CLOUD COMPUTING ASSIGNMENT 1B
PHOTO ALBUM WEBSITE ON AWS
COMPREHENSIVE REVIEW 2026 FULL
QUESTIONS AND VERIFIED ANSWERS
◉ Cloud Consumer. Answer: An organization (or a human) that has a
formal arrangement with a cloud provider to use IT resources made
available by the cloud provider.
◉ Cloud Service Owner. Answer: The person or organization that
legally owns a cloud service.
The cloud service owner can be the cloud consumer. or the cloud
provider that owns the cloud within which the cloud service resides.
◉ Cloud Resource Administrator. Answer: The person or organization
responsible for administering a cloud-based IT resource (including cloud
services).
The cloud resource administrator can be the cloud consumer or cloud
provider of the cloud within which the cloud service resides.
Alternatively, it can be a third-party organization contracted to
administer the cloud-based IT resource.
◉ Cloud Auditor. Answer: A third-party (often accredited) that conducts
independent assessments of cloud environments.
, Typical responsibilities include the evaluation of security controls,
privacy impacts, and performance.
The main purpose of the cloud auditor role is to provide an unbiased
assessment of a cloud environment to help strengthen the trust
relationship between cloud consumers and cloud providers.
◉ Cloud Broker. Answer: A party that assumes the responsibility of
managing and negotiating the usage of cloud services between cloud
consumers and cloud providers.
◉ Cloud Carrier. Answer: The party responsible for providing the wire-
level connectivity between cloud consumers and cloud providers
assumes the role of the cloud carrier.
◉ Organizational Boundary. Answer: The physical perimeter that
surrounds a set of IT resources that are owned and governed by an
organization.
The organizational boundary does not represent the boundary of an
actual organization, only an organizational set of IT assets and IT
resources.
◉ Trust Boundary. Answer: A logical perimeter that typically spans
beyond physical boundaries to represent the extent to which IT resources
are trusted.
PHOTO ALBUM WEBSITE ON AWS
COMPREHENSIVE REVIEW 2026 FULL
QUESTIONS AND VERIFIED ANSWERS
◉ Cloud Consumer. Answer: An organization (or a human) that has a
formal arrangement with a cloud provider to use IT resources made
available by the cloud provider.
◉ Cloud Service Owner. Answer: The person or organization that
legally owns a cloud service.
The cloud service owner can be the cloud consumer. or the cloud
provider that owns the cloud within which the cloud service resides.
◉ Cloud Resource Administrator. Answer: The person or organization
responsible for administering a cloud-based IT resource (including cloud
services).
The cloud resource administrator can be the cloud consumer or cloud
provider of the cloud within which the cloud service resides.
Alternatively, it can be a third-party organization contracted to
administer the cloud-based IT resource.
◉ Cloud Auditor. Answer: A third-party (often accredited) that conducts
independent assessments of cloud environments.
, Typical responsibilities include the evaluation of security controls,
privacy impacts, and performance.
The main purpose of the cloud auditor role is to provide an unbiased
assessment of a cloud environment to help strengthen the trust
relationship between cloud consumers and cloud providers.
◉ Cloud Broker. Answer: A party that assumes the responsibility of
managing and negotiating the usage of cloud services between cloud
consumers and cloud providers.
◉ Cloud Carrier. Answer: The party responsible for providing the wire-
level connectivity between cloud consumers and cloud providers
assumes the role of the cloud carrier.
◉ Organizational Boundary. Answer: The physical perimeter that
surrounds a set of IT resources that are owned and governed by an
organization.
The organizational boundary does not represent the boundary of an
actual organization, only an organizational set of IT assets and IT
resources.
◉ Trust Boundary. Answer: A logical perimeter that typically spans
beyond physical boundaries to represent the extent to which IT resources
are trusted.