Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

select the correct answer: In cloud computing, which of the following can play t

ID: 3589011 • Letter: S

Question

select the correct answer:

In cloud computing, which of the following can play the role of a cloud service consumer?

a service

b software program

c network device

d mobile device

In cloud computing, what is considered an IT resource? (select all that apply)

a software program

b virtual server

c wokstation

d storage device

Which of the following cloud computing vulnerabilities is relevant to shared technology issues? (select all that apply)

a hypervisor

b web browser

c virtualization

d social engineering

Explanation / Answer

In cloud computing, which of the following can play the role of a cloud service consumer?
a. service: This is something that is offered to the consumer.
b. software program: This is also a kind of service (SaaS) offered to the consumer.
c. Network device: This is also a kind of service (IaaS) offered to the consumer.
d. mobile device: This can be considered the role of a cloud service consumer.
       It can use any of the above specified services.
So, D is the answer.

In cloud computing, what is considered an IT resource?
a. software program: This is a resource (SaaS) which can be utilized by the consumer.
b. virtual server: This is a resource (IaaS) which can be utilized by the consumer.
c. workstation: This is the one(stand alone machine) which consumes the services offered in cloud computing.
d. storage device: This is a resource (IaaS) which can be utilized by the consumer.
So, the answer is: A, B, D.

Which of the following cloud computing vulnerabilities is relavent to shared technology issues?
a. Hypervisor: This is a virtual monitor which runs virtual machines.
b. Web Browser: This is a piece of software which interacts with other servers to get information.
                   So, this could be the answer.
c. Virtualization: This is a technology which separates logically from one machine to another.
d. Social Engineering: This is a generic kind of vulnerability can be found everywhere.
                   So, this could also be the answer.
So, the answer is: B, D.