Free C90.02 Exam Braindumps (page: 4)

Page 4 of 22

The attack occurs when access is granted to an attacker erroneously or too broadly, resulting in the attacker gaining access to IT resources that are normally protected. Select the correct answer.

  1. denial of service
  2. malicious intermediary
  3. insufficient authorization
  4. virtualization

Answer(s): C



The is a service agent that can measure the usage of a cloud-based IT resource by a cloud consumer for billing purposes. Select the correct answer.

  1. automated scaling listener
  2. pay-for-use monitor
  3. multi-device broker
  4. resource replicator

Answer(s): B



A virtual server is being attacked by a malicious cloud service consumer that is generating increased usage loads upon the underlying physical server. As a result, other virtual sewers being hosted by the physical server are becoming unavailable to other cloud service consumers. This kind of attack is known as: . Select the correct answer.

  1. denial of service
  2. overlapping trust boundary
  3. insufficient authorization
  4. buffer overrun

Answer(s): A



represents the ability of a cloud platform to keep track of the usage of its IT resources by cloud consumers, and is therefore directly related to the mechanism. Select the correct answer.

  1. Replicated usage, cloud monitor
  2. Measured usage, pay-for-use monitor
  3. Agent usage, on-premise monitor
  4. None of the above.

Answer(s): B



Page 4 of 22



Post your Comments and Discuss Arcitura Education C90.02 exam with other Community members:

Prince Asamoah commented on February 14, 2024
Great and relevant questions
Anonymous
upvote