Package deal
WGU - C838 Test Exam Bundle
WGU - C838 Test Exam Bundle
[Show more]WGU - C838 Test Exam Bundle
[Show more]What are the 4 characteristics of cloud computing? - Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
What NIST publication number defines cloud computing? - 800-145 
 
What ISO/IEC standard provides information on cloud computing? - 17788 
 
Wh...
Preview 4 out of 38 pages
Add to cartWhat are the 4 characteristics of cloud computing? - Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
What NIST publication number defines cloud computing? - 800-145 
 
What ISO/IEC standard provides information on cloud computing? - 17788 
 
Wh...
Broad network access - There should never be network bandwidth bottlenecks. 
 
On-demand services - Refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider. 
 
Resource pooling - Chara...
Preview 2 out of 6 pages
Add to cartBroad network access - There should never be network bandwidth bottlenecks. 
 
On-demand services - Refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider. 
 
Resource pooling - Chara...
International Traffic in Arms Regulation (ITAR) - USA - state dept prohibitions on defense related exports. This can include cryptographic systems. 
 
Export Administration Regulations - Department of Commerce 
 
Control: dual-use goods/software/technology predominately civilian in nature but ...
Preview 2 out of 6 pages
Add to cartInternational Traffic in Arms Regulation (ITAR) - USA - state dept prohibitions on defense related exports. This can include cryptographic systems. 
 
Export Administration Regulations - Department of Commerce 
 
Control: dual-use goods/software/technology predominately civilian in nature but ...
NIST 800-145 Cloud Computing Definition - A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
Business Impact Analy...
Preview 4 out of 42 pages
Add to cartNIST 800-145 Cloud Computing Definition - A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
Business Impact Analy...
_____ drive security decisions. 
business requirements 
 
 
All of these are reasons because of which an organization may want to consider cloud migration, except: 
Elimination of risks 
 
 
The generally accepted definition of cloud computing includes all of the following characteristics except: 
n...
Preview 4 out of 41 pages
Add to cart_____ drive security decisions. 
business requirements 
 
 
All of these are reasons because of which an organization may want to consider cloud migration, except: 
Elimination of risks 
 
 
The generally accepted definition of cloud computing includes all of the following characteristics except: 
n...
(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
(ISC)2 Cloud...
Preview 3 out of 17 pages
Add to cart(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
(ISC)2 Cloud...
NIST 800-53 - Security and Privacy Contols for Information Systems and Organizations 
 
NIST 500-292 - Cloud Computing Reference Architecture 
 
NIST 800-37 - Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach 
 
NIST 800-57 - ...
Preview 1 out of 2 pages
Add to cartNIST 800-53 - Security and Privacy Contols for Information Systems and Organizations 
 
NIST 500-292 - Cloud Computing Reference Architecture 
 
NIST 800-37 - Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach 
 
NIST 800-57 - ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller TeeGrades. Stuvia facilitates payment to the seller.
No, you only buy these notes for $29.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
81989 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now