Cognitive Class: Introduction to Cloud Exam Answers

Are you looking for Cognitive Class: Introduction to Cloud Exam Answers? If yes, here is the latest and updated answer to the Introduction to Cloud and Get a free certificate. This article will help you with the Introduction to Cloud Answers in the easiest ways. It is offered by Cognitive Class which helps learners understand the core concepts of cloud computing.

CourseIntroduction to Cloud
ProviderCognitive Class
Enroll LinkClick here

Cognitive Class – Introduction to Cloud Answers

Cognitive Class: Introduction to Cloud Exam Answers

Module 1 – Overview of Cloud Computing

1. In the US National Institute of Standards and Technology, NIST, definition of “cloud computing”, what does the statement “shared pool of configurable computing resources” include?

  1. Leverage cloud services over the open internet on hardware owned by the cloud provider
  2. Data security, associated with loss or unavailability of data causing business disruption
  3. Networks, servers, storage, applications, and services
  4. Five essential characteristics, three deployment models, three service models

Explanation: These are all recognized as computing resources that can be configured as needed and shared.

2. What tasks do hypervisors accomplish? Select two.

  1. Enable multiple operating systems to run alongside each other, sharing the same physical computing resources.
  2. Facilitate access to mainframes for multiple users to access the same data storage layer.
  3. Scale on demand to support fluctuating workloads.
  4. Separates VMs logically and assigns each a share of the underlying computing power, memory, and storage.

Explanation: A hypervisor is a small software layer that enables multiple operating systems to run alongside each other, sharing the same physical computing resources. Hypervisors also separate virtual machines logically, assigning each its own slice of the underlying computing power, memory and storage, preventing the virtual machines from interfering with each other.

3. What are some of the cloud benefits that make it lower risk for enterprises to adopt cloud? Select two.

  1. Data security associated with loss or unavailability of data causing business disruption
  2. The pay-as-you-go model allows enterprises to experiment with technologies as opposed to making long-term decisions based on little or no trial.
  3. Diversity of standardization in how the constantly evolving technologies integrate and interoperate.
  4. The speed with which applications can be up and running on the cloud versus months on traditional platforms, means enterprises can experiment, fail fast, learn, and course correct without setting them back significantly.

Explanation: Renting by the hour as opposed to the huge upfront cost of investing and re-investing in hardware and software make cloud adoption a low-risk option for enterprises. The speed and productivity provided by the cloud makes cloud adoption lower-risk for enterprises.

Module 2 – Cloud Adoption and Emerging Technologies

1. An IBM Institute for Business Value study says that more than three-quarters of enterprises today are using cloud computing to expand into new industries. What additional benefits do organizations find when adopting the cloud:

  1. Avoid having to fail at all
  2. Improve customer experience and create enhanced products and services
  3. Lengthen product lifecycles to ensure higher quality offerings
  4. Continue making expensive decisions because it often worked in the past

Explanation: Cloud enables businesses to respond quickly to marketplace changes, use analytics to understand customer experience, and to apply that understanding to adapt their products and service from what they learn.

2. What is the three-way symbiotic relationship between IoT, AI, and Cloud?

  1. Power, scale, dynamic nature, and economics of the cloud resources
  2. Making sense of the endless streams of data from IoT devices
  3. IoT delivers the data, AI powers the insights, and both emerging technologies leverage cloud’s scalability and processing power
  4. AI consumes the data produced by IoT devices

Explanation: This is the three-way relationship between IoT, AI, and Cloud.

3. What is the three-way relationship between blockchain, AI, and the Cloud?

  1. An immutable network allowing members to view only those transactions that are relevant to them.
  2. Lends trust and transparency to AI by recording the data and variables that go into a decision made in an AI algorithm.
  3. Blockchain provides the trusted, decentralized source of truth, AI powers the analytics and decisions made from the collected data, and cloud provides the globally distributed, scalable, and cost-efficient computing resources to support both technologies.
  4. Globally distributed, scalable, and cost-efficient computing resources.

Explanation: This is the mutually beneficial, three-way relationship between Blockchain, AI, and Cloud.

Module 3 – Cloud Computing Service and Deployment Models

1. Which are some of the key components of cloud infrastructure? Select two.

  1. IaaS providers manage the hypervisors and provision virtual instances
  2. IaaS providers deploy the middleware and install required applications on the virtual machines
  3. IaaS providers manage large data centers that contain the physical machines required to power the various layers of abstraction on top of them
  4. IaaS providers manage the hypervisors and end-users provision the virtual instances

Explanation: In most IaaS models, end users do not interact directly with the physical infrastructure but experience it as a service provided to them. The cloud providers manage the hypervisors, but the virtual instances are provisioned by the end-users as per their needs.

2. According to the video, which of these statements are true of Virtual Private Clouds (VPCs)? Select two.

  1. VPCs are provisioned in a logically isolated part of a shared public cloud
  2. The VPC infrastructure is owned, managed, and operated by the public cloud service provider
  3. VPCs may be provisioned over a cloud service provider’s infrastructure, but the infrastructure is owned, managed, and operated by the enterprise
  4. VPC allows all users of the shared public cloud to access resources in the VPC on need basis; it also allows users of the VPC to access resources of the public cloud

Explanation: A VPC is a public cloud offering that lets an organization establish its own private and secure cloud-like computing environment in a logically isolated part of a shared public cloud. While the infrastructure is tailored to an individual organization’s unique needs, it is still owned, managed, and operated by the public cloud service provider.

3. If an organization needs to run a highly sensitive and mission critical application with unpredictable performance and capacity requirements, which of the following models would best meet its requirements?

  1. Hybrid Cloud
  2. Public Cloud
  3. Private Cloud
  4. On-premise Data Centers

Explanation: With a Hybrid Cloud, organizations can choose to run their mission-critical applications on the private cloud while leveraging additional public cloud capacity to accommodate spikes in demand for their application.

Module 4 – Components of Cloud Computing

1. Is it possible to run completely different operating systems on Virtual Machines (VMs) that are on a single host? If yes, what makes this possible?

  1. No, it is not possible—A single host can only work as one single virtual environment, and can, therefore, have only one environment.
  2. Yes, Virtualization makes it possible— to have VMs, running different operating systems, on a single host.
  3. Yes, Containerization makes it possible—to have VMs that are unique physical entities, so you can have completely different Operating Systems on them.
  4. No, it is not possible—VMs are software-based versions of a single host. They cannot have different environments from one another.

Explanation: Each VM works like an independent physical entity with its own Operating System, runtime environments and applications.

2. Which of these scenarios is ideal for the use of bare metal servers, as opposed to virtual servers? Select two.

  1. CPU and I/O intensive workloads
  2. Low cost to use
  3. Huge performance and strict security and compliance requirements
  4. Workloads that require limited throughput and performance

Explanation: Since bare metal servers are dedicated and fully customizable, they can do what a customer wants in the most demanding environments. Bare metal servers are intended for high performance use in highly secure and isolated environments. Clients have full access and control of bare metal servers because they are dedicated for their use.

3. Subnets are the main area where security is implemented in the cloud. What is used to provide security at the virtual instance level in subnets?

  1. Security Groups or SGs
  2. Virtual Private Cloud or VPC
  3. Load Balancers
  4. Access Control Lists or ACLs

Explanation: SGs provide instance level security.

Module 5 – Cloud Storage

1. Which of these are features of Object Storage? Select two.

  1. Storage is attached to compute nodes using a fibre network
  2. You can directly use Object Storage without attaching it to a compute node
  3. Object Storage can be mounted on multiple compute nodes via an ethernet network
  4. Object storage is effectively infinite

Explanation: You don’t need an underlying compute node to connect to object storage, rather you can access it from anywhere using an API. With file and block storage, you specify the size of the storage and pay a fee based on the size you provisioned. With Object Storage, you consume as much storage as you need and pay-as-you-go.

2. There are four types of cloud storage available. Which storage type is ephemeral or non-persistent?

  1. File storage
  2. Direct Attached storage
  3. Block storage
  4. Object storage

Explanation: Direct Attached storage, also known as “local storage”, is ephemeral as it is no longer accessible once the VM its attached to is de-provisioned.

3. What is the main benefit of a Content Delivery Network (CDN)?

  1. Network topology
  2. Distribute tasks, workloads, and network traffic
  3. Enhanced control over network traffic by routing traffic to specified resources
  4. Speed, it makes your website faster by serving files from a location closer to the user.

Explanation: Load balancers observe all incoming network traffic and direct it to routers or servers that can handle the traffic.

Module 6 – Cloud Native and Emergent Cloud Trends

1. What are the key elements of a hybrid Multicloud strategy?

  1. For seamless working, it is recommended that if you’re subscribed to the infrastructure services of a cloud provider, you should subscribe to the application services provided by the same vendor.
  2. Embraces a mix of cloud models and services as long as they are from the same cloud service provider
  3. Embraces a mix of cloud models while creating a vendor lock-in with the cloud provider
  4. Connects an organization’s on-premise private cloud and third-party public cloud into a single infrastructure

Explanation: Hybrid Multicloud strategy allows you to work across public and private clouds behaving as if they are part of the same infrastructure.

2. What is an attribute that distinguishes serverless computing from other compute models?

  1. In the serverless computing environment, compute resources cannot be scaled up or down
  2. Serverless computing does not require any underlying servers for executing workloads
  3. The serverless model requires NO provisioning of servers, installation of application stacks, or operation of the infrastructure BY the users/developers
  4. End users pay for resources as long as they are running, even if idle

Explanation: The serverless model does require provisioning of servers, etc. but the provisioining and management of infrastructure is performed by the cloud service provider, not the users/developers.

3. Cloud adoption is an integral part of application modernization. What are the other two important components of modernization?

  1. Service Oriented Architecture and Waterfall Methodology
  2. VMs and Agile Methodology
  3. Microservices and DevOps
  4. Serverless and Virtual Machines

Explanation: the three key transformations that drive application modernization are cloud adoption, microservices architecture, and DevOps.

Module 7 – Cloud Security, Case Studies and Jobs in Cloud Computing [Optional]

1. What are some of the monitoring tools that help you to gain insights about your posture, compliance, and threats?

  1. Security events
  2. Hypervisors
  3. Flow logs from the network
  4. Data encryption

Explanation: A hypervisor is a software layer that helps build virtual environments or virtual machines. Flow logs help to monitor information about how the network resources are operating. This is a method for securing data so unauthorized people cannot read the protected data.

2. What is the role SecDevOps plays in cloud security?

  1. Security in the DevOps process helps embed security through the life cycle of an application
  2. Provides policies, technological procedures, services, and solutions to secure the enterprise against security threats and breaches
  3. Helps maintain visibility of all data exchanges between public, private, and hybrid cloud environments
  4. Identity and Access Management

Explanation: Security embedded through the DevOps cycle helps to ensure that the application runs on a safe platform, the code is free from vulnerabilities, and operational risks are understood.

3. The Weather Company migrated their weather web property to a secure, scalable, and global architecture in the IBM Cloud. What are some of the benefits they realized as a result of this migration? Select two.

  1. Optimize their systems for elasticity in handling extreme spikes in demand which can mean a difference between life and death for its users
  2. Increase asset availability and overall equipment effectiveness
  3. Harness local data centers to minimize latency for users spread across the globe
  4. Faster development and release of new apps and digital self-service tools to customers

Explanation: This is the business benefit realized by Cementos Pacasmayo which helped them expand their presence in new markets. Customer experience in the airlines business is increasingly dependent on digital self-service tools. American Airlines leveraged the cloud to help customers access instant information and services.

Introduction to Cloud Final Exam Answers

Note: The final exam has a 1-hour time limit

1. Which cloud deployment model lets users use multiple cloud models working together seamlessly?

  1. Private
  2. Hybrid
  3. Broad Network Access
  4. Public

Explanation: Hybrid model is the mix of both public and private clouds working together seamlessly.

2. Which of these are essential characteristics of the Cloud? Select two.

  1. Single-tenant
  2. On-demand self-service
  3. Resource pooling
  4. Fixed fee

Explanation: Users can access cloud resources such as the processing power, storage, and network using a simple interface, without requiring human interaction with each service provider. Cloud resources are dynamically assigned and reassigned, according to demand, without consumers needing to concern themselves with the physical location of these resources.

3. What are some cloud computing benefits? Select two.

  1. Purchasing off-the-shelf software and upgrades
  2. Diversity of standardization in how the constantly evolving technologies integrate and interoperate.
  3. Competitive advantage
  4. Flexibility and efficiency

Explanation: Cloud services make some of the most innovative technologies available to enterprises while managing the underlying infrastructure, enabling organizations to focus on their priorities. Users can scale services as needed and customize applications. Cloud-based applications and data are available from anywhere with an internet connection. Cloud infrastructure scales on demand to support fluctuating workloads.

4. According to the International Data Corporation (IDC), what is that crucial ability that will make cloud computing essential for businesses to succeed, sustain, and compete in today’s markets?

  1. Multi-cloud infrastructures
  2. Applied exponential technologies such as AI, Automation, IoT, and Blockchain
  3. Cognitively-enabled workflows
  4. Data-driven decisions

Explanation: Considering the unprecedented amounts of data being produced daily and the ability to make data-driven decisions crucial to any business, the power, resources, and technologies available on the cloud will make cloud essential for businesses to succeed, sustain, and compete.

5. IoT, AI, Blockchain, and Analytics are emerging technologies enabled by the cloud. What are some of the attributes of cloud computing that enable these technologies? Select two.

  1. Cloud resources are offered in a single-tenant model
  2. The power and scale of cloud resources
  3. Computing resources can be accessed via internet connection
  4. Cloud offers on-demand computing

Explanation: Emerging technologies such as IoT, AI, Blockchain, and Analytics process and generate an unprecedented amount of data. Cloud provides the scalability and processing power required to gather, store, and process this data. Cloud resources scale up and down in response to the workload demand, with users paying only for resources that they use. This makes it cost-viable for organizations to leverage emerging technologies on the cloud.

6. In the car analogy used to explain the differences between the three cloud service models, which of the provided options is an analogy for PaaS?

  1. Hiring a taxi
  2. Buying a car
  3. Leasing a car
  4. Renting a car

Explanation: Renting a car is likened to the PaaS model in this analogy. The customer is driving the car, paying for the gas and toll expense but is not concerned about the specifications of the car.

7. Which of these scenarios are good use cases for Public Cloud? Select two.

  1. Reducing time-to-market for products and services
  2. Managing business critical platforms and applications
  3. Disaster recovery, data protection, and business continuity
  4. Applications with stable capacity and resourcing needs

Explanation: Cloud-based applications and platforms free up internal IT teams to focus on building and testing applications, thereby reducing time-to-market for products and services. More and more organizations are using public cloud computing resources to build secondary infrastructures for disaster recovery, data protection, and business continuity.

8. Private cloud platforms can be implemented internally or externally. What is an example of external private cloud platform?

  1. Virtual Private Cloud or VPC
  2. Cloud platform that runs on-premises
  3. Platform that is owned, managed, and operated by the organization
  4. Controlled access and customized security measures

Explanation: When the platform is provisioned over a logically isolated part of a cloud provider’s public infrastructure, and is owned, managed, and operated by the service provider.

9. The infrastructure layer is the foundation of the cloud and consists of physical resources. Where do these physical resources reside?

  1. Regions, Zones, and Data Centers
  2. Compute, Storage, and Networking Resources
  3. Virtual Servers, Bare Metal Servers, and Serverless computing resources
  4. In a warehouse that houses a centralized mainframe server

Explanation: The physical resources of a cloud’s IT infrastructure are housed in data centers, that are located with Availability Zones that are clustered within Regions.

10. Why do bare metal servers take longer to provision than virtual servers?

  1. They’re multi-tenant servers, and all tenants must help configure them
  2. They are physical servers that can be customized to specified capacity
  3. GPUs for data analytics are hard to configure and provision
  4. Customer configures the physical servers

Explanation: Bare-metal servers are physical machines and take longer to provision than virtual servers as physical resources with specified capacity may need to be configured by the cloud provider before they are made available to users.

11. Containers provide isolation of applications. What is one of the benefits this provides?

  1. Help keep malicious code in one container from impacting other containers
  2. Abstraction from the host operating system
  3. Repackaged into containers or containerized microservices
  4. Open sourced runtime engine

Explanation: The isolation of applications as containers reduces the chance that malicious code present in one container will impact other containers or invade the host system.

12. What makes File storage an ideal solution for scenarios where common storage (a landing zone for incoming files) is needed?

  1. Mounted from remote storage appliances
  2. File storage can be mounted to multiple compute nodes at a time
  3. Its consistently high speed
  4. File Storage is mounted to compute nodes via an ethernet network

Explanation: The ability for File Storage to be mounted to multiple compute nodes at a time make it an ideal solution for common storage requirements.

13. Which of these scenarios are best suited for Block Storage? Select two.

  1. Workloads that need low-latency storage
  2. Workloads that need disk sharing between compute nodes
  3. Low cost is a consideration
  4. Applications that need consistent fast access to disk, such as databases

Explanation: Block storage is accessed via a dedicated network of fibres through which signals move at high speed, consistently. This makes block storage suitable for low latency workloads. Fibre optic networks move traffic at consistently high speeds, making it ideal for applications that need consistent and fast access.

14. Which of the following is NOT a good fit for Object Storage?

  1. Data that does not require fast read and write speeds
  2. Operating systems or applications like databases
  3. Storage needs are finite and can be pre-defined
  4. Files or objects that are static

Explanation: Object storage is not suitable for running operating systems, databases, or anything else where the contents of the file changes.

15. What is a Content Delivery Network (CDN)?

  1. Network topology
  2. A network node
  3. A distributed server network
  4. A network link

Explanation: A CDN is a distributed server network that delivers temporarily stored or cached copies of website content to users based on the user’s geographic location.

16. What are some of the benefits of using microservices architecture? Select two.

  1. Application components can be developed and updated independently of each other
  2. Each microservice of an application needs to use the same stack and runtime environment
  3. Components facing varied amounts of load can be scaled independently
  4. Each line of code for a microservice needs to be written from scratch

Explanation: Microservices are function specific independent components that can be developed and updated by multiple developers working independently on the individual components. Each component can be scaled independently, reducing the waste and cost associated with having to scale entire applications.

17. What are the characteristics of a cloud native application?

  1. Collection of microservices that need to be scaled and updated in relation to each other
  2. Collection of microservices working together as a whole to comprise an application
  3. Collection of microservices that are built as one huge piece of software
  4. Collection of microservices with tightly coupled UI, business logic layer, and data layer

Explanation: A cloud native application consists of microservices working together as independent units of software working as a whole.

18. DevOps’ tools, practices, and processes are helping tackle some of the complexities and challenges posed by the cloud. Identify two ways in which DevOps is mitigating these challenges. Select two.

  1. DevOps processes outline the development principles that need to be followed to modernize monolithic applications to cloud native applications
  2. By creating an automated deployment pipeline
  3. By fully automating the infrastructure installation process in a way that is documented, repeatable, verifiable, and traceable
  4. DevOps best practices eliminate the need to provision servers, build middleware, and install application code

Explanation: The DevOps’ practices of continuous integration and continuous deployment help create a fully automated deployment pipeline that tackles the complexities involved in application deployment. DevOps best practices make it possible to programmatically provision servers, build middleware, install application code, and fully automate the installation process.


That’s all about Introduction to Cloud Exam Answers. If you have any further queries drop them in the comments below. It is a great opportunity to learn new skills from industry experts for free and get a certificate.

Leave a Comment