You are on page 1of 234

Practice Worksheet Unit 1

1. Which is not a benefit of virtualization?


* Flexible and efficient allocation of resources
* Lowers the cost of IT infrastructure
* Remote access and rapid scalability
* Run on single operating system

2. Which of the following helps a user to have remote access to an


application from a server?
* Application virtualization
* Network virtualization
* Desktop virtualization
* Storage virtualization

3. What type of computing technology refers to services and


applications that typically run on a distributed network through
virtualized resources?
* Distributed Computing
* Cloud Computing
* Soft Computing
* Parallel Computing

4. Cloud computing is a kind of abstraction which is based on the


notion of combining physical resources and represents them as
_______resources to users.
* Real
* Cloud
* Virtual
* none of the mentioned

5. Which one of the following is Cloud Platform by Amazon?


* Azure
* AWS
* Cloudera
* All of the mentioned
6. Which of the following statement is not true?
* Through cloud computing, one can begin with very small and
become big in a rapid manner.
* All applications benefit from deployment in the Cloud.
* Cloud computing is revolutionary, even though the
technology it is built on is evolutionary.
* None of the mentioned

7. Which one of the following refers to the user's part of the Cloud
Computing system?
* back End
* Management
* Infrastructure
* Front End

8. Which of the following type of virtualization is found in hypervisor


such as Microsoft’s Hyper-V?
* paravirtualization
* full virtualization
* emulation
* None of the mentioned

9. Which is the correct type of full virtualization?


* Software assisted
* IoT assisted
* Hardware-assisted
* Software assisted and Hardware-assisted both
10. In which of the following virtualization, guest OS’s instructions
might allow a virtual context to execute privileged instructions
directly on the processor, even though it is virtualized.
* Software assisted full virtualizations
* IoT assisted full virtualizations
* Hardware-assisted full virtualizations
* None of these
Practice Worksheet Unit 2

1. Point out the wrong statement:

* Full virtualization requires that the host operating system


provide a virtual machine interface for the guest operating
system and that the guest access hardware through that host
VM
* Guest operating systems in full virtualization systems are
generally faster than other virtualization schemes
* A process virtual machine instantiates when a command
begins a process
* None of the mentioned

2. The _________ is what controls and allocates what portion of


hardware resources each operating system should get, in order
every one of them to get what they need and not to disrupt each
other.
* hypervisor
* virtual machine
* virtual cloud
* None of these

3. Which one of the following statements is true about the


Virtualization?
* It provides a logical name for a physical resource, and on-
demand provides an indicator of that physical resource.
* In Virtualization, we analyse the strategy related problems
that customers may face.
* In Virtualization, it is necessary to compile the Multitenant
properly.
* All of the above

4. On which one of the following utility computing is based?


* Grid Computing Model
* SOA Model
* virtual isolation Model
* Pay-per-Use model
5. In Grid Computing, which types of computer resources are
there?
* heterogeneous dispersed.
* geographically dispersed.
* Both A and B
* None of the above

6. Which one of the following refers to the Distributed Computing,


in which several sets of computers distributed on multiple
geographical locations and are connected with each other to
achieve a common goal?
* Virtualization
* SOA
* Grid Computing
* Utility Computing

7. On which one of the following hypervisors runs directly on the


underlying host system, it is also known as________?
* Bare metal hypervisor
* Hosted Hypervisor
* Native Hypervisor
* Both A and C

8. Which one of the following is not an example of the Type1-


Hypervisor?
* VMware ESXi
* Citrix XenServer
* Microsoft Hyper-V hypervisor
* VMware Player

9. ________________ is a paradigm of distributed computing to


provide the customers on-demand, utility-based computing
service.
* Remote Sensing
* Remote Invocation
* Cloud Computing
* Private Computing
Practice Worksheet Unit 3

1. Which of the following is not a cloud stakeholder?


* Cloud providers
* Clients
* End users
* Cloud users

2. These cloud services are of the form of utility computing i.e.


the _________ uses these services pay-as-you-go model.
* Cloud providers
* Clients
* End users
* Cloud users

3. Which of the following is not a type of cloud?


* Private
* Public
* Protected
* Hybrid

4. In this type of cloud, an organization rents cloud services from


cloud providers on-demand basis.
* Private
* Public
* Protected
* Hybrid

5. _____________ enables the migration of the virtual image


from one physical machine to another.
* visualization
* virtualization
* migration
* virtual transfer
6. Most of the cloud architectures are built on this type of
architecture.
* skeleton
* grid
* linear
* template

7. SaaS stands for?


* Software as a service
* System Software and services
* Software as a system
* System as a service

8. Which of the following is true about cloud computing?


* Cloud computing is platform dependent
* Cloud Computing makes our business applications mobile
and collaborative.
* Cloud Computing provides us means of accessing the
applications as utilities over computer only.
* All of the above

9. Which of the following is the working models for cloud


computing?
* Deployment Models
* Configuring Model
* Collaborative Model
* All of the above

10. How many types of Cloud are there in Deployment Models?


* 2
* 3
* 4
* 5
Practice Worksheet Unit 4

1. The __________ allows systems and services to be accessible


within an organization.
* Private cloud
* Public cloud
* Community cloud
* Hybrid cloud

2. Which of the following is a type of Service Models?


* Public-as-a-Service
* Platform-as-a-Service
* Community-as-a-Service
* Public-as-a-Service

3. _______ provides the runtime environment for applications,


development and deployment tools, etc.
* IaaS
* PaaS
* SaaS
* XaaS

4. ________________ is yet another service model, which


includes Network-as-a-Service, Business-as-a-Service, Identity-
as-a-Service, Database-as-a-Service or Strategy-as-a-Service.
* IaaS
* PaaS
* SaaS
* XaaS

5. The program which provides partitioning, isolation or


abstraction is called?
* virtualization hypervisor
* software hypervisor
* hardware hypervisor
* system hypervisor
6. Hypervisor runs directly on underlying host system. It is also
known as?
* Bare metal hypervisor
* Native Hypervisor
* Hosted Hypervisor
* Both A and B

7. What is true about Grid Computing?


* breaks complex task into smaller pieces
* combine smaller task into complex task
* subscription tier plays vital role in Grid Computing
* Both A and B

8. VLANs and IP addresses resources are made available to end


user via?
* Server virtualization.
* Client virtualization.
* End-user virtualization.
* IaaS

9. Which of the following are benefit of IaaS?


* Flexible and efficient renting of computer hardware.
* Portability, interoperability with legacy applications.
* Full control of the computing resources through
administrative access to VMs.
* All of the above

10. The most commonly used model for discovery and description
used with SOAP messaging is the?
* WSDL
* VMc
* DHML
* SOA
Practice Worksheet Unit 5

1. _________ forms the basis for most of the Web services stacks.
* WSDL
* VMc
* SOA
* SOAP

2. Content can be ___________ in virtual appliance


* structured
* unstructured
* Both A and B
* None of the above

3. Point out the wrong statement about cloud computing


* The customer takes no responsibility for maintaining the
hardware, the software, or the development of the applications
* The vendor is responsible for all the operational aspects of the
service
* Google’s App Engine platform is IaaS offering
* None of the above

4. Which of the following can be considered PaaS offering?


* Google Maps
* Google Earth
* Google AdSense
* YouTube

5. Which type of PaaS includes on-demand scaling and application


security?
* Stand-alone development environments
* Application delivery-only environments
* Open platform as a service
* Add-on development facilities
6. Which type of PaaS allows to customize the existing SaaS
platform?
* Stand-alone development environments
* Application delivery-only environments
* Open platform as a service
* Add-on development facilities

7. Which type of PaaS does not include licensing or technical


dependencies on specific SaaS applications?
* Stand-alone development environments
* Application delivery-only environments
* Open platform as a service
* Add-on development facilities

8. Which of the following is associated with considerable vendor


lock-in?
* PaaS
* SaaS
* IaaS
* None of the above

9. A ________ is an application that can display a Web page that


shows data and supports features from two or more sources.
* workspace
* workload
* mashup
* Multitenant

10. Which of the following are issues associated with SaaS?


* Modest software tools
* Network dependence
* Centralized management and data
* Multitenant solutions
Practice Worksheet Unit 6

1. CDN servers are often called


∗ Fog Server
∗ Edge Servers
∗ Remote servers
∗ None of mentioned

2. A replica server, which delivers content on behalf of the origin server is


called a
∗ CDN server
∗ Data server
∗ Content replicator
∗ Data store

3. What is not advantage of CDN?


∗ Better results for web publishers
∗ Reduced bandwidth consumption
∗ Reduced latency
∗ Adds complexity to your website and deployment procedures

4. A ________ is an application that can display a Web page that shows data
and supports features from two or more sources.
∗ workspace
∗ workload
∗ mashup
∗ Multitenant
5. "Container images" become
∗ containers at runtime
∗ docker at runtime
∗ images cannot run
∗ services at runtime

6. REST API used for
∗ template with instructions for creating a Docker
∗ implements a failover system mechanism that monitors failure
conditions and automatically redirects the workload
∗ specifying interfaces with programs that can be used to talk to
the daemon services and instruct them what to do.
∗ None among mentioned

7. A Docker registry stores


∗ Docker files
∗ Docker hub
∗ Docker images
∗ None among mentioned

8. Kubernetes(K8s) is an open-source system for


∗ implements a failover system mechanism that monitors failure
conditions and automatically redirects the workload
∗ IAAS
∗ source system for automating deployment, scaling, and
management of containerized applications.
∗ Private cloud

9. A pod consists of
∗ network mechanism that lets Kubernetes maintain a grouping
∗ one or more containers that are guaranteed to be co-located on
the host machine and can share resources
∗ mathematical models or closed functions used to predict outcomes
and require strong computing power to create
∗ none among mentioned

10 The objective of IAM systems is


∗ ensure that once a digital identity has been established, it must be
maintained
∗ to maintains and manages its customers' data
∗ ensure that once a digital identity has been established, it must
be maintained
∗ none among mentioned
1. computing refers to applications and services that run on a distributed network using virtualized resources.

a) Distributed

b) Cloud

c) Soft

d) Parallel

View Answer

Answer: b

2. Point out the wrong statement.

a) The massive scale of cloud computing systems was enabled by the popularization of the Internet

b) Soft computing represents a real paradigm shift in the way in which systems are deployed

c) Cloud computing makes the long-held dream of utility computing possible with a pay-as-you-go, infinitely scalable, universally available
system

d) All of the mentioned

View Answer

Answer: b

3__________as a utility is a dream that dates from the beginning of the computing industry itself.

a) Model

b) Computing

c) Software

d) All of the mentioned

View Answer

Answer: b

4. Which of the following is essential concept related to Cloud?

a) Reliability

b) Productivity

c) Abstraction

d) All of the mentioned

View Answer

Answer: c

5. Point out the wrong statement.

a) All applications benefit from deployment in the cloud

b) With cloud computing, you can start very small and become big very fast

c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary

d) None of the mentioned

View Answer

Answer: a
d) None of the mentioned
View Answer
Answer: a
Explanation: Issues with latency, transaction control, and in particular security and regulatory
compliance are of particular concern.
6. Which of the following cloud concept is related to pooling and sharing of resources?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned
View Answer
Answer: c
Explanation: Applications run on physical systems that aren’t specified, data is stored in locations
that are unknown, administration of systems is outsourced to others, and access by users is
ubiquitous.
has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned
View Answer
Answer: a
Explanation: The Internet offers abstraction, runs using the same set of protocols and standards, and
uses the same applications and operating systems.
8. Which of the following can be identified as cloud?
a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned
View Answer
Answer: c
Explanation: When an intranet becomes large enough that a diagram no longer wishes to
differentiate between individual physical systems, the intranet too becomes identified as a cloud.
9. Cloud computing is an abstraction based on the notion of pooling physical resources
and presenting them as a resource.
a) real
b) virtual
c) cloud
d) none of the mentioned
View Answer
Answer: b
Explanation: Cloud Computing is a new model for provisioning resources, for staging applications,
and for platform-independent user access to services.
10. Which of the following is Cloud Platform by Amazon?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned
View Answer
Answer: b
Explanation: One of the most successful cloud-based businesses is Amazon Web Services, which is
an Infrastructure as a Service offering that lets you rent virtual computers on Amazon’s own
infrastructure.
1. model consists of the particular types of services that you can access on a
cloud computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned
View Answer
Answer: a
Explanation: Service models describe the type of service that the service provider is offering.
2. Point out the correct statement.
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
View Answer
Answer: b
Explanation: Abstraction and Virtualization are the two essential concepts.
3. refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
View Answer
Answer: b
Explanation: The deployment model tells you where the cloud is located and for what purpose.
4. Which of the following is the deployment model?
a) public
b) private
c) hybrid
d) all of the mentioned
View Answer
Answer: d
Explanation: Public, private, community, and hybrid clouds are deployment models.
5. Point out the wrong statement.
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned
View Answer
Answer: b
Explanation: Google has built mega data centres for its search engine.
6. Which of the following is best known service model?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: d
Explanation: The best-known service models are Software as a Service, Platform as a Service, and
Infrastructure as a Service—the SPI model.
7. The model originally did not require a cloud to use virtualization to pool resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned
View Answer
Answer: b
Explanation: NIST stands for National Institute of Standards and Technology.
8. model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square
b) Cloud Service
c) Cloud Cube
d) All of the mentioned
View Answer
Answer: c
Explanation: Cloud Cube model is mainly used for secure collaboration.
9. How many types of dimensions exists in Cloud Cube Model?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: There are four types of dimensions in Cloud Cube.
10. Which of the following dimension is related to organization’s boundaries?
a) Physical location of data
b) Ownership
c) Security boundary
d) All of the mentioned
View Answer
Answer: a
Explanation: Internal (I) / External (E) determines your organization’s boundaries.
1. How many types of security boundary values exist in Cloud Cube model?
a) 1
b) 2
c) 3
d) None of the mentioned
View Answer
Answer: b
Explanation: There are two types depending upon network firewall.
2. Point out the correct statement.
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
View Answer
Answer: a
Explanation: Four types of deployment models exist.
3. Which of the following is provided by ownership dimension of Cloud Cube Model?
a) Proprietary
b) Owner
c) P
d) All of the mentioned
View Answer
Answer: b
Explanation: P stands for Proprietary ownership.
4. is a measure of whether the operation is inside or outside the security boundary
or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned
View Answer
Answer: d
Explanation: Per stands for Perimeterised.
5. Point out the wrong statement.
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned
View Answer
Answer: a
Explanation: The public cloud infrastructure is available for public use alternatively for a large
industry group.
6. Which of the following is related to the service provided by Cloud?
a) Sourcing
b) Ownership
c) Reliability
d) AaaS
View Answer
Answer: a
Explanation: Insourced or Outsourced means whether the service is provided by the customer or the
service provider.
7. dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data
b) Ownership
c) Security boundary
d) None of the mentioned
View Answer
Answer: d
Explanation: The sourcing dimension addresses the deliverer of the service.
8. The cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
View Answer
Answer: b
Explanation: The cloud may be managed by that organization or a third party.
9. cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
View Answer
Answer: c
Explanation: A community cloud may be managed by the constituent organization(s) or by a third
party.
10. A hybrid cloud combines multiple clouds where those clouds retain their unique identities
but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
View Answer
Answer: d
Explanation: A hybrid cloud may offer standardized or proprietary access to data and applications,
as well as application portability.
This set of Cloud Computing Questions & Answers for entrance exams focuses on “Cloud Types –
3”.
1. Which of the following is owned by an organization selling cloud services?
a) Public
b) Private
c) Community
d) Hybrid
View Answer
Answer: a
Explanation: The public cloud infrastructure is available for public use alternatively for a large
industry group.
2. Point out the wrong statement.
a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in
which infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services,
development frameworks, transactions, and control structures
d) All of the mentioned
View Answer
Answer: c
Explanation: PaaS provides virtual machines, operating systems, applications, services,
development frameworks, transactions, and control structures.
3. provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: The IaaS service provider manages all the infrastructure, while the client is responsible
for all other aspects of the deployment.
4. Which of the following provides development frameworks and control structures?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: Infrastructure as a Service (IaaS) is a form of cloud computing that provides
virtualized computing resources over the Internet.
5. Point out the wrong statement.
a) A PaaS service adds integration features, middleware, and other orchestration and
choreography services to the IaaS model
b) XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid
Cloud computing
c) Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud jigsaw
d) None of the mentioned
View Answer
Answer: d
Explanation: Monitoring as a Service provides the option to offload a large majority of those costs
by having it run as a service as opposed to a fully invested in house tool.
6. is a complete operating environment with applications, management, and user interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: b
Explanation: In the SaaS model, the application is provided to the client through a thin client
interface.
7. How many types of service model are mainly present in Cloud?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: Three types of Service model exist.
8. The three different service models are together known as the model of cloud computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned
View Answer
Answer: a
Explanation: Many other service models are also present.
9. CaaS stands for as service.
a) Compliance
b) Computer
c) Community
d) Communication
View Answer
Answer: d
Explanation: Communication as a Service (CaaS), enables the consumer to utilize Enterprise level
VoIP, VPNs, PBX and Unified Communications without the costly investment of purchasing,
hosting and managing the infrastructure.
10. Which of the following is the IaaS service provider?
a) EC2
b) EC1
c) EC10
d) Hybrid
View Answer
Answer: a
Explanation: On Amazon EC2, a client would provision a computer in the form of a virtual machine
image.
1. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned
View Answer
Answer: d
Explanation: Cloud computing has shifted the economics of software delivery in a manner similar
to the way that music downloads have shifted the delivery of commercial music.
2. Point out the correct statement.
a) Google’s cloud includes perhaps some 10 data centers worldwide
b) Flipkart.com’s infrastructure was built to support elastic demand so the system
could accommodate peak traffic
c) Data centers have been sited to optimize the overall system latency
d) All of the mentioned
View Answer
Answer: c
Explanation: Datacenter can Keep land costs modest and occupation unobtrusive.
3. Which of the following benefit is related to creates resources that are pooled together in a
system that supports multi-tenant usage?
a) On-demand self-service
b) Broad network access
c) Resource pooling
d) All of the mentioned
View Answer
Answer: a
Explanation: A cloud service provider creates resources that are pooled together in a system that
supports multi-tenant usage.
4. The is something that you can obtain under contract from your vendor.
a) PoS
b) QoS
c) SoS
d) All of the mentioned
View Answer
Answer: b
Explanation: Depending upon the type of service being offered, you may find that you do not
require hardware or software licenses to implement your service.
5. Point out the wrong statement.
a) Internet consumes roughly 1 percent of the world’s total power
b) The cost advantages of cloud computing have enabled new software vendors to
create productivity applications
c) A client can provision computer resources without the need for interaction with cloud
service provider personnel
d) None of the mentioned
View Answer
Answer: a
Explanation: Data centers have been sited to have access to low cost power.
6. All cloud computing applications suffer from the inherent that is intrinsic in their WAN
connectivity.
a) propagation
b) latency
c) noise
d) all of the mentioned
View Answer
Answer: b
Explanation: While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, cloud computing may not be the best model for
you.
7. Cloud computing is a system and it is necessarily unidirectional in nature.
a) stateless
b) stateful
c) reliable
d) all of the mentioned
View Answer
Answer: a
Explanation: Cloud computing is a stateless system, as is the Internet in general.
8. Which of the following is the most important area of concern in cloud computing?
a) Security
b) Storage
c) Scalability
d) All of the mentioned
View Answer
Answer: a
Explanation: When your data travels over and rests on systems that are no longer under your
control, you have increased risk due to the interception and malfeasance of others.
9. You can’t count on a cloud provider maintaining your in the face of government actions.
a) scalability
b) reliability
c) privacy
d) none of the mentioned
View Answer
Answer: c
Explanation: Cloud computing industry continues to address security concerns.
10. Which of the following architectural standards is working with cloud computing industry?
a) Service-oriented architecture
b) Standardized Web services
c) Web-application frameworks
d) All of the mentioned
View Answer
Answer: a
Explanation: These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility
computing.
1. Which of the following is one of the unique attributes of Cloud Computing?
a) utility type of delivery
b) elasticity
c) low barrier to entry
d) all of the mentioned
View Answer
Answer: d
Explanation: These attributes change how applications are created, priced, and delivered.
2. Point out the correct statement.
a) Service Level Agreements (SLAs) is small aspect of cloud computing
b) Cloud computing does not have impact on software licensing
c) Cloud computing presents new opportunities to users and developers
d) All of the mentioned
View Answer
Answer: c
Explanation: Because it is based on the paradigm of a shared multi-tenant utility.
3. Applications that work with cloud computing that have low margins and usually low risk are

a) high touch
b) low touch
c) moderate touch
d) all of the mentioned
View Answer
Answer: b
Explanation: The “high touch” applications that come with high margins require committed
resources and pose more of a risk.
4. A service that concentrates on hardware follows the as a Service model.
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: Amazon web service follows PaaS model.
5. Point out the wrong statement.
a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability
to provision hardware and software
b) High touch applications are best done on-premises
c) The Google App Engine follows IaaS
d) None of the mentioned
View Answer
Answer: c
Explanation: The Google App Engine follows PaaS.
6. When you add a software stack, such as an operating system and applications to the service,
the model shifts to model.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: Microsoft’s Windows Azure Platform is best described as currently using SaaS model.
7. Which of the following is the most refined and restrictive service model?
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: When the service requires the client to use a complete hardware/software/application
stack, it is using the most refined and restrictive service model.
8. is a pay-as-you-go model matches resources to need on an ongoing basis.
a) Utility
b) Elasticity
c) Low barrier to entry
d) All of the mentioned
View Answer
Answer: a
Explanation: This eliminates waste and has the added benefit of shifting risk from the client.
9. feature allows you to optimize your system and capture all possible transactions.
a) scalability
b) reliability
c) elasticity
d) none of the mentioned
View Answer
Answer: c
Explanation: You have the ability to right-size resources as required.
10. enables batch processing, which greatly speeds up high-processing applications.
a) Scalability
b) Reliability
c) Elasticity
d) Utility
View Answer
Answer: a
Explanation: This feature obviates the need for planning and provisioning.
1. A service provider gets the same benefits from a composable system that a user does.
a) CaaS
b) AaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: If you are a PaaS or SaaS service provider and your task is to create the platform or
service presented to the developer, reseller, or user, the notion of working with a composable system
is still a very powerful one.
2. Point out the correct statement.
a) Cloud architecture can couple software running on virtualized hardware in multiple locations
to provide an on-demand service
b) Cloud computing relies on a set of protocols needed to manage interprocess communications
c) Platforms are used to create more complex software
d) All of the mentioned
View Answer
Answer: d
Explanation: The most commonly used services uses a set of discovery and description protocols
based on WSDL.
3. Which of the following is the property of the composable component?
a) stateful
b) stateless
c) symmetric
d) all of the mentioned
View Answer
Answer: b
Explanation: A transaction is executed without regard to other transactions or requests.
4. From the standpoint of a it makes no sense to offer non-standard machine instances
to customers.
a) CaaS
b) AaaS
c) PaaS
d) IaaS
View Answer
Answer: d
Explanation: Because those customers are almost certainly deploying applications built on standard
operating systems such as Linux, Windows, Solaris, or some other well-known operating system.
5. Point out the wrong statement.
a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another
datacenter
b) A composable component must be modular
c) A composable component must be stateless
d) None of the mentioned
View Answer
Answer: a
Explanation: While resources in a cloud can be real physical resources, more often they are
virtualized resources because virtualized resources are easier to modify and optimize.
6. A service provider reselling a may have the option to offer one module to customize
the information.
a) CaaS
b) AaaS
c) PaaS
d) SaaS
View Answer
Answer: d
Explanation: Modifications are generally severely limited.
7. Which of the following is the highest degree of integration in cloud computing?
a) CaaS
b) AaaS
c) PaaS
d) SaaS
View Answer
Answer: d
Explanation: An SaaS vendor such as Quicken.com or Salesforce.com is delivering an application
as a service to a customer.
8. Which of the architectural layer is used as a front end in cloud computing?
a) client
b) cloud
c) soft
d) all of the mentioned
View Answer
Answer: a
Explanation: Cloud computing may be differentiated from older models by describing an
encapsulated information technology service that is often controlled through an Application
Programming Interface (API).
9. Which of the following benefit is provided by the PaaS service provider?
a) A larger pool of qualified developers
b) More reliable operation
c) A logical design methodology
d) All of the mentioned
View Answer
Answer: d
Explanation: The essence of a service oriented design is that services are constructed from a set of
modules using standard communications and service interfaces.
10. Communication between services is done widely using protocol.
a) REST
b) SOAP
c) RESTful
d) None of the mentioned
View Answer
Answer: b
Explanation: There are alternative sets of standards as well.
1. Which of the following provider rely on the virtual machine technology to deliver servers?
a) CaaS
b) AaaS
c) PaaS
d) IaaS
View Answer
Answer: d
Explanation: Most large Infrastructure as a Service (IaaS) providers rely on virtual machine
technology that can run applications.
2. Point out the correct statement.
a) Virtual machines are containers that are assigned specific resources
b) Applications need not be mindful of how they use cloud resources
c) When a developer creates an application that uses a cloud service, the developer cannot attach
to the appropriate service
d) All of the mentioned
View Answer
Answer: a
Explanation: The software that runs in the virtual machines is what defines the utility of the cloud
computing system.
3. Which of the following component is called hypervisor?
a) VGM
b) VMc
c) VMM
d) All of the mentioned
View Answer
Answer: c
Explanation: VMM component is also called hypervisor.
4. Applications such as a Web server or database server that can run on a virtual machine image
are referred to as
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned
View Answer
Answer: b
Explanation: The name virtual appliance is a little misleading because it conjures up the image of a
machine that serves a narrow purpose.
5. Point out the wrong statement.
a) Platforms represent nearly the full cloud software stack
b) A platform in the cloud is a software layer that is used to create higher levels of service
c) Platforms often come replete with tools and utilities to aid in application design and deployment
d) None of the mentioned
View Answer
Answer: d
Explanation: Most platforms begin by establishing a developer community to support the work
done in the environment.
6. allows different operating systems to run in their own memory space.
a) VGM
b) VMc
c) VMM
d) All of the mentioned
View Answer
Answer: c
Explanation: VMM manages I/O for the virtual machines.
7. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of
nodes.
a) Ben
b) Xen
c) Ken
d) Zen
View Answer
Answer: b
Explanation: You run across virtual appliances in IaaS systems such as Amazon’s Elastic Compute
Cloud.
8. Which of the following offers virtual appliances, including ones based on Windows, all of
which run on VMware Player?
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
View Answer
Answer: a
Explanation: Virtual appliances have begun to affect the PC industry in much the same way that
application stores have affected the cell phone industry.
9. offers various Linux distributions upon which you can build a virtual machine.
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
View Answer
Answer: b
Explanation: Jcinacio has Ubuntu appliances.
10. is a CPU emulator and virtual machine monitor.
a) Imaging
b) Parallels
c) QEMU
d) None of the mentioned
View Answer
Answer: c
Explanation: Parallels hosts a variety of appliances that includes Linux distros, server software, and
other products.
1. Which of the following is a virtual machine technology now owned by Oracle that can
run various operating systems?
a) Vmachines
b) VirtualBox
c) ThoughtPolice
d) None of the mentioned
View Answer
Answer: b
Explanation: VirtualBox serves as a host for a variety of virtual appliances.
2. Point out the correct statement.
a) JumpIt is an open-source virtual appliance installation and management service
b) Converting a virtual appliance from one platform to another is easy proposition
c) Nearly all major virtualization platform vendors support OVF, notably VMware, Microsoft,
Oracle, and Citrix
d) All of the mentioned
View Answer
Answer: c
Explanation: Efforts are underway to create file format standards for these types of objects that
make the task easier.
3. Which of the following lets a Web service advertise itself in terms of a collection of endpoints?
a) WSDL
b) VMc
c) SOAP
d) All of the mentioned
View Answer
Answer: a
Explanation: The most commonly used model for discovery and description used with SOAP
messaging is the Web Services Description Language (WSDL).
4. Which of the following is a specification for multicast discovery on a LAN?
a) WS-Agent
b) WS-Discovery
c) WS-SOAP
d) All of the mentioned
View Answer
Answer: b
Explanation: WS-Discovery stands for Web Services Dynamic Discovery specification.
5. Point out the wrong statement.
a) Cloud computing arises from services available over the Internet communicating
b) XML-RPC uses platform-independent XML data to encode program calls that are
transported over HTTP
c) SOAP uses JSON for its messages and uses RPC and HTTP for message passing
d) None of the mentioned
View Answer
Answer: c
Explanation: SOAP forms the basis for most of the Web services stacks.
6. as a Service is a cloud computing infrastructure that creates a
development environment upon which applications may be build.
a) Infrastructure
b) Service
c) Platform
d) All of the mentioned
View Answer
Answer: c
Explanation: PaaS provides a model that can be used to create or augment complex applications
such as Customer Relation Management (CRM) or Enterprise Resource Planning (ERP) systems.
7. is a cloud computing service model in which hardware is virtualized in the cloud.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
View Answer
Answer: a
Explanation: In this particular model, the service vendor owns the equipment: servers, storage,
network infrastructure, and so forth.
8. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
View Answer
Answer: c
Explanation: A workload simulates the ability of a certain type of real or physical server to do any
amount of work.
9. How many types of virtual private server instances are partitioned in an IaaS stack?
a) one
b) two
c) three
d) all of the mentioned
View Answer
Answer: c
Explanation: The three workloads require three different sizes of computers: small, medium, and
large.
10. Which of the following correctly represents cloud computing
ecosystem? a)

Business Process
Application Services
Platform Services
Infrastructure Services
b)
Application Process
Business Services
Platform Services
Infrastructure Services
c)
Application Process
Infrastructure Services
Platform Services
Infrastructure Services
d)
Business Process
Application Services
Infrastructure Services
Platform Services
View Answer
Answer: a
Explanation: You can broadly partition cloud computing into four layers that form a cloud
computing ecosystem.
1. Which of the following content is allowed as per virtual appliance block diagram shown below?

a) Table
b) Image
c) Documents
d) All of the mentioned
View Answer
Answer: d
Explanation: Content can be structured or unstructured in virtual appliance.
2. Point out the correct statement.
a) WS-+ services carried over XML messages using the SOAP protocol access remote
server applications
b) REST stands for Representational State Transfer
c) A transaction following the rules of SOAP is considered to be RESTful
d) All of the mentioned
View Answer
Answer: b
Explanation: REST assigns a global identifier to a resource so there is a uniform method for
accessing information sources.
3. Which of the following is based on the IETF Session Initiation Protocol?
a) WSDL
b) SIMPLE
c) SOAP
d) All of the mentioned
View Answer
Answer: b
Explanation: SIMPLE is an open standard protocol.
4. Which of the following is a third-party VPN based on Google’s GoogleTalk?
a) Hotspot VPN
b) Gbridge
c) AnchorFree Hotspot Shield
d) All of the mentioned
View Answer
Answer: b
Explanation: Gbridge is an interesting solution that illustrates the use of VPN over a cloud
connection.
5. Point out the wrong statement.
a) Atom is a syndication format that allows for HTTP protocols to create and update information
b) Cloud services span the gamut of computer applications
c) The impact of cloud computing on network communication is to discourage the use of
open- network protocols in place of proprietary protocols
d) None of the mentioned
View Answer
Answer: c
Explanation: Microsoft’s ADO.NET Data Services Framework is another system for transferring
data using a RESTful transaction and standard HTTP commands.
6. Which of the following is a classic example of an IaaS service model?
a) AWS
b) Azure
c) Cloudera
d) All of the mentioned
View Answer
Answer: a
Explanation: AWS has several data centers in which servers run on top of a virtualization platform
(Xen).
7. is designed specifically to run connected to the cloud as a dedicated cloud client.
a) Harvera Tablet OS
b) Fedora Netbook OS
c) Jolicloud Netbook OS
d) None of the mentioned
View Answer
Answer: c
Explanation: Jolicloud concentrates on building a social platform with automatic software updates
and installs.
8. Which of the following is the management console in AWS?
a) CSC
b) CCS
c) CSS
d) All of the mentioned
View Answer
Answer: b
Explanation: Pods are managed by a Cloud Control System (CCS).
9. A group of users within a particular instance is called
a) suser
b) pod
c) superuser
d) all of the mentioned
View Answer
Answer: b
Explanation: Sizing limitations for pods need to be accounted for if you are building a large cloud-
based application.
10. Pods are aggregated into pools within an IaaS region or site called an
zone.
a) restricted
b) unavail
c) availability
d) none of the mentioned
View Answer
Answer: c
Explanation: In very large cloud computing networks, when systems fail, they fail on a pod-by-pod
basis, and often on a zone-by-zone basis.
1. offering provides the tools and development environment to deploy applications
on another vendor’s application.
a) PaaS
b) IaaS
c) CaaS
d) All of the mentioned
View Answer
Answer: b
Explanation: PaaS tool is a fully integrated development environment.
2. Point out the correct statement.
a) Platforms cannot be based on specific types of development languages, application
frameworks, or other constructs
b) PaaS systems offer a way to create user interfaces
c) In a CaaS model, customers may interact with the software to enter and retrieve data
d) All of the mentioned
View Answer
Answer: b
Explanation: PaaS systems support standards such as HTML, JavaScript, or other rich media
technologies.
3. Which of the following is associated with considerable vendor lock-in?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: a
Explanation: The difficulty with PaaS is that it locks the developer (and the customer) into a
solution that is dependent upon the platform vendor.
4. serves as a PaaS vendor within Google App Engine system.
a) Google
b) Amazon
c) Microsoft
d) All of the mentioned
View Answer
Answer: a
Explanation: Google offers many of its Web service applications to customers as part of this service
model.
5. Point out the wrong statement.
a) The customer takes no responsibility for maintaining the hardware, the software, or
the development of the applications
b) The vendor is responsible for all the operational aspects of the service
c) Google’s App Engine platform is IaaS offering
d) None of the mentioned
View Answer
Answer: c
Explanation: The customer is responsible only for his interaction with the platform
6. Which of the following can be considered PaaS offering?
a) Google Maps
b) Gmail
c) Google Earth
d) All of the mentioned
View Answer
Answer: a
Explanation: The vendor of the PaaS solution is in most cases the developer, who is offering a
complete solution to the customer.
7. is the most refined and restrictive service model.
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: When the service requires the client to use a complete hardware/software/application
stack, it is using the most refined and restrictive service model.
8. provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: The IaaS service provider manages all the infrastructure, while the client is responsible
for all other aspects of the deployment.
9. Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to

a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: In AWS, the CCS is the AWS Management Console.
10. Rackspace Cloud Service is an example of
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: Unlike other cloud providers, Rackspace only offers managed solutions.
1. Which of the following is the most complete cloud computing service model?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: d
Explanation: The most complete cloud computing service model is one in which the computing
hardware and software, as well as the solution itself, are provided by a vendor as a complete service
offering.
2. Point out the correct statement.
a) Platforms can be based on specific types of development languages, application frameworks,
or other constructs
b) SaaS is the cloud-based equivalent of shrink-wrapped software
c) Software as a Service (SaaS) may be succinctly described as software that is deployed on a
hosted service
d) All of the mentioned
View Answer
Answer: d
Explanation: SaaS can be accessed globally over the Internet, most often in a browser.
3. Which of the following aspect of the service is abstracted away?
a) Data escrow
b) User Interaction
c) Adoption drivers
d) None of the mentioned
View Answer
Answer: b
Explanation: With the exception of the user interaction with the software, all other aspects of the
service are abstracted away.
4. Which of the following SaaS platform is with an exposed API?
a) salesforce.com
b) amazon.com
c) flipkart.com
d) all of the mentioned
View Answer
Answer: a
Explanation: SaaS does not necessarily mean that the software is static or monolithic.
5. Point out the wrong statement.
a) SaaS applications come in all shapes and sizes
b) Every computer user is familiar with SaaS systems
c) SaaS software is not customizable
d) None of the mentioned
View Answer
Answer: d
Explanation: Every computer user is familiar with SaaS systems, which are either replacements or
substitutes for locally installed software.
6. Which of the following is a SaaS characteristic?
a) The typical license is subscription-based or usage-based and is billed on a recurring basis
b) The software is available over the Internet globally through a browser on demand
c) The software and the service are monitored and maintained by the vendor
d) All of the mentioned
View Answer
Answer: d
Explanation: There may be executable client-side code, but the user isn’t responsible for
maintaining that code or its interaction with the service.
7. applications have a much lower barrier to entry than their locally
installed competitors.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
View Answer
Answer: d
Explanation: Such applications feature automated upgrades, updates, and patch management and
much faster rollout of changes.
8. SaaS supports multiple users and provides a shared data model through model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) all of the mentioned
View Answer
Answer: b
Explanation: The alternative of software virtualization of individual instances also exists, but is less
common.
9. Open source software used in a SaaS is called SaaS.
a) closed
b) free
c) open
d) all of the mentioned
View Answer
Answer: c
Explanation: A considerable amount of SaaS software is based on open source software.
10. The componentized nature of SaaS solutions enables many solutions to support a feature called

a) workspace
b) workloads
c) mashups
d) all of the mentioned
View Answer
Answer: c
Explanation: A mashup is an application that can display a Web page that shows data and supports
features from two or more sources.
1. Salesforce.com is the largest provider of CRM software.
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: d
Explanation: Salesforce.com extended its SaaS offering to allow developers to create add-on
applications.
2. Point out the correct statement.
a) Mashups are an incredibly useful hybrid Web application
b) SaaS will eventually replace all locally installed software
c) The establishment and proof of identity is a central network function
d) All of the mentioned
View Answer
Answer: d
Explanation: An identity service is one that stores the information associated with a digital entity in
a form that can be queried and managed for use in electronic transactions.
3. Which of the following group is dedicated to support technologies that implement
enterprise mashups?
a) Open Alliance Apache
b) Open Mashup Alliance
c) Open Tech Alliance
d) None of the mentioned
View Answer
Answer: b
Explanation: This group predicts that the use of mashups will grow by a factor of 10 within just a
few years.
4. Which of the following attribute should be unique?
a) identity
b) digital identity
c) mashup
d) all of the mentioned
View Answer
Answer: b
Explanation: A digital identity is those attributes and metadata of an object along with a set of
relationships with other objects that makes an object identifiable.
5. Point out the wrong statement.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify
the difficulties faced by identity management systems
b) Services that provide digital identity management as a service have been part of
internetworked systems from Day One
c) IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
d) None of the mentioned
View Answer
Answer: c
Explanation: The name servers that run the various Internet domains are IDaaS servers.
6. authentication requires the outside use of a network security or trust service.
a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned
View Answer
Answer: c
Explanation: More secure authentication requires the use of at least two-factor authentication.
7. is the assignment of a network identity to a specific MAC address that allows
systems to be found on networks.
a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned
View Answer
Answer: c
Explanation: Network interfaces are identified uniquely by Media Access Control (MAC)
addresses, which alternatively are referred to as Ethernet Hardware Addresses.
8. is one of the more expensive and complex areas of network computing.
a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned
View Answer
Answer: c
Explanation: Ticket or token providing services, certificate servers, and other trust mechanisms all
provide identity services that can be pushed out of private networks and into the cloud.
9. Which of the following is provided by Identity as a Service?
a) Identity governance
b) Provisioning
c) Risk and event monitoring
d) All of the mentioned
View Answer
Answer: d
Explanation: Identity as a Service or the related hosted (managed) identity services may be the most
valuable and cost effective distributed service types you can subscribe to.
10. Which of the following figure fully represent standards needed by IDaaS applications
for interoperability?
a)

b)

c)

d)
View Answer
Answer: a
Explanation: Cloud computing IDaaS applications must rely on a set of developing industry
standards to provide interoperability.
1. Any software application that complies with the standard accepts a that is authenticated
by a trusted provider.
a) OpenID
b) OpenUser
c) OpenSSD
d) None of the mentioned
View Answer
Answer: a
Explanation: When an identity is created in an OpenID system, that information is stored in the
system of any OpenID service provider and translated into a unique identifier.
2. Point out the wrong statement.
a) XML checks the ID request against its policies and either allows or denies the request
b) SPML in most instances operates as a reply/request mechanism
c) User centric authentication takes place usually in the form of knowledge cards
d) All of the mentioned
View Answer
Answer: b
Explanation: In SAML, a service provider passes a statement or set of statements (called assertions)
to an identity provider that must be evaluated.
3. Which of the following allows a distributed ID system to write and enforce custom
policy expressions?
a) XACML
b) XML
c) SOAP
d) None of the mentioned
View Answer
Answer: a
Explanation: This is a general-purpose authorization policy language.
4. is a standard of OASIS’s PSTC that conforms to the SOA architecture.
a) XACML
b) SPML
c) SML
d) All of the mentioned
View Answer
Answer: b
Explanation: SPML is an XML request/response language that is used to integrate and interoperate
service provisioning requests.
5. Point out the wrong statement.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify
the difficulties faced by identity management systems
b) The Distributed Audit Service provides accountability for users accessing a system
c) The OpenID and CardSpace specifications support the authentication type of data object
d) None of the mentioned
View Answer
Answer: c
Explanation: OpenID is a developing industry standard for authenticating “end users” by storing
their digital identity in a common format.
6. Which of the following standard is concerned with the exchange and control of
identity information?
a) IGK
b) IDF
c) IGF
d) All of the mentioned
View Answer
Answer: c
Explanation: The Identity Governance Framework (IGF) is a standards initiative of the Liberty
Alliance.
7. is a Microsoft software client that is part of the company’s Identity Metasystem
and built into the Web Services Protocol Stack.
a) IHA
b) EHA
c) CardSpace
d) None of the mentioned
View Answer
Answer: c
Explanation: CardSpace was introduced with .NET Frameworks 3.0 and can be installed on
Windows XP, Server 2003, and later.
8. The Open Source Identity Framework is used to create a vendor-neutral cloud-
based authentication service.
a) Higgins
b) Hughes
c) Hinges
d) All of the mentioned
View Answer
Answer: a
Explanation: The Higgins Open Source Identity Framework uses an i-Card metaphor.
9. Which of the following is authorization markup language?
a) eXtensible Access Control Markup Language
b) intrinsic Access Control Markup Language
c) hypertext Access Control Markup Language
d) all of the mentioned
View Answer
Answer: a
Explanation: A policy in XACML describes a subject element that requests an action from a
resource.
10. Which of the following should come in place of question mark for the following figure?

a) Policy Enforcement Point


b) Policy Decision Point
c) Policy Insertion Point
d) All of the mentioned
View Answer
Answer: b
Explanation: SAML integrates with XACML to implement a policy engine in a Service Oriented
Architecture to support identity services authorization.
1. Which of the following is an example of a vertical cloud that advertise CaaS capabilities?
a) FedCloud
b) ClearPoint PCI
c) Rackserve PCI
d) All of the mentioned
View Answer
Answer: d
Explanation: It’s much easier to envisage a CaaS system built inside a private cloud where the data
is under the control of a single entity.
2. Point out the wrong statement.
a) SPML is used to prepare Web services and applications for use
b) With SPML, a system can provide automated user and system access
c) Without a provisioning system, a cloud computing system can be very efficient and
potentially reliable
d) All of the mentioned
View Answer
Answer: c
Explanation: Without a provisioning system, a cloud computing system can be very inefficient and
potentially unreliable.
3. Which of the following allows a distributed ID system to write and enforce custom
policy expressions?
a) XACML
b) XML
c) SOAP
d) None of the mentioned
View Answer
Answer: a
Explanation: This is a general-purpose authorization policy language.
4. Which of the following is a man-in-the-middle type of service?
a) CaaS
b) IaaS
c) AaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: A CaaS would need to be able to manage cloud relationships, understand security
policies and procedures.
5. Point out the correct statement.
a) Cloud computing by its very nature spans same jurisdictions
b) SaaS is much more than simply providing an anonymous service token to an identity
c) A Compliance as a Service application would need to serve as a trusted third party
d) All of the mentioned
View Answer
Answer: c
Explanation: CaaS may need to be architected as its own layer of an SOA architecture in order to be
trusted.
6. Which of the following can be used for the banking industry?
a) athenahealth
b) bankserve
c) bankingsol
d) all of the mentioned
View Answer
Answer: b
Explanation: Athenahealth is used for the medical industry.
7. as a Service is a hosted application that is the cloud equivalent of a traditional
desktop application.
a) Software
b) Platform
c) Analytics
d) Compliance
View Answer
Answer: a
Explanation: Most of the cloud computing compliance systems to date have been built using private
clouds.
8. Which of the following is a PCI CaaS service?
a) FedCloud
b) ClearSoln
c) Rackserve PCI
d) All of the mentioned
View Answer
Answer: c
Explanation: FedCloud is used for government.
9. is used for merchant transactions under the Payment Card Industry Data
Security Standard.
a) ClearPoint PCI
b) ClearSoln
c) Rackserve PCI
d) All of the mentioned
View Answer
Answer: a
Explanation: Organizations can manage PCI compliance risk more effectively with the help of
ClearPoint PCI.
10. as a Service is a development environment that builds upon an existing
cloud computing application infrastructure.
a) Software
b) Platform
c) Analytics
d) Compliance
View Answer
Answer: b
Explanation: Service types are models upon which distributed applications are created and hosted.
1. Which of the following correctly represents different types of mobile patterns?

a)
b)

c)
d) All of the mentioned
View Answer
Answer: a
Explanation: You can define the features in software and hardware that enables flexibility as
conforming to one or more of the mobility patterns.
2. Point out the wrong statement.
a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
b) Virtualization assigns a logical name for a physical resource and then provides a pointer to
that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be assigned
on demand to users
d) All of the mentioned
View Answer
Answer: c
Explanation: Several important cloud computing approaches use a strictly hardware-based approach
to abstraction.
3. Which of the following type of virtualization is also characteristic of cloud computing?
a) Storage
b) Application
c) CPU
d) All of the mentioned
View Answer
Answer: d
Explanation: To enable these characteristics, resources must be highly configurable and flexible.
4. The technology used to distribute service requests to resources is referred to as
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
View Answer
Answer: c
Explanation: Load balancing is an optimization technique.
5. Point out the correct statement.
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based on conditions
c) Computers can be partitioned into a set of virtual machines with each machine being assigned
a workload
d) All of the mentioned
View Answer
Answer: d
Explanation: Alternatively, systems can be virtualized through load-balancing technologies.
6. Which of the following software can be used to implement load balancing?
a) Apache mod_balancer
b) Apache mod_proxy_balancer
c) F6’s BigIP
d) All of the mentioned
View Answer
Answer: b
Explanation: Load balancing can be used to increase utilization and throughput, lower latency,
reduce response time, and avoid system overload.
7. Which of the following network resources can be load balanced?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
View Answer
Answer: d
Explanation: Load balancing provides the necessary redundancy to make an intrinsically unreliable
system reliable through managed redirection.
8. Which of the following is a more sophisticated load balancer?
a) workload managers
b) workspace managers
c) rackserve managers
d) all of the mentioned
View Answer
Answer: a
Explanation: They determine the current utilization of the resources in their pool.
9. A is a combination load balancer and application server that is a server placed between
a firewall or router.
a) ABC
b) ACD
c) ADC
d) All of the mentioned
View Answer
Answer: c
Explanation: An Application Delivery Controller is assigned a virtual IP address (VIP) that maps to
a pool of servers based on application specific criteria.
10. Which of the following should be replaced with the question mark in the following figure?

a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
View Answer
Answer: b
Explanation: Virtualization is a key enabler of the first four of five key attributes of cloud
computing.
1. Which type of Hypervisor is shown in the following figure?

a) Type 1
b) Type 2
c) Type 3
d) All of the mentioned
View Answer
Answer: a
Explanation: A hypervisor running on bare metal is a Type 1 VM or native VM.
2. Point out the wrong statement.
a) Load balancing virtualizes systems and resources by mapping a logical address to a
physical address
b) Multiple instances of various Google applications are running on different hosts
c) Google uses hardware virtualization
d) All of the mentioned
View Answer
Answer: c
Explanation: Google performs server load balancing to distribute the processing load and to get
high utilization rates.
3. Which of the following is another name for the system virtual machine?
a) hardware virtual machine
b) software virtual machine
c) real machine
d) none of the mentioned
View Answer
Answer: a
Explanation: Some virtual machines are designed to run only a single application or process and are
referred to as process virtual machines.
4. Which of the following provide system resource access to virtual machines?
a) VMM
b) VMC
c) VNM
d) All of the mentioned
View Answer
Answer: a
Explanation: VMM is another name for Hypervisor.
5. Point out the correct statement.
a) A virtual machine is a computer that is walled off from the physical computer that the
virtual machine
is running on
b) Virtual machines provide the capability of running multiple machine instances, each with
their own operating system
c) The downside of virtual machine technologies is that having resources indirectly
addressed means there is some level of overhead
d) All of the mentioned
View Answer
Answer: d
Explanation: This makes virtual machine technology very useful for running old versions of
operating systems, testing applications in what amounts to a sandbox.
6. An operating system running on a Type VM is full virtualization.
a) 1
b) 2
c) 3
d) All of the mentioned
View Answer
Answer: a
Explanation: Because it is a complete simulation of the hardware that it is running on.
7. Which of the following is Type 1 Hypervisor?
a) Wind River Simics
b) Virtual Server 2005 R2
c) KVM
d) LynxSecure
View Answer
Answer: d
Explanation: Type 1 VMs have no host operating system because they are installed on a bare
system.
8. Which of the following is Type 2 VM?
a) VirtualLogix VLX
b) VMware ESX
c) Xen
d) LynxSecure
View Answer
Answer: c
Explanation: Xen is used by Amazon Web Services to provide Amazon Machine Instances (AMIs).
9. Which of the following will be the host operating system for Windows Server?
a) VirtualLogix VLX
b) Microsoft Hyper-V
c) Xen
d) All of the mentioned
View Answer
Answer: b
Explanation: Type 2 virtual machines are installed over a host operating system.
10. Which of the following should be placed in second lowermost layer for the following figure?

a) Host Operating System


b) Software
c) VM
d) None of the mentioned
View Answer
Answer: a
Explanation: Examples of Type 2 Virtual Machine Monitors are Containers, KVM, Microsoft Hyper
V and Parallels Desktop for Mac
1. What does the following figure represent?

a) vSquare cloud infrastructure


b) vCube cloud infrastructure
c) vSphere cloud infrastructure
d) None of the mentioned
View Answer
Answer: c
Explanation: vSphere is the branding for a set of management tools and a set of products previously
labeled VMware Infrastructure.
2. Point out the wrong statement.
a) Some hypervisors are installed over an operating system and are referred to as Type 2 or
hosted VM
b) All CPUs support virtual machines
c) On a Type 2 VM, a software interface is created that emulates the devices with which a
system would normally interact
d) All of the mentioned
View Answer
Answer: b
Explanation: Not all CPUs support virtual machines and many that do require that you enable this
support in the BIOS.
3. Which of the following type of virtualization is found in hypervisor such as Microsoft’s
Hyper- V?
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
View Answer
Answer: a
Explanation: It is the host operating system that is performing the I/O through a para-API.
4. In the virtual machine simulates hardware, so it can be independent of the
underlying system hardware.
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
View Answer
Answer: c
Explanation: A guest operating system using emulation does not need to be modified in any way.
5. Point out the wrong statement.
a) Full virtualization requires that the host operating system provide a virtual machine interface
for the guest operating system and that the guest access hardware through that host VM
b) Guest operating systems in full virtualization systems are generally faster than
other virtualization schemes
c) A process virtual machine instantiates when a command begins a process
d) All of the mentioned
View Answer
Answer: a
Explanation: An operating system running as a guest on a paravirtualization system must be ported
to work with the host interface.
Object 1

6. In a scheme, the VM is installed as a Type 1 Hypervisor directly onto


the hardware.
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
View Answer
Answer: b
Explanation: All operating systems in full virtualization communicate directly with the VM
hypervisor.
7. Which of the following operating system support operating system virtualization?
a) Windows NT
b) Sun Solaris
c) Windows XP
d) Compliance
View Answer
Answer: b
Explanation: This type of virtualization creates virtual servers at the operating system or kernel
level.
8. Which of the following is a service that aggregates servers into an assignable pool?
a) VMware vStorage
b) VMware vNetwork
c) VMware vCompute
d) Application services
View Answer
Answer: c
Explanation: VMware vSphere is a management infrastructure framework that virtualizes system,
storage, and networking hardware to create cloud computing infrastructures.
9. is a service that creates and manages virtual network interfaces.
a) VMware vStorage
b) VMware vNetwork
c) VMware vCompute
d) Application services
View Answer
Answer: b
Explanation: VMware vStorage is a service that aggregates storage resources into an assignable
pool.
10. Which of the following allows a virtual machine to run on two or more physical processors
at the same time?
a) Virtual SMP
b) Distributed Resource Scheduler
c) vNetwork Distributed Switch
d) Storage VMotion
View Answer
Answer: a
Explanation: The virtualization layer that abstracts processing, memory, and storage uses the
VMware ESX or ESXi virtualization server.
1. Which of the following subject area deals with pay-as-you-go usage model?
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned
View Answer
Answer: a
Explanation: For cloud computing, the pay-as-you-go usage model allows for costs to be applied to
individual accounts directly.
2. Point out the correct statement.
a) Except for tightly managed SaaS cloud providers, the burden of resource management is still
in the hands of the user
b) Cloud computing vendors run very reliable networks
c) The low barrier to entry cannot be accompanied by a low barrier to provisioning
d) All of the mentioned
View Answer
Answer: b
Explanation: Often, cloud data is load-balanced between virtual systems and replicated between
sites.
3. captive requires that the cloud accommodate multiple compliance regimes.
a) Licensed
b) Policy-based
c) Variable
d) All of the mentioned
View Answer
Answer: b
Explanation: Compliance with laws and policies varies by geographical area.
4. Security methods such as private encryption, VLANs and firewalls comes under
subject area.
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned
View Answer
Answer: c
Explanation: To ensure data privacy in the cloud, additional security methods such as private
encryption, VLANs, firewalls, and local storage of sensitive data are necessary.
5. Point out the wrong statement.
a) Large cloud providers with geographically dispersed sites worldwide, therefore,
achieve reliability rates that are hard for private systems to achieve
b) Private data centers tend to be located in places where the company or unit was founded
or acquired
c) A network backbone is a very low-capacity network connection
d) None of the mentioned
View Answer
Answer: c
Explanation: On the Internet, an Internet backbone consists of the high-capacity routes and routers
that are typically operated by an individual service provider such as a government or commercial
entity.
6. Which of the following captive area deals with monitoring?
a) Licensed
b) Variable but under control
c) Low
d) All of the mentioned
View Answer
Answer: b
Explanation: For private systems, any monitoring system the organization wishes to deploy can be
brought to bear.
7. Network bottlenecks occur when data sets must be transferred.
a) large
b) small
c) big
d) all of the mentioned
View Answer
Answer: a
Explanation: This is the case for staging,
8. The reputation for cloud computing services for the quality of those services is shared by

a) replicas
b) shards
c) tenants
d) all of the mentioned
View Answer
Answer: c
Explanation: Clouds often have higher reliability than private systems.
9. Cloud are standardized in order to appeal to the majority of its audience.
a) SVAs
b) SLAs
c) SALs
d) None of the mentioned
View Answer
Answer: b
Explanation: Custom SLAs that allow for multiple data sources are difficult to obtain or enforce.
10. is a function of the particular enterprise and application in an on-
premises deployment.
a) Vendor lock
b) Vendor lock-in
c) Vendor lock-ins
d) None of the mentioned
View Answer
Answer: b
Explanation: Vendor lock-in for a cloud computing solution in a PaaS model is very high.
1. The term refers to a Network or Internet.
A. Cloud Computing
B. Cloud
C. Computing
D. CRM
View Answer
Ans : B
Explanation: The term Cloud refers to a Network or Internet.

2. Cloud Computing refers to?


A. accessing the hardware
B. configuring the hardware
C. manipulating the hardware
D. All of the above
View Answer
Ans : D
Explanation: Cloud Computing refers to manipulating, configuring, and accessing the hardware and
software resources remotely. It offers online data storage, infrastructure, and application.
3. Which of the following is true about cloud computing?
A. Cloud computing is platform dependent
B. Cloud Computing makes our business applications mobile and collaborative.
C. Cloud Computing provides us means of accessing the applications as utilities over
computer only.
D. All of the above
View Answer
Ans : B
Explanation: Cloud computing offers platform independency, as the software is not required to be
installed locally on the PC. Hence, the Cloud Computing is making our business applications
mobile and collaborative.

4. Which of the following is the working modelsfor cloud computing?


A. Deployment Models
B. Configuring Model
C. Collaborative Model
D. All of the above
View Answer
Ans : A
Explanation: Following are the working models for cloud computing: Deployment Models and
Service Models.

5. How many types of Cloud are there in Deployment Models?


A. 2
B. 3
C. 4
D. 5
View Answer
Ans : C
Explanation: Cloud can have any of the four types of access: Public, Private, Hybrid, and
Community.

6. The allows systems and services to be accessible by a group of organizations.


A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
View Answer
Ans : C
Explanation: The community cloud allows systems and services to be accessible by a group of
organizations.

7. The allows systems and services to be accessible within an organization.


A. Private cloud
B. Public cloud
C. Community cloud
D. Hybrid cloud
View Answer
Ans : A
Explanation: The private cloud allows systems and services to be accessible within an organization.
It is more secured because of its private nature.

8. Which of the following is a type of Service Models?


A. Public-as-a-Service
B. Platform-as-a-Service
C. Community-as-a-Service
D. Public-as-a-Service
View Answer
Ans : B
Explanation: Cloud computing is based on service models. These are categorized into three basic
service models which are : Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and
Software-as-a-Service (SaaS)

9. provides the runtime environment for applications, development and deployment


tools, etc.
A. IaaS
B. PaaS
C. SaaS
D. XaaS
View Answer
Ans : B
Explanation: PaaS provides the runtime environment for applications, development and deployment
tools, etc.
10. is yet another service model, which includes Network-as-a-Service,
Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-
Service.
A. IaaS
B. PaaS
C. SaaS
D. XaaS
View Answer
Ans : D
Explanation: Anything-as-a-Service (XaaS) is yet another service model, which includes
Network- as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or
Strategy-as-a- Service.
1. Which of the following are correct technologies working behind the cloud computing platforms?
A. Virtualization
B. SOA
C. Grid Computing
D. All of the above
View Answer
Ans : D
Explanation: There are certain technologies working behind the cloud computing platforms making
cloud computing flexible, reliable, and usable. These technologies are : Virtualization, Service-
Oriented Architecture (SOA), Grid Computing and Utility Computing

2. is a technique, which allows to share single physical instance of an


application or resource among multiple organizations or tenants (customers).
A. Virtualization
B. Service-Oriented Architecture
C. Grid Computing
D. Utility Computing
View Answer
Ans : A
Explanation: Virtualization is a technique, which allows to share single physical instance of an
application or resource among multiple organizations or tenants (customers)

3. What is true about Virtualization?


A. In Virtualization, it is necessary to have well-compiled Multitenant.
B. In Virtualization, we analyze the strategy problems that customer might face
C. It assign a logical name to a physical resource and providing a pointer to that physical
resource when demanded.
D. All of the above
View Answer
Ans : C
Explanation: It assign a logical name to a physical resource and providing a pointer to that physical
resource when demanded is true regarding Virtualization.

4. In Virtualization, Which architecture offers virtual isolation among the multiple tenants?
A. IT Architecture
B. Multitenant
C. Deployment
D. Business Architecture
View Answer
Ans : B
Explanation: The Multitenant architecture offers virtual isolation among the multiple tenants.
Hence, the organizations can use and customize their application as though they each have their
instances running.

5. Utility computing is based on?


A. Grid Computing Model
B. Pay-per-Use model
C. virtual isolation Model
D. SOA Model
View Answer
Ans : B
Explanation: Utility computing is based on Pay-per-Use model.

6. What is true about Service-Oriented Architecture?


A. Service-Oriented Architecture helps to use applications as a service for other applications
B. It is possible to exchange the data between applications of different vendors without
additional programming
C. It offers computational resources on demand as a metered service.
D. Both A and B
View Answer
Ans : D
Explanation: Service-Oriented Architecture helps to use applications as a service for other
applications regardless the type of vendor, product or technology. Therefore, it is possible to
exchange the data between applications of different vendors without additional programming or
making changes to services.

7. In Grid Computing, computer resources are?


A. heterogeneous dispersed.
B. geographically dispersed.
C. Both A and B
D. None of the above
View Answer
Ans : C
Explanation: These computer resources are heterogeneous and geographically dispersed.

8. Managed IT services are based on the concept of?


A. Virtualization
B. SOA
C. Grid Computing
D. Utility Computing
View Answer
Ans : D
Explanation: Cloud computing, grid computing, and managed IT services are based on the concept
of utility computing.

9. refers to distributed computing, in which a group of computers from


multiple locations are connected with each other to achieve a common objective.
A. Virtualization
B. SOA
C. Grid Computing
D. Utility Computing
View Answer
Ans : C
Explanation: Grid Computing refers to distributed computing, in which a group of computers from
multiple locations are connected with each other to achieve a common objective.

10. What is true about Grid Computing?


A. breaks complex task into smaller pieces
B. combine smaller task into complex task
C. subscription tier play vital role in Grid Computing
D. Both A and B
View Answer
Ans : A
Explanation: Grid Computing breaks complex task into smaller pieces, which are distributed to
CPUs that reside within the grid.
1. Broadly divide the cloud architecture into?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : A
Explanation: We can broadly divide the cloud architecture into two parts : Front End and Back End

2. Cloud computing architecture is a combination of?


A. service-oriented architecture and grid computing
B. utility computing and event-driven architecture.
C. service-oriented architecture and event-driven architecture.
D. virtualization and event-driven
architecture. View Answer
Ans : C
Explanation: Cloud computing architecture is a combination of service-oriented architecture and
event-driven architecture.

3. Which of the following refers to the client part of cloud computing system?
A. back End
B. Front End
C. Infrastructure
D. Management
View Answer
Ans : B
Explanation: The front end refers to the client part of cloud computing system. It consists of
interfaces and applications that are required to access the cloud computing platforms.
4. What is the example of Front End?
A. Amazon Web Services
B. Google Compute Engine
C. Cisco Metapod
D. Web Browser.
View Answer
Ans : D
Explanation: web browser is the example of Front End.

5. The back end is used by the?


A. Client
B. User
C. service provider
D. Stackholders
View Answer
Ans : C
Explanation: The back end is used by the service provider. It manages all the resources that are
required to provide cloud computing services.

6. Both front end and back end are connected to others through a?
A. Network
B. Database
C. Browser
D. Both A and B
View Answer
Ans : A
Explanation: Both front end and back end are connected to others through a network, generally
using the internet connection.

7. How many types of services Cloud computing offers?


A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: Cloud computing offers the following three type of services: SaaS, PaaS and IaaS.

8. Windows Azure and Force.com are example of?


A. PaaS
B. IaaS
C. SaaS
D. All of the above
View Answer
Ans : A
Explanation: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift are example of
PaaS.

9. is an in-built back end component of cloud computing.


A. Service
B. Application
C. Storage
D. Security
View Answer
Ans : D
Explanation: Security is an in-built back end component of cloud computing. It implements a
security mechanism in the back end.

10. Who provide GUI (Graphical User Interface) to interact with the cloud?
A. Client
B. Application
C. Client Infrastructure
D. Server
View Answer
Ans : C
Explanation: Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
1. The program which provide partitioning, isolation or abstraction is called?
A. virtualization hypervisor
B. software hypervisor
C. hardware hypervisor
D. system hypervisor
View Answer
Ans : A
Explanation: The program which provide partitioning, isolation or abstraction is called
virtualization hypervisor.

2. A hypervisor is sometimes also called a?


A. VMA
B. VMS
C. VMM
D. VMR
View Answer
Ans : C
Explanation: A hypervisor is sometimes also called a virtual machine manager(VMM).

3. How many types of hypervisor are there ?


A. 2
B. 3
C. 4
D. 5
View Answer
Ans : A
Explanation: TYPE-1 Hypervisor and TYPE-2 Hypervisor.

4. Hypervisor runs directly on underlying host system.It is also known as?


A. Bare metal hypervisor
B. Native Hypervisor
C. Hosted Hypervisor
D. Both A and B
View Answer
Ans : D
Explanation: Hypervisor runs directly on underlying host system.It is also known as "Native
Hypervisor" or "Bare metal hypervisor".
5. Which of the following is not an examples of Type 1 hypervisors?
A. VMware ESXi
B. Citrix XenServer
C. VMware Player
D. Microsoft Hyper-V hypervisor
View Answer
Ans : C
Explanation: VMware Player is and example of Type 2 hypervisor.

6. How many main modues coordinate in order to emiulate the undrelying hardware?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: There are 3 main modues coordinate in order to emiulate the undrelying hardware:
Dispatcher, Allocator and Interpreter.

7. Which of the following behaves like the entry point of the monitor and reroutes the
instructions of the virtual machine?
A. Dispatcher
B. Allocator
C. Interpreter
D. Both A and B
View Answer
Ans : A
Explanation: The dispatcher behaves like the entry point of the monitor and reroutes the instructions
of the virtual machine instance to one of the other two modules.

8. The allocator is invoked by the?


A. INTERPRETER
B. DISPATCHER
C. Both A and B
D. TYPE-2 Hypervisor
View Answer
Ans : B
Explanation: whenever virtual machine tries to execute an instruction that results in changing the
machine resources associated with the virtual machine, the allocator is invoked by the dispatcher.

9. Parallels Desktop is an example of?


A. TYPE-1 Hypervisor
B. DISPATCHER
C. TYPE-2 Hypervisor
D. INTERPRETER
View Answer
Ans : C
Explanation: Example of Type 2 hypervisor include VMware Player or Parallels Desktop. Hosted
hypervisors are often found on endpoints like PCs.

10. Point out the wrong statement :


A. Full virtualization requires that the host operating system provide a virtual machine interface
for the guest operating system and that the guest access hardware through that host VM
B. Guest operating systems in full virtualization systems are generally faster than
other virtualization schemes
C. A process virtual machine instantiates when a command begins a process
D. All of the above
View Answer
Ans : A
Explanation: Full virtualization requires that the host operating system provide a virtual machine
interface for the guest operating system and that the guest access hardware through that host VM
1. consists of servers, storage devices, network, cloud management
software, deployment software, and platform virtualization.
A. Computing Planning
B. Cloud infrastructure
C. Cloud Computing Technologies
D. Cloud Computing Architecture
View Answer
Ans : B
Explanation: Cloud infrastructure consists of servers, storage devices, network, cloud management
software, deployment software, and platform virtualization.

2. is a firmware that acts as a Virtual Machine Manager.


A. Hypervisor
B. Network
C. Server
D. Storage
View Answer
Ans : A
Explanation: Hypervisor is a firmware that acts as a Virtual Machine Manager.

3. Hypervisor also known as?


A. high-level program
B. simple program
C. complex program
D. low-level program
View Answer
Ans : D
Explanation: Hypervisor is a firmware or low-level program that acts as a Virtual Machine
Manager. It allows to share the single physical instance of cloud resources between several tenants.

4. Management Software is used for?


A. It helps to maintain and configure the infrastructure.
B. It helps to deploy and integrate the application on the cloud.
C. Both A and B
D. None of the above
View Answer
Ans : A
Explanation: Management Software : It helps to maintain and configure the infrastructure.

5. Resource allocation and de-allocation services provided by?


A. Network
B. Server
C. Storage
D. Software
View Answer
Ans : B
Explanation: The server helps to compute the resource sharing and offers other services such as
resource allocation and de-allocation, monitoring the resources, providing security etc.
6. Point out the wrong statement.
A. A cloud is defined as the combination of the infrastructure of a datacenter with the ability
to provision hardware and software
B. High touch applications are best done on-premises
C. The Google App Engine follows IaaS
D. All of the above
View Answer
Ans : C
Explanation: The Google App Engine follows PaaS.

7. enables batch processing, which greatly speeds up high-processing applications.


A. Scalability
B. Reliability
C. Elasticity
D. Utility
View Answer
Ans : A
Explanation: This feature obviates the need for planning and provisioning.

8. An operating system running on a Type VM is full virtualization.


A. 1
B. 2
C. 3
D. 4
View Answer
Ans : A
Explanation: Because it is a complete simulation of the hardware that it is running on.

9. Which of the following is Type 1 Hypervisor?


A. Wind River Simics
B. Virtual Server 2005 R2
C. KVM
D. LynxSecure
View Answer
Ans : D
Explanation: Type 1 VMs have no host operating system because they are installed on a bare
system.

10. Which of the following operating system support operating system virtualization?
A. Windows NT
B. Sun Solaris
C. Windows XP
D. Compliance
View Answer
Ans : B
Explanation: This type of virtualization creates virtual servers at the operating system or kernel
level.
1. IaaS stands for?
A. IT-as-a-Service
B. Internet-as-a-Service
C. Infrastructure-as-a-Service
D. Interoperability-as-a-Service
View Answer
Ans : C
Explanation: IaaS stands for Infrastructure-as-a-Service.

2. VLANs and IP addresses resources are made available to end user via?
A. Server virtualization.
B. Client virtualization.
C. End-user virtualization.
D. IaaS
View Answer
Ans : A
Explanation: VLANs and IP addresses resources are made available to end user via server
virtualization.

3. Which of the following are benefit of IaaS?


A. Flexible and efficient renting of computer hardware.
B. Portability, interoperability with legacy applications.
C. Full control of the computing resources through administrative access to VMs.
D. All of the above
View Answer
Ans : D
Explanation: All the above are benefit of IaaS.

4. IaaS shares issues with?


A. PaaS
B. SaaS
C. Both A and B
D. None of the above
View Answer
Ans : C
Explanation: IaaS shares issues with PaaS and SaaS, such as Network dependence and browser
based risks.

5. IaaS offers an isolated environment to individual customers through?


A. hypervisor
B. virtual machine sprawl
C. security vulnerabilities
D. renting
View Answer
Ans : A
Explanation: IaaS offers an isolated environment to individual customers through hypervisor.

6. The most commonly used model for discovery and description used with SOAP messaging
is the?
A. WSDL
B. VMc
C. DHML
D. SOA
View Answer
Ans : A
Explanation: The most commonly used model for discovery and description used with SOAP
messaging is the Web Services Description Language (WSDL).

7. forms the basis for most of the Web services stacks.


A. WSDL
B. VMc
C. SOA
D. SOAP
View Answer
Ans : D
Explanation: SOAP forms the basis for most of the Web services stacks.

8. How many types of virtual private server instances are partitioned in an IaaS stack?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: The three workloads require three different sizes of computers: small, medium, and
large.

9. Content can be in virtual appliance


A. structured
B. unstructured
C. Both A and B
D. None of the above
View Answer
Ans : C
Explanation: Content can be structured or unstructured in virtual appliance.

10. Which of the following is an open standard protocol.?


A. SIMPLE
B. WSDL
C. DHML
D. SOAP
View Answer
Ans : A
Explanation: SIMPLE is an open standard protocol.
1. What is true about PaaS?
A. PaaS tool is a fully integrated development environment.
B. PaaS systems support standards such as HTML, JavaScript, or other rich media technologies.
C. PaaS offers the runtime environment for applications.
D. All of the above
View Answer
Ans : D
Explanation: All statement are true.

2. Point out the wrong statement.


A. The customer takes no responsibility for maintaining the hardware, the software, or
the development of the applications
B. The vendor is responsible for all the operational aspects of the service
C. Google's App Engine platform is IaaS offering
D. None of the above
View Answer
Ans : C
Explanation: The customer is responsible only for his interaction with the platform.

3. Which of the following can be considered PaaS offering?


A. Google Maps
B. Google Earth
C. Google Adsense
D. Youtube
View Answer
Ans : A
Explanation: The vendor of the PaaS solution is in most cases the developer, who is offering a
complete solution to the customer.

4. In AWS, the is the AWS Management Console.


A. CAS
B. CCS
C. CDSS
D. CDA
View Answer
Ans : B
Explanation: In AWS, the CCS is the AWS Management Console.
5. Which of the following are benefit of PaaS?
A. Lower administrative overhead
B. Lower total cost of ownership
C. More current system software
D. All of the above
View Answer
Ans : D
Explanation: All of the above are benefit of PaaS.

6. How many types of PaaS is there?


A. 2
B. 3
C. 4
D. 5
View Answer
Ans : C
Explanation: Based on the functions, PaaS can be classified into four types.

7. Which type of PaaS includes on-demand scaling and application security?


A. Stand-alone development environments
B. Application delivery-only environments
C. Open platform as a service
D. Add-on development facilities
View Answer
Ans : B
Explanation: The application delivery PaaS includes on-demand scaling and application security.

8. Which type of PaaS allows to customize the existing SaaS platform?


A. Stand-alone development environments
B. Application delivery-only environments
C. Open platform as a service
D. Add-on development facilities
View Answer
Ans : D
Explanation: The add-on PaaS allows to customize the existing SaaS platform.

9. Which type of PaaS does not include licensing or technical dependencies on specific
SaaS applications?
A. Stand-alone development environments
B. Application delivery-only environments
C. Open platform as a service
D. Add-on development facilities
View Answer
Ans : A
Explanation: The stand-alone PaaS works as an independent entity for a specific function. It does
not include licensing or technical dependencies on specific SaaS applications.

10. Which of the following is associated with considerable vendor lock-in?


A. PaaS
B. SaaS
C. IaaS
D. DaaS
View Answer
Ans : A
Explanation: The difficulty with PaaS is that it locks the developer (and the customer) into a
solution that is dependent upon the platform vendor.

1. SaaS Stands for?


A. Software-as-a-Service
B. Server-as-a-Software
C. Storage-as-a-Service
D. None of the above
View Answer
Ans : A
Explanation: Software-as-a-Service (SaaS) model allows to provide software application as a
service to the end users.

2. A is an application that can display a Web page that shows data and supports
features from two or more sources.
A. workspace
B. workload
C. mashup
D. Multitenant
View Answer
Ans : C
Explanation: A mashup is an application that can display a Web page that shows data and supports
features from two or more sources.

3. SaaS does not necessarily mean that the software is?


A. dynamic
B. static
C. sololithic
D. diolithic
View Answer
Ans : B
Explanation: SaaS does not necessarily mean that the software is static or monolithic.

4. Which of the following SaaS platform is with an exposed API?


A. salesforce.com
B. amazon.com
C. filpkart.com
D. None of the above
View Answer
Ans : A
Explanation: SaaS platform is with an exposed API salesforce.com

5. Point out the correct statement.


A. Platforms can be based on specific types of development languages, application frameworks,
or other constructs
B. SaaS is the cloud-based equivalent of shrink-wrapped software
C. Software as a Service (SaaS) may be succinctly described as software that is deployed on
a hosted service
D. All of the above
View Answer
Ans : D
Explanation: SaaS can be accessed globally over the Internet, most often in a browser.

6. Which of the following are true characteristics of SaaS service model?


A. The software applications are maintained by the vendor.
B. They can be scaled up or down on demand.
C. SaaS applications are cost-effective since they do not require any maintenance at end user side.
D. All of the above
View Answer
Ans : D
Explanation: All are true characteristics of SaaS service model.

7. Which of the following are issues associated with SaaS?


A. Modest software tools
B. Network dependence
C. Centralized management and data
D. Multitenant solutions
View Answer
Ans : B
Explanation: There are several issues associated with SaaS, some of them are listed below :
Browser based risks, Network dependence, Lack of portability between SaaS clouds.

8. SaaS applications are?


A. customizable
B. not customizable
C. reliable
D. Non reliable
View Answer
Ans : A
Explanation: SaaS provides us Application Programming Interface (API), which allows the
developer to develop a customized application.

9. Which of the following is a SaaS characteristic?


A. The typical license is subscription-based or usage-based and is billed on a recurring basis
B. The software is available over the Internet globally through a browser on demand
C. The software and the service are monitored and maintained by the vendor
D. All of the above
View Answer
Ans : D
Explanation: There may be executable client-side code, but the user isn't responsible for
maintaining that code or its interaction with the service.

10. SaaS supports multiple users and provides a shared data model through model.
A. single-tenancy
B. multi-tenancy
C. multiple-instance
D. None of the above
View Answer
Ans : B
Explanation: The alternative of software virtualization of individual instances also exists, but is less
common.
1. IDaaS stands for?
A. ID-as-a-Service
B. Identity-as-a-Service
C. Intranet-as-a-service
D. Interoperability-as-a-Service
View Answer
Ans : B
Explanation: To solve above problems, a new technique emerged which is known as Identity-as-a-
Service (IDaaS).

2. has single authentication server, managing multiple accesses to other systems


A. SSO
B. IDaaS
C. SOAP
D. SOA
View Answer
Ans : A
Explanation: SSO has single authentication server, managing multiple accesses to other systems

3. What is true about SSO?


A. SSO has multiple authentication server
B. SSO managing single accesses to other systems
C. In SSO, User sends the ticket to intranet server.
D. All of the above
View Answer
Ans : C
Explanation: SSO has single authentication server, managing multiple accesses to other systems and
user sends the ticket to intranet server.

4. It offers users to login into multiple websites with single account.


A. FIDM
B. OpenID
C. SSO
D. Identity
View Answer
Ans : B
Explanation: OpenID : It offers users to login into multiple websites with single account. Google,
Yahoo!, Flickr, MySpace, WordPress.com are some of the companies that support OpenID.

5. What is true about FIDM?


A. FIDM describes the technologies and protocols
B. It uses Security Markup Language (SAML) to package a user's security credentials
C. SAML has access control
D. All of the above
View Answer
Ans : D
Explanation: FIDM describes the technologies and protocols that enable a user to package security
credentials across security domains. It uses Security Markup Language (SAML) to package a user's
security credentials

6. Which of the following group is dedicated to support technologies that implement


enterprise mashups?
A. Open Alliance Apache
B. Open Mashup Alliance
C. Open Tech Alliance
D. None of the above
View Answer
Ans : B
Explanation: This group predicts that the use of mashups will grow by a factor of 10 within just a
few years.

7. More secure authentication requires the use of at least?


A. two-factor authentication.
B. three-factor authentication.
C. four-factor authentication.
D. None of the above
View Answer
Ans : A
Explanation: More secure authentication requires the use of at least two-factor authentication.

8. is an XML request/response language that is used to integrate and interoperate


service provisioning requests.
A. XACML
B. FIDM
C. SPML
D. SSP
View Answer
Ans : C
Explanation: SPML is an XML request/response language that is used to integrate and interoperate
service provisioning requests.

9. The Open Source Identity Framework uses an i-Card metaphor.


A. Hughes
B. Higgins
C. Hinges
D. XACML
View Answer
Ans : B
Explanation: Higgins Open Source Identity Framework is used to create a vendor-neutral cloud-
based authentication service.

10. Point out the wrong statement.


A. Distributed transaction systems such as internetworks or cloud computing systems magnify
the difficulties faced by identity management systems
B. The Distributed Audit Service provides accountability for users accessing a system
C. The OpenID and CardSpace specifications support the authentication type of data object
D. All of the above
View Answer
Ans : C
Explanation: OpenID is a developing industry standard for authenticating "end users" by storing
their digital identity in a common format.
1) What type of computing technology refers to services and applications that typically run on
a distributed network through virtualized resources?
1. Distributed Computing
2. Cloud Computing
3. Soft Computing
4. Parallel Computing

Answer: B
Explanation: Cloud computing is a computing technique in which applications are accessed by
common internet protocols and networking standards.

2) Which one of the following options can be considered as the Cloud?


1. Hadoop
2. Intranet
3. Web Applications
4. All of the mentioned

Answer: A
Explanation: Whenever any intranet becomes large enough in size that a diagram is not able to
differentiate the individual physical system, so at that stage intranet also becomes known as a cloud.
Hadoop can be considered as a cloud.

3) Cloud computing is a kind of abstraction which is based on the notion of combining


physical resources and represents them as resources to users.
1. Real
2. Cloud
3. Virtual
4. none of the mentioned

Answer: C
Explanation: Cloud Computing is a kind of new model for providing resources for applications
such as staging applications, platform-independent user access to services.

4) Which of the following has many features of that is now known as cloud computing?
1. Web Service
2. Softwares
3. All of the mentioned
4. Internet

Answer: D
Explanation: Internet provides the abstraction, runs through the same set of protocols and
standards, and uses the same operating system and applications.

5) Which one of the following cloud concepts is related to sharing and pooling the resources?
1. Polymorphism
2. Virtualization
3. Abstraction
4. None of the mentioned

Answer: B
Explanation: The application runs on physical systems that are not specified in real. The
information stored in the locations that are also not specified or unknown, administration of the
systems are outsourced to others and can be accessed by the user.

6) Which one of the following statements is not true?


1. The popularization of the Internet actually enabled most cloud computing systems.
2. Cloud computing makes the long-held dream of utility as a payment possible for you,
with an infinitely scalable, universally available system, pay what you use.
3. Soft computing addresses a real paradigm in the way in which the system is deployed.
4. All of the mentioned

Answer: C
Explanation: Cloud computing is distinguished by the notion that resources are virtual and infinite
and describe the physical systems on which software runs in the abstracted manner from the user.

7) Which one of the following can be considered as a utility is a dream that dates from
the beginning of the computing industry itself?
1. Computing
2. Model
3. Software
4. All of the mentioned

Answer: A
Explanation: Cloud computing takes the technology, services, and applications that are similar to
those on the Internet and turns them into a self-service utility.

8) Which of the following is an essential concept related to Cloud?


1. Reliability
2. Abstraction
3. Productivity
4. All of the mentioned

Answer: B
Explanation: Cloud computing hides all the detail of system implementation from users and
developers.

9) Which one of the following is Cloud Platform by Amazon?


1. Azure
2. AWS
3. Cloudera
4. All of the mentioned

Answer: B
Explanation: Amazon web service is one of the most successful cloud-based businesses, which
offers infrastructure as a service and lets you rent virtual computers on its own infrastructure.

10) Which of the following statement is not true?


1. Through cloud computing, one can begin with very small and become big in a rapid manner.
2. All applications benefit from deployment in the Cloud.
3. Cloud computing is revolutionary, even though the technology it is built on is evolutionary.
4. None of the mentioned

Answer: B
Explanation: A variety of issues, such as issues with latency, security, and regulatory compliance,
all are subject to concern. AWS is one of the most successful cloud-based businesses, which is a
type of infrastructure as a service and lets you rent virtual computers on its own infrastructure

Questions and Answers based on the "Planning"


1) In the Planning Phase, Which of the following is the correct step for performing the analysis?
1. Cloud Computing Value Proposition
2. Cloud Computing Strategy Planning
3. Both A and B
4. Business Architecture Development

Answer: C
Explanation: In the planning phase, we actually analyze the strategy related problems which
customers might face. There are usually two steps to perform the analysis: Cloud Computing
Planning and Cloud Computing Value Proposition.

12) In which one of the following, a strategy record or Document is created respectively to
the events, conditions a user may face while applying cloud computing mode.
1. Cloud Computing Value Proposition
2. Cloud Computing Strategy Planning
3. Planning Phase
4. Business Architecture Development

Answer: B
Explanation: Cloud Computing Strategy Planning: The establishment of the strategy is based on
the above step's analysis result. In this phase, a strategy document is prepared according to the
conditions faced by the customer while implementing the cloud computing mode

3) What is Business Architecture Development?


1. We recognize the risks that might be caused by cloud computing application from a
business perspective.
2. We identify the applications that support the business processes and the
technologies required to support enterprise applications and data systems.
3. We formulate all kinds of plans that are required to transform the current business to
cloud computing modes.
4. None of the above

Answer: A
Explanation: Business Architecture Development: In this phase, we identify the risks that can be
caused by a cloud computing application from a business point of view.

4) Which one of the following refers to the non-functional requirements like disaster
recovery, security, reliability, etc.
1. Service Development
2. Quality of service
3. Plan Development
4. Technical Service

Answer: B
Explanation: Quality of service refers to the non-functional requirements such as reliability,
security, disaster recovery, etc.

5) Which one of the following is a phase of the Deployment process?


1. Selecting Cloud Computing Provider
2. IT Architecture Development
3. Business Architecture Development
4. Transformation Plan Development

Answer: D
Explanation: Deployment phase: This phase focuses on both steps. It consists of the following two
steps: Selecting a cloud computing provider, maintenance and technical service.

6) This phase involves selecting a cloud provider based on the Service Level Agreement
(SLA), which defines the level of service the provider receives.
1. Maintenance and Technical Service
2. Selecting Cloud Computing Provider
3. Both A and B
4. None of the above

Answer: B
Explanation: This phase involves selecting a cloud provider based on the Service Level Agreement
(SLA), that defines the level of service the provider receives.

7) In which one of the following phases, IT Architecture Development came?


1. Strategy Phase
2. Planning Phase
3. Deployment Phase
4. Development Phase

Answer: B
Explanation: IT Architecture Development steps in Planning Phase

8) Which of the model involves the special types of services that users can access on a
Cloud Computing platform?
1. Service
2. Planning
3. Deployment
4. Application

Answer: A
Explanation: The service model contains the specials types of services that users can access on a
cloud computing platform.

9) Which one of the following is related to the services provided by Cloud?


1. Sourcing
2. Ownership
3. Reliability
4. PaaS

Answer: A
Explanation: Insourced or Outsourced means whether the service is provided by the customer or
the service provider.

10) How many phases are present in Cloud Computing


Planning? 1. 2
2. 3
3. 4
4. 5

Answer: B
Explanation: In Cloud Computing Planning, there are usually three phases that are Strategy Phase,
Planning Phase, and Deployment Phase.
This set of the following Multiple Choice Questions (MCQ's)
focuses on the Cloud Computing Architecture.
1) Cloud computing architecture is a combination of?
1. service-oriented architecture and grid computing
2. Utility computing and event-driven architecture.
3. Service-oriented architecture and event-driven architecture.
4. Virtualization and event-driven architecture.

Answer: C
Explanation: Cloud computing architecture is a combination of service-oriented architecture and
event-driven architecture.

2) In how many parts we can broadly divide the architecture of the


Cloud? 1. 4
2. 3
3. 2
4. 5

Answer: C
Explanation: The architecture of the Cloud can broadly be divided into two main parts that are
Back-end and Front-end.

3) Which one of the following refers to the user's part of the Cloud Computing system?
1. back End
2. Management
3. Infrastructure
4. Front End

Answer: D
Explanation: It is the front-end that refers to the user's part of the cloud computing system. It
includes many applications and interfaces that are required to access or use the cloud computing
platform.

4) Which one of the following can be considered as the example of the Front-end?
1. Web Browser
2. Google Compute Engine
3. Cisco Metapod
4. Amazon Web Services

Answer: A
Explanation: From the following given options, we can consider the Web-browser as the perfect
example of the Front-end.

25) By whom is the backend commonly used?


1. Client
2. User
3. Stockholders
4. service provider

Answer: D
Explanation: It is commonly used by the service provider in order to manage all resources required
to provide the Cloud Computing Services.

6) Through which, the backend and front-end are connected with each other?
1. Browser
2. Database
3. Network
4. Both A and B

Answer: C
Explanation: Typically using an internet connection, both the front and back end are connected to
the others through a network.

7) How many types of services are there those are offered by the Cloud Computing to the
users? 1. 2
2. 4
3. 3
4. 5

Answer: C
Explanation: Usually, Cloud Computing offers three types of services to the users that are Platform
as a service (or PaaS), Application as a service (or AssS), and Software as a service (or SaaS).
8) The Foce.com and windows Azure are examples of which of the following?
1. IaaS
2. PaaS
3. SaaS
4. Both A and B

Answer: B
Explanation: Both Force.com and Windows Azure are examples of the Platform as a service

9) Which of the following is one of the backend's built-in components of cloud computing?
1. Security
2. Application
3. Storage
4. Service

Answer: A
Explanation: Security is one of the back-end's built-in components of cloud computing.

10) Which of the following provides the Graphic User Interface (GUI) for interaction with
the cloud?
1. Client
2. Client Infrastructure
3. Application
4. Server

Answer: B
Explanation: The Client Infrastructure is one of the front-end components that provide the way of
communication in the form of a Graphic User Interface to communicate with the Cloud.

Multiple Choice Questions (MCQ's) Based on the


"Technologies" used in the Cloud Computing.
1) Which one of the following a technology works behind the cloud computing platform?
1. Virtualization
2. SOA
3. Grid Computing
4. All of the above

Answer: D
Explanation: Several technologies work behind the Cloud Computing platforms, which provide
features like Flexibility, reliability, and usability to cloud computing.

2) Which one of the following is a kind of technique that allows sharing the single physical
instance of an application or the resources among multiple organizations/customers?
1. Virtualization
2. Service-Oriented Architecture
3. Grid Computing
4. Utility Computing

Answer: A
Explanation: Virtualization is a kind of technique that allows us to share the single physical
instance of a resource or application between several organizations/users.

3) Which one of the following statement is true about the Virtualization?


1. It provides a logical name for a physical resource, and on-demand provides an indicator
of that physical resource.
2. In Virtualization, we analyze the strategy related problems that customers may face.
3. In Virtualization, it is necessary to compile the Multitenant properly.
4. All of the above

Answer: A
Explanation: It provides a logical name to the physical resource when the demand is correct
regarding virtualization and provides an indicator of that physical resource.

4) In Virtualization, which architecture provides the virtual isolation between the several tenants?
1. IT Architecture
2. Multitenant
3. Deployment
4. Business Architecture

Answer: B
Explanation: The Multitenant architecture provides us the virtual isolation in between several
tenants. Hence the organization can easily use and also modify their application as they each have
their instances running.

5) On which one of the following utility computing is based?


1. Grid Computing Model
2. SOA Model
3. virtual isolation Model
4. Pay-per-Use model

Answer: D

6) Which one of the following statement is true about the Service-Oriented Architecture?
1. It is possible to exchange data between applications from different vendors without
using additional programming.
2. It provides computational resources on-demand as a metered service.
3. Service-Oriented Architecture allows using the application as a service for
other applications.
4. Both A and C

Answer: D

7) In Grid Computing, which types of computer resources are there?


1. heterogeneous dispersed.
2. geographically dispersed.
3. Both A and B
4. None of the above

Answer: C

8) Managed IT services are based on the concept of which one of the following?
1. Virtualization
2. Utility Computing
3. Grid Computing
4. SOA

Answer: B

9) Which one of the following refers to the Distributed Computing, in which several sets of
computers distributed on multiple geographical locations and are connected with each other
to achieve a common goal?
1. Virtualization
2. SOA
3. Grid Computing
4. Utility Computing

Answer: C

10) Which one of the following statement is true about Grid Computing?
1. Pieces combine small tasks into complex tasks
2. The subscription tier plays an important role in grid computing.
3. Breaks complex tasks into small operations
4. Both A and C

Answer: C

Multiple Choice Questions (MCQ's) based on the


"Hypervisors" used in the Cloud Computing.
1) Which one of the following given programs provides the isolation (abstraction) and partitioning?
1. System hypervisor
2. Software hypervisor
3. Hardware hypervisor
4. Virtualization hypervisor

Answer: D
2) On which one of the following hypervisor runs directly on the underlying host system, it is
also known as ?
1. Bare metal hypervisor
2. Hosted Hypervisor
3. Native Hypervisor
4. Both A and C

Answer: D

3) Which of the following behaves like the monitor's entry point and reroutes the instructions of
the virtual machine?
1. Dispatcher
2. Allocator
3. Interpreter
4. Both A and B

Answer: A

4) Which one of the following is also known as a Hypervisor?


1. VMA
2. VMM
3. VMS
4. VMR

Answer: B

5) How many kinds of Hypervisor are


there? 1. 4
2. 3
3. 2
4. 5
Answer: C

6) Which one of the following is not an example of the Type1-Hypervisor?


1. VMware ESXi
2. Citrix XenServer
3. Microsoft Hyper-V hypervisor
4. VMware Player

Answer: D

7) How many main modules are needed to coordinate in order to emulate the underlying
hardware? 1. 3
2. 2
3. 4
4. 5

Answer: A

8) Which one of the following is used to call the allocator?


1. INTERPRETER
2. TYPE-2 Hypervisor
3. Both A and B
4. DISPATCHER

Answer: D

9) The Parallels Desktop can be considered as the example of which of the following?
1. TYPE-2 Hypervisor
2. DISPATCHER
3. TYPE-1 Hypervisor
4. INTERPRETER
Answer: A

10) Which one of the following statements is not true?


1. Whenever a command begins a process, immediately the process virtual machine
gets instantiated.
2. Usually, the guest operating systems are mores faster in full virtualization as compared
to other virtualization schemes.
3. It is necessary for the full virtualization that the host OS (Operating System ) offers a
Virtual Machine Interface for the guest operating system by which the guest operating
system can access the hardware through the host VM.
4. All of the above

Answer: C

11) Which of the following statements is not true?


1. Load balancing virtualizes systems and resources by mapping a logical address to a
physical address
2. Multiple instances of various Google applications are running on different hosts
3. Google uses hardware virtualization
4. All of the above

Answer: A

12) Which one of the following can be considered as the example of the Type2 Virtual
Machine monitors?
1. KVM
2. Microsoft Hyper V
3. Parallels Desktop
4. All of the above

Answer: D

13) Which one of the following is a type of software that supports the virtual machine?
1. Kernel
2. Hypervisor
3. VMM
4. Both B and C

Answer: D

14) Which one of the following runs on Xen Hypervisor?


1. Azure
2. AWS EC2
3. C AWS EC3
4. All of the above

Answer: B

15) Which one of the following is the type of a service that manages and creates virtual
network interfaces?
1. VMware vStorage
2. Application services
3. VMware vCompute
4. VMware vNetwork

Answer: D

16) In which one of the following, the virtual machine simulates hardware, through which it can
be independent of the underlying system hardware?
1. Para-virtualization
2. Full virtualization
3. Emulation
4. None of the above

Answer: C
17) Which one of the following will be the host operating system for Windows Server?
1. VirtualLogix VLX
2. Microsoft Hyper-V
3. Xen
4. All of the above

Answer: B

18) In Which Type of VM, full virtualization can be possible?


1. Type4
2. Type2
3. Type3
4. Type1

Answer: D

19) Which one of the following can be considered as another name of Virtual Machine?
1. Software virtual machine
2. Real machine
3. process virtual machine
4. Virtualization hypervisor

Answer: C

MCQ's based on the SaaS


1) Which of the following is the correct full form of SaaS?
1. Storage-as-a-Service
2. Server-as-a-Software
3. Software-as-a-Service
4. None of the above

Answer: C
2) Through which one of the following models, SaaS supports multiple users and offers a
shared data model?
1. single-tenancy
2. multiple-instance
3. multi-tenancy
4. None of the above

Answer: C

3) Which of the following is the SaaS's Characteristics?


1. Usually, the license is subscription-based or usage-based and is billed on a recurring basis.
2. The software and the service are observed and maintained usually by the vendor.
3. Software mostly available over the internet across the world and can be provided
according to the demand through the browser.
4. All of the above

Answer: D

4) Which of the following is a characteristic of the SaaS applications?


1. SaaS applications are reliable
2. SaaS applications are not customizable
3. SaaS applications are customizable
4. Non-reliable

Answer: C

5) Which types of issues are associated with the SaaS?


1. Modest software tools
2. Multitenant solutions
3. Centralized management and data
4. Network dependence
Answer: D

6) Which one of the following statements can be considered as the true characteristics of
software as a Service (SaaS) model?
1. Software applications are generally maintained by the service provider (or vendor)
2. SaaS provides the best cost-effective applications because they do not need any
maintenance at the customer side.
3. They can easily scale up or scale down according to the conditions.
4. All of the above

Answer: D

7) Which one of the following is not the correct statement?


1. SaaS may be also be described as software deployed on a hosted service.
2. The platform can be based on the types of software development languages,
frameworks, and several other constructs.
3. SaaS is the cloud-based equivalent of shrink-wrapped software
4. All of the above

Answer: D

8) Which one of the following can be considered as the most complete cloud computing
service model?
1. PaaS
2. IaaS
3. CaaS
4. SaaS

Answer: D

9) In SaaS, the used open-source software are also known as


1. Closed
2. Free
3. Open
4. all of the mentioned

Answer: C

10) Which one of the following statements is not true about SaaS?
1. SaaS applications are offered in all shapes and sizes.
2. All users with a little knowledge or know how to operate a computer also know about
the SaaS.
3. SaaS software is not customizable.
4. None of the above

Answer: D

MCQ's based on the Paas (Platform as a service)


1) Which type of PaaS does not contains any type of license or technical dependencies on
specific SaaS applications?
1. Add-on development facilities
2. Application delivery-only environments
3. Open Platform as a service
4. Stand-alone development environments

Answer: D

2) Which one of the following is associated heavily with vendor lock-in?


1. DaaS
2. SaaS
3. IaaS
4. PaaS

Answer: D
3) Which one of the following is a type of PaaS that usually allows customizing the existing
SaaS platform?
1. Stand-alone development environments
2. Add-on development facilities
3. Open Platform as a service
4. Application delivery-only environments

Answer: B

4) Which one of the following of PaaS type that involves on-demand scaling and
application security?
1. Stand-alone development environments
2. Open Platform as a service
3. Application delivery-only environments
4. Add-on development facilities

Answer: C

5) How many types of PaaS are


there? 1. 4
2. 3
3. 2
4. 5

Answer: A

6) Which one of the following can be considered as the benefit of PaaS?


1. Lower administrative overhead
2. Lower total cost of ownership
3. More current system software
4. All of the above
Answer: D

7) In AWS, which of the following is the AWS Management Console?


1. CAS
2. CDSS
3. CCS
4. CDA

Answer: C

8) Which of the following can be considered PaaS offering?


1. Youtube
2. Google Earth
3. Google Adsense
4. Google Maps

Answer: D

9) Which one of the following is not the correct statement?


1. The customer assumes no responsibility for maintaining the hardware, software or
the development of applications.
2. Google's App Engine platform is one of the IaaS offerings.
3. The vendor is usually responsible for all operational aspects of the services.
4. All of the above

Answer: B

10) Which one of the following statements is correct about the PaaS?
1. The platform as a service (or PaaS) systems usually support standards like
JavaScript, HTML, and several other rich media technologies.
2. Platform as a service provides the runtime environment for the applications.
3. The platform as a service is a completely integrated development environment.
4. All of the above

Answer: D

MCQ's based on the IaaS


1) The terms "Iaas" stand for?
1. IT-as-a-Service
2. Infrastructure-as-a-Service
3. Internet-as-a-Service
4. Interoperability-as-a-Service

Answer: B

2) The resources like IP addresses and VLANs are provided to the end-users by which of
the following?
1. Server virtualization.
2. Client virtualization.
3. End-user virtualization.
4. IaaS

Answer: A
Explanation: Resources such as the IP addresses and VLANs are offered to the end-users through
the server virtualization.

3) Which one of the following is a kind of open standard protocol?


1. SOAP
2. WSDL
3. DHML
4. SIMPLE

4) In the virtual appliance, the content can be .


1. structured
2. unstructured
3. Both A and B
4. None of the above

Answer: C

5) How many kinds of virtual private server instances are there partitioned in the IaaS
stack? 1. 3
2. 2
3. 4
4. 5

Answer: A

6) Which of the following forms the basis for almost all web services stacks?
1. WSDL
2. SOAP
3. UDDI
4. VMCC. SOA

Answer: B

7) Which of the following is the most commonly used model for description and discovery and
is also used with SOAP messaging?
1. DHML
2. VMC
3. WSDL
4. SOA

Answer: C
8) The Infrastructure as a service (IaaS) provides a type of isolated environment to each
customer individually by using .
1. renting
2. virtual machine sprawl
3. security vulnerabilities
4. hypervisor

Answer: D

9) IaaS usually shares issues with the .


1. PaaS
2. SaaS
3. Both A and B
4. None of the above

Answer: C

10) Which of the following is an advantage of IaaS (Infrastructure as service)?


1. Efficient and flexible renting of computer hardware.
2. Portability, interoperability with legacy applications.
3. Complete control of the computing resources through administrative access to VMs.
4. All of the above

Answer: D

MCQ Based on the DIaaS


1) Which one of the following is not a correct statement?
1. The Distributed Audit Service offers accountability for users accessing a system.
2. The CardSpace and OpenID specifications support the authentication type of data object.
3. Distributed transaction systems like as Cloud Computing Systems, Internetworks
and several others usually increases the obstacles faced by identity management
systems.
4. All of the above
Answer: B

2) Which one of the following frameworks uses i-Card metaphor?


1. Higgins
2. Hughes
3. Hinges
4. XACML

Answer: A
3) Which of the following is a type of XML request or response language commonly used
to integrate and interrupt services that handle requests?
1. XACML
2. FIDM
3. SSP
4. SPML

Answer: D

4) In order to provide more secure authentication, which of the following is required at least?
1. three-factor authentication.
2. two -factor authentication.
3. four-factor authentication.
4. None of the above

Answer: B
Explanation: In order to provide more secure authentication, the two-factor authentication is
required at least.

5) Which one of the following groups is usually dedicated to supporting technologies


that implement enterprise mashups?
1. Open Mashup Alliance
2. Open Alliance Apache
3. Open Tech Alliance
4. None of the above

Answer: A
6) Which one of the following statements is correct about the FIDM?
1. SAML have access control
2. It typically uses the Security Markup Language (SAML) for packaging the user's
security credentials.
3. It describes the protocols and technologies.
4. All of the above

Answer: D

7) Which of the following allows the users to login into a several different websites with the
same single account ?
1. OpenID
2. FIDM
3. SSO
4. Identity

Answer: A

8) Which one of the following statements is true about the SSO?


1. It has multiple authentication servers
2. It manages single accesses to other systems
3. In SSO, User sends the ticket to intranet server.
4. All of the above

Answer: C

9) Among the following, which one has the single authentication server and manages
multiple accesses to the other systems?
1. SOAP
2. IDaaS
3. SSO
4. SOA
Answer: C

10) The term "IDaaS" stands for?


1. ID-as-a-Service
2. Interoperability-as-a-Service
3. Intranet-as-a-service
4. Identity-as-a-Service

Answer: D

Multiple-choice Questions Based on the Cloud Type-1.


1) Which of the following can be referred to the location and management of the
cloud's infrastructure?
1. Service
2. Deployment
3. Application
4. None of the mentioned

Answer: B

2) model consists of the particular types of services that you can access on a
cloud computing platform.
1. Service
2. Deployment
3. Application
4. None of the mentioned

Answer: A

3) Which one of the following statements is wrong?


1. The use of the word "cloud" makes reference to the two essential concepts.
2. Cloud computing abstracts systems by pooling and sharing resources
3. Cloud computing is nothing more than the Internet.
4. All of the mentioned

Answer: B
Explanation: Abstraction and virtualization are the two essential concepts.

4) Which of the following is the deployment model?


1. Public
2. Private
3. Hybrid
4. All of the mentioned

Answer: D
`

5) Which one of the following statements is wrong?


1. Cloud Computing has two distinct sets of models.
2. Amazon has built a worldwide network of data centers to service its search engine.
3. Azure enables .NET Framework applications to run over the Internet.
4. None of the mentioned

Answer: B

6) Which one of the following is considered the best-known service model?


1. SaaS
2. IaaS
3. PaaS
4. All of the mentioned

Answer: D

7) The model originally did not require a cloud to use virtualization to pool resources.
1. NEFT
2. NIST
3. NIT
4. All of the mentioned

Answer: B

8) Which one of the following dimensions is related to the organization's boundaries?


1. The physical location of data
2. Ownership
3. Security boundary
4. All of the mentioned

Answer: A

9) How many types of dimensions exist in the Cloud Cube Model?


1. One
2. Two
3. Three
4. Four

Answer: D

10) model attempts to categorize a cloud network based on four-dimensional factors.


1. Cloud Square
2. Cloud Service
3. Cloud Cube
4. All of the mentioned

Answer: C
Multiple-choice Questions Based on the Cloud Type-2.
1) A hybrid cloud combines multiple clouds where those clouds retain their unique identities but
are bound together as a unit.
1. Public
2. Private
3. Community
4. Hybrid

Answer: D

2) Which one of the following is the wrong statement?


1. A deployment model defines the purpose of the cloud and the nature of how the cloud
is located.
2. The service model defines the purpose of the cloud and the nature of how the cloud
is located.
3. Cloud Square Model is meant to show us that the traditional notion of a network
boundary being the network's firewall no longer applies in cloud computing.
4. All of the mentioned

Answer: A

3) Which one of the following is the wrong statement?


1. Public Cloud may be managed by the constituent organization(s) or by a third party.
2. A community cloud may be managed by the constituent organization(s) or by a third party.
3. Private clouds may be either on- or off-premises
4. None of the mentioned

Answer: A
`

4) How many types of security threshold values are actually present in the cloud cube
model? 1. 1
2. 2
3. 3
4. None of the mentioned
Answer: B
`

5) Which of the following is offered by the ownership dimension of the Cloud Cube Model?
1. Proprietary
2. Owner
3. P
4. All of the mentioned

Answer: B
`

6) Which of the following is a measure of knowing whether the operation is inside or outside
the security limits?
1. Per
2. P
3. Pre
4. All of the mentioned

7) Which one of the following is related to the services offered by the Cloud?
1. Sourcing
2. Ownership
3. Reliability
4. AaaS

Answer: A
`

8) Which one of the following dimensions corresponds to two different states in the possible
eight cloud forms?
1. The physical location of data
2. Ownership
3. Security boundary
4. None of the mentioned
Answer: D

9) Which one of the following options is correct cloud infrastructure operated for the exclusive
use of an organization?
1. Public
2. Private
3. Community
4. All of the mentioned

Answer: B

10) Which one of the following is a type of the Cloud that is organized in such a way to serve
the common purpose or the functions?
1. Public
2. Private
3. Community
4. All of the mentioned

Answer: C

This set of Cloud Computing Questions & Answers for


entrance exams Based on "Cloud Types - 3".
1) Which one of the following is the wrong statement?
1. Everything from application to infrastructure is the responsibility of the vendor.
2. AaaS provides several sources such as the applications, development frameworks,
operating systems, virtual machines, control structures, transactions, etc.
3. In the deployment model, different types of clouds are referred to as an expression of
the infrastructure's approach.
4. All of the mentioned

Answer: B
.

2) Which one of the following provides the resources or services such as the virtual
infrastructure, virtual machines, virtual storage, and several other hardware assets?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned

Answer: A

3) Which one of the following offers the control structures and development frameworks?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned

Answer: A

4) Which one of the following is the wrong statement?


1. The Platform as a service includes the integration features, middleware, and several
other orchestrations choreography services to the IaaS model.
2. Hybrid Cloud Computing offers xaas or "anything as a service" as the delivery of IT as
a service.
3. MaaS (or the Monitoring as a Service) is currently still an emerging piece of Cloud Jigsaw.
4. None of the mentioned

Answer: C

5) Which one of the following was owned by an organization that sells cloud services?
1. Hybrid
2. Private
3. Community
4. Public
Answer: D
.

6) Find out which one can be considered the complete operating environment with
applications, management?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned

Answer: B

7) Which one of the following is considered a type of cloud computing model involving the
three different service models together?
1. CPI
2. SIP
3. SPI
4. All of the mentioned

Answer: A

8) The term "Caas" stands for as a service?


1. Compliance as a service
2. Computer as a service
3. Community as a service
4. Communication as a service

Answer: D

9) Which one of the following is a type of infrastructure as a service?


1. EC2
2. EC1
3. EC10
4. Hybrid
Answer: A

Multiple-choice Questions based on the Advantages and


Disadvantages of Cloud Computing
1) Which one of the following was one of the top 5 cloud applications in late 2010?
1. Cloud backup
2. Web applications
3. Business applications
4. All of the mentioned

Answer: D

2) Which one of the following statements is not true?


1. Google's cloud involves approx ten data-centers in all over the world.
2. Data centers are sited in such a way that the overall system latency can be optimized.
3. The online shopping website, such as Flipkart.com, has the infrastructure built so that it
can support the elastic demand so the system will be capable of accommodating peak
traffic.
4. All of the above

Answer: B

3) Which of the following benefits is related to creating stored resources together in a system
that supports multi-tenant use?
1. On-demand self-service
2. Extensive network access
3. Resource pooling
4. All of the above

Answer: A
4) Which one of the following is something that a user can obtain it under the contract from
his/her vendor?
1. PoS
2. SoS
3. QoS
4. All of the mentioned

Answer: C

5) All cloud computing applications suffer from the inherent that is intrinsic in their WAN
connectivity.
1. Propagation
2. Latency
3. Noise
4. All of the mentioned

Answer: B

6) Which of the following architectural standards is working with the cloud computing industry?
1. Service-oriented architecture
2. Standardized Web services
3. Web-application frameworks
4. All of the mentioned

Answer: A

7) Which one of the following is the most important subject of concern in cloud computing?
1. Security
2. Storage
3. Scalability
4. All of the mentioned

Answer: A
8) You cannot rely on a cloud provider for maintaining its in the event of government work.
1. Scalability
2. Reliability
3. Privacy
4. None of the mentioned

Answer: C

9) enables batch processing, which greatly speeds up high-processing applications.


1. Scalability
2. Reliability
3. Elasticity
4. Utility

Answer: A

10) feature allows you to optimize your system and capture all possible transactions.
1. Scalability
2. Reliability
3. Elasticity
4. none of the mentioned

Answer: C

11) is a pay-as-you-go model matches resources to need on an ongoing basis.


1. Utility
2. Elasticity
3. Low barrier to entry
4. All of the mentioned

Answer: A
12) Which of the following is the most refined and restrictive service model?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned

Answer: C

13) When you add a software stack, such as an operating system and applications to the service,
the model shifts to model.
1. SaaS
2. PaaS
3. IaaS
4. All of the mentioned

Answer: A

14) Which one of the following is a false statement?


1. A cloud is defined as the combination of the infrastructure of a data-center with the ability
to provision hardware and software.
2. High touch applications are best done on-premises.
3. The Google App Engine follows IaaS.
4. None of the mentioned

Answer: C

15) Service that generally focuses on the hardware follows which one of the following
service models?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned

Answer: A
16) Which of the following types of applications works with cloud computing that has low
risks, low margins?
1. High touch
2. Low touch
3. Moderate touch
4. All of the mentioned

Answer: B

17) Which one of the following statements is false?


1. Service Level Agreements (SLAs) is a small aspect of cloud computing.
2. Cloud computing does not have an impact on Software licensing.
3. Cloud computing present new opportunities to users and developers.
4. All of the mentioned

Answer: C

18) Which one of the following is a special attribute of cloud computing?


1. utility type of delivery
2. elasticity
3. low barrier to entry
4. all of the mentioned

Answer: C

1. What is Cloud Computing replacing?


A. Corporate data centers
B. Expensive personal computer hardware
C. Expensive software upgrades
D. All of the above
Ans:D
2. What is the number one concern about cloud computing?
A. Too expensive
B. Security concerns
C. Too many platforms
D. Accessability
ANS:B
3. Which of these companies is not a leader in cloud computing?
A. Google
B. Amazon
C. Blackboard
D. Microsoft
ANS:C
4. Google Docs is a type of cloud computing.
A. True
B. False
ANS:A
5. Which one of these is not a cloud computing pricing model?
A. Free
B. Pay Per Use
C. Subscription
D. Ladder
E. Perpetual License
ANS:D
6. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
ANS:A
7. An Internet connection is neccessary for cloud computing interaction.
A. True
B. False
ANS:A
8. Which is not a major cloud computing platform?
A. Google 101
B. IBM Deep blue
C. Microsoft Azure
D. Amazon EC2
ANS:B
9. “Cloud” in cloud computing represents what?
A. Wireless
B. Hard drives
C. People
D. Internet
ANS:D
10. Which of these should a company consider before implementing cloud
computing technology?
A. Employee satisfaction
B. Potential cost reduction
C. Information sensitivity
D. All of the above
ANS:D

11. What exactly is cloud computing?


A. A way to organize desktop computers
B. Lightweight software that takes up little space on a hard drive
C. Computing resources that can be accessed on demand, like electricity from a utility
D. The World Wide Web
Answer: C.
12. What widely used service is built on cloud-computing technology?
A. Twitter B. Skype
C. GmailD. YouTube
E. All of the above
Answer: E
13. Which of these techniques is vital for creating cloud-computing centers?
A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
Answer: A
14. An internal cloud is…
A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate firewall
D. The group of knowledge workers who use a social network for water-cooler
gossip Answer: C.
15. Match the provider with the cloud-based service.
A. Amazon1. Azure
B. IBM2. Elastic Compute Cloud
C. EMC3. Decho
D. Microsoft4. Cloudburst
ANSWER: A
16. Cloud computing embraces many concepts that were previously touted as the next
big thing in information technology. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Grid computing
E. Desktop computing
Answer: E
17. IBM, EMC and Boeing Co. were among the companies signing what document whose
title is reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Answer: D.
18. The term “cloud computing” is a metaphor that originated in what?
A. Graphical depiction of computer architectures
B. Meteorological symbolism
C. Worries about an unclear future for computing architectures
D. The idea that computer users trust in
magic Answer: A
19. Link the cloud-based service on the left with the desktop or server application it
is designed to displace on the right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-
rela- tionship management
D. Amazon EC24. Backup disk
Answer: A
20. What August event was widely seen as an example of the risky nature of cloud computing?
A. Spread of Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
Answer: B
21. Which of the following is true of cloud computing?
A. It’s always going to be less expensive and more secure than local computing.
B. You can access your data from any computer in the world, as long as you have an
Internet connection.
C. Only a few small companies are investing in the technology, making it a risky
venture. Ans:B
22. What is private cloud?
A. A standard cloud service offered via the Internet
B. A cloud architecture maintained within an enterprise data center.
C. A cloud service inaccessible to anyone but the cultural
elite Ans:B
23. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service (SAAS)
B. Platform as a Service (PAAS)
C. Infrastructure as a Service (IAAS)
Ans:C
24. Google Docs is a type of cloud computing.
A. True
B. False
Ans: A
25. What is Cloud Foundry?
A. A factory that produces cloud components
B. An industry wide PaaS initiative
C. VMware-led open source
PaaS. Ans: C
26 This is a software distribution model in which applications are hosted by a vendor or
service provider and made available to customers over a network, typically the Internet.
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS).
Ans:C
27. Which of the following statements about Google App Engine (GAE) is INCORRECT.
A. It’s a Platform as a Service (PaaS) model.
B. Automatic Scalability is built in with GAE. As a developer you don’t need to worry
about application scalability
C. You can decide on how many physical servers required for hosting your application.
D. The applications deployed on GAE have the same security, privacy and data protection policies
as that of Google’s applications. So, applications can take advantage of reliability, performance
and security of Google’s infrastructure.
Ans:C
28. I’ve a website containing all static pages. Now I want to provide a simple Feedback
form for end users. I don’t have software developers, and would like to spend minimum
time and money. What should I do?
A. Hire software developers, and build dynamic page.
B. Use ZOHO creator to build the required form, and embed in html page.
C. Use Google App Engine (GAE) to build and deploy dynamic
page. Ans:B
29. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working.
B. Cloud Security Alliance.
C. Cloud Security WatchDog.
D. Security in the Cloud Alliance.
Ans:B
30. “Cloud” in cloud computing represents what?
A. Wireless
B. Hard drives
C. People
D. Internet
Ans:D
31. What second programming language did Google add for App Engine development?
A. C++
B. Flash
C. Java
D. Visual Basic
Ans:C
32. What facet of cloud computing helps to guard against downtime and determines costs?
A. Service-level agreements
B. Application programming interfaces
C. Virtual private networks
D. Bandwidth fees
ANS:A
33. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
ANS:A
34. Cloud Services have a relationship with their customers.
A. Many-to-many
B. One-to-many
C. One-to-one
ANS:B
35. What is the name of Rackspace’s cloud service?
A. Cloud On-Demand
B. Cloud Servers
C. EC2
ANS:B
36. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working Group
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
ANS:B
37. Which of these companies specializes in cloud computing management tools and services?
A. RightScale
B. Google
C. Salesforce.com
D. Savis
ANS:A
38. What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics
ANS:A
39. Virtual Machine Ware (VMware) is an example of
A. Infrastructure Service
B. Platform Service
C. Software Service
ANS:A
30. Cloud Service consists of
A. Platform, Software, Infrastructure
B. Software, Hardware, Infrastructure
C. Platform, Hardware,
Infrastructure ANS:A
41. Google Apps Engine is a type of
A. SaaS
B. PaaS
C. IaaS
D. NA
ANS:D
42. Which vendor recently launched a cloud-based test and development service
for enterprises?
A. HP
B. Cisco
C. IBM
D. Oracle
ANS:C
43. Geographic distribution of data across a cloud provider’s network is a problem for
many enterprises because it:
A. Breaks compliance regulations
B. Adds latency
C. Raises security concerns
D. Makes data recovery harder
ANS:A
44. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service
ANS:C
45. Cloud computing networks are designed to support only private or hybrid clouds.
A. True
B. False
Ans: B
46. A good cloud computing network can be adjusted to provide bandwidth on demand.
A. True
B. False
Ans: A
47. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True
B. False
Ans: B
48. The typical three-layer switching topology will not create latency within a cloud network.
A. True
B. False
Ans: B
49. The term ‘Cloud’ in cloud-computing refers to .
A. The Internet
B. Cumulus Clouds
C. A Computer
D. Thin Clients
Ans: A
50. In order to participate in cloud-computing, you must be using the following OS .
A. Windows
B. Mac OS
C. Linux
D. All of the above
Ans: D

1. What second programming language did Google add for App Engine
development?
A. C++
B. Flash
C. Java
D. Visual Basic
Ans:C

2. What facet of cloud computing helps to guard against downtime and


determines costs?
A. Service-level agreements
B. Application programming interfaces
C. Virtual private networks
D. Bandwidth fees
ANS:A

3. Which of these is not a major type of cloud computing usage?


A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
ANS:A

4. Cloud Services have a relationship with their customers.


A. Many-to-many
B. One-to-many
C. One-to-one
ANS:B

5. What is the name of Rackspace’s cloud service?


A. Cloud On-Demand
B. Cloud Servers
C. EC2
ANS:B

6. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working Group
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
ANS:B

7. Which of these companies specializes in cloud computing management tools


and services?
A. RightScale
B. Google
C. Salesforce.com
D. Savis
ANS:A

8. What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics
ANS:A

9. Virtual Machine Ware (VMware) is an example of


A. Infrastructure Service
B. Platform Service
C. Software Service
ANS:A

10. Cloud Service consists of


A. Platform, Software, Infrastructure
B. Software, Hardware, Infrastructure
C. Platform, Hardware,
Infrastructure ANS:A

11. Google Apps Engine is a type of


A. SaaS
B. PaaS
C. IaaS
D. NA
ANS:D

12. Which vendor recently launched a cloud-based test and development service
for enterprises?
A. HP
B. Cisco
C. IBM
D. Oracle
ANS:C

13. Geographic distribution of data across a cloud provider's network is a


problem for many enterprises because it:
A. Breaks compliance regulations
B. Adds latency
C. Raises security concerns
D. Makes data recovery harder
ANS:A

14. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service
ANS:C

15. Cloud computing networks are designed to support only private or hybrid
clouds.
A. True
B. False
Ans: B

16. A good cloud computing network can be adjusted to provide bandwidth on


demand.
A. True
B. False
Ans: A

17. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True
B. False
Ans: B

18. The typical three-layer switching topology will not create latency within a
cloud network.
A. True
B. False
Ans: B

19. The term 'Cloud' in cloud-computing refers to .


A. The Internet
B. Cumulus Clouds
C. A Computer
D. Thin Clients
Ans: A

20. In order to participate in cloud-computing, you must be using the following


OS .
A. Windows
B. Mac OS
C. Linux
D. All of the above
Ans: D
Also Read Cloud Computing Interview Questions
21. Which of the following is true of cloud computing?
A. It's always going to be less expensive and more secure than local computing.
B. You can access your data from any computer in the world, as long as you have an
Internet connection.
C. Only a few small companies are investing in the technology, making it a risky
venture. Ans:B

22. What is private cloud?


A. A standard cloud service offered via the Internet
B. A cloud architecture maintained within an enterprise data center.
C. A cloud service inaccessible to anyone but the cultural
elite Ans:B

23. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service (SAAS)
B. Platform as a Service (PAAS)
C. Infrastructure as a Service (IAAS)
A.ns:C

24. Google Docs is a type of cloud computing.


A. True
B. False
Ans: A

25. What is Cloud Foundry?


A. A factory that produces cloud components
B. An industry wide PaaS initiative
C. VMware-led open source
PaaS. Ans: C

26 This is a software distribution model in which applications are hosted by a


vendor or service provider and made available to customers over a network,
typically the Internet.
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS).
Ans:C

27. Which of the following statements about Google App Engine (GAE) is
INCORRECT.
A. It's a Platform as a Service (PaaS) model.
B. Automatic Scalability is built in with GAE. As a developer you don't need to worry
about application scalability
C. You can decide on how many physical servers required for hosting your application.
D. The applications deployed on GAE have the same security, privacy and data protection policies
as that of Google's applications. So, applications can take advantage of reliability, performance
and security of Google's infrastructure.
Ans:C

28. I've a website containing all static pages. Now I want to provide a simple
Feedback form for end users. I don't have software developers, and would like
to spend minimum time and money. What should I do?
A. Hire software developers, and build dynamic page.
B. Use ZOHO creator to build the required form, and embed in html page.
C. Use Google App Engine (GAE) to build and deploy dynamic
page. Ans:B

29. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working.
B. Cloud Security Alliance.
C. Cloud Security WatchDog.
D. Security in the Cloud Alliance.
Ans:B

30. "Cloud" in cloud computing represents what?


A. Wireless
B. Hard drives
C. People
D. Internet
Ans:D
31. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service
Ans: C

32. What is private cloud?


A. A standard cloud service offered via the Internet
B. A cloud architecture maintained within an enterprise data center
C. A cloud service inaccessible to anyone but the cultural
elite Ans: B

33. What is the name of the Rackspace cloud service?


A. Cloud On-Demand
B. Cloud Servers
C. EC2
Ans: B

34. Which Amazon cloud product recently experienced a massive outage?


A. SimpleDB
B. EBS
C. S3
D. CloudFront
Ans: B

35. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
Ans: B

36. What is Cloud Foundry?


A. A factory that produces cloud components
B. VMware-led open source PaaS
C. An industry wide PaaS initiative
D. VMware-led closed source
PaaS Ans: D

37. Which of the following isn't an advantage of cloud?


A. No worries about running out of storage
B. Easier to maintain a cloud network
C. Immediate access to computing resources
C. Paying only for what you use
Ans: B

38. Which company recently shut the doors on its cloud storage service?
A. Hitachi Data Systems
B. Savvis
C. Iron Mountain
D. Symantec
Ans: C

39. Which of these services is not Platform as a Service?


A. Force.com
B. Microsoft Azure
C. Amazon EC2
D. Joyent
Ans:B

40. What feature does not belong in a private cloud?


A. Metered billing
B. Self-service portal
C. Dial-home support
D. Rapid elasticity
Ans: B

41. What exactly is cloud computing?


A. A way to organize desktop computers
B. Lightweight software that takes up little space on a hard drive
C. Computing resources that can be accessed on demand, like electricity from a utility
D. The World Wide Web
Ans: C

42. What widely used service is built on cloud-computing technology?


A. Twitter
B. Skype
C. Gmail
D. YouTube
E. All of the above
Ans: E

43. Which of these techniques is vital for creating cloud-computing centers?


A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
Ans: A

44. An internal cloud is…


A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate firewall
D. The group of knowledge workers who use a social network for water-cooler
gossip Ans: C

45. Match the provider with the cloud-based service.


A. Amazon1. Azure
B. IBM2. Elastic Compute Cloud
C. EMC3. Decho
D. Microsoft4. Cloudburst
ANS: A
46. Cloud computing embraces many concepts that were previously touted as the
next big thing in information technology. Which of these is not an antecedent of
the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Grid computing
E. Desktop computing
Ans: E

47. IBM, EMC and Boeing Co. were among the companies signing what
document whose title is reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Ans: D

48. The term "cloud computing" is a metaphor that originated in what?


A. Graphical depiction of computer architectures
B. Meteorological symbolism
C. Worries about an unclear future for computing architectures
D. The idea that computer users trust in
magic Ans: A

49. Link the cloud-based service on the left with the desktop or server
application it is designed to displace on the right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-
rela- tionship management
D. Amazon EC24. Backup disk
Ans: A
50. What August event was widely seen as an example of the risky nature of
cloud computing?
A. Spread of Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
Ans: B
UNIT-1 Questions

1. Which of the following advantages’ is not true about traditional server concept?
%1.0 Easy to conceptualize
%2.0 Deployment is easy
%3.0 Difficult to backup
%4.0 Virtually any application/service can be run from this type of setup

2. Which Cloud service model has got the maximum privileges to the user?
Q IaaS
R PaaS
S SaaS
T None of these
3. Which of the following is a type of computing technology in which various services and applications
runs on a distributed network and makes use of virtualized resources?
Q Parallel Computing
R Grid Computing
S Cloud Computing
T Utility Computing
4. The architecture of the Cloud is majorly divided into ____ parts.
E. 5
F. 4
G. 3
H. 2
5. ____and _____ are examples of Platform as a Service (PaaS) model?
E. The Foce.com and windows Azure
F. Gmail and Zoom
G. Salesforce and Dropbox
H. Netflix and Amazon Prime
6. Which one of the following is not an example of the Type2-Hypervisor?
E. VMware Player
F. VMware ESXi
G. Oracle VirtualBox
H. VMware Workstation
7.________supports the Infrastructure as a Service (IaaS) cloud service model?
E. EC5
F. EC4
G. EC3
H. EC2
8. What are the different operations involved in VSAN?
F. Virtual SAN Cluster
G. Disk Groups and Virtual SAN Data Store
H. Booting and Data Transfer
I. Both (a) and (b)
9. _________is the ability to migrate an application from one cloud service to another or between a
customer’s environment and a cloud service.
E. Cloud application portability 
F. Switching cloud service providers
G. Directly linked cloud services 
H. Hybrid cloud configuration
10. Pick up the wrong statement about VSAN?
E. A software-defined storage provisions and manages storage based on policies, regardless
of the underlying hardware.
F. It is a storage product that is used in collaboration with VMware ESXi hypervisor.
G. It does not use the object-based storage architecture where each object represents a
block of data within the underlying Virtual Machine (VM)
H. VSAN reduces the cost and complexity.
11. Which of the following statement is the exact definition of type 1 hypervisor?
E. A hypervisor runs on the host system without an OS.
F. A host OS is installed on the host system and a hypervisor runs on it.
G. A hypervisor runs on the host system with an OS.
H. A host OS is installed on the host system and a hypervisor does not run on it.
12. Which of the following types of virtualization involves the modification of OS kernel?
F. Application Virtualization
G. Para Virtualization
H. Storage Virtualization
I. Network Virtualization
13. Imagine you have 3 physical servers with individual dedicated purposes. One is a mail server,
another is a web server, and the last one runs internal legacy applications. Which technology would be
best opted for the maximum utilization so that instead of having dedicated servers we can make use of
all them into one?
E. Cloud Computing
F. Virtualization
G. Triple Booting
H. Grid Computing
14._______ virtualization is the process of grouping physical storage using software to represent what
appears to be a single storage device in a virtual format.
E. Network
F. Storage
G. Client
H. Application
15. Which of the following is not a benefit of Virtualization?

E. Slash your IT expenses

F. Reduce downtime and enhance resiliency

G. Increased availability, scalability and decentralization

H. Control independence and DevOps

16. A ___ is a group of devices on one or more LANs that are configured to communicate as if they
were attached to the same wire, when in fact they are located on a number of different ____segments.

D. VSAN, SAN

E. VLAN, SAN

F. VSAN, LAN

G. VLAN, LAN

17. Select the appropriate phase which involves the selection of a cloud vendor based on the Service Level
Agreement (SLA), and then defines the level of service the provider receives.

E. Selection of Cloud Computing Provider


F. Technical and Maintenance Service

G. Both (a) and (b)

H. None of the above

18. What is that model called which makes use of pay-as-you-go feature and matches the resources that
you are required.

D. Low barrier to entry

E. Scalability

F. Utility

G. All the mentioned above

19. what is/are the contents of virtual appliance.


D. Structured only
E. Unstructured only
F. Structured and Unstructured
G. All the mentioned above
20. Choose from the following which will be used as the host operating system for Windows Server?
E. Xen
F. Microsoft Hyper-V
G. VirtualLogix VLX

H. All of the above


UNIT-2 Questions

1. Many of the cloud architecture are built on which of the following


architectures?
a) Grid
b) Skelton
c) Utility
d) Any one of them
2.___ is the type of cloud which possess the functionalities of external and
internal cloud.
a) Private
b) Protected
c) Hybrid
d) Public
3. Cloud Computing is a paradigm of _______to provide the customers on-
demand, _______ service.
a) Distributed computing, utility computing
b) Grid computing, private computing
c) Cluster computing, utility computing
d) Both (a) and (c)
4. Which grid from the following consists of one or more systems working
together to provide a single point of access to users.
a) Cluster
b) Homogenous
c) Middleware
d) Both (b) and (c)
5. Which of the following is the correct step for performing the analysis in the
Planning Phase of cloud computing?
a) Business Architecture Development
b) Cloud Computing Value Proposition
c) Cloud Computing Strategy Planning
d) Both B and C
6. _____ is the technology which is used to distribute various service requests to
multiple resources:
a) Load Scheduling
b) Load Performing
c) Load Balancing
d) Economic Load Scheduling
7. Which of the following cloud service model provides the least amount of
built-in security?
a) PaaS
b) SaaS
c) IaaS
d) All the mentioned above
8. Choose the Incorrect Statement

a) Data should be transferred and stored in an encrypted format for security


purpose
b) Adapting your on-premises systems to a cloud model does not
require that you determine what security mechanisms are required
and mapping those to controls that exist in your chosen cloud service
provider
c) Different types of cloud computing service models provide different
levels of security services
d) None of them

9. For Hybrid multi-cloud deployment models which of the following is


application and infrastructure management software?

a) VMware Hyperic
b) Univa UD
c) Web metrics
d) Tapinsystems

10. Choose the wrong statement

a) SaaS software is not customizable


b) SaaS applications come in all shapes and sizes
c) Every computer user is familiar with SaaS systems
d) None of the above

11. In the following figure what is intended to evaluate __________ in any


cloud deployment model?

a) errors
b) inconsistencies
c) risk
d) none of the mentioned

12. Which computing model is used for decreasing the complexity of computing
systems and thus seeks to improve systems by decreasing human involvement
in their operation
a) Utility
b) Grid
c) Cloud
d) Autonomic
13. What is false about 5th Iterative step (Augment) of seven step model for
migration into cloud?
a) It deals with Bandwidth
b) It deals with Security
c) Mapping the libraries and runtime approximation
d) Seek Low-cost augmentations
14. Which of the following is not a risk in cloud computing?
a) Compliance
b) Changes
c) Privacy
d) Measured Service
15. Which one of the following is not considered as a challenge in cloud
computing?
a) Security Issues
b) On- demand self service
c) Performance
d) Lack of resources/expertise
16. An OVF package cannot be used by:
a) an independent software vendor (ISV) to publish a software solution
b) a client to a software solution
c) a customer to archive a software solution
d) other use case that can be met by having a standardized package for a
software solution
17. Select the wrong statement
a) ESXi provides a virtualization layer that abstracts the CPU, storage,
memory and networking resources of the physical host into multiple
virtual machine.
b) ESXi is supported on Intel processors (Xeon and above) and AMD
Opteron processors.
c) ESXi support up to 2,096 virtual processors per host, 30 logical CPUs
per host, 15 virtual machines per host and up 2 GB of RAM per host.
d) ESXi can be installed on a hard disk, USB device, or SD card

18. ____ defines a way to make software components reusable via service
interfaces.
a) service-computing architecture
b) service-oriented architecture
c) service-level architecture
d) service-managed architecture
19. Which model from the following acts as one of the roots for cloud
computing model?
a) Grid Computing
b) Utility Computing
c) Autonomic Computing
d) All the mentioned above
20. From the following choose the common characteristic a cloud should have:
a) pay-per-use (no ongoing commitment, utility prices)
b) elastic capacity and the illusion of infinite resources
c) resources that are abstracted or virtualized
d) All the mentioned above
UNIT-III Questions

1. What should the role of internal audit be in your organizations move to


the cloud?
a) Proactive trusted advisor/partner
b) Internal audit does not involve with the move until it is time to
audit
c) Advise on the costs saving that would be realized by a reduction of
audits
d) All the mentioned above

2. ____ is considered as one of the difficult factors to determined


a) Network delay
b) Network performance
c) Network Capacity
d) All the mentioned above
3. Which of the following is/are the largest cloud providers and databases?
a) Google Bigtable
b) Amazon simple DB
c) Cloud based SQL
d) All the mentioned above

4. Choose the wrong statement


a) It moves the additional workload to the public cloud upon reaching
a limit through a trigger.
b) Switch off the cloud bursting once the load reaches normal level
c) Does not monitor the current load of the applications
d) Both (b) and (c)

5. Cloud computing architecture is a combination of ___ and ___


architecture
a) Front end and back end
b) Service oriented and event driven
c) Service and deployment
d) None of the above

6. When you have___ as your cloud stack you lose a little control over the
applications
a) PaaS
b) SaaS
c) IaaS
d) CaaS

7. Which is the role of cloud usage monitor from the following statements?
a) It can carry out run time tracking and data processing
b) It is used for monitoring the system as may be required to fulfil
legal requirements
c) It is used to manage workloads and virtual hosts that require
distribution
d) It is used to support work load balancing between cluster nodes

8. What is the name of that architecture which is used for billing the cloud
storage based on an actual usage, rather than fluctuating storage
consumption?
a) Elastic disk provisioning
b) Work load distribution
c) Cloud burst
d) Cloud capacity planning

9. Which of the following is correct regarding Automated scaling listeners?


a) It can respond to the workload fluctuation conditions.
b) Automatically scaling IT resources out or in based on parameters
previously defined by the cloud consumers
c) Automatic notification of the cloud consumer when workloads
exceed current thresholds or fall below allocated resources
d) All the mentioned above

10. What is the name of the technology which is used to distribute various
service requests to the multiple resources?
a) Load scheduling
b) Load balancing
c) Load performing
d) Load manipulating

11. Choose the correct option from the following that specifies the parameter
of SLA?
a) Responsibilities of each party
b) Response times and Warranties
c) Both (b) and (c)
d) All of the mentioned

12.
1) What type of computing technology refers to services and applications that
typically run on a distributed network through virtualized resources? 1

1. Distributed Computing
2. Cloud Computing
3. Soft Computing
4. Parallel Computing

Answer: B

Explanation: Cloud computing is a computing technique in which applications are


accessed by common internet protocols and networking standards.

2) Which one of the following options can be considered as the Cloud?

1. Hadoop
2. Intranet
3. Web Applications
4. All of the mentioned

Answer: A

Explanation: Whenever any intranet becomes large enough in size that a diagram is


not able to differentiate the individual physical system, so at that stage intranet also
becomes known as a cloud. Hadoop can be considered as a cloud.

3) Cloud computing is a kind of abstraction which is based on the notion of


combining physical resources and represents them as _______resources to users.

1. Real
2. Cloud
3. Virtual
4. none of the mentioned

Answer: C

Provided BY Waris Ali


Explanation: Cloud Computing is a kind of new model for providing resources for
applications such as staging applications, platform-independent user access to
services.

4) Which of the following has many features of that is now known as cloud
computing?

1. Web Service
2. Softwares
3. All of the mentioned
4. Internet

Answer: D

Explanation: Internet provides the abstraction, runs through the same set of protocols
and standards, and uses the same operating system and applications.

5) Which one of the following cloud concepts is related to sharing and pooling the
resources?

1. Polymorphism
2. Virtualization
3. Abstraction
4. None of the mentioned

Answer: B

Explanation: The application runs on physical systems that are not specified in real.
The information stored in the locations that are also not specified or unknown,
administration of the systems are outsourced to others and can be accessed by the
user.

6) Which one of the following statements is not true?

1. The popularization of the Internet actually enabled most cloud computing


systems.

Provided BY Waris Ali


2. Cloud computing makes the long-held dream of utility as a payment possible
for you, with an infinitely scalable, universally available system, pay what you
use.
3. Soft computing addresses a real paradigm in the way in which the system is
deployed.
4. All of the mentioned

Answer: C

Explanation: Cloud computing is distinguished by the notion that resources are


virtual and infinite and describe the physical systems on which software runs in the
abstracted manner from the user.

7) Which one of the following can be considered as a utility is a dream that dates from
the beginning of the computing industry itself?

1. Computing
2. Model
3. Software
4. All of the mentioned

Answer: A

Explanation: Cloud computing takes the technology, services, and applications that


are similar to those on the Internet and turns them into a self-service utility.

8) Which of the following is an essential concept related to Cloud?

1. Reliability
2. Abstraction
3. Productivity
4. All of the mentioned

Answer: B

Provided BY Waris Ali


Explanation: Cloud computing hides all the detail of system implementation from
users and developers.

9) Which one of the following is Cloud Platform by Amazon?

1. Azure
2. AWS
3. Cloudera
4. All of the mentioned

Answer: B

Explanation: Amazon web service is one of the most successful cloud-based


businesses, which offers infrastructure as a service and lets you rent virtual computers
on its own infrastructure.

10) Which of the following statement is not true?

1. Through cloud computing, one can begin with very small and become big in a
rapid manner.
2. All applications benefit from deployment in the Cloud.
3. Cloud computing is revolutionary, even though the technology it is built on is
evolutionary.
4. None of the mentioned

Answer: B

Explanation: A variety of issues, such as issues with latency, security, and regulatory
compliance, all are subject to concern. AWS is one of the most successful cloud-based
businesses, which is a type of infrastructure as a service and lets you rent virtual
computers on its own infrastructure.

Questions and Answers based on the "Planning"


Provided BY Waris Ali
1) In the Planning Phase, Which of the following is the correct step for performing the
analysis?

1. Cloud Computing Value Proposition


2. Cloud Computing Strategy Planning
3. Both A and B
4. Business Architecture Development

Answer: C

Explanation: In the planning phase, we actually analyze the strategy related problems
which customers might face. There are usually two steps to perform the analysis:
Cloud Computing Planning and Cloud Computing Value Proposition.

12) In which one of the following, a strategy record or Document is created


respectively to the events, conditions a user may face while applying cloud computing
mode.

1. Cloud Computing Value Proposition


2. Cloud Computing Strategy Planning
3. Planning Phase
4. Business Architecture Development

Answer: B

Explanation: Cloud Computing Strategy Planning: The establishment of the strategy


is based on the above step's analysis result. In this phase, a strategy document is
prepared according to the conditions faced by the customer while implementing the
cloud computing mode

3) What is Business Architecture Development?

1. We recognize the risks that might be caused by cloud computing application


from a business perspective.

Provided BY Waris Ali


2. We identify the applications that support the business processes and the
technologies required to support enterprise applications and data systems.
3. We formulate all kinds of plans that are required to transform the current
business to cloud computing modes.
4. None of the above

Answer: A

Explanation: Business Architecture Development: In this phase, we identify the risks


that can be caused by a cloud computing application from a business point of view.

4) Which one of the following refers to the non-functional requirements like disaster
recovery, security, reliability, etc.

1. Service Development
2. Quality of service
3. Plan Development
4. Technical Service

Answer: B

Explanation: Quality of service refers to the non-functional requirements such as


reliability, security, disaster recovery, etc.

5) Which one of the following is a phase of the Deployment process?

1. Selecting Cloud Computing Provider


2. IT Architecture Development
3. Business Architecture Development
4. Transformation Plan Development

Answer: D

Provided BY Waris Ali


Explanation: Deployment phase: This phase focuses on both steps. It consists of the
following two steps: Selecting a cloud computing provider, maintenance and technical
service.

6) This phase involves selecting a cloud provider based on the Service Level
Agreement (SLA), which defines the level of service the provider receives.

1. Maintenance and Technical Service


2. Selecting Cloud Computing Provider
3. Both A and B
4. None of the above

Answer: B

Explanation: This phase involves selecting a cloud provider based on the Service


Level Agreement (SLA), that defines the level of service the provider receives.

7) In which one of the following phases, IT Architecture Development came?

1. Strategy Phase
2. Planning Phase
3. Deployment Phase
4. Development Phase

Answer: B

Explanation: IT Architecture Development steps in Planning Phase

8) Which of the model involves the special types of services that users can access on a
Cloud Computing platform?

1. Service
2. Planning

Provided BY Waris Ali


3. Deployment
4. Application

Answer: A

Explanation: The service model contains the specials types of services that users can
access on a cloud computing platform.

9) Which one of the following is related to the services provided by Cloud?

1. Sourcing
2. Ownership
3. Reliability
4. PaaS

Answer: A

Explanation: Insourced or Outsourced means whether the service is provided by the


customer or the service provider.

10) How many phases are present in Cloud Computing Planning?

1. 2
2. 3
3. 4
4. 5

Answer: B

Explanation: In Cloud Computing Planning, there are usually three phases that are
Strategy Phase, Planning Phase, and Deployment Phase.

Provided BY Waris Ali


This set of the following Multiple Choice Questions (MCQ's)
focuses on the Cloud Computing Architecture.
1) Cloud computing architecture is a combination of?

1. service-oriented architecture and grid computing


2. Utility computing and event-driven architecture.
3. Service-oriented architecture and event-driven architecture.
4. Virtualization and event-driven architecture.

Answer: C

Explanation: Cloud computing architecture is a combination of service-oriented


architecture and event-driven architecture.

2) In how many parts we can broadly divide the architecture of the Cloud?

1. 4
2. 3
3. 2
4. 5

Answer: C

Explanation: The architecture of the Cloud can broadly be divided into two main
parts that are Back-end and Front-end.

3) Which one of the following refers to the user's part of the Cloud Computing
system?

1. back End
2. Management
3. Infrastructure
4. Front End

Provided BY Waris Ali


.

Answer: D

Explanation: It is the front-end that refers to the user's part of the cloud computing
system. It includes many applications and interfaces that are required to access or use
the cloud computing platform.

4) Which one of the following can be considered as the example of the Front-end?

1. Web Browser
2. Google Compute Engine
3. Cisco Metapod
4. Amazon Web Services

Answer: A

Explanation: From the following given options, we can consider the Web-browser as


the perfect example of the Front-end.

25) By whom is the backend commonly used?

1. Client
2. User
3. Stockholders
4. service provider

Answer: D

Explanation: It is commonly used by the service provider in order to manage all


resources required to provide the Cloud Computing Services.

6) Through which, the backend and front-end are connected with each other?

Provided BY Waris Ali


1. Browser
2. Database
3. Network
4. Both A and B

Answer: C

Explanation: Typically using an internet connection, both the front and back end are
connected to the others through a network.

7) How many types of services are there those are offered by the Cloud Computing to
the users?

1. 2
2. 4
3. 3
4. 5

Answer: C

Explanation: Usually, Cloud Computing offers three types of services to the users


that are Platform as a service (or PaaS), Application as a service (or AssS), and
Software as a service (or SaaS).

8) The Foce.com and windows Azure are examples of which of the following?

1. IaaS
2. PaaS
3. SaaS
4. Both A and B

Answer: B

Provided BY Waris Ali


Explanation: Both Force.com and Windows Azure are examples of the Platform as a
service

9) Which of the following is one of the backend's built-in components of cloud


computing?

1. Security
2. Application
3. Storage
4. Service

Answer: A

Explanation: Security is one of the back-end's built-in components of cloud


computing.

10) Which of the following provides the Graphic User Interface (GUI) for interaction
with the cloud?

1. Client
2. Client Infrastructure
3. Application
4. Server

Answer: B

Explanation: The Client Infrastructure is one of the front-end components that


provide the way of communication in the form of a Graphic User Interface to
communicate with the Cloud.

Multiple Choice Questions (MCQ's) Based on the


"Technologies" used in the Cloud Computing.

Provided BY Waris Ali


1) Which one of the following a technology works behind the cloud computing
platform?

1. Virtualization
2. SOA
3. Grid Computing
4. All of the above

Answer: D

Explanation: Several technologies work behind the Cloud Computing platforms,


which provide features like Flexibility, reliability, and usability to cloud computing.

2) Which one of the following is a kind of technique that allows sharing the single
physical instance of an application or the resources among multiple
organizations/customers?

1. Virtualization
2. Service-Oriented Architecture
3. Grid Computing
4. Utility Computing

Answer: A

Explanation: Virtualization is a kind of technique that allows us to share the single


physical instance of a resource or application between several organizations/users.

3) Which one of the following statement is true about the Virtualization?

1. It provides a logical name for a physical resource, and on-demand provides an


indicator of that physical resource.
2. In Virtualization, we analyze the strategy related problems that customers may
face.
3. In Virtualization, it is necessary to compile the Multitenant properly.
4. All of the above

Provided BY Waris Ali


.

Answer: A

Explanation: It provides a logical name to the physical resource when the demand is
correct regarding virtualization and provides an indicator of that physical resource.

4) In Virtualization, which architecture provides the virtual isolation between the


several tenants?

1. IT Architecture
2. Multitenant
3. Deployment
4. Business Architecture

Answer: B

Explanation: The Multitenant architecture provides us the virtual isolation in


between several tenants. Hence the organization can easily use and also modify their
application as they each have their instances running.

5) On which one of the following utility computing is based?

1. Grid Computing Model


2. SOA Model
3. virtual isolation Model
4. Pay-per-Use model

Answer: D

Explanation: Utility computing is based on the pay-what-you use model.

6) Which one of the following statement is true about the Service-Oriented


Architecture?
Provided BY Waris Ali
1. It is possible to exchange data between applications from different vendors
without using additional programming.
2. It provides computational resources on-demand as a metered service.
3. Service-Oriented Architecture allows using the application as a service for
other applications.
4. Both A and C

Answer: D

Explanation: The service-oriented architecture helps to be used as a service for other


applications regardless of vendor, product, or technology type. Therefore, it is
possible to exchange data between different vendors' applications without changes in
additional programming or services.

7) In Grid Computing, which types of computer resources are there?

1. heterogeneous dispersed.
2. geographically dispersed.
3. Both A and B
4. None of the above

Answer: C

Explanation: In grid computing, heterogeneous types of resources are used that are
geographically dispersed.

8) Managed IT services are based on the concept of which one of the following?

1. Virtualization
2. Utility Computing
3. Grid Computing
4. SOA

Provided BY Waris Ali


Answer: B

Explanation: In Cloud Computing, managed IT services and grid computing are


based on the concept of Utility Computing.

9) Which one of the following refers to the Distributed Computing, in which several
sets of computers distributed on multiple geographical locations and are connected
with each other to achieve a common goal?

1. Virtualization
2. SOA
3. Grid Computing
4. Utility Computing

Answer: C

Explanation: Grid Computing refers to the Distributed Computing, in which several


sets of computers distributed on multiple geographically dispersed, and are connected
with each other to achieve a common goal.

10) Which one of the following statement is true about Grid Computing?

1. Pieces combine small tasks into complex tasks


2. The subscription tier plays an important role in grid computing.
3. Breaks complex tasks into small operations
4. Both A and C

Answer: C

Explanation: Grid computing breaks down complex tasks into smaller pieces, which
are distributed to the CPU residing within the grid.

Provided BY Waris Ali


Multiple Choice Questions (MCQ's) based on the
"Hypervisors" used in the Cloud Computing.
1) Which one of the following given programs provides the isolation (abstraction) and
partitioning?

1. System hypervisor
2. Software hypervisor
3. Hardware hypervisor
4. Virtualization hypervisor

Answer: D

Explanation: The virtualization hypervisor program provides the isolation


(abstraction) and partitioning

2) On which one of the following hypervisor runs directly on the underlying host
system, it is also known as________?

1. Bare metal hypervisor


2. Hosted Hypervisor
3. Native Hypervisor
4. Both A and C

Answer: D

Explanation: The Hypervisor runs directly on the underlying host system, and


sometimes it is also known as "Native Hypervisor" or "Bare metal hypervisor."

3) Which of the following behaves like the monitor's entry point and reroutes the
instructions of the virtual machine?

1. Dispatcher
2. Allocator

Provided BY Waris Ali


3. Interpreter
4. Both A and B

Answer: A

Explanation: The Dispatcher acts as the monitor's entry point and reruns the
instructions (statements) of the virtual machine instance to one of the other two
modules.

4) Which one of the following is also known as a Hypervisor?

1. VMA
2. VMM
3. VMS
4. VMR

Answer: B

Explanation: A Virtual Machine Monitor (or VMM) is sometimes also known as the
Hypervisor.

5) How many kinds of Hypervisor are there?

1. 4
2. 3
3. 2
4. 5

Answer: C

Explanation: There are only two kinds of Hypervisors that are Type1-Hypervisor and
Type2-Hypervisor.

Provided BY Waris Ali


6) Which one of the following is not an example of the Type1-Hypervisor?

1. VMware ESXi
2. Citrix XenServer
3. Microsoft Hyper-V hypervisor
4. VMware Player

Answer: D

Explanation: VMware Player is one of the examples of Typ2-Hypervisor not of the


Type1-Hypervisor

7) How many main modules are needed to coordinate in order to emulate the
underlying hardware?

1. 3
2. 2
3. 4
4. 5

Answer: A

Explanation: In order to emulate the underlying hardware, there are three main
modules needed to coordinate, which are as follows:

 Interpreter
 Allocator
 Dispatcher

8) Which one of the following is used to call the allocator?

1. INTERPRETER
2. TYPE-2 Hypervisor
3. Both A and B
4. DISPATCHER

Provided BY Waris Ali


.

Answer: D

Explanation: Each time when the virtual machine wants to execute an operation or


instruction, it will result in allowing in changing the machine's resources associated
with the virtual machine. Hence the allocator is called by the Dispatcher.

9) The Parallels Desktop can be considered as the example of which of the following?

1. TYPE-2 Hypervisor
2. DISPATCHER
3. TYPE-1 Hypervisor
4. INTERPRETER

Answer: A

Explanation: Parallels Desktop or VMware Player is one of the examples of the


Type2-Hypervisor. Almost all the hosted hypervisors are usually found on endpoints
such as PCs.

10) Which one of the following statements is not true?

1. Whenever a command begins a process, immediately the process virtual


machine gets instantiated.
2. Usually, the guest operating systems are mores faster in full virtualization as
compared to other virtualization schemes.
3. It is necessary for the full virtualization that the host OS (Operating System )
offers a Virtual Machine Interface for the guest operating system by which the
guest operating system can access the hardware through the host VM.
4. All of the above

Answer: C

Explanation: The statement give in the option c is not true at all.

Provided BY Waris Ali


11) Which of the following statements is not true?

1. Load balancing virtualizes systems and resources by mapping a logical address


to a physical address
2. Multiple instances of various Google applications are running on different hosts
3. Google uses hardware virtualization
4. All of the above

Answer: A

Explanation: Google performs the load balancing for distributing the processing load
in order to achieve high utilization rates.

12) Which one of the following can be considered as the example of the Type2
Virtual Machine monitors?

1. KVM
2. Microsoft Hyper V
3. Parallels Desktop
4. All of the above

Answer: D

Explanation: KVM, Microsoft Hyper V, and Parallels Desktop for Mac are examples
of the Type2 Virtual Machine Monitors.

13) Which one of the following is a type of software that supports the virtual
machine?

1. Kernel
2. Hypervisor
3. VMM
4. Both B and C

Provided BY Waris Ali


.

Answer: D

Explanation: The VMM and kernel both are a kind of software that supports the
Virtual Machine.

14) Which one of the following runs on Xen Hypervisor?

1. Azure
2. AWS EC2
3. C AWS EC3
4. All of the above

Answer: B

Explanation: AWS EC2 runs on Xen Hypervisor

15) Which one of the following is the type of a service that manages and creates
virtual network interfaces?

1. VMware vStorage
2. Application services
3. VMware vCompute
4. VMware vNetwork

Answer: D

Explanation: VMware vNetwork is a kind of service that manages and creates virtual


network interfaces.

16) In which one of the following, the virtual machine simulates hardware, through
which it can be independent of the underlying system hardware?

Provided BY Waris Ali


1. Para-virtualization
2. Full virtualization
3. Emulation
4. None of the above

Answer: C

Explanation: In emulation, the virtual machine simulates hardware, through that it


can be independent of the underlying system hardware

17) Which one of the following will be the host operating system for Windows
Server?

1. VirtualLogix VLX
2. Microsoft Hyper-V
3. Xen
4. All of the above

Answer: B

Explanation: Type 2 virtual machines are installed over a host operating system.

18) In Which Type of VM, full virtualization can be possible?

1. Type4
2. Type2
3. Type3
4. Type1

Answer: D

Explanation: In Type1, the full virtualization can be possible because it provides a


complete simulation of the hardware on which it is currently running.

Provided BY Waris Ali


19) Which one of the following can be considered as another name of Virtual
Machine?

1. Software virtual machine


2. Real machine
3. process virtual machine
4. Virtualization hypervisor

Answer: C

Explanation: Some kinds of Virtual Machines are specially designed so that they can
able to run only a single process or application. Hence, these kinds of virtual machines
are referred as the process Virtual Machines.

MCQ's based on the SaaS


1) Which of the following is the correct full form of SaaS?

1. Storage-as-a-Service
2. Server-as-a-Software
3. Software-as-a-Service
4. None of the above

Answer: C

Explanation: The term "SaaS" stands for the "Software as a Service," a type of model
that allows to offer Software application as a service for the customers. For Example:
MailChimp, Google Apps, Dropbox, Salesforce, etc

2) Through which one of the following models, SaaS supports multiple users and
offers a shared data model?

1. single-tenancy

Provided BY Waris Ali


2. multiple-instance
3. multi-tenancy
4. None of the above

Answer: C

Explanation: There is also an alternate of the Software virtualization of the single


individual instances that exist, although it is not that common.

3) Which of the following is the SaaS's Characteristics?

1. Usually, the license is subscription-based or usage-based and is billed on a


recurring basis.
2. The software and the service are observed and maintained usually by the
vendor.
3. Software mostly available over the internet across the world and can be
provided according to the demand through the browser.
4. All of the above

Answer: D

Explanation: Sometimes it may be the client-side executable code. Still, it is not the


end-user's responsibility to maintain that code and maintain its interaction with the
services at all.

4) Which of the following is a characteristic of the SaaS applications?

1. SaaS applications are reliable


2. SaaS applications are not customizable
3. SaaS applications are customizable
4. Non-reliable

Answer: C

Provided BY Waris Ali


Explanation: SaaS offers Application Programming Interface (API) to the users,
which allows the users/developers to develop a customized application.

5) Which types of issues are associated with the SaaS?

1. Modest software tools


2. Multitenant solutions
3. Centralized management and data
4. Network dependence

Answer: D

Explanation: There are many issues associated with the SaaS (Software as a Service),
such as Lack of portability between SaaS clouds, Web-browser related issues, and
Network dependence.

6) Which one of the following statements can be considered as the true characteristics
of software as a Service (SaaS) model?

1. Software applications are generally maintained by the service provider (or


vendor)
2. SaaS provides the best cost-effective applications because they do not need any
maintenance at the customer side.
3. They can easily scale up or scale down according to the conditions.
4. All of the above

Answer: D

Explanation: All the statements provided in the above question are the characteristics
of the SaaS or Software as a Service model.

7) Which one of the following is not the correct statement?

Provided BY Waris Ali


1. SaaS may be also be described as software deployed on a hosted service.
2. The platform can be based on the types of software development languages,
frameworks, and several other constructs.
3. SaaS is the cloud-based equivalent of shrink-wrapped software
4. All of the above

Answer: D

Explanation: SaaS can be accessed globally through the internet, usually in a


browser.

8) Which one of the following can be considered as the most complete cloud
computing service model?

1. PaaS
2. IaaS
3. CaaS
4. SaaS

Answer: D

Explanation: The most complete cloud computing service model must contain the
computing hardware and software, as well as the solution itself. Hence the SaaS
model has all these features.

9) In SaaS, the used open-source software are also known as_____

1. Closed
2. Free
3. Open
4. all of the mentioned

Answer: C

Provided BY Waris Ali


Explanation: In general, a huge part of the SaaS Software's is based on the open-
sourced software.

10) Which one of the following statements is not true about SaaS?

1. SaaS applications are offered in all shapes and sizes.


2. All users with a little knowledge or know how to operate a computer also know
about the SaaS.
3. SaaS software is not customizable.
4. None of the above

Answer: D

Explanation: Every computer user is well familiar with SaaS, which is an alternate


for the locally installed software.

MCQ's based on the Paas (Platform as a service)


1) Which type of PaaS does not contains any type of license or technical dependencies
on specific SaaS applications?

1. Add-on development facilities


2. Application delivery-only environments
3. Open Platform as a service
4. Stand-alone development environments

Answer: D

Explanation: The PaaS is a type of stand-alone, works as the independent entity for


the unique function. It also does not require technical dependencies and licensing on
any special SaaS (Software as a service) applications.

2) Which one of the following is associated heavily with vendor lock-in?

Provided BY Waris Ali


1. DaaS
2. SaaS
3. IaaS
4. PaaS

Answer: D

Explanation: The main problem with the "Platform as a service" (or PaaS) is that it
normally tie the developer and the customer in such a solution, in which both the
developer and customers have to depend on the platform vendor.

3) Which one of the following is a type of PaaS that usually allows customizing the
existing SaaS platform?

1. Stand-alone development environments


2. Add-on development facilities
3. Open Platform as a service
4. Application delivery-only environments

Answer: B

Explanation: Add-on development facilities are a type of Paas that allows us to


customize the existing SaaS platform.

4) Which one of the following of PaaS type that involves on-demand scaling and
application security?

1. Stand-alone development environments


2. Open Platform as a service
3. Application delivery-only environments
4. Add-on development facilities

Answer: C

Provided BY Waris Ali


Explanation: The application delivery-only environment contains features like
application security and on-demand scaling.

5) How many types of PaaS are there?

1. 4
2. 3
3. 2
4. 5

Answer: A

Explanation: On the basis of function, there are four types of PaaS.

6) Which one of the following can be considered as the benefit of PaaS?

1. Lower administrative overhead


2. Lower total cost of ownership
3. More current system software
4. All of the above

Answer: D

Explanation: Lower administrative overhead, the lower total cost of ownership and


more current network all are the benefits of the PaaS (Platform as a service).

7) In AWS, which of the following is the AWS Management Console?

1. CAS
2. CDSS
3. CCS
4. CDA

Provided BY Waris Ali


Answer: C

Explanation: CSS is the AWS Management Console in the AWS.

8) Which of the following can be considered PaaS offering?

1. Youtube
2. Google Earth
3. Google Adsense
4. Google Maps

Answer: D

Explanation: In most cases, vendors of PaaS solutions are the developer who
provides a complete solution to the customer.

9) Which one of the following is not the correct statement?

1. The customer assumes no responsibility for maintaining the hardware, software


or the development of applications.
2. Google's App Engine platform is one of the IaaS offerings.
3. The vendor is usually responsible for all operational aspects of the services.
4. All of the above

Answer: B

Explanation: The customer is generally responsible only for his interaction with the
Platform.

10) Which one of the following statements is correct about the PaaS?

1. The platform as a service (or PaaS) systems usually support standards like
JavaScript, HTML, and several other rich media technologies.
2. Platform as a service provides the runtime environment for the applications.
Provided BY Waris Ali
3. The platform as a service is a completely integrated development environment.
4. All of the above

Answer: D

Explanation: All statements mentioned in the above questions are true about the
PaaS, so that the correct option will be the D.

MCQ's based on the IaaS


1) The terms "Iaas" stand for?

1. IT-as-a-Service
2. Infrastructure-as-a-Service
3. Internet-as-a-Service
4. Interoperability-as-a-Service

Answer: B

Explanation: The full form of the term IaaS is "Infrastructure as a Service."

2) The resources like IP addresses and VLANs are provided to the end-users by which
of the following?

1. Server virtualization.
2. Client virtualization.
3. End-user virtualization.
4. IaaS

Answer: A

Explanation: Resources such as the IP addresses and VLANs are offered to the end-
users through the server virtualization.

Provided BY Waris Ali


3) Which one of the following is a kind of open standard protocol?

1. SOAP
2. WSDL
3. DHML
4. SIMPLE

Answer: D

Explanation: The term "SIMPLE" is a type of open standard protocol.

4) In the virtual appliance, the content can be _____.

1. structured
2. unstructured
3. Both A and B
4. None of the above

Answer: C

Explanation: In a virtual appliance, the content can be either structured or


unstructured.

5) How many kinds of virtual private server instances are there partitioned in the IaaS
stack?

1. 3
2. 2
3. 4
4. 5

Answer: A
Provided BY Waris Ali
Explanation: There are only three types of workloads that need three different sizes
of computers, such as large, medium, and small.

6) Which of the following forms the basis for almost all web services stacks?

1. WSDL
2. SOAP
3. UDDI
4. VMCC. SOA

Answer: B

Explanation: The term "SOAP" stands for the Simple Object Access Protocol, and it
forms the basis for most Web Service Stacks.

7) Which of the following is the most commonly used model for description and
discovery and is also used with SOAP messaging?

1. DHML
2. VMC
3. WSDL
4. SOA

Answer: C

Explanation: Web Services Description Language (WSDL) is the model that is


usually used for description and discovery, and it is also used with SOAP messaging.

8) The Infrastructure as a service (IaaS) provides a type of isolated environment to


each customer individually by using_____.

1. renting
2. virtual machine sprawl

Provided BY Waris Ali


3. security vulnerabilities
4. hypervisor

Answer: D

Explanation: The Infrastructure as a service (or IaaS) provides a type of isolated


environment to each customer individually through the hypervisors.

9) IaaS usually shares issues with the ______.

1. PaaS
2. SaaS
3. Both A and B
4. None of the above

Answer: C

Explanation: It usually shares issues with both PaaS (Platform as a service) and SaaS
(Software as a service)

10) Which of the following is an advantage of IaaS (Infrastructure as service)?

1. Efficient and flexible renting of computer hardware.


2. Portability, interoperability with legacy applications.
3. Complete control of the computing resources through administrative access to
VMs.
4. All of the above

Answer: D

Explanation: All statements mentioned in the above questions are the advantages of


the IaaS (Infrastructure as a service)

Provided BY Waris Ali


MCQ Based on the DIaaS
1) Which one of the following is not a correct statement?

1. The Distributed Audit Service offers accountability for users accessing a


system.
2. The CardSpace and OpenID specifications support the authentication type of
data object.
3. Distributed transaction systems like as Cloud Computing Systems,
Internetworks and several others usually increases the obstacles faced by
identity management systems.
4. All of the above

Answer: B

Explanation: OpenID is a type of developing industry standard to authenticate the


End Users, by sorting the digital identity of the users in a specific format.

2) Which one of the following frameworks uses i-Card metaphor?

1. Higgins
2. Hughes
3. Hinges
4. XACML

Answer: A

Explanation: The Higgins open source identity framework is typically used to create


a vendor-neutral cloud-based authentication service

3) Which of the following is a type of XML request or response language commonly


used to integrate and interrupt services that handle requests?

1. XACML
2. FIDM

Provided BY Waris Ali


3. SSP
4. SPML

Answer: D

Explanation: SPML is a type an XML request/response language, which usually used


to integrate and interoperate service provisioning requests.

4) In order to provide more secure authentication, which of the following is required


at least?

1. three-factor authentication.
2. two -factor authentication.
3. four-factor authentication.
4. None of the above

Answer: B

Explanation: In order to provide more secure authentication, the two-factor


authentication is required at least.

5) Which one of the following groups is usually dedicated to supporting technologies


that implement enterprise mashups?

1. Open Mashup Alliance


2. Open Alliance Apache
3. Open Tech Alliance
4. None of the above

Answer: A

Explanation: Open Mashup Alliances group usually predicts that the use of mashups
will increase by a factor of 10 within just some years.

Provided BY Waris Ali


6) Which one of the following statements is correct about the FIDM?

1. SAML have access control


2. It typically uses the Security Markup Language (SAML) for packaging the
user's security credentials.
3. It describes the protocols and technologies.
4. All of the above

Answer: D

Explanation: FIDM addresses the protocols and technologies that enable a user for
packaging the security credentials across the security domains.

Usually, the SAML (or Security Markup Language) is used to package the user's
security credentials.

7) Which of the following allows the users to login into a several different websites
with the same single account ?

1. OpenID
2. FIDM
3. SSO
4. Identity

Answer: A

Explanation: OpenID allows users to login into several different websites with the
same single account. Google, Myspace, Yahoo!, Flickr and several others are the
companies which support the OpenID.

8) Which one of the following statements is true about the SSO?

1. It has multiple authentication servers

Provided BY Waris Ali


2. It manages single accesses to other systems
3. In SSO, User sends the ticket to intranet server.
4. All of the above

Answer: C

Explanation: It has the single authentication instead of multiple authentication


servers and manages multiple accessed to the other systems. In this, the user sends the
ticket/token to intranet server.

9) Among the following, which one has the single authentication server and manages
multiple accesses to the other systems?

1. SOAP
2. IDaaS
3. SSO
4. SOA

Answer: C

Explanation: It is the SSO, which has the one single authentication server, and
manages the multiple accesses to the other systems.

10) The term "IDaaS" stands for?

1. ID-as-a-Service
2. Interoperability-as-a-Service
3. Intranet-as-a-service
4. Identity-as-a-Service

Answer: D

Provided BY Waris Ali


Explanation: In order to solve the several other problems a new technology is
introduced known as the IDaas or Identity as a Service.

Multiple-choice Questions Based on the Cloud Type-1.


1) Which of the following can be referred to the location and management of the
cloud's infrastructure?

1. Service
2. Deployment
3. Application
4. None of the mentioned

Answer: B

Explanation: The deployment model tells us where the cloud is located.

2) _________ model consists of the particular types of services that you can access on
a cloud computing platform.

1. Service
2. Deployment
3. Application
4. None of the mentioned

Answer: A

Explanation: Service models describe the type of service that the service provider is
offering.

3) Which one of the following statements is wrong?

1. The use of the word "cloud" makes reference to the two essential concepts.

Provided BY Waris Ali


2. Cloud computing abstracts systems by pooling and sharing resources
3. Cloud computing is nothing more than the Internet.
4. All of the mentioned

Answer: B

Explanation: Abstraction and virtualization are the two essential concepts.

4) Which of the following is the deployment model?

1. Public
2. Private
3. Hybrid
4. All of the mentioned

Answer: D

Explanation: Public, private, community and hybrid clouds are the deployment


models.

5) Which one of the following statements is wrong?

1. Cloud Computing has two distinct sets of models.


2. Amazon has built a worldwide network of data centers to service its search
engine.
3. Azure enables .NET Framework applications to run over the Internet.
4. None of the mentioned

Answer: B

Explanation: Google has built mega data centers for its search engine. Hence it not
true that Amazon has built a worldwide network of data centers to services its search
engine.

Provided BY Waris Ali


6) Which one of the following is considered the best-known service model?

1. SaaS
2. IaaS
3. PaaS
4. All of the mentioned

Answer: D

Explanation: The best-known service models are Software as a Service, Platform as a


Service, and Infrastructure as a Service?the SPI model.

7) The __________ model originally did not require a cloud to use virtualization to
pool resources.

1. NEFT
2. NIST
3. NIT
4. All of the mentioned

Answer: B

Explanation: NIST stands for the National Institute of Standards and Technology.

8) Which one of the following dimensions is related to the organization's boundaries?

1. The physical location of data


2. Ownership
3. Security boundary
4. All of the mentioned

Answer: A
Provided BY Waris Ali
Explanation: Internal (I) / External (E) determines the organization's boundaries so
that the correct option will be A.

9) How many types of dimensions exist in the Cloud Cube Model?

1. One
2. Two
3. Three
4. Four

Answer: D

Explanation: There are four types of dimensions in Cloud Cube Model.

10) _______ model attempts to categorize a cloud network based on four-dimensional


factors.

1. Cloud Square
2. Cloud Service
3. Cloud Cube
4. All of the mentioned

Answer: C

Explanation: The Cloud Cube model is mainly used for secure collaboration.

Multiple-choice Questions Based on the Cloud Type-2.


1) A hybrid cloud combines multiple clouds where those clouds retain their unique
identities but are bound together as a unit.

1. Public
2. Private

Provided BY Waris Ali


3. Community
4. Hybrid

Answer: D

Explanation: A hybrid cloud can offer standardized or proprietary access to data and
applications, as well as application portability.

2) Which one of the following is the wrong statement?

1. A deployment model defines the purpose of the cloud and the nature of how the
cloud is located.
2. The service model defines the purpose of the cloud and the nature of how the
cloud is located.
3. Cloud Square Model is meant to show us that the traditional notion of a
network boundary being the network's firewall no longer applies in cloud
computing.
4. All of the mentioned

Answer: A

Explanation: Four types of deployment models exist.

3) Which one of the following is the wrong statement?

1. Public Cloud may be managed by the constituent organization(s) or by a third


party.
2. A community cloud may be managed by the constituent organization(s) or by a
third party.
3. Private clouds may be either on- or off-premises
4. None of the mentioned

Answer: A

Provided BY Waris Ali


Explanation: The public cloud infrastructure is available for public use, alternatively
for a large industry group.

4) How many types of security threshold values are actually present in the cloud cube
model?

1. 1
2. 2
3. 3
4. None of the mentioned

Answer: B

Explanation: There are only two types of depending upon the network firewall.

5) Which of the following is offered by the ownership dimension of the Cloud Cube
Model?

1. Proprietary
2. Owner
3. P
4. All of the mentioned

Answer: B

Explanation: P stands for Proprietary ownership

6) Which of the following is a measure of knowing whether the operation is inside or


outside the security limits?

1. Per
2. P
3. Pre

Provided BY Waris Ali


4. All of the mentioned

Answer: D

Explanation: All options mentioned in the above questions are the ways of knowing
whether the operation is inside or outside the security limits, we can also call it a
network firewall.

7) Which one of the following is related to the services offered by the Cloud?

1. Sourcing
2. Ownership
3. Reliability
4. AaaS

Answer: A

Explanation: It can be understood as the Outsourced or Insourced, which refers to the


services that are provided by the service provider.

8) Which one of the following dimensions corresponds to two different states in the
possible eight cloud forms?

1. The physical location of data


2. Ownership
3. Security boundary
4. None of the mentioned

Answer: D

Explanation: None of the following given dimension corresponds to two different


states in the eight possible cloud forms.

Provided BY Waris Ali


9) Which one of the following options is correct cloud infrastructure operated for the
exclusive use of an organization?

1. Public
2. Private
3. Community
4. All of the mentioned

Answer: B

Explanation: The Cloud can be managed by the third party or by that organization.

10) Which one of the following is a type of the Cloud that is organized in such a way
to serve the common purpose or the functions?

1. Public
2. Private
3. Community
4. All of the mentioned

Answer: C

Explanation: The management of a community cloud can be managed by the


constituent organization(s) or a third party.

This set of Cloud Computing Questions & Answers for


entrance exams Based on "Cloud Types - 3".
1) Which one of the following is the wrong statement?

1. Everything from application to infrastructure is the responsibility of the vendor.


2. AaaS provides several sources such as the applications, development
frameworks, operating systems, virtual machines, control structures,
transactions, etc.

Provided BY Waris Ali


3. In the deployment model, different types of clouds are referred to as an
expression of the infrastructure's approach.
4. All of the mentioned

Answer: B

Explanation: It is the Paas (the Platform As A Services) that provides several sources
or services such as the applications, development frameworks, operating systems,
virtual machines, control structures, and transactions etc. not the AaaS (or the
Application As A Service).

2) Which one of the following provides the resources or services such as the virtual
infrastructure, virtual machines, virtual storage, and several other hardware assets?

1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned

Answer: A

Explanation: The IaaS (or Infrastructure As A Service) service provider maintains all


infrastructure, while on the other hand client is responsible for several other
deployment aspects.

3) Which one of the following offers the control structures and development
frameworks?

1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned

Provided BY Waris Ali


Answer: A

Explanation: The correct answer is the IaaS (the infrastructure As a Service) because


it is a kind of cloud computing that uniquely provides resources such as the virtualized
computing over the internet.

4) Which one of the following is the wrong statement?

1. The Platform as a service includes the integration features, middleware, and


several other orchestrations choreography services to the IaaS model.
2. Hybrid Cloud Computing offers xaas or "anything as a service" as the delivery
of IT as a service.
3. MaaS (or the Monitoring as a Service) is currently still an emerging piece of
Cloud Jigsaw.
4. None of the mentioned

Answer: C

Explanation: Monitoring as a service (or MaaS) provides the option of unloading a


large portion of those costs from running as a service as opposed to a complete
investment in-home tool.

5) Which one of the following was owned by an organization that sells cloud
services?

1. Hybrid
2. Private
3. Community
4. Public

Answer: D

Explanation: The public Cloud is one of the cloud infrastructures that are available
for public use as the alternative for the large industry group.

Provided BY Waris Ali


6) Find out which one can be considered the complete operating environment with
applications, management?

1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned

Answer: B

Explanation: In the Software as a Service model (the SAAS), the application is


usually provided to the users through a thin client interface.

7) Which one of the following is considered a type of cloud computing model


involving the three different service models together?

1. CPI
2. SIP
3. SPI
4. All of the mentioned

Answer: A

Explanation: SPI is actually an acronym( or we can say the Short form of any words)
for the most standard cloud computing services models, such as the infrastructure as a
Service, Platform as a Service, and Software as a Service.

8) The term "Caas" stands for_____ as a service?

1. Compliance as a service
2. Computer as a service
3. Community as a service
4. Communication as a service

Provided BY Waris Ali


.

Answer: D

Explanation: The term "CAAS" stands for Communication as a service, which


enables the clients to utilize resources like the Unified Communications, and
Enterprise Level PBX, VPNs, VoIP without the expense of hosting, purchasing, and
maintaining the infrastructure.

9) Which one of the following is a type of infrastructure as a service?

1. EC2
2. EC1
3. EC10
4. Hybrid

Answer: A

Explanation: Amazon EC2 stands for the Amazon Elastic Compute Cloud that offers
the scalable computing capacity in the AWS (or Amazon Web Services) cloud to its
clients. One can eliminate his investment in hardware upfront using the Amazon
Elastic Compute Cloud and boost the development and deployment application
process.

Multiple-choice Questions based on the Advantages and


Disadvantages of Cloud Computing
1) Which one of the following was one of the top 5 cloud applications in late 2010?

1. Cloud backup
2. Web applications
3. Business applications
4. All of the mentioned

Answer: D
Provided BY Waris Ali
Explanation: The economics of software delivery has been shifted in a significant
manner, just like the music downloads has been shifted the delivery of the music.

2) Which one of the following statements is not true?

1. Google's cloud involves approx ten data-centers in all over the world.
2. Data centers are sited in such a way that the overall system latency can be
optimized.
3. The online shopping website, such as Flipkart.com, has the infrastructure built
so that it can support the elastic demand so the system will be capable of
accommodating peak traffic.
4. All of the above

Answer: B

Explanation: Data-centers can help lower land costs and reduce occupations.

3) Which of the following benefits is related to creating stored resources together in a


system that supports multi-tenant use?

1. On-demand self-service
2. Extensive network access
3. Resource pooling
4. All of the above

Answer: A

Explanation: The cloud service provider creates resources that support multi-tenant


usage in a system.

4) Which one of the following is something that a user can obtain it under the contract
from his/her vendor?

Provided BY Waris Ali


1. PoS
2. SoS
3. QoS
4. All of the mentioned

Answer: C

Explanation: Usually, it totally depends on the type of services being offered. One


can find that he/she does not require any software or hardware licensees in order to
implement his/her services.

5) All cloud computing applications suffer from the inherent _______ that is intrinsic
in their WAN connectivity.

1. Propagation
2. Latency
3. Noise
4. All of the mentioned

Answer: B

Explanation: While cloud computing applications excel at large-scale processing


tasks, if your application needs large amounts of data transfer, cloud computing may
not be the best model for you.

6) Which of the following architectural standards is working with the cloud


computing industry?

1. Service-oriented architecture
2. Standardized Web services
3. Web-application frameworks
4. All of the mentioned

Provided BY Waris Ali


Answer: A

Explanation: These standards help to enable different business models that cloud


computing vendors can support, most notably Software as a Service (SaaS), Web 2.0
applications, and utility computing. When your data travels over and rests on systems
that are no longer under your control, you have increased risk due to others'
interception and malfeasance.

7) Which one of the following is the most important subject of concern in cloud
computing?

1. Security
2. Storage
3. Scalability
4. All of the mentioned

Answer: A

Explanation: When your data travels over and rests on systems that are no longer
under your control, you have increased risk due to others' interception and
malfeasance.

8) You cannot rely on a cloud provider for maintaining its _____ in the event of
government work.

1. Scalability
2. Reliability
3. Privacy
4. None of the mentioned

Answer: C

Explanation: The Cloud computing industry continues to address security concerns.

Provided BY Waris Ali


9) _______ enables batch processing, which greatly speeds up high-processing
applications.

1. Scalability
2. Reliability
3. Elasticity
4. Utility

Answer: A

Explanation: This feature obviates the need for planning and provisioning.

10) _______ feature allows you to optimize your system and capture all possible
transactions.

1. Scalability
2. Reliability
3. Elasticity
4. none of the mentioned

Answer: C

Explanation: You have the ability to right-size resources as required.

11) _______ is a pay-as-you-go model matches resources to need on an ongoing basis.

1. Utility
2. Elasticity
3. Low barrier to entry
4. All of the mentioned

Answer: A

Provided BY Waris Ali


Explanation: This eliminates waste and has the added benefit of shifting risk from
the client.

12) Which of the following is the most refined and restrictive service model?

1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned

Answer: C

Explanation: When the service requires the client to use a complete


hardware/software/application stack, it is used the most refined and restrictive service
model.

13) When you add a software stack, such as an operating system and applications to
the service, the model shifts to _____ model.

1. SaaS
2. PaaS
3. IaaS
4. All of the mentioned

Answer: A

Explanation: Microsoft's Windows Azure Platform is best described as currently


using the SaaS model.

14) Which one of the following is a false statement?

1. A cloud is defined as the combination of the infrastructure of a data-center with


the ability to provision hardware and software.

Provided BY Waris Ali


2. High touch applications are best done on-premises.
3. The Google App Engine follows IaaS.
4. None of the mentioned

Answer: C

Explanation: The Google App Engine follows PaaS (or Platform as a service).

15) Service that generally focuses on the hardware follows which one of the following
service models?

1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned

Answer: A

Explanation: Amazon web service follows the PaaS model.

16) Which of the following types of applications works with cloud computing that has
low risks, low margins?

1. High touch
2. Low touch
3. Moderate touch
4. All of the mentioned

Answer: B

Explanation: The "low touch" applications that come with low margins require
committed resources and pose less risk.

Provided BY Waris Ali


17) Which one of the following statements is false?

1. Service Level Agreements (SLAs) is a small aspect of cloud computing.


2. Cloud computing does not have an impact on Software licensing.
3. Cloud computing present new opportunities to users and developers.
4. All of the mentioned

Answer: C

Explanation: The answer will be the C because it is based on the paradigm of a


shared multi-tenant utility.

18) Which one of the following is a special attribute of cloud computing?

1. utility type of delivery


2. elasticity
3. low barrier to entry
4. all of the mentioned

Answer: C

Explanation: These attributes change how applications are created, priced, and


delivered.

Provided BY Waris Ali


1. Which of the following service provider provides the least amount of built in security?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
View Answer
Answer: c

2. Point out the correct statement.


a) Different types of cloud computing service models provide different levels of security services
b) Adapting your on-premises systems to a cloud model requires that you determine what security
mechanisms are required and mapping those to controls that exist in your chosen cloud service
provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All of the mentioned
View Answer
Answer: d

3. Which of the following services that need to be negotiated in Service Level Agreements?
a) Logging
b) Auditing
c) Regulatory compliance
d) All of the mentioned
View Answer
Answer: d

4. The following flowchart is intended to evaluate __________ in any cloud.


cloud-computing-questions-answers-cloud-security-q4
a) risk
b) errors
c) inconsistencies
d) none of the mentioned
View Answer
Answer: a

5. Point out the wrong statement.


a) You can use proxy and brokerage services to separate clients from direct access to shared cloud
storage
b) Any distributed application has a much greater attack surface than an application that is closely
held on a Local Area Network
c) Cloud computing doesn’t have vulnerabilities associated with Internet applications
d) All of the mentioned
View Answer
Answer: c

6. Which of the following area of cloud computing is uniquely troublesome?


a) Auditing
b) Data integrity
c) e-Discovery for legal compliance
d) All of the mentioned
View Answer
Answer: d

7. Which of the following is the operational domain of CSA?


a) Scalability
b) Portability and interoperability
c) Flexibility
d) None of the mentioned
View Answer
Answer: b

8. Which of the following is considered an essential element in cloud computing by CSA?


a) Multi-tenancy
b) Identity and access management
c) Virtualization
d) All of the mentioned
View Answer
Answer: a

9. Which of the following is used for Web performance management and load testing?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems
View Answer
Answer: b

10. Which of the following is application and infrastructure management software for hybrid multi-
clouds?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems
View Answer
Answer: c
1. Which of the following correctly represents different types of mobile patterns?

a)

b)

c)
d) All of the mentioned
View Answer
Answer: a

1. How many aspects need to be considered while assessing network capacity?


a) one
b) two
c) three
d) all of the mentioned
View Answer
Answer: c

2. Point out the correct statement.


a) For a cloud-based virtual computer, the network interface may be a highly variable resource
b) Increasing the variability between servers makes it easier to troubleshoot problems and simpler to
deploy and configure new systems
c) A server with the different set of software, system configuration, and hardware should perform
similarly if given the same role in an infrastructure
d) All of the mentioned
View Answer
Answer: a
3. Which of the following is not the aspect considered for network capacity?
a) Network traffic from the cloud to the network interface
b) Network traffic to and from the network interface at the server
c) Network traffic from the cloud through your ISP to your local network interface
d) All of the mentioned
View Answer
Answer: d

4. Which of the following utility is used to monitor traffic in Windows?


a) Microsoft Network Monitor
b) Microsoft Performance Monitor
c) Microsoft Perfmon
d) None of the mentioned
View Answer
Answer: a

5. Point out the wrong statement.


a) Tools are available that can monitor a cloud network’s performance at geographical different
points and over different third-party ISP connections
b) Apparent Networks company makes WAN network monitoring software
c) Network Capacity is easy to measure in a reliable way
d) All of the mentioned
View Answer
Answer: c

6. Which of the following packet sniffer was formerly called Ethereal?


a) TCPdump
b) Wireshark
c) Ntop
d) None of the mentioned
View Answer
Answer: b

7. Which of the following factor can be considered to determine WAN Capacity?


a) Routing and switching protocols
b) Overall system traffic
c) Network interconnect technologies
d) All of the mentioned
View Answer
Answer: d

8. __________ scaling allows you to use a virtual system to run more virtual machines.
a) Horizontal
b) Vertical
c) Out
d) All of the mentioned
View Answer
Answer: b
9. Which of the following is used to evaluate your own cloud application’s network performance?
a) Path Cloud
b) PathView Cloud
c) View Cloud
d) All of the mentioned
View Answer
Answer: b

10. Scaling _____ indefinitely leads you to an architecture with a large number of servers.
a) out
b) in
c) vertically
d) all of the mentioned
View Answer
Answer: a
1. Which of the following type is missing in the following figure?

a) High-CPU
b) High-Disk
c) High-ROM
d) All of the mentioned
View Answer
Answer: a

2. Point out the correct statement.


a) Use of different machine instance sizes is an attempt to create standard servers
b) Reducing the variability between servers makes it easier to troubleshoot problems and simpler to
deploy and configure new systems
c) A server with the same set of software, system configuration, and hardware should perform
similarly if given the same role in an infrastructure
d) All of the mentioned
View Answer
Answer: d

3. Which of the following instance has 68.4GB of memory and 26 EC2 Compute Units?
a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) Micro Instance
d) High-CPU Extra Large Instance
View Answer
4. Which of the following instance is used by default in AMI?
a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) Micro Instance
d) High-CPU Extra Large Instance
View Answer
Answer: b

5. Point out the wrong statement.


a) In practice, there is less performance variability in cloud machine instances
b) Capacity planning seeks to compare the capability of one system against another system
c) Capacity planning provides the service with the best operational parameters at the lowest cost
d) All of the mentioned
View Answer
Answer: a
E
6. Which of the following graph correctly describes relative costs and efficiencies of different
physical and virtual servers?

a)
b)

c)
d) None of the mentioned
View Answer
Answer: a

7. Which of the following instance has an API name: m2.4xlarge?


a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) Micro Instance
d) High-CPU Extra Large Instance
View Answer
Answer: d
Explanation: High-CPU Extra Large Instance has 7GB of memory and 20 EC2 Compute Units.
8. EC2 Compute Unit is the equivalent of a _____ GHz 2007 Opteron or 2007 Xeon processor.
a) 1
b) 2
c) 4
d) All of the mentioned
View Answer
Answer: a

9. Which of the following instance has the lowest performance in AMI?


a) Auto Bench
b) Auto Scaling
c) Auto Performance
d) All of the mentioned
View Answer
Answer: b

10. Which of the following cloud computing infrastructures automatically manage your capacity?
a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) High-CPU Extra Large Instance
d) All of the mentioned
View Answer
Answer: b

1. Which of the following is storage data interchange interface for stored data objects?
a) OCC
b) OCCI
c) OCMI
d) All of the mentioned
View Answer
Answer: b

2. Point out the correct statement.


a) To determine whether your application will port successfully, you should perform a functionality
mapping exercise
b) Cloud computing supports some application features better than others
c) Cloud bursting is an overflow solution that clones the application to the cloud and directs traffic
to the cloud during times of high traffic
d) All of the mentioned
View Answer
Answer: d

3. ________ data represents more than 50 percent of the data created every day.
a) Shadow
b) Light
c) Dark
d) All of the mentioned
View Answer
Answer: a
4. Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by
IDC.
a) 10
b) 15
c) 20
d) None of the mentioned
View Answer
Answer: d

5. Point out the wrong statement.


a) Some APIs are both exposed as SOAP and REST
b) The role of a cloud vendor specific API has impact on porting an application
c) There are mainly three types of cloud storage
d) None of the mentioned
View Answer
Answer: c

6. Which of the following system does not provision storage to most users?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: b

7. The addition of a software package on top of a cloud storage volume makes most cloud storage
offerings conform to a ________ as a Service model.
a) Software
b) Platform
c) Analytics
d) None of the mentioned
View Answer
option A

8. How many categories of storage devices broadly exist in cloud?


a) 1
b) 2
c) 3
d) None of the mentioned
View Answer
Answer: b

9. Which of the following storage devices exposes its storage to clients as Raw storage that can be
partitioned to create volumes?
a) block
b) file
c) disk
d) all of the mentioned
View Answer
Answer: a

10. Which of the following impose additional overhead on clients and offer faster transfer?
a) Block storage
b) File Storage
c) File Server
d) All of the mentioned
View Answer
Answer: a

1. Which of the following feature make cloud-based storage systems highly reliable?
a) Redundant networks
b) Redundant name servers
c) Replication
d) All of the mentioned
View Answer
Answer: d

2. Point out the correct statement.


a) With Atmos, you can create your own cloud storage system or leverage a public cloud service
with Atmos online
b) IBM is a major player in cloud computing particularly for businesses
c) In managed storage, the storage service provider makes storage capacity available to users
d) All of the mentioned
View Answer
Answer: a

3. Redundancy has to be implemented at the _________ architectural level for effective results in
cloud computing.
a) lower
b) higher
c) middle
d) all of the mentioned
View Answer
Answer: b

4. Which of the following can manage data from CIFS and NFS file systems over HTTP networks?
a) StorageGRID
b) DataGRID
c) DiskGRID
d) All of the mentioned
View Answer
Answer: a

5. Point out the wrong statement.


a) AWS S3 essentially lets you create your own cloud storage
b) AWS created “Availability Zones” within regions, which are sets of systems that are isolated
from one another
c) Amazon Web Services (AWS) adds redundancy to its IaaS systems by allowing EC2 virtual
machine instances
d) None of the mentioned
View Answer
Answer: d
Explanation: In theory, instances in different availability zones shouldn’t fail at the same time.

advertisement

6. A ________ is a logical unit that serves as the target for storage operations, such as the SCSI
protocol READs and WRITEs.
a) GETs
b) PUN
c) LUN
d) All of the mentioned
View Answer
Answer: c

7. Which of the following use LUNs to define a storage volume that appears to a connected
computer as a device?
a) SAN
b) iSCSI
c) Fibre Channel
d) All of the mentioned
View Answer
Answer: d

8. Which of the following protocol is used for discovering and retrieving objects from a cloud?
a) OCCI
b) SMTP
c) HTTP
d) All of the mentioned
View Answer
Answer: a

9. Which of the following disk operation is performed When a tenant is granted access to a virtual
storage container?
a) CRUD
b) File system modifications
c) Partitioning
d) All of the mentioned
View Answer
Answer: d

10. Which of the following standard connect distributed hosts or tenants to their provisioned storage
in the cloud?
a) CDMI
b) OCMI
c) COA
d) All of the mentioned
View Answer
Answer: a
1. If you have a local version of a file, then a version of that file stored in the cloud conforms to all
three of the ______ backup rules.
a) 3-2-1
b) One-two-three
c) 1-2-3
d) All of the mentioned
View Answer
Answer: c

2. Point out the correct statement.


a) Replication creates a copy of the data which is not synchronized
b) An archive removes older information that is no longer operational and saves it for long-term
storage
c) Reverse delta backup allows a system to do what is referred to as a bare metal restore
d) All of the mentioned
View Answer
Answer: b

3. Which of the following is the first rule according to 3-2-1 Backup Rule by Peter Krogh?
a) Retain three copies of any file—an original and two backups
b) Files must be on two different media types
c) One copy must be stored offsite
d) All of the mentioned
View Answer
Answer: c

4. Which of the following is an incorrect feature of cloud storage backup solution?


a) Logon authentication
b) Low Encryption
c) Fast backup
d) None of the mentioned
View Answer
Answer: b

5. Point out the wrong statement.


a) In a differential backup, the backup software can obtain the up-to-date backup from the last full
backup and the last incremental backup alone
b) Incremental backup analyzes the transactions that are in progress
c) A cloud storage system contains a certain built-in latency, so unless the original data set is
quiescent, the mirror lags behind the original in concurrency
d) None of the mentioned
View Answer
Answer: b

6. Which of the following is the most important feature of cloud storage listed below?
a) Logon authentication
b) Bare file
c) Multiplatform support
d) Adequate bandwidth
View Answer
Answer: a

7. How many bits of encryption is at least required for cloud backup storage solution?
a) 56
b) 84
c) 128
d) None of the mentioned
View Answer

8. Which of the following is the most important client to back up in the cloud?
a) Windows
b) Mac
c) Linux
d) All of the mentioned
View Answer
Answer: d

9. Which of the following service does not support backup on the Linux platform?
a) Backblaze
b) Crashplan
c) Datapreserve
d) ADrive
View Answer
Answer: a

10. Which of the following is the least important feature of cloud storage listed below?
a) Multisite storage or replication
b) 24×7 technical support
c) Data versioning
d) All of the mentioned
View Answer
Answer: a

1. What second programming language did Google add for App Engine development?
A. C++
B. Flash
C. Java
D. Visual Basic
2. What facet of cloud computing helps to guard against downtime and determines costs?
A. Service-level agreements
B. Application programming interfaces
C. Virtual private networks
D. Bandwidth fees
3. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
4. Cloud Services have a________ relationship with their customers.
A. Many-to-many
B. One-to-many
C. One-to-one
5. What is the name of Rackspace’s cloud service?
A. Cloud On-Demand
B. Cloud Servers
C. EC2
6. What is the name of the organization helping to foster security standards for cloud
computing?
A. Cloud Security Standards Working Group
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
7. Which of these companies specializes in cloud computing management tools and services?
A. RightScale
B. Google
C. Salesforce.com
D. Savis
8. What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics
9. Virtual Machine Ware (VMware) is an example of
A. Infrastructure Service
B. Platform Service
C. Software Service
10. Cloud Service consists of
A. Platform, Software, Infrastructure
B. Software, Hardware, Infrastructure
C. Platform, Hardware, Infrastructure
11. Google Apps Engine is a type of
A. SaaS
B. PaaS
C. IaaS
D. NA
12. Which vendor recently launched a cloud-based test and development service for
enterprises?
A. HP
B. Cisco
C. IBM
D. Oracle
13. Geographic distribution of data across a cloud provider’s network is a problem for many
enterprises because it:
A. Breaks compliance regulations
B. Adds latency
C. Raises security concerns
D. Makes data recovery harder
14. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service
15. Cloud computing networks are designed to support only private or hybrid clouds.
A. True
B. False
16. A good cloud computing network can be adjusted to provide bandwidth on demand.
A. True
B. False
17. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True
B. False
18. The typical three-layer switching topology will not create latency within a cloud network.
A. True
B. False
19. The term ‘Cloud’ in cloud-computing refers to ______.
A. The Internet
B. Cumulus Clouds
C. A Computer
D. Thin Clients
20. In order to participate in cloud-computing, you must be using the following OS _______ .
A. Windows
B. Mac OS
C. Linux
D. All of the above
21. Which of the following is true of cloud computing?
A. It’s always going to be less expensive and more secure than local computing.
B. You can access your data from any computer in the world, as long as you have an Internet
connection.
C. Only a few small companies are investing in the technology, making it a risky venture.
22. What is private cloud?
A. A standard cloud service offered via the Internet
B. A cloud architecture maintained within an enterprise data center.
C. A cloud service inaccessible to anyone but the cultural elite
23. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service (SAAS)
B. Platform as a Service (PAAS)
C. Infrastructure as a Service (IAAS)
24. Google Docs is a type of cloud computing.
A. True
B. False
25. What is Cloud Foundry?
A. A factory that produces cloud components
B. An industry wide PaaS initiative
C. VMware-led open source Paas.
26. This is a software distribution model in which applications are hosted by a vendor or
service provider and made available to customers over a network, typically the Internet.
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS).
27. Which of the following statements about Google App Engine (GAE) is INCORRECT.
A. It’s a Platform as a Service (PaaS) model.
B. Automatic Scalability is built in with GAE. As a developer you don’t need to worry about
application scalability
C. You can decide on how many physical servers required for hosting your application.
D. The applications deployed on GAE have the same security, privacy and data protection policies
as that of Google’s applications. So, applications can take advantage of reliability, performance and
security of Google’s infrastructure.
28. I’ve a website containing all static pages. Now I want to provide a simple Feedback form
for end users. I don’t have software developers, and would like to spend minimum time and
money. What should I do?
A. Hire software developers, and build dynamic page.
B. Use ZOHO creator to build the required form, and embed in html page.
C. Use Google App Engine (GAE) to build and deploy dynamic page.
29. What is the name of the organization helping to foster security standards for cloud
computing?
A. Cloud Security Standards Working.
B. Cloud Security Alliance.
C. Cloud Security WatchDog.
D. Security in the Cloud Alliance.
30. “Cloud” in cloud computing represents what?
A. Wireless
B. Hard drives
C. People
D. Internet
1. Which of the following sells a server referred to as Cloud Attached Storage?
a) CEAT
b) CTERA
c) OCCI
d) All of the mentioned
View Answer
Answer: b

2. Point out the correct statement.


a) The CTERA Cloud Attached Storage backup server has the attributes of a NAS
b) CDMI removes older information that is no longer operational and saves it for long-term storage
c) OCMI cloud backup provides a solution that optimizes the backup based on bandwidth
availability
d) All of the mentioned
View Answer
Answer: a

3. The development of systems on a chip has enabled CTERA to create a scaled-down version of
the CTERA server called the CTERA __________
a) CloudPlug
b) NextCloud
c) CloudNext
d) All of the mentioned
View Answer
Answer: a
Explanation: This palm-sized low-power device converts a USB/eSATA drive and your Ethernet
network and turns the hard drive into a NAS server.

4. Which of the following filesystem can be backed up by CloudPlug?


a) NTFS
b) FAT32
c) EXT3
d) All of the mentioned
View Answer
Answer: d

5. Point out the wrong statement.


a) Clients have browser-based access to the backups or can locally access files using CTERA
“Virtual Cloud Drive” network drive
b) CloudPlug performs backup and synchronization services and then performs automated or on-
demand backups and snapshots of your systems
c) CloudPlug uses UPnP (Universal Plug and Play) and Bonjour to discover systems on the network
d) None of the mentioned
View Answer
Answer: d

advertisement

6. Which of the following is the open cloud storage management standard by SNIA?
a) CDMI
b) OCCI
c) CEA
d) Adequate bandwidth
View Answer
Answer: a

7. Which of the following standard uses the same authorization and authentication mechanism as
CDMI?
a) SIA
b) NFS
c) NTFS
d) None of the mentioned
View Answer
Answer: b

8. While working with the storage domain model, CDMI allows for interoperation of which of the
following clouds?
a) public
b) private
c) hybrid
d) all of the mentioned
View Answer
Answer: d

9. In the Cloud Data Management Interface (CDMI), the storage space is partitioned into units
called _________
a) containers
b) workspace
c) replicas
d) none of the mentioned
View Answer
Answer: a

10. Which of the following server performs the backups of clients without requiring any client-
based software?
a) Next3
b) OBackup
c) CTERA
d) All of the mentioned
View Answer
Answer: c

1. _______ blurs the differences between a small deployment and a large one because scale
becomes tied only to demand.
a) Leading
b) Pooling
c) Virtualization
d) All of the mentioned
View Answer
Answer: b

2. Point out the correct statement.


a) A branded cloud computing platform cannot extend customer relationships by offering additional
service options
b) A cloud computing platform extends the company’s products and defends their franchise
c) The economies of scale cannot make a profitable business
d) All of the mentioned
View Answer
Answer: b

3. A _____ is a facility that is a self-contained semiconductor assembly line.


a) fab
b) touch
c) rep
d) all of the mentioned
View Answer
Answer: a

4. How many laws exist for Cloudonomics by Weinman?


a) 4
b) 5
c) 10
d) 15
View Answer
Answer: c

5. Point out the wrong statement.


a) Google App Engine allows a developer to scale an application immediately
b) The customer relationship management provider SalesForce.com has a development platform
called Force.com that is an IaaS offering
c) A cloud computing provider can become a hub master at the center of many ISVs offerings
d) None of the mentioned
View Answer
Answer: b
6. Cutting latency in half requires ______ times the number of nodes in a system.
a) two
b) three
c) four
d) seven
View Answer
Answer: c

advertisement

7. Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better
than smaller systems do.
a) sniffers
b) botnets
c) trojan horse
d) all of the mentioned
View Answer
Answer: b

8. The reliability of a system with n redundant components and a reliability of r is ____________


a) 1-(1-r)n
b) 1-(1+r)n
c) 1+(1-r)n
d) All of the mentioned
View Answer
Answer: a

9. A __________ site is one that is environmentally friendly: locations that are on a network
backbone.
a) greenfield
b) redfield
c) greenful
d) none of the mentioned
View Answer
Answer: a

10. The peak of the sum is never ________ than the sum of the peaks.
a) smaller
b) greater
c) equal to
d) none of the mentioned
View Answer
Answer: b

1. The cost of a cloud computing deployment is roughly estimated to be ___________


a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD x (Revenue + CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) All of the mentioned
View Answer
Answer: c

2. Point out the correct statement.


a) Cloud resource pricing doesn’t always scale linearly based on performance
b) Depending upon the service model type, other resources add additional unit costs
c) Typical efficiency in data centers are between 10 and 55 percent
d) All of the mentioned
View Answer
Answer: a

3. The costs associated with resources in the cloud computing model _______ can be unbundled to
a greater extent than the costs associated with CostDATACENTER.
a) CLOUD
b) CostCLOUD
c) CCLOUD
d) All of the mentioned
View Answer
Answer: b

4. Security methods such as private encryption, VLANs and firewalls comes under __________
subject area.
a) CostDATACENTER = 1nΣ(UnitCostDATACENTER / (Revenue
–(CostDATACENTER/Utilization))SYSTEMn
b) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue
–(CostDATACENTER/Utilization))SYSTEMn
c) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue
+(CostDATACENTER/Utilization))SYSTEMn
d) All of the mentioned
View Answer
Answer: b
Explanation: Sum includes terms for System 1, System 2, System 3, and so on.

5. Point out the wrong statement.


a) Data center operates under average loads
b) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
c) Private cloud doesn’t employ the same level of virtualization
d) None of the mentioned
View Answer
Answer: c

6. For a server with a four-year lifetime, you would therefore need to include an overhead roughly
equal to ___ percent of the system’s acquisition cost.
a) 10
b) 20
c) 25
d) All of the mentioned
View Answer
Answer: c

advertisement

7. The overhead associated with ____ staff is a major cost.


a) Data Center
b) IT
c) Non IT
d) All of the mentioned
View Answer
Answer: b

8. Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their
cloud computing provider.
a) Dex
b) OpEx
c) Pex
d) All of the mentioned
View Answer
Answer: b

9. ________ is surely an impediment to established businesses starting new enterprises.


a) Proposition
b) Capitalization
c) Globalization
d) None of the mentioned
View Answer
Answer: b

10. Cloud computing is also a good option when the cost of infrastructure and management is
______
a) low
b) high
c) moderate
d) none of the mentioned
View Answer
Answer: b

1. ______ sizing is possible when the system load is cyclical or in some cases when there are
predictable bursts or spikes in the load.
a) Left
b) Right
c) Top
d) All of the mentioned
View Answer
Answer: b

2. Point out the correct statement.


a) A standard machine instance (virtual computer) might cost $0.10 or less an hour
b) A typical storage charge might be $0.10 per GB/month
c) Outsourcing shifts the burden of capital expenditures onto the service provider
d) All of the mentioned
View Answer
Answer: d
\

3. _____ is a financial estimate for the costs of the use of a product or service over its lifetime.
a) TCO
b) TOC
c) COT
d) All of the mentioned
View Answer
Answer: a

4. The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a
cloud deployment on Windows Azure in an attractive report format.
a) AWS
b) EC2
c) Azure
d) All of the mentioned
View Answer
Answer: c

5. Point out the wrong statement.


a) TCO must account for the real costs of items, but frequently they do not
b) A system consumes resources such as space in a datacenter or portion of your site, power,
cooling, and management
c) Microsoft maintains an economics page for its Windows Azure Platform
d) None of the mentioned
View Answer
Answer: d

6. A ________ Level Agreement (SLA) is the contract for performance negotiated between you and
a service provider.
a) Service
b) Application
c) Deployment
d) All of the mentioned
View Answer
Answer: a

advertisement
7. Which of the following is specified parameter of SLA?
a) Response times
b) Responsibilities of each party
c) Warranties
d) All of the mentioned
View Answer
Answer: d
Explanation: Some SLAs are enforceable as contracts.

8. When you purchase shrink-wrapped software, you are using that software based on a licensing
agreement called ________
a) EULA
b) EUL
c) ELA
d) All of the mentioned
View Answer
Answer: a

9. Cloud computing shifts capital expenditures into ________ expenditures.


a) operating
b) service
c) local
d) none of the mentioned
View Answer
Answer: a

10. Which of the following service is used for backing up a licensed computer?
a) CarbonT
b) Karbonite
c) Carbonite
d) None of the mentioned
View Answer
Answer: c

You might also like