Professional Documents
Culture Documents
Cloud Computing MCQ PDF
Cloud Computing MCQ PDF
5. What is the name of the organization helping to foster security standards for cloud computing?
A. Cloud Security Standards Working B. Cloud Security Alliance
C. Cloud Security Watch Dog D. Security in the Cloud Alliance
8. Which company recently shut the doors on its cloud storage service?
A. Hitachi Data Systems B. Savvis C. Iron Mountain D. Symantec
11. ________ describes a cloud service that can only be accessed by a limited amount of people.
A. Data center
B. Private cloud
C. Virtualization
D. Public cloud
12. ________ describes a distribution model in which applications are hosted by a service
provider and made available to users.
A. Infrastructure-as-a-Service (IaaS) B. Platform-as-a-Service (PaaS)
C. Software-as-a-Service (SaaS) D. Cloud service
13. _________ is the feature of cloud computing that allows the service to change in size or
volume in order to meet a user’s needs.
A. Scalability B. Virtualization C. Security D. Cost-savings
18. on which part of the OSI reference model would application protocols like HTTP, FTP, SSH,
Telnet be mapped?
A. Frame Relay B. Layer 7 C. Layer 10 D. Core protocols
20. What could be the impact of network downtime when using Cloud computing?
A. Integrity of data can be compromised B. Application available may be lower for the user
C. Service provider assumes responsibility for Service Level
D. Fail-over to a local network is required
21. Which is not one of the three main categories of cloud computing services?
A. Infrastructure-as-a-Service (IaaS) B. Platform-as-a-Service (PaaS)
C. Communication-as-a-Service (CaaS) D. Software-as-a-Service (SaaS)
22. Which model of cloud computing services provides the servers, storage devices, and networks
for a subscriber?
A. Infrastructure-as-a-Service (IaaS) B. Platform-as-a-Service (PaaS)
c. Communication-as-a-Service (CaaS) D. Software-as-a-Service (SaaS)
23. Which cloud deployment model is operated solely for a single organization and its authorized
users?
A. Community cloud B. Hybrid cloud C. Public cloud D. Private cloud
24. Which cloud characteristic refers to the ability of a subscriber to increase or decrease its
computing requirements as needed without having to contact a human representative of the
cloud provider?
A. Rapid elasticity B. On-demand self service C. Broad network access
D. Resource pooling
25. Which cloud deployment model is managed by a cloud provider, has an infrastructure that is
offsite, and is accessible to the general public?
A. Community cloud B. Hybrid cloud C. Public cloud D. Private cloud
26. In which category of SaaS services does customer relationship management (CRM) software
fall?
A. Consumer services B. Communication services C. Infrastructure services
D. Business services
28. Which is considered the most widely used cloud computing service?
A. Infrastructure-as-a-Service (IaaS) B. Platform-as-a-Service (PaaS)
C. Communication-as-a-Service (CaaS) D. Software-as-a-Service (SaaS)
30. Which refers to the practice of a primary cloud provider offering services that are distributed
through another cloud provider?
A. Hybrid cloud B. Composite cloud C. Virtualization D. Grid computing
40. Which of these should a company consider before implementing cloud computing technology?
A. Employee satisfaction B. Potential cost reduction
C. Information sensitivity D. All of the above
41. Which of the following is the BEST definition for the Cloud?
A. A large pool of usable and accessible virtualized resources
B. A software package from Google for Office use
C. A series of interconnected Web sites
D. Ethernet based access to virtualized applications
43. Which functionality is best suited to provide single sign-on on a cloud application using your
own Active Directory server?
A. Federation services B. Virtual Private Network C. Hypertext Transfer Protocol
D. None of the above
45. Which of the following may typically have a negative impact on the business case for Cloud
computing?
A. Costs of bandwidth and networking B. Costs of operational staffing
C. Costs of new hardware investments D. Technical knowledge of the Service Desk
46. When read access to data by unauthorized people from the Internet is a threat, which aspect
of security is at risk?
A. Confidentiality B. Integrity C. Availability D. Authentication
50. Which statement best describes the relationship between application, server, and client in a
multitenancy environment?
A. Single instance of software running on a server and serves one client.
B. Single instance of software running on a server and serves multiple clients.
C. Multiple instances of software running on a server and serves multiple clients.
D. Multiple instances of software running on multiple servers and serves one client.