Wh

en

one

of

the v

irtu

al m

ach

ines is a

ffe

cte

d b

y a

vir

us

, o

nly

th

at

virtu

al

mach

ine is in

fecte

d.

Op

en

Vir

tua

liza

tio

n F

orm

at

(OV

F)

is a

n o

pe

n s

tan

dard

fo

r

packa

gin

g

an

d

dis

trib

utin

g

virtu

al

app

liance

s

or

mo

re

gen

era

lly s

oft

wa

re t

o b

e r

un

in

virtu

al m

ach

ines.

Re

leva

nt

sta

nd

ard

s a

nd

pro

toco

ls f

or

sys

tem

s m

an

ag

em

en

t

inclu

de t

he f

ollo

win

g:

·

WB

EM

: W

eb

-Ba

se

d E

nte

rprise

Ma

nag

em

ent

·

DM

TF

: D

istr

ibute

d M

an

age

me

nt T

ask F

orc

e

·

SM

I-S

: S

tora

ge

Ma

na

gem

ent

Initia

tive

Sp

ecific

atio

n

·

SM

AS

H:

Syste

m M

an

ag

em

ent

Arc

hite

ctu

re f

or

Syste

m H

ard

wa

re

Page 7: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

13

Clo

ud

arc

hit

ec

ture

s a

nd

se

cu

rity

Clo

ud

ar

ch

ite

ctu

re

s

Clo

ud

co

mp

utin

g c

om

es a

s a

lo

gic

al

evo

lutio

n f

rom

co

nce

pts

like

Se

rvic

e O

rie

nte

d A

rch

ite

ctu

re,

dis

trib

ute

d c

om

putin

g a

nd

virtu

aliz

atio

n.

To

da

y,

Tie

red

, M

ult

ipu

rpo

se a

nd

Da

tace

nte

r

arc

hit

ec

ture

s a

re u

se

d.

·

Th

e W

eb fr

ont-

end

is

re

sp

on

sib

le fo

r re

sp

on

din

g to

clie

nt

req

uests

.

·

Th

e

Bu

sin

ess

log

ic

tie

r e

nab

les

mu

ltip

le

back-e

nd

app

lica

tio

n s

erv

ers

.

·

Th

e D

ata

base

tie

r e

nsu

res lo

ad

ba

lan

ce

d d

ata

base

s.

A

loa

d

ba

lance

r m

ake

s

su

re

that

the

ba

ck-e

nd

se

rve

rs

pro

pe

rly d

istr

ibute

the

wo

rklo

ad

.

With

a P

riva

te C

lou

d o

r L

oc

al

Clo

ud

im

ple

me

nta

tio

n,

se

rve

rs

are

ke

pt

in-h

ou

se

. S

erv

ers

in

lo

ca

l clo

ud

s m

ay b

e a

cce

sse

d

by

both

u

se

rs

at

the

lo

ca

tio

n

of

the

d

ata

ce

nte

r a

nd

fro

m

outs

ide

th

e lo

ca

tio

n o

f th

e d

ata

ce

nte

r. S

erv

ers

and

th

e c

lients

usin

g t

he

m a

re n

ot

nece

ssa

rily

on t

he

sa

me

lo

ca

tio

n o

r e

ve

n

in t

he s

am

e c

oun

try.

Th

e

Priva

te

Clo

ud

im

ple

me

nta

tio

n

is

to

be

se

en

a

ga

inst

Pu

bli

c C

lou

d a

nd H

yb

rid

Clo

ud

im

ple

me

nta

tio

ns.

Th

e w

ord

Pa

rtn

er

Clo

ud

is

so

me

tim

es

use

d

for

hoste

d

so

lutio

n

that

pro

vid

es

a

hig

he

r le

ve

l o

f co

ntr

ol

than

P

ub

lic

Clo

ud

imp

lem

enta

tio

ns

bu

t ye

t ru

ns

off

p

rem

ise

s

and

w

ith

th

e

eco

no

mie

s

of

sca

le

that

co

me

with

a

(s

em

i-)s

hare

d

enviro

nm

ent.

Clo

ud C

om

putin

g P

ocket

Guid

e

14

Se

cu

rit

y p

rin

cip

les

C

lou

d

co

mp

utin

g

co

me

s

with

s

ecu

rity

ri

sk

s,

inclu

din

g

co

nce

rns

ove

r p

rote

ctio

n

of

data

. A

ppro

pri

ate

m

itig

atin

g

me

asu

res

nee

d

to

be

ta

ke

n.

Th

ere

m

ust

be

app

ropria

te

atte

ntio

n f

or

priva

cy a

nd

co

mp

liance

issu

es a

nd s

afe

gu

ard

s -

e.g

. th

e

He

alth

P

ort

ab

ility

a

nd

A

cco

un

tab

ility

A

ct

(HIP

AA

)

priva

cy r

ule

pro

vid

es p

rote

ctio

n o

f h

ea

lth

in

form

atio

n.

The

e

sse

ntia

l e

lem

ents

o

f se

cu

rity

a

re

Co

nfi

de

nti

ali

ty,

Inte

gri

ty

an

d

Av

ail

ab

ilit

y.

Da

ta

sh

ou

ld

ind

eed

o

nly

b

e

acce

sse

d

by

au

tho

rize

d

pe

op

le

(co

nfid

en

tia

lity)

an

d

mo

dific

atio

ns s

hou

ld o

nly

com

e f

rom

auth

ori

ze

d p

eo

ple

an

d

pro

ce

sse

s

(in

teg

rity

).

Ba

cku

ps

help

e

nsu

re

ava

ilab

ility

a

nd

inte

grity

of

info

rma

tio

n.

Me

asu

res

for

auth

ori

ze

d

use

in

clu

de

A

uth

en

tic

ati

on

,

Au

tho

riza

tio

n a

nd

A

cco

un

tab

ilit

y (A

AA

). A

uth

en

tica

tio

n is

wh

ere

so

me

on

e's

id

en

tity

is

a

uth

entica

ted

, e

.g.

with

a

use

rna

me

a

nd

p

assw

ord

. A

uth

ori

za

tio

n d

ete

rmin

es w

he

the

r

som

eon

e is a

uth

ori

ze

d t

o p

erf

orm

a g

ive

n a

ctivity.

Acco

un

tin

g

invo

lve

s t

he t

rackin

g o

f re

so

urc

e u

sa

ge

fo

r d

iffe

ren

t pu

rpose

s.

On

e

asp

ect

of

se

cu

rity

m

ana

ge

me

nt

is

ne

two

rk

sec

uri

ty.

We

ll-kn

ow

n

typ

es

of

atta

cks

inclu

de

D

en

ial-

of-

se

rvic

e

and

Dis

trib

ute

d D

en

ial o

f S

erv

ice

an

d M

an

-in-t

he-m

iddle

att

ack.

A V

irtu

al

Pri

va

te N

etw

ork

ca

n b

e u

se

d t

o p

rovid

e a

cce

ss t

o

a L

oca

l A

rea

Ne

two

rk.

A V

irtu

al

Pri

va

te N

etw

ork

(V

PN

) is

a

se

cu

red

co

nn

ectio

n f

or

rem

ote

acce

ss t

o a

lo

ca

l a

rea

ne

two

rk.

Inte

rne

t P

roto

co

l S

ecu

rity

(IP

Se

c)

is a

typ

ica

l se

cu

rity

pro

toco

l

use

d fo

r b

uild

ing

su

ch

a

V

PN

. P

rett

y G

ood

P

riva

cy (P

GP

)

pro

vid

es d

ata

encry

ptio

n a

nd d

ecry

ptio

n f

or

com

mu

nic

atio

n.

Page 8: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

15

Ide

nti

ty M

an

ag

em

en

t in

th

e C

lou

d

Iden

tity

m

ana

ge

me

nt

in

the

Clo

ud

co

me

s

with

th

e

use

o

f

Fe

de

ratio

n a

nd

th

e u

se

of

pre

se

nce

da

ta.

Fe

de

rati

on

re

fers

to c

lou

d b

ase

d i

de

ntity

ma

na

ge

me

nt

en

ablin

g s

ing

le s

ign

-on

for

mu

ltip

le s

yste

ms.

·

·

·

·

Pre

sen

ce

da

ta i

nd

ica

te w

he

the

r a

use

r is

ava

ilab

le,

an

d m

ay

als

o in

dic

ate

pers

on

al in

form

atio

n p

rovid

ed

by t

he

use

r o

n h

is

or

her

mo

od

, lo

ca

tio

n

or

activity.

A

sta

nd

ard

p

roto

co

l fo

r

pre

se

nce

is t

he E

xte

nsib

le M

essa

gin

g a

nd

Pre

se

nce

Pro

toco

l

(XM

PP

). I

t ca

n b

e p

art

of

an

In

sta

nt

Messa

gin

g a

nd P

rese

nce

Se

rvic

e (

IMP

S).

Lo

cati

on

in

form

ati

on

is

u

se

d to

d

ete

rmin

e th

e g

eo

gra

ph

ic

loca

tio

n o

f th

e u

se

r o

f a

n a

pplic

atio

n.

Lo

ca

tio

n d

ata

ca

nno

t b

e

use

d t

o i

de

ntify

or

tra

ck a

n i

nd

ivid

ua

l u

se

r n

or

to d

ete

rmin

e

wh

o h

as a

cce

sse

d a

docu

me

nt

sto

red

in

th

e c

lou

d.

Th

e u

se

r's

ide

ntity

m

ay

or

ma

y

no

t b

e

kn

ow

n

to

the

app

lica

tio

n,

dep

en

din

g o

n t

he a

pp

lica

tio

n.

Se

cu

rity

pro

toco

ls l

ike

an

d O

pen

ID c

an b

e u

se

d.

Th

an

ks t

o

the u

se

of

the

Op

en

ID s

tan

dard

, u

se

rs c

an c

reate

an

acco

un

t

once

a

nd

th

en

use

th

ose

a

cco

un

ts

for

sig

nin

g

on

to

a

ny

we

bsite

w

hic

h a

cce

pts

O

pen

ID a

uth

entica

tio

n.

Op

en

ID h

as

beco

me

m

ore

a

nd

m

ore

com

mo

n o

ve

r th

e p

revio

us ye

ars

,

and

ado

ptio

n is s

till

gro

win

g.

Clo

ud C

om

putin

g P

ocket

Guid

e

16

Eva

lua

tin

g C

lou

d c

om

pu

tin

g

Whe

n e

va

lua

tin

g c

lou

d c

om

pu

tin

g i

mp

lem

en

tati

on

s,

both

perf

orm

ance

fa

cto

rs,

ma

na

ge

me

nt

requ

ire

me

nts

a

nd

sa

tisfa

ctio

n

facto

rs

as

we

ll a

s

se

rvic

e

pro

vid

ers

a

nd

the

ir

se

rvic

es in

Clo

ud

co

mp

utin

g a

re r

ele

va

nt.

E.g

., w

he

n c

onsid

eri

ng t

o u

se

So

ftw

are

-as-a

-Se

rvic

e,

a t

ria

l

pe

rio

d c

an h

elp

to

eva

lua

te t

hat

the s

ele

cte

d a

pp

lica

tio

n i

s

app

rop

riate

. C

ha

ng

es i

n t

he

in

fra

str

uctu

re c

an b

e p

erf

orm

ed

aft

er

the

tria

l p

eri

od.

Oth

er

asp

ects

a

re

mo

re

difficu

lt

to

asse

ss.

Th

e b

an

dw

idth

d

uring

th

e tr

ial

peri

od m

ay n

ot

be

realis

tic

and

b

an

dw

idth

ca

n

be

en

larg

ed

w

hile

u

sin

g

the

app

lica

tio

n.

Als

o,

the t

ria

l p

erio

d w

ill t

yp

ica

lly b

e t

oo s

hort

to

su

ffic

iently e

va

lua

te t

he S

LA

with

th

e v

en

dor.

The b

us

ine

ss c

as

e fo

r C

loud

co

mp

utin

g ca

n b

e b

uilt

on a

com

pariso

n

betw

ee

n

co

sts

a

nd

p

ossib

le

sa

vin

gs

of

Clo

ud

com

putin

g.

Usin

g C

lou

d c

om

putin

g m

ay n

ee

d l

ess s

taff

, b

ut

usin

g C

lou

d co

mp

utin

g d

oes a

lso

co

me

w

ith

th

e n

ee

d fo

r

sp

ecia

lize

d

skill

s.

Usin

g

Clo

ud

co

mp

utin

g

ma

y

pla

ce

le

ss

str

ess o

n I

T s

taff

fre

ed

fro

m n

orm

al

daily

activitie

s a

s s

een

in

typ

ica

l d

ata

ce

nte

rs.

E.g

.,

there

m

ay

be

less

wo

rry

abo

ut

norm

al d

aily

activitie

s lik

e m

akin

g b

acku

ps.

Whe

n co

nsid

erin

g th

e T

ota

l C

os

t o

f O

wn

ers

hip

(T

CO

) of

both

a p

ote

ntia

l C

loud

se

rvic

e a

nd

th

e a

lte

rna

tive

, a

ll re

leva

nt

asp

ects

nee

d t

o b

e t

ake

n i

nto

acco

un

t. F

or

insta

nce

, fa

cili

tie

s

and

e

nviro

nm

ent

asp

ects

in

clu

din

g

ele

ctr

icity

pla

y

a

role

.

Pra

ctice

has le

arn

ed

th

at

the C

lou

d i

s n

ot

an

a

ll-or-

noth

ing

sce

na

rio fo

r th

e e

ntire

IT

. R

ece

nt

ado

pte

rs h

ave

se

en

th

e

ben

efits

of

a m

ixe

d (

hyb

rid

) e

nvir

onm

ent

base

d o

n a

th

oro

ug

h

und

ers

tan

din

g o

f th

eir b

usin

ess a

nd

th

eir s

pecific

ne

ed

s.

Page 9: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

17

Re

fere

nc

es

EX

IN (

ed)

Clo

ud

co

mp

utin

g F

ou

nda

tio

n -

Pre

pa

ratio

n G

uid

e

EX

IN,

20

11

EX

IN (

ed)

Clo

ud

co

mp

utin

g F

ou

nda

tio

n -

Sa

mp

le Q

ue

stio

ns

EX

IN,

20

11

EX

IN (

ed)

Clo

ud

co

mp

utin

g F

ou

nda

tio

n, b

asic

tra

inin

g m

ate

ria

l

EX

IN,

20

11

Ch

ris H

ard

ing

Clo

ud

Co

mp

utin

g F

or

Bu

sin

ess,

Th

e O

pe

n G

rou

p G

uid

e

Va

n H

are

n P

ublis

hin

g,

20

11

ISB

N:

97

8 9

0 8

753

657

2

Clo

ud C

om

putin

g P

ocket

Guid

e

18

Te

st

yo

urs

elf

Pa

rt

1

1. W

hic

h f

un

cti

on

ality

is

be

st

su

ite

d t

o p

rov

ide

sin

gle

sig

n-o

n o

n a

clo

ud

ap

pli

ca

tio

n u

sin

g y

ou

r o

wn

Ac

tiv

e

Dir

ecto

ry s

erv

er?

A.

Fe

dera

tio

n s

erv

ice

s

B.

Virtu

al P

riva

te N

etw

ork

C. H

yp

ert

ext

Tra

nsfe

r P

roto

co

l

D.

No

ne

of

the

ab

ove

2. W

hic

h o

f th

e f

oll

ow

ing

is m

os

t ty

pic

al o

f a

Lo

cal

Clo

ud

imp

lem

en

tati

on

?

A.

It is n

ot

sh

are

d w

ith

oth

er

use

rs

B. S

erv

ers

are

ke

pt

in-h

ouse

C. T

he a

pp

lica

tio

n r

un

s a

s a

se

rvic

e

D. T

he S

erv

ice

Pro

vid

er

en

su

res e

nd-t

o-e

nd c

ove

rag

e

3. W

hic

h o

f th

e f

oll

ow

ing

ma

y t

yp

ica

lly

ha

ve

a n

eg

ati

ve

imp

act

on

th

e b

us

ine

ss c

ase

fo

r C

lou

d c

om

pu

tin

g?

A.

Co

sts

of

ba

nd

wid

th a

nd n

etw

ork

ing

B.

Co

sts

of

op

era

tio

na

l sta

ffin

g

C.

Co

sts

of

ne

w h

ard

wa

re in

ve

stm

ents

D.

Te

ch

nic

al kn

ow

ledg

e o

f th

e S

erv

ice

De

sk

Page 10: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

19

4. W

he

n r

ea

d a

cce

ss t

o d

ata

by u

na

uth

ori

ze

d p

eo

ple

fro

m

the

In

tern

et

is a

th

rea

t, w

hic

h a

sp

ec

t o

f s

ec

uri

ty i

s a

t

ris

k?

A.

Co

nfid

en

tia

lity

B.

Inte

gri

ty

C.

Ava

ilab

ility

D.

Au

the

ntica

tio

n

5. W

ha

t is

th

e h

yp

erv

iso

r u

sed

fo

r?

A.

Lin

kin

g b

etw

ee

n a

pp

lica

tio

ns

B.

Str

ong

auth

en

tica

tio

n

C.

Pri

va

cy r

eg

ula

tio

ns

D.

Virtu

aliz

atio

n

Clo

ud C

om

putin

g P

ocket

Guid

e

20

Pa

rt

2

1. O

n w

hic

h p

art

of

the

OS

I re

fere

nc

e m

od

el w

ou

ld

ap

pli

ca

tio

n p

roto

co

ls lik

e H

TT

P,

FT

P,

SS

H,

Te

lne

t b

e

ma

pp

ed

?

A.

Fra

me

Rela

y

B.

La

ye

r 7

C.

La

ye

r 1

0

D.

Co

re p

roto

co

ls

2. W

hic

h o

f th

e f

oll

ow

ing

is N

OT

a b

en

efi

t o

f

vir

tua

liza

tio

n?

A.

Imp

rove

d d

ata

ba

se

perf

orm

ance

B.

Fa

il-o

ve

r b

etw

ee

n m

ach

ines

C.

Mu

ltip

le g

uest

op

era

tin

g s

yste

ms r

unn

ing o

n th

e p

hysic

al

mach

ine

D.

Be

tter

ha

rdw

are

ca

pa

city u

sa

ge

3. W

ha

t c

ou

ld b

e t

he

im

pa

ct

of

ne

two

rk d

ow

nti

me

wh

en

us

ing

Clo

ud

co

mp

uti

ng

?

A. In

tegri

ty o

f d

ata

ca

n b

e c

om

pro

mis

ed

B. A

pp

lica

tio

n a

va

ilable

ma

y b

e lo

we

r fo

r th

e u

se

r

C. S

erv

ice

pro

vid

er

assu

me

s r

esp

on

sib

ility

fo

r S

erv

ice

Le

ve

l

D. F

ail-

ove

r to

a lo

ca

l n

etw

ork

is r

equ

ire

d

Page 11: Cloud Computing Pocket Guide

Clo

ud C

om

putin

g P

ocket

Guid

e

21

4. W

hic

h o

f th

e f

oll

ow

ing

is t

he

BE

ST

de

fin

itio

n f

or

the

Clo

ud

?

A.

A la

rge

po

ol o

f u

sa

ble

an

d a

cce

ssib

le v

irtu

aliz

ed r

eso

urc

es

B.

A s

oft

wa

re p

ack

ag

e f

rom

Go

og

le f

or

Off

ice

use

C.

A s

eri

es

of

inte

rco

nn

ect

ed

We

b s

ite

s

D.

Eth

ern

et

ba

sed

acc

ess

to

vir

tua

lize

d a

pp

lica

tio

ns

5.

Wh

at

wo

uld

be

a t

yp

ica

l u

se f

or

the

XM

PP

pro

toco

l?

A. In

sta

nt

Messa

gin

g a

nd

Pre

se

nce

Se

rvic

e

B. N

etw

ork

An

aly

ze

r

C.

An

tiviru

s f

unctio

na

lity f

or

fire

wa

lls

D.

Syste

ms m

ana

ge

me

nt

of

virtu

al se

rve

rs

An

swe

r k

ey

s

Pa

rt 1

: 1

A -

2B

- 3

A -

4A

- 5

D

Pa

rt 2

: 1

B -

2A

- 3

B -

4A

- 5

A

Clo

ud C

om

putin

g P

ocket

Guid

e

22

Clo

ud

co

mp

uti

ng

Fo

un

da

tio

n e

xam

E

XIN

off

ers

an e

xam

inatio

n a

nd

ce

rtific

atio

n p

rog

ram

a

bo

ut

Clo

ud

co

mp

utin

g e

sse

ntia

ls.

Th

e e

xam

take

s 6

0 m

inu

tes a

nd

co

nta

ins 4

0 m

ultip

le-c

ho

ice

que

stio

ns.

Use

of

note

s,

bo

oks o

r

oth

er

aid

s is n

ot

allo

we

d.

In o

rde

r to

pa

ss t

he e

xa

m,

yo

u n

ee

d

to h

ave

26 c

orr

ect

answ

ers

out

of

40 q

ue

stio

ns.

Th

ere

are

no

re

qu

ire

me

nts

to

be

allo

we

d t

o t

his

exa

m.

It w

ill

co

st

yo

u a

rou

nd

€ 1

40

,00

. A

tte

ndin

g t

rain

ing is r

eco

mm

end

ed

but

not

req

uire

d.

Mo

st

exa

m l

oca

tio

ns w

ill o

ffe

r th

e e

xam

on

the c

om

pute

r-b

ase

d e

nviro

nm

ent.

Fo

r m

ore

in

form

atio

n,

vis

it t

he E

XIN

We

b s

ite

:

ww

w.e

xin

-exa

ms.c

om


Recommended