云计算(cloud computing)是基于互联网的相关服务的增加、使用和交付模式,通常涉及通过互联网来提供动态易扩展且经常是虚拟化的资源。这种模式提供可用的、便捷的、按需的网络访问,进入可配置的计算资源共享池(资源包括网络,服务器,存储,应用软件,服务),这些资源能够被快速提供,只需投入很少的管理工作,或与服务供应商进行很少的交互。根据上述定义,以下不属于云计算特点的是()
A.超大规模
B.比较昂贵
C.通用性
D.按需服务
A.超大规模
B.比较昂贵
C.通用性
D.按需服务
A.虚拟化
B.软件即服务
C.资源无限
D.分布式计算
Part A
Directions: Read the following four texts. Answer the questions below each text by choosing A, B, C or D. (40 points)
Data security used to be all about spending big bucks on firewalls to defend data at the network perimeter and on antivirus software to protect individual computers. Internet-based computing, or cloud computing, has changed all that, at the same time expanding exponentially the chances for data thieves and hackers.
The cloud creates other opportunities too. a handful of security vendors now deliver security as a service--a one-two punch of hardware and software that monitors and manages an enterprise's data security and bills customers only for the computing power they use. "For years, security was about big companies pushing technology to their customers," says Qualys CEO and founder Philippe Courtot. "Now it's about the customers pulling precisely what they need and providing them with those resources on demand. "
Qualys, a privately held company in Redwood Shores, Calif. , was among the first to embrace the service-oriented model, in 1999. Today four different modules of QualysGuard, its flagship offering, are used by more than 3500 organizations in 85 countries. The company performs more than 200 million security audits per year.
Courtot knows something about opportunity. The French entrepreneur arrived in Silicon Valley in 1987 and has built a number of companies into big-time players, including Signio, an electronic-payment start-up that was eventually sold to VeriSign in a combined deal for more than $1 billion. As CEO, he rebuilt Verity and transformed cc:Mail, a once unknown firm of 12 people, into a dominant e-mail platform. before Lotus acquired it in 1991. "Throughout my career, I've been able to recognize that for a technology to succeed, it must have a purpose," he says. "Technology itself has no value. It's what you do with it that counts. "
Under the old paradigm, according to Courtot, enterprises overspent for stand-alone security devices that became unruly and difficult to operate over the long term He says Qualys attacks the flaws in this strategy by streamlining security and tackling most of the service delivery through the cloud. "We control the infrastructure, software updates, quality assurance and just about everything in between," he says. The firm unveiled QualysGuard in 2000. After an infusion of $ 25 million from the venture firm Trident Capital and another $ 25 million from Gourtot, Qualys tweaked the service to focus mostly on vulnerability management.
Much of the company's current revenue-sales, topped $ 50 million last year--is being driving by a set of standards established by the Payment Card Industry Security Standards Council (PCISSC). "The PCI standard has been a major driver of business for all of them, especially Qualys," says Avivah Litan, a vice president and analyst at market-research firm Gartner. "When everyone has to comply, there's a lot of work to go around. "
The traditional way to ensure data security is by ______.
A.applying for cloud computing
B.installing firewalls and antivirus programs
C.decreasing the chances for hackers
D.using a handful of hardwares and softwares
A.VMware Cloud on AWS
B.zure VMware Solutions by CloudSimple
C.Google Cloud VMware Solution by CloudSimple
D.华为云
分布式云(Distributed Cloud)就是分布在不同地理位置的云,是公有云“进化”的最新形态。天翼云采用的CTyunOS底层采用的操作系统是()。
A.统信
B.欧拉
C.麒麟
D.CentoS
A.竞争(Competition)
B.云(Cloud)
C.计算机科学(ComputerScience)
D.沟通交流Communication
A.H3C Cloud Desktop Studio(服务器端,统一管理平台)
B.H3C SpaceOS(云终端操作系统)
C.H3C Workspace SpaceAgent(管控组件)
D.H3C Workspace App or H3C IDV(客户端)