Professional Documents
Culture Documents
MCQS
MCQS
7. Which one of the following refers to the user's part of the Cloud
Computing system?
* back End
* Management
* Infrastructure
* Front End
10. The most commonly used model for discovery and description
used with SOAP messaging is the?
* WSDL
* VMc
* DHML
* SOA
Practice Worksheet Unit 5
1. _________ forms the basis for most of the Web services stacks.
* WSDL
* VMc
* SOA
* SOAP
4. A ________ is an application that can display a Web page that shows data
and supports features from two or more sources.
∗ workspace
∗ workload
∗ mashup
∗ Multitenant
5. "Container images" become
∗ containers at runtime
∗ docker at runtime
∗ images cannot run
∗ services at runtime
∗
6. REST API used for
∗ template with instructions for creating a Docker
∗ implements a failover system mechanism that monitors failure
conditions and automatically redirects the workload
∗ specifying interfaces with programs that can be used to talk to
the daemon services and instruct them what to do.
∗ None among mentioned
9. A pod consists of
∗ network mechanism that lets Kubernetes maintain a grouping
∗ one or more containers that are guaranteed to be co-located on
the host machine and can share resources
∗ mathematical models or closed functions used to predict outcomes
and require strong computing power to create
∗ none among mentioned
a) Distributed
b) Cloud
c) Soft
d) Parallel
View Answer
Answer: b
a) The massive scale of cloud computing systems was enabled by the popularization of the Internet
b) Soft computing represents a real paradigm shift in the way in which systems are deployed
c) Cloud computing makes the long-held dream of utility computing possible with a pay-as-you-go, infinitely scalable, universally available
system
View Answer
Answer: b
3__________as a utility is a dream that dates from the beginning of the computing industry itself.
a) Model
b) Computing
c) Software
View Answer
Answer: b
a) Reliability
b) Productivity
c) Abstraction
View Answer
Answer: c
b) With cloud computing, you can start very small and become big very fast
View Answer
Answer: a
d) None of the mentioned
View Answer
Answer: a
Explanation: Issues with latency, transaction control, and in particular security and regulatory
compliance are of particular concern.
6. Which of the following cloud concept is related to pooling and sharing of resources?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned
View Answer
Answer: c
Explanation: Applications run on physical systems that aren’t specified, data is stored in locations
that are unknown, administration of systems is outsourced to others, and access by users is
ubiquitous.
has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned
View Answer
Answer: a
Explanation: The Internet offers abstraction, runs using the same set of protocols and standards, and
uses the same applications and operating systems.
8. Which of the following can be identified as cloud?
a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned
View Answer
Answer: c
Explanation: When an intranet becomes large enough that a diagram no longer wishes to
differentiate between individual physical systems, the intranet too becomes identified as a cloud.
9. Cloud computing is an abstraction based on the notion of pooling physical resources
and presenting them as a resource.
a) real
b) virtual
c) cloud
d) none of the mentioned
View Answer
Answer: b
Explanation: Cloud Computing is a new model for provisioning resources, for staging applications,
and for platform-independent user access to services.
10. Which of the following is Cloud Platform by Amazon?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned
View Answer
Answer: b
Explanation: One of the most successful cloud-based businesses is Amazon Web Services, which is
an Infrastructure as a Service offering that lets you rent virtual computers on Amazon’s own
infrastructure.
1. model consists of the particular types of services that you can access on a
cloud computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned
View Answer
Answer: a
Explanation: Service models describe the type of service that the service provider is offering.
2. Point out the correct statement.
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
View Answer
Answer: b
Explanation: Abstraction and Virtualization are the two essential concepts.
3. refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
View Answer
Answer: b
Explanation: The deployment model tells you where the cloud is located and for what purpose.
4. Which of the following is the deployment model?
a) public
b) private
c) hybrid
d) all of the mentioned
View Answer
Answer: d
Explanation: Public, private, community, and hybrid clouds are deployment models.
5. Point out the wrong statement.
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned
View Answer
Answer: b
Explanation: Google has built mega data centres for its search engine.
6. Which of the following is best known service model?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: d
Explanation: The best-known service models are Software as a Service, Platform as a Service, and
Infrastructure as a Service—the SPI model.
7. The model originally did not require a cloud to use virtualization to pool resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned
View Answer
Answer: b
Explanation: NIST stands for National Institute of Standards and Technology.
8. model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square
b) Cloud Service
c) Cloud Cube
d) All of the mentioned
View Answer
Answer: c
Explanation: Cloud Cube model is mainly used for secure collaboration.
9. How many types of dimensions exists in Cloud Cube Model?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: There are four types of dimensions in Cloud Cube.
10. Which of the following dimension is related to organization’s boundaries?
a) Physical location of data
b) Ownership
c) Security boundary
d) All of the mentioned
View Answer
Answer: a
Explanation: Internal (I) / External (E) determines your organization’s boundaries.
1. How many types of security boundary values exist in Cloud Cube model?
a) 1
b) 2
c) 3
d) None of the mentioned
View Answer
Answer: b
Explanation: There are two types depending upon network firewall.
2. Point out the correct statement.
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
View Answer
Answer: a
Explanation: Four types of deployment models exist.
3. Which of the following is provided by ownership dimension of Cloud Cube Model?
a) Proprietary
b) Owner
c) P
d) All of the mentioned
View Answer
Answer: b
Explanation: P stands for Proprietary ownership.
4. is a measure of whether the operation is inside or outside the security boundary
or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned
View Answer
Answer: d
Explanation: Per stands for Perimeterised.
5. Point out the wrong statement.
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned
View Answer
Answer: a
Explanation: The public cloud infrastructure is available for public use alternatively for a large
industry group.
6. Which of the following is related to the service provided by Cloud?
a) Sourcing
b) Ownership
c) Reliability
d) AaaS
View Answer
Answer: a
Explanation: Insourced or Outsourced means whether the service is provided by the customer or the
service provider.
7. dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data
b) Ownership
c) Security boundary
d) None of the mentioned
View Answer
Answer: d
Explanation: The sourcing dimension addresses the deliverer of the service.
8. The cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
View Answer
Answer: b
Explanation: The cloud may be managed by that organization or a third party.
9. cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
View Answer
Answer: c
Explanation: A community cloud may be managed by the constituent organization(s) or by a third
party.
10. A hybrid cloud combines multiple clouds where those clouds retain their unique identities
but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
View Answer
Answer: d
Explanation: A hybrid cloud may offer standardized or proprietary access to data and applications,
as well as application portability.
This set of Cloud Computing Questions & Answers for entrance exams focuses on “Cloud Types –
3”.
1. Which of the following is owned by an organization selling cloud services?
a) Public
b) Private
c) Community
d) Hybrid
View Answer
Answer: a
Explanation: The public cloud infrastructure is available for public use alternatively for a large
industry group.
2. Point out the wrong statement.
a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in
which infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services,
development frameworks, transactions, and control structures
d) All of the mentioned
View Answer
Answer: c
Explanation: PaaS provides virtual machines, operating systems, applications, services,
development frameworks, transactions, and control structures.
3. provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: The IaaS service provider manages all the infrastructure, while the client is responsible
for all other aspects of the deployment.
4. Which of the following provides development frameworks and control structures?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: Infrastructure as a Service (IaaS) is a form of cloud computing that provides
virtualized computing resources over the Internet.
5. Point out the wrong statement.
a) A PaaS service adds integration features, middleware, and other orchestration and
choreography services to the IaaS model
b) XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid
Cloud computing
c) Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud jigsaw
d) None of the mentioned
View Answer
Answer: d
Explanation: Monitoring as a Service provides the option to offload a large majority of those costs
by having it run as a service as opposed to a fully invested in house tool.
6. is a complete operating environment with applications, management, and user interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: b
Explanation: In the SaaS model, the application is provided to the client through a thin client
interface.
7. How many types of service model are mainly present in Cloud?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: Three types of Service model exist.
8. The three different service models are together known as the model of cloud computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned
View Answer
Answer: a
Explanation: Many other service models are also present.
9. CaaS stands for as service.
a) Compliance
b) Computer
c) Community
d) Communication
View Answer
Answer: d
Explanation: Communication as a Service (CaaS), enables the consumer to utilize Enterprise level
VoIP, VPNs, PBX and Unified Communications without the costly investment of purchasing,
hosting and managing the infrastructure.
10. Which of the following is the IaaS service provider?
a) EC2
b) EC1
c) EC10
d) Hybrid
View Answer
Answer: a
Explanation: On Amazon EC2, a client would provision a computer in the form of a virtual machine
image.
1. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned
View Answer
Answer: d
Explanation: Cloud computing has shifted the economics of software delivery in a manner similar
to the way that music downloads have shifted the delivery of commercial music.
2. Point out the correct statement.
a) Google’s cloud includes perhaps some 10 data centers worldwide
b) Flipkart.com’s infrastructure was built to support elastic demand so the system
could accommodate peak traffic
c) Data centers have been sited to optimize the overall system latency
d) All of the mentioned
View Answer
Answer: c
Explanation: Datacenter can Keep land costs modest and occupation unobtrusive.
3. Which of the following benefit is related to creates resources that are pooled together in a
system that supports multi-tenant usage?
a) On-demand self-service
b) Broad network access
c) Resource pooling
d) All of the mentioned
View Answer
Answer: a
Explanation: A cloud service provider creates resources that are pooled together in a system that
supports multi-tenant usage.
4. The is something that you can obtain under contract from your vendor.
a) PoS
b) QoS
c) SoS
d) All of the mentioned
View Answer
Answer: b
Explanation: Depending upon the type of service being offered, you may find that you do not
require hardware or software licenses to implement your service.
5. Point out the wrong statement.
a) Internet consumes roughly 1 percent of the world’s total power
b) The cost advantages of cloud computing have enabled new software vendors to
create productivity applications
c) A client can provision computer resources without the need for interaction with cloud
service provider personnel
d) None of the mentioned
View Answer
Answer: a
Explanation: Data centers have been sited to have access to low cost power.
6. All cloud computing applications suffer from the inherent that is intrinsic in their WAN
connectivity.
a) propagation
b) latency
c) noise
d) all of the mentioned
View Answer
Answer: b
Explanation: While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, cloud computing may not be the best model for
you.
7. Cloud computing is a system and it is necessarily unidirectional in nature.
a) stateless
b) stateful
c) reliable
d) all of the mentioned
View Answer
Answer: a
Explanation: Cloud computing is a stateless system, as is the Internet in general.
8. Which of the following is the most important area of concern in cloud computing?
a) Security
b) Storage
c) Scalability
d) All of the mentioned
View Answer
Answer: a
Explanation: When your data travels over and rests on systems that are no longer under your
control, you have increased risk due to the interception and malfeasance of others.
9. You can’t count on a cloud provider maintaining your in the face of government actions.
a) scalability
b) reliability
c) privacy
d) none of the mentioned
View Answer
Answer: c
Explanation: Cloud computing industry continues to address security concerns.
10. Which of the following architectural standards is working with cloud computing industry?
a) Service-oriented architecture
b) Standardized Web services
c) Web-application frameworks
d) All of the mentioned
View Answer
Answer: a
Explanation: These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility
computing.
1. Which of the following is one of the unique attributes of Cloud Computing?
a) utility type of delivery
b) elasticity
c) low barrier to entry
d) all of the mentioned
View Answer
Answer: d
Explanation: These attributes change how applications are created, priced, and delivered.
2. Point out the correct statement.
a) Service Level Agreements (SLAs) is small aspect of cloud computing
b) Cloud computing does not have impact on software licensing
c) Cloud computing presents new opportunities to users and developers
d) All of the mentioned
View Answer
Answer: c
Explanation: Because it is based on the paradigm of a shared multi-tenant utility.
3. Applications that work with cloud computing that have low margins and usually low risk are
a) high touch
b) low touch
c) moderate touch
d) all of the mentioned
View Answer
Answer: b
Explanation: The “high touch” applications that come with high margins require committed
resources and pose more of a risk.
4. A service that concentrates on hardware follows the as a Service model.
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: Amazon web service follows PaaS model.
5. Point out the wrong statement.
a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability
to provision hardware and software
b) High touch applications are best done on-premises
c) The Google App Engine follows IaaS
d) None of the mentioned
View Answer
Answer: c
Explanation: The Google App Engine follows PaaS.
6. When you add a software stack, such as an operating system and applications to the service,
the model shifts to model.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: Microsoft’s Windows Azure Platform is best described as currently using SaaS model.
7. Which of the following is the most refined and restrictive service model?
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: When the service requires the client to use a complete hardware/software/application
stack, it is using the most refined and restrictive service model.
8. is a pay-as-you-go model matches resources to need on an ongoing basis.
a) Utility
b) Elasticity
c) Low barrier to entry
d) All of the mentioned
View Answer
Answer: a
Explanation: This eliminates waste and has the added benefit of shifting risk from the client.
9. feature allows you to optimize your system and capture all possible transactions.
a) scalability
b) reliability
c) elasticity
d) none of the mentioned
View Answer
Answer: c
Explanation: You have the ability to right-size resources as required.
10. enables batch processing, which greatly speeds up high-processing applications.
a) Scalability
b) Reliability
c) Elasticity
d) Utility
View Answer
Answer: a
Explanation: This feature obviates the need for planning and provisioning.
1. A service provider gets the same benefits from a composable system that a user does.
a) CaaS
b) AaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: If you are a PaaS or SaaS service provider and your task is to create the platform or
service presented to the developer, reseller, or user, the notion of working with a composable system
is still a very powerful one.
2. Point out the correct statement.
a) Cloud architecture can couple software running on virtualized hardware in multiple locations
to provide an on-demand service
b) Cloud computing relies on a set of protocols needed to manage interprocess communications
c) Platforms are used to create more complex software
d) All of the mentioned
View Answer
Answer: d
Explanation: The most commonly used services uses a set of discovery and description protocols
based on WSDL.
3. Which of the following is the property of the composable component?
a) stateful
b) stateless
c) symmetric
d) all of the mentioned
View Answer
Answer: b
Explanation: A transaction is executed without regard to other transactions or requests.
4. From the standpoint of a it makes no sense to offer non-standard machine instances
to customers.
a) CaaS
b) AaaS
c) PaaS
d) IaaS
View Answer
Answer: d
Explanation: Because those customers are almost certainly deploying applications built on standard
operating systems such as Linux, Windows, Solaris, or some other well-known operating system.
5. Point out the wrong statement.
a) A cloud cannot be created within an organization’s own infrastructure or outsourced to another
datacenter
b) A composable component must be modular
c) A composable component must be stateless
d) None of the mentioned
View Answer
Answer: a
Explanation: While resources in a cloud can be real physical resources, more often they are
virtualized resources because virtualized resources are easier to modify and optimize.
6. A service provider reselling a may have the option to offer one module to customize
the information.
a) CaaS
b) AaaS
c) PaaS
d) SaaS
View Answer
Answer: d
Explanation: Modifications are generally severely limited.
7. Which of the following is the highest degree of integration in cloud computing?
a) CaaS
b) AaaS
c) PaaS
d) SaaS
View Answer
Answer: d
Explanation: An SaaS vendor such as Quicken.com or Salesforce.com is delivering an application
as a service to a customer.
8. Which of the architectural layer is used as a front end in cloud computing?
a) client
b) cloud
c) soft
d) all of the mentioned
View Answer
Answer: a
Explanation: Cloud computing may be differentiated from older models by describing an
encapsulated information technology service that is often controlled through an Application
Programming Interface (API).
9. Which of the following benefit is provided by the PaaS service provider?
a) A larger pool of qualified developers
b) More reliable operation
c) A logical design methodology
d) All of the mentioned
View Answer
Answer: d
Explanation: The essence of a service oriented design is that services are constructed from a set of
modules using standard communications and service interfaces.
10. Communication between services is done widely using protocol.
a) REST
b) SOAP
c) RESTful
d) None of the mentioned
View Answer
Answer: b
Explanation: There are alternative sets of standards as well.
1. Which of the following provider rely on the virtual machine technology to deliver servers?
a) CaaS
b) AaaS
c) PaaS
d) IaaS
View Answer
Answer: d
Explanation: Most large Infrastructure as a Service (IaaS) providers rely on virtual machine
technology that can run applications.
2. Point out the correct statement.
a) Virtual machines are containers that are assigned specific resources
b) Applications need not be mindful of how they use cloud resources
c) When a developer creates an application that uses a cloud service, the developer cannot attach
to the appropriate service
d) All of the mentioned
View Answer
Answer: a
Explanation: The software that runs in the virtual machines is what defines the utility of the cloud
computing system.
3. Which of the following component is called hypervisor?
a) VGM
b) VMc
c) VMM
d) All of the mentioned
View Answer
Answer: c
Explanation: VMM component is also called hypervisor.
4. Applications such as a Web server or database server that can run on a virtual machine image
are referred to as
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned
View Answer
Answer: b
Explanation: The name virtual appliance is a little misleading because it conjures up the image of a
machine that serves a narrow purpose.
5. Point out the wrong statement.
a) Platforms represent nearly the full cloud software stack
b) A platform in the cloud is a software layer that is used to create higher levels of service
c) Platforms often come replete with tools and utilities to aid in application design and deployment
d) None of the mentioned
View Answer
Answer: d
Explanation: Most platforms begin by establishing a developer community to support the work
done in the environment.
6. allows different operating systems to run in their own memory space.
a) VGM
b) VMc
c) VMM
d) All of the mentioned
View Answer
Answer: c
Explanation: VMM manages I/O for the virtual machines.
7. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of
nodes.
a) Ben
b) Xen
c) Ken
d) Zen
View Answer
Answer: b
Explanation: You run across virtual appliances in IaaS systems such as Amazon’s Elastic Compute
Cloud.
8. Which of the following offers virtual appliances, including ones based on Windows, all of
which run on VMware Player?
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
View Answer
Answer: a
Explanation: Virtual appliances have begun to affect the PC industry in much the same way that
application stores have affected the cell phone industry.
9. offers various Linux distributions upon which you can build a virtual machine.
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
View Answer
Answer: b
Explanation: Jcinacio has Ubuntu appliances.
10. is a CPU emulator and virtual machine monitor.
a) Imaging
b) Parallels
c) QEMU
d) None of the mentioned
View Answer
Answer: c
Explanation: Parallels hosts a variety of appliances that includes Linux distros, server software, and
other products.
1. Which of the following is a virtual machine technology now owned by Oracle that can
run various operating systems?
a) Vmachines
b) VirtualBox
c) ThoughtPolice
d) None of the mentioned
View Answer
Answer: b
Explanation: VirtualBox serves as a host for a variety of virtual appliances.
2. Point out the correct statement.
a) JumpIt is an open-source virtual appliance installation and management service
b) Converting a virtual appliance from one platform to another is easy proposition
c) Nearly all major virtualization platform vendors support OVF, notably VMware, Microsoft,
Oracle, and Citrix
d) All of the mentioned
View Answer
Answer: c
Explanation: Efforts are underway to create file format standards for these types of objects that
make the task easier.
3. Which of the following lets a Web service advertise itself in terms of a collection of endpoints?
a) WSDL
b) VMc
c) SOAP
d) All of the mentioned
View Answer
Answer: a
Explanation: The most commonly used model for discovery and description used with SOAP
messaging is the Web Services Description Language (WSDL).
4. Which of the following is a specification for multicast discovery on a LAN?
a) WS-Agent
b) WS-Discovery
c) WS-SOAP
d) All of the mentioned
View Answer
Answer: b
Explanation: WS-Discovery stands for Web Services Dynamic Discovery specification.
5. Point out the wrong statement.
a) Cloud computing arises from services available over the Internet communicating
b) XML-RPC uses platform-independent XML data to encode program calls that are
transported over HTTP
c) SOAP uses JSON for its messages and uses RPC and HTTP for message passing
d) None of the mentioned
View Answer
Answer: c
Explanation: SOAP forms the basis for most of the Web services stacks.
6. as a Service is a cloud computing infrastructure that creates a
development environment upon which applications may be build.
a) Infrastructure
b) Service
c) Platform
d) All of the mentioned
View Answer
Answer: c
Explanation: PaaS provides a model that can be used to create or augment complex applications
such as Customer Relation Management (CRM) or Enterprise Resource Planning (ERP) systems.
7. is a cloud computing service model in which hardware is virtualized in the cloud.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
View Answer
Answer: a
Explanation: In this particular model, the service vendor owns the equipment: servers, storage,
network infrastructure, and so forth.
8. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
View Answer
Answer: c
Explanation: A workload simulates the ability of a certain type of real or physical server to do any
amount of work.
9. How many types of virtual private server instances are partitioned in an IaaS stack?
a) one
b) two
c) three
d) all of the mentioned
View Answer
Answer: c
Explanation: The three workloads require three different sizes of computers: small, medium, and
large.
10. Which of the following correctly represents cloud computing
ecosystem? a)
Business Process
Application Services
Platform Services
Infrastructure Services
b)
Application Process
Business Services
Platform Services
Infrastructure Services
c)
Application Process
Infrastructure Services
Platform Services
Infrastructure Services
d)
Business Process
Application Services
Infrastructure Services
Platform Services
View Answer
Answer: a
Explanation: You can broadly partition cloud computing into four layers that form a cloud
computing ecosystem.
1. Which of the following content is allowed as per virtual appliance block diagram shown below?
a) Table
b) Image
c) Documents
d) All of the mentioned
View Answer
Answer: d
Explanation: Content can be structured or unstructured in virtual appliance.
2. Point out the correct statement.
a) WS-+ services carried over XML messages using the SOAP protocol access remote
server applications
b) REST stands for Representational State Transfer
c) A transaction following the rules of SOAP is considered to be RESTful
d) All of the mentioned
View Answer
Answer: b
Explanation: REST assigns a global identifier to a resource so there is a uniform method for
accessing information sources.
3. Which of the following is based on the IETF Session Initiation Protocol?
a) WSDL
b) SIMPLE
c) SOAP
d) All of the mentioned
View Answer
Answer: b
Explanation: SIMPLE is an open standard protocol.
4. Which of the following is a third-party VPN based on Google’s GoogleTalk?
a) Hotspot VPN
b) Gbridge
c) AnchorFree Hotspot Shield
d) All of the mentioned
View Answer
Answer: b
Explanation: Gbridge is an interesting solution that illustrates the use of VPN over a cloud
connection.
5. Point out the wrong statement.
a) Atom is a syndication format that allows for HTTP protocols to create and update information
b) Cloud services span the gamut of computer applications
c) The impact of cloud computing on network communication is to discourage the use of
open- network protocols in place of proprietary protocols
d) None of the mentioned
View Answer
Answer: c
Explanation: Microsoft’s ADO.NET Data Services Framework is another system for transferring
data using a RESTful transaction and standard HTTP commands.
6. Which of the following is a classic example of an IaaS service model?
a) AWS
b) Azure
c) Cloudera
d) All of the mentioned
View Answer
Answer: a
Explanation: AWS has several data centers in which servers run on top of a virtualization platform
(Xen).
7. is designed specifically to run connected to the cloud as a dedicated cloud client.
a) Harvera Tablet OS
b) Fedora Netbook OS
c) Jolicloud Netbook OS
d) None of the mentioned
View Answer
Answer: c
Explanation: Jolicloud concentrates on building a social platform with automatic software updates
and installs.
8. Which of the following is the management console in AWS?
a) CSC
b) CCS
c) CSS
d) All of the mentioned
View Answer
Answer: b
Explanation: Pods are managed by a Cloud Control System (CCS).
9. A group of users within a particular instance is called
a) suser
b) pod
c) superuser
d) all of the mentioned
View Answer
Answer: b
Explanation: Sizing limitations for pods need to be accounted for if you are building a large cloud-
based application.
10. Pods are aggregated into pools within an IaaS region or site called an
zone.
a) restricted
b) unavail
c) availability
d) none of the mentioned
View Answer
Answer: c
Explanation: In very large cloud computing networks, when systems fail, they fail on a pod-by-pod
basis, and often on a zone-by-zone basis.
1. offering provides the tools and development environment to deploy applications
on another vendor’s application.
a) PaaS
b) IaaS
c) CaaS
d) All of the mentioned
View Answer
Answer: b
Explanation: PaaS tool is a fully integrated development environment.
2. Point out the correct statement.
a) Platforms cannot be based on specific types of development languages, application
frameworks, or other constructs
b) PaaS systems offer a way to create user interfaces
c) In a CaaS model, customers may interact with the software to enter and retrieve data
d) All of the mentioned
View Answer
Answer: b
Explanation: PaaS systems support standards such as HTML, JavaScript, or other rich media
technologies.
3. Which of the following is associated with considerable vendor lock-in?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: a
Explanation: The difficulty with PaaS is that it locks the developer (and the customer) into a
solution that is dependent upon the platform vendor.
4. serves as a PaaS vendor within Google App Engine system.
a) Google
b) Amazon
c) Microsoft
d) All of the mentioned
View Answer
Answer: a
Explanation: Google offers many of its Web service applications to customers as part of this service
model.
5. Point out the wrong statement.
a) The customer takes no responsibility for maintaining the hardware, the software, or
the development of the applications
b) The vendor is responsible for all the operational aspects of the service
c) Google’s App Engine platform is IaaS offering
d) None of the mentioned
View Answer
Answer: c
Explanation: The customer is responsible only for his interaction with the platform
6. Which of the following can be considered PaaS offering?
a) Google Maps
b) Gmail
c) Google Earth
d) All of the mentioned
View Answer
Answer: a
Explanation: The vendor of the PaaS solution is in most cases the developer, who is offering a
complete solution to the customer.
7. is the most refined and restrictive service model.
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: When the service requires the client to use a complete hardware/software/application
stack, it is using the most refined and restrictive service model.
8. provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: The IaaS service provider manages all the infrastructure, while the client is responsible
for all other aspects of the deployment.
9. Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: c
Explanation: In AWS, the CCS is the AWS Management Console.
10. Rackspace Cloud Service is an example of
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
View Answer
Answer: a
Explanation: Unlike other cloud providers, Rackspace only offers managed solutions.
1. Which of the following is the most complete cloud computing service model?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: d
Explanation: The most complete cloud computing service model is one in which the computing
hardware and software, as well as the solution itself, are provided by a vendor as a complete service
offering.
2. Point out the correct statement.
a) Platforms can be based on specific types of development languages, application frameworks,
or other constructs
b) SaaS is the cloud-based equivalent of shrink-wrapped software
c) Software as a Service (SaaS) may be succinctly described as software that is deployed on a
hosted service
d) All of the mentioned
View Answer
Answer: d
Explanation: SaaS can be accessed globally over the Internet, most often in a browser.
3. Which of the following aspect of the service is abstracted away?
a) Data escrow
b) User Interaction
c) Adoption drivers
d) None of the mentioned
View Answer
Answer: b
Explanation: With the exception of the user interaction with the software, all other aspects of the
service are abstracted away.
4. Which of the following SaaS platform is with an exposed API?
a) salesforce.com
b) amazon.com
c) flipkart.com
d) all of the mentioned
View Answer
Answer: a
Explanation: SaaS does not necessarily mean that the software is static or monolithic.
5. Point out the wrong statement.
a) SaaS applications come in all shapes and sizes
b) Every computer user is familiar with SaaS systems
c) SaaS software is not customizable
d) None of the mentioned
View Answer
Answer: d
Explanation: Every computer user is familiar with SaaS systems, which are either replacements or
substitutes for locally installed software.
6. Which of the following is a SaaS characteristic?
a) The typical license is subscription-based or usage-based and is billed on a recurring basis
b) The software is available over the Internet globally through a browser on demand
c) The software and the service are monitored and maintained by the vendor
d) All of the mentioned
View Answer
Answer: d
Explanation: There may be executable client-side code, but the user isn’t responsible for
maintaining that code or its interaction with the service.
7. applications have a much lower barrier to entry than their locally
installed competitors.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
View Answer
Answer: d
Explanation: Such applications feature automated upgrades, updates, and patch management and
much faster rollout of changes.
8. SaaS supports multiple users and provides a shared data model through model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) all of the mentioned
View Answer
Answer: b
Explanation: The alternative of software virtualization of individual instances also exists, but is less
common.
9. Open source software used in a SaaS is called SaaS.
a) closed
b) free
c) open
d) all of the mentioned
View Answer
Answer: c
Explanation: A considerable amount of SaaS software is based on open source software.
10. The componentized nature of SaaS solutions enables many solutions to support a feature called
a) workspace
b) workloads
c) mashups
d) all of the mentioned
View Answer
Answer: c
Explanation: A mashup is an application that can display a Web page that shows data and supports
features from two or more sources.
1. Salesforce.com is the largest provider of CRM software.
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: d
Explanation: Salesforce.com extended its SaaS offering to allow developers to create add-on
applications.
2. Point out the correct statement.
a) Mashups are an incredibly useful hybrid Web application
b) SaaS will eventually replace all locally installed software
c) The establishment and proof of identity is a central network function
d) All of the mentioned
View Answer
Answer: d
Explanation: An identity service is one that stores the information associated with a digital entity in
a form that can be queried and managed for use in electronic transactions.
3. Which of the following group is dedicated to support technologies that implement
enterprise mashups?
a) Open Alliance Apache
b) Open Mashup Alliance
c) Open Tech Alliance
d) None of the mentioned
View Answer
Answer: b
Explanation: This group predicts that the use of mashups will grow by a factor of 10 within just a
few years.
4. Which of the following attribute should be unique?
a) identity
b) digital identity
c) mashup
d) all of the mentioned
View Answer
Answer: b
Explanation: A digital identity is those attributes and metadata of an object along with a set of
relationships with other objects that makes an object identifiable.
5. Point out the wrong statement.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify
the difficulties faced by identity management systems
b) Services that provide digital identity management as a service have been part of
internetworked systems from Day One
c) IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
d) None of the mentioned
View Answer
Answer: c
Explanation: The name servers that run the various Internet domains are IDaaS servers.
6. authentication requires the outside use of a network security or trust service.
a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned
View Answer
Answer: c
Explanation: More secure authentication requires the use of at least two-factor authentication.
7. is the assignment of a network identity to a specific MAC address that allows
systems to be found on networks.
a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned
View Answer
Answer: c
Explanation: Network interfaces are identified uniquely by Media Access Control (MAC)
addresses, which alternatively are referred to as Ethernet Hardware Addresses.
8. is one of the more expensive and complex areas of network computing.
a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned
View Answer
Answer: c
Explanation: Ticket or token providing services, certificate servers, and other trust mechanisms all
provide identity services that can be pushed out of private networks and into the cloud.
9. Which of the following is provided by Identity as a Service?
a) Identity governance
b) Provisioning
c) Risk and event monitoring
d) All of the mentioned
View Answer
Answer: d
Explanation: Identity as a Service or the related hosted (managed) identity services may be the most
valuable and cost effective distributed service types you can subscribe to.
10. Which of the following figure fully represent standards needed by IDaaS applications
for interoperability?
a)
b)
c)
d)
View Answer
Answer: a
Explanation: Cloud computing IDaaS applications must rely on a set of developing industry
standards to provide interoperability.
1. Any software application that complies with the standard accepts a that is authenticated
by a trusted provider.
a) OpenID
b) OpenUser
c) OpenSSD
d) None of the mentioned
View Answer
Answer: a
Explanation: When an identity is created in an OpenID system, that information is stored in the
system of any OpenID service provider and translated into a unique identifier.
2. Point out the wrong statement.
a) XML checks the ID request against its policies and either allows or denies the request
b) SPML in most instances operates as a reply/request mechanism
c) User centric authentication takes place usually in the form of knowledge cards
d) All of the mentioned
View Answer
Answer: b
Explanation: In SAML, a service provider passes a statement or set of statements (called assertions)
to an identity provider that must be evaluated.
3. Which of the following allows a distributed ID system to write and enforce custom
policy expressions?
a) XACML
b) XML
c) SOAP
d) None of the mentioned
View Answer
Answer: a
Explanation: This is a general-purpose authorization policy language.
4. is a standard of OASIS’s PSTC that conforms to the SOA architecture.
a) XACML
b) SPML
c) SML
d) All of the mentioned
View Answer
Answer: b
Explanation: SPML is an XML request/response language that is used to integrate and interoperate
service provisioning requests.
5. Point out the wrong statement.
a) Distributed transaction systems such as internetworks or cloud computing systems magnify
the difficulties faced by identity management systems
b) The Distributed Audit Service provides accountability for users accessing a system
c) The OpenID and CardSpace specifications support the authentication type of data object
d) None of the mentioned
View Answer
Answer: c
Explanation: OpenID is a developing industry standard for authenticating “end users” by storing
their digital identity in a common format.
6. Which of the following standard is concerned with the exchange and control of
identity information?
a) IGK
b) IDF
c) IGF
d) All of the mentioned
View Answer
Answer: c
Explanation: The Identity Governance Framework (IGF) is a standards initiative of the Liberty
Alliance.
7. is a Microsoft software client that is part of the company’s Identity Metasystem
and built into the Web Services Protocol Stack.
a) IHA
b) EHA
c) CardSpace
d) None of the mentioned
View Answer
Answer: c
Explanation: CardSpace was introduced with .NET Frameworks 3.0 and can be installed on
Windows XP, Server 2003, and later.
8. The Open Source Identity Framework is used to create a vendor-neutral cloud-
based authentication service.
a) Higgins
b) Hughes
c) Hinges
d) All of the mentioned
View Answer
Answer: a
Explanation: The Higgins Open Source Identity Framework uses an i-Card metaphor.
9. Which of the following is authorization markup language?
a) eXtensible Access Control Markup Language
b) intrinsic Access Control Markup Language
c) hypertext Access Control Markup Language
d) all of the mentioned
View Answer
Answer: a
Explanation: A policy in XACML describes a subject element that requests an action from a
resource.
10. Which of the following should come in place of question mark for the following figure?
a)
b)
c)
d) All of the mentioned
View Answer
Answer: a
Explanation: You can define the features in software and hardware that enables flexibility as
conforming to one or more of the mobility patterns.
2. Point out the wrong statement.
a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
b) Virtualization assigns a logical name for a physical resource and then provides a pointer to
that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be assigned
on demand to users
d) All of the mentioned
View Answer
Answer: c
Explanation: Several important cloud computing approaches use a strictly hardware-based approach
to abstraction.
3. Which of the following type of virtualization is also characteristic of cloud computing?
a) Storage
b) Application
c) CPU
d) All of the mentioned
View Answer
Answer: d
Explanation: To enable these characteristics, resources must be highly configurable and flexible.
4. The technology used to distribute service requests to resources is referred to as
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
View Answer
Answer: c
Explanation: Load balancing is an optimization technique.
5. Point out the correct statement.
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based on conditions
c) Computers can be partitioned into a set of virtual machines with each machine being assigned
a workload
d) All of the mentioned
View Answer
Answer: d
Explanation: Alternatively, systems can be virtualized through load-balancing technologies.
6. Which of the following software can be used to implement load balancing?
a) Apache mod_balancer
b) Apache mod_proxy_balancer
c) F6’s BigIP
d) All of the mentioned
View Answer
Answer: b
Explanation: Load balancing can be used to increase utilization and throughput, lower latency,
reduce response time, and avoid system overload.
7. Which of the following network resources can be load balanced?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
View Answer
Answer: d
Explanation: Load balancing provides the necessary redundancy to make an intrinsically unreliable
system reliable through managed redirection.
8. Which of the following is a more sophisticated load balancer?
a) workload managers
b) workspace managers
c) rackserve managers
d) all of the mentioned
View Answer
Answer: a
Explanation: They determine the current utilization of the resources in their pool.
9. A is a combination load balancer and application server that is a server placed between
a firewall or router.
a) ABC
b) ACD
c) ADC
d) All of the mentioned
View Answer
Answer: c
Explanation: An Application Delivery Controller is assigned a virtual IP address (VIP) that maps to
a pool of servers based on application specific criteria.
10. Which of the following should be replaced with the question mark in the following figure?
a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
View Answer
Answer: b
Explanation: Virtualization is a key enabler of the first four of five key attributes of cloud
computing.
1. Which type of Hypervisor is shown in the following figure?
a) Type 1
b) Type 2
c) Type 3
d) All of the mentioned
View Answer
Answer: a
Explanation: A hypervisor running on bare metal is a Type 1 VM or native VM.
2. Point out the wrong statement.
a) Load balancing virtualizes systems and resources by mapping a logical address to a
physical address
b) Multiple instances of various Google applications are running on different hosts
c) Google uses hardware virtualization
d) All of the mentioned
View Answer
Answer: c
Explanation: Google performs server load balancing to distribute the processing load and to get
high utilization rates.
3. Which of the following is another name for the system virtual machine?
a) hardware virtual machine
b) software virtual machine
c) real machine
d) none of the mentioned
View Answer
Answer: a
Explanation: Some virtual machines are designed to run only a single application or process and are
referred to as process virtual machines.
4. Which of the following provide system resource access to virtual machines?
a) VMM
b) VMC
c) VNM
d) All of the mentioned
View Answer
Answer: a
Explanation: VMM is another name for Hypervisor.
5. Point out the correct statement.
a) A virtual machine is a computer that is walled off from the physical computer that the
virtual machine
is running on
b) Virtual machines provide the capability of running multiple machine instances, each with
their own operating system
c) The downside of virtual machine technologies is that having resources indirectly
addressed means there is some level of overhead
d) All of the mentioned
View Answer
Answer: d
Explanation: This makes virtual machine technology very useful for running old versions of
operating systems, testing applications in what amounts to a sandbox.
6. An operating system running on a Type VM is full virtualization.
a) 1
b) 2
c) 3
d) All of the mentioned
View Answer
Answer: a
Explanation: Because it is a complete simulation of the hardware that it is running on.
7. Which of the following is Type 1 Hypervisor?
a) Wind River Simics
b) Virtual Server 2005 R2
c) KVM
d) LynxSecure
View Answer
Answer: d
Explanation: Type 1 VMs have no host operating system because they are installed on a bare
system.
8. Which of the following is Type 2 VM?
a) VirtualLogix VLX
b) VMware ESX
c) Xen
d) LynxSecure
View Answer
Answer: c
Explanation: Xen is used by Amazon Web Services to provide Amazon Machine Instances (AMIs).
9. Which of the following will be the host operating system for Windows Server?
a) VirtualLogix VLX
b) Microsoft Hyper-V
c) Xen
d) All of the mentioned
View Answer
Answer: b
Explanation: Type 2 virtual machines are installed over a host operating system.
10. Which of the following should be placed in second lowermost layer for the following figure?
a) replicas
b) shards
c) tenants
d) all of the mentioned
View Answer
Answer: c
Explanation: Clouds often have higher reliability than private systems.
9. Cloud are standardized in order to appeal to the majority of its audience.
a) SVAs
b) SLAs
c) SALs
d) None of the mentioned
View Answer
Answer: b
Explanation: Custom SLAs that allow for multiple data sources are difficult to obtain or enforce.
10. is a function of the particular enterprise and application in an on-
premises deployment.
a) Vendor lock
b) Vendor lock-in
c) Vendor lock-ins
d) None of the mentioned
View Answer
Answer: b
Explanation: Vendor lock-in for a cloud computing solution in a PaaS model is very high.
1. The term refers to a Network or Internet.
A. Cloud Computing
B. Cloud
C. Computing
D. CRM
View Answer
Ans : B
Explanation: The term Cloud refers to a Network or Internet.
4. In Virtualization, Which architecture offers virtual isolation among the multiple tenants?
A. IT Architecture
B. Multitenant
C. Deployment
D. Business Architecture
View Answer
Ans : B
Explanation: The Multitenant architecture offers virtual isolation among the multiple tenants.
Hence, the organizations can use and customize their application as though they each have their
instances running.
3. Which of the following refers to the client part of cloud computing system?
A. back End
B. Front End
C. Infrastructure
D. Management
View Answer
Ans : B
Explanation: The front end refers to the client part of cloud computing system. It consists of
interfaces and applications that are required to access the cloud computing platforms.
4. What is the example of Front End?
A. Amazon Web Services
B. Google Compute Engine
C. Cisco Metapod
D. Web Browser.
View Answer
Ans : D
Explanation: web browser is the example of Front End.
6. Both front end and back end are connected to others through a?
A. Network
B. Database
C. Browser
D. Both A and B
View Answer
Ans : A
Explanation: Both front end and back end are connected to others through a network, generally
using the internet connection.
10. Who provide GUI (Graphical User Interface) to interact with the cloud?
A. Client
B. Application
C. Client Infrastructure
D. Server
View Answer
Ans : C
Explanation: Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
1. The program which provide partitioning, isolation or abstraction is called?
A. virtualization hypervisor
B. software hypervisor
C. hardware hypervisor
D. system hypervisor
View Answer
Ans : A
Explanation: The program which provide partitioning, isolation or abstraction is called
virtualization hypervisor.
6. How many main modues coordinate in order to emiulate the undrelying hardware?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: There are 3 main modues coordinate in order to emiulate the undrelying hardware:
Dispatcher, Allocator and Interpreter.
7. Which of the following behaves like the entry point of the monitor and reroutes the
instructions of the virtual machine?
A. Dispatcher
B. Allocator
C. Interpreter
D. Both A and B
View Answer
Ans : A
Explanation: The dispatcher behaves like the entry point of the monitor and reroutes the instructions
of the virtual machine instance to one of the other two modules.
10. Which of the following operating system support operating system virtualization?
A. Windows NT
B. Sun Solaris
C. Windows XP
D. Compliance
View Answer
Ans : B
Explanation: This type of virtualization creates virtual servers at the operating system or kernel
level.
1. IaaS stands for?
A. IT-as-a-Service
B. Internet-as-a-Service
C. Infrastructure-as-a-Service
D. Interoperability-as-a-Service
View Answer
Ans : C
Explanation: IaaS stands for Infrastructure-as-a-Service.
2. VLANs and IP addresses resources are made available to end user via?
A. Server virtualization.
B. Client virtualization.
C. End-user virtualization.
D. IaaS
View Answer
Ans : A
Explanation: VLANs and IP addresses resources are made available to end user via server
virtualization.
6. The most commonly used model for discovery and description used with SOAP messaging
is the?
A. WSDL
B. VMc
C. DHML
D. SOA
View Answer
Ans : A
Explanation: The most commonly used model for discovery and description used with SOAP
messaging is the Web Services Description Language (WSDL).
8. How many types of virtual private server instances are partitioned in an IaaS stack?
A. 2
B. 3
C. 4
D. 5
View Answer
Ans : B
Explanation: The three workloads require three different sizes of computers: small, medium, and
large.
9. Which type of PaaS does not include licensing or technical dependencies on specific
SaaS applications?
A. Stand-alone development environments
B. Application delivery-only environments
C. Open platform as a service
D. Add-on development facilities
View Answer
Ans : A
Explanation: The stand-alone PaaS works as an independent entity for a specific function. It does
not include licensing or technical dependencies on specific SaaS applications.
2. A is an application that can display a Web page that shows data and supports
features from two or more sources.
A. workspace
B. workload
C. mashup
D. Multitenant
View Answer
Ans : C
Explanation: A mashup is an application that can display a Web page that shows data and supports
features from two or more sources.
10. SaaS supports multiple users and provides a shared data model through model.
A. single-tenancy
B. multi-tenancy
C. multiple-instance
D. None of the above
View Answer
Ans : B
Explanation: The alternative of software virtualization of individual instances also exists, but is less
common.
1. IDaaS stands for?
A. ID-as-a-Service
B. Identity-as-a-Service
C. Intranet-as-a-service
D. Interoperability-as-a-Service
View Answer
Ans : B
Explanation: To solve above problems, a new technique emerged which is known as Identity-as-a-
Service (IDaaS).
Answer: B
Explanation: Cloud computing is a computing technique in which applications are accessed by
common internet protocols and networking standards.
Answer: A
Explanation: Whenever any intranet becomes large enough in size that a diagram is not able to
differentiate the individual physical system, so at that stage intranet also becomes known as a cloud.
Hadoop can be considered as a cloud.
Answer: C
Explanation: Cloud Computing is a kind of new model for providing resources for applications
such as staging applications, platform-independent user access to services.
4) Which of the following has many features of that is now known as cloud computing?
1. Web Service
2. Softwares
3. All of the mentioned
4. Internet
Answer: D
Explanation: Internet provides the abstraction, runs through the same set of protocols and
standards, and uses the same operating system and applications.
5) Which one of the following cloud concepts is related to sharing and pooling the resources?
1. Polymorphism
2. Virtualization
3. Abstraction
4. None of the mentioned
Answer: B
Explanation: The application runs on physical systems that are not specified in real. The
information stored in the locations that are also not specified or unknown, administration of the
systems are outsourced to others and can be accessed by the user.
Answer: C
Explanation: Cloud computing is distinguished by the notion that resources are virtual and infinite
and describe the physical systems on which software runs in the abstracted manner from the user.
7) Which one of the following can be considered as a utility is a dream that dates from
the beginning of the computing industry itself?
1. Computing
2. Model
3. Software
4. All of the mentioned
Answer: A
Explanation: Cloud computing takes the technology, services, and applications that are similar to
those on the Internet and turns them into a self-service utility.
Answer: B
Explanation: Cloud computing hides all the detail of system implementation from users and
developers.
Answer: B
Explanation: Amazon web service is one of the most successful cloud-based businesses, which
offers infrastructure as a service and lets you rent virtual computers on its own infrastructure.
Answer: B
Explanation: A variety of issues, such as issues with latency, security, and regulatory compliance,
all are subject to concern. AWS is one of the most successful cloud-based businesses, which is a
type of infrastructure as a service and lets you rent virtual computers on its own infrastructure
Answer: C
Explanation: In the planning phase, we actually analyze the strategy related problems which
customers might face. There are usually two steps to perform the analysis: Cloud Computing
Planning and Cloud Computing Value Proposition.
12) In which one of the following, a strategy record or Document is created respectively to
the events, conditions a user may face while applying cloud computing mode.
1. Cloud Computing Value Proposition
2. Cloud Computing Strategy Planning
3. Planning Phase
4. Business Architecture Development
Answer: B
Explanation: Cloud Computing Strategy Planning: The establishment of the strategy is based on
the above step's analysis result. In this phase, a strategy document is prepared according to the
conditions faced by the customer while implementing the cloud computing mode
Answer: A
Explanation: Business Architecture Development: In this phase, we identify the risks that can be
caused by a cloud computing application from a business point of view.
4) Which one of the following refers to the non-functional requirements like disaster
recovery, security, reliability, etc.
1. Service Development
2. Quality of service
3. Plan Development
4. Technical Service
Answer: B
Explanation: Quality of service refers to the non-functional requirements such as reliability,
security, disaster recovery, etc.
Answer: D
Explanation: Deployment phase: This phase focuses on both steps. It consists of the following two
steps: Selecting a cloud computing provider, maintenance and technical service.
6) This phase involves selecting a cloud provider based on the Service Level Agreement
(SLA), which defines the level of service the provider receives.
1. Maintenance and Technical Service
2. Selecting Cloud Computing Provider
3. Both A and B
4. None of the above
Answer: B
Explanation: This phase involves selecting a cloud provider based on the Service Level Agreement
(SLA), that defines the level of service the provider receives.
Answer: B
Explanation: IT Architecture Development steps in Planning Phase
8) Which of the model involves the special types of services that users can access on a
Cloud Computing platform?
1. Service
2. Planning
3. Deployment
4. Application
Answer: A
Explanation: The service model contains the specials types of services that users can access on a
cloud computing platform.
Answer: A
Explanation: Insourced or Outsourced means whether the service is provided by the customer or
the service provider.
Answer: B
Explanation: In Cloud Computing Planning, there are usually three phases that are Strategy Phase,
Planning Phase, and Deployment Phase.
This set of the following Multiple Choice Questions (MCQ's)
focuses on the Cloud Computing Architecture.
1) Cloud computing architecture is a combination of?
1. service-oriented architecture and grid computing
2. Utility computing and event-driven architecture.
3. Service-oriented architecture and event-driven architecture.
4. Virtualization and event-driven architecture.
Answer: C
Explanation: Cloud computing architecture is a combination of service-oriented architecture and
event-driven architecture.
Answer: C
Explanation: The architecture of the Cloud can broadly be divided into two main parts that are
Back-end and Front-end.
3) Which one of the following refers to the user's part of the Cloud Computing system?
1. back End
2. Management
3. Infrastructure
4. Front End
Answer: D
Explanation: It is the front-end that refers to the user's part of the cloud computing system. It
includes many applications and interfaces that are required to access or use the cloud computing
platform.
4) Which one of the following can be considered as the example of the Front-end?
1. Web Browser
2. Google Compute Engine
3. Cisco Metapod
4. Amazon Web Services
Answer: A
Explanation: From the following given options, we can consider the Web-browser as the perfect
example of the Front-end.
Answer: D
Explanation: It is commonly used by the service provider in order to manage all resources required
to provide the Cloud Computing Services.
6) Through which, the backend and front-end are connected with each other?
1. Browser
2. Database
3. Network
4. Both A and B
Answer: C
Explanation: Typically using an internet connection, both the front and back end are connected to
the others through a network.
7) How many types of services are there those are offered by the Cloud Computing to the
users? 1. 2
2. 4
3. 3
4. 5
Answer: C
Explanation: Usually, Cloud Computing offers three types of services to the users that are Platform
as a service (or PaaS), Application as a service (or AssS), and Software as a service (or SaaS).
8) The Foce.com and windows Azure are examples of which of the following?
1. IaaS
2. PaaS
3. SaaS
4. Both A and B
Answer: B
Explanation: Both Force.com and Windows Azure are examples of the Platform as a service
9) Which of the following is one of the backend's built-in components of cloud computing?
1. Security
2. Application
3. Storage
4. Service
Answer: A
Explanation: Security is one of the back-end's built-in components of cloud computing.
10) Which of the following provides the Graphic User Interface (GUI) for interaction with
the cloud?
1. Client
2. Client Infrastructure
3. Application
4. Server
Answer: B
Explanation: The Client Infrastructure is one of the front-end components that provide the way of
communication in the form of a Graphic User Interface to communicate with the Cloud.
Answer: D
Explanation: Several technologies work behind the Cloud Computing platforms, which provide
features like Flexibility, reliability, and usability to cloud computing.
2) Which one of the following is a kind of technique that allows sharing the single physical
instance of an application or the resources among multiple organizations/customers?
1. Virtualization
2. Service-Oriented Architecture
3. Grid Computing
4. Utility Computing
Answer: A
Explanation: Virtualization is a kind of technique that allows us to share the single physical
instance of a resource or application between several organizations/users.
Answer: A
Explanation: It provides a logical name to the physical resource when the demand is correct
regarding virtualization and provides an indicator of that physical resource.
4) In Virtualization, which architecture provides the virtual isolation between the several tenants?
1. IT Architecture
2. Multitenant
3. Deployment
4. Business Architecture
Answer: B
Explanation: The Multitenant architecture provides us the virtual isolation in between several
tenants. Hence the organization can easily use and also modify their application as they each have
their instances running.
Answer: D
6) Which one of the following statement is true about the Service-Oriented Architecture?
1. It is possible to exchange data between applications from different vendors without
using additional programming.
2. It provides computational resources on-demand as a metered service.
3. Service-Oriented Architecture allows using the application as a service for
other applications.
4. Both A and C
Answer: D
Answer: C
8) Managed IT services are based on the concept of which one of the following?
1. Virtualization
2. Utility Computing
3. Grid Computing
4. SOA
Answer: B
9) Which one of the following refers to the Distributed Computing, in which several sets of
computers distributed on multiple geographical locations and are connected with each other
to achieve a common goal?
1. Virtualization
2. SOA
3. Grid Computing
4. Utility Computing
Answer: C
10) Which one of the following statement is true about Grid Computing?
1. Pieces combine small tasks into complex tasks
2. The subscription tier plays an important role in grid computing.
3. Breaks complex tasks into small operations
4. Both A and C
Answer: C
Answer: D
2) On which one of the following hypervisor runs directly on the underlying host system, it is
also known as ?
1. Bare metal hypervisor
2. Hosted Hypervisor
3. Native Hypervisor
4. Both A and C
Answer: D
3) Which of the following behaves like the monitor's entry point and reroutes the instructions of
the virtual machine?
1. Dispatcher
2. Allocator
3. Interpreter
4. Both A and B
Answer: A
Answer: B
Answer: D
7) How many main modules are needed to coordinate in order to emulate the underlying
hardware? 1. 3
2. 2
3. 4
4. 5
Answer: A
Answer: D
9) The Parallels Desktop can be considered as the example of which of the following?
1. TYPE-2 Hypervisor
2. DISPATCHER
3. TYPE-1 Hypervisor
4. INTERPRETER
Answer: A
Answer: C
Answer: A
12) Which one of the following can be considered as the example of the Type2 Virtual
Machine monitors?
1. KVM
2. Microsoft Hyper V
3. Parallels Desktop
4. All of the above
Answer: D
13) Which one of the following is a type of software that supports the virtual machine?
1. Kernel
2. Hypervisor
3. VMM
4. Both B and C
Answer: D
Answer: B
15) Which one of the following is the type of a service that manages and creates virtual
network interfaces?
1. VMware vStorage
2. Application services
3. VMware vCompute
4. VMware vNetwork
Answer: D
16) In which one of the following, the virtual machine simulates hardware, through which it can
be independent of the underlying system hardware?
1. Para-virtualization
2. Full virtualization
3. Emulation
4. None of the above
Answer: C
17) Which one of the following will be the host operating system for Windows Server?
1. VirtualLogix VLX
2. Microsoft Hyper-V
3. Xen
4. All of the above
Answer: B
Answer: D
19) Which one of the following can be considered as another name of Virtual Machine?
1. Software virtual machine
2. Real machine
3. process virtual machine
4. Virtualization hypervisor
Answer: C
Answer: C
2) Through which one of the following models, SaaS supports multiple users and offers a
shared data model?
1. single-tenancy
2. multiple-instance
3. multi-tenancy
4. None of the above
Answer: C
Answer: D
Answer: C
6) Which one of the following statements can be considered as the true characteristics of
software as a Service (SaaS) model?
1. Software applications are generally maintained by the service provider (or vendor)
2. SaaS provides the best cost-effective applications because they do not need any
maintenance at the customer side.
3. They can easily scale up or scale down according to the conditions.
4. All of the above
Answer: D
Answer: D
8) Which one of the following can be considered as the most complete cloud computing
service model?
1. PaaS
2. IaaS
3. CaaS
4. SaaS
Answer: D
Answer: C
10) Which one of the following statements is not true about SaaS?
1. SaaS applications are offered in all shapes and sizes.
2. All users with a little knowledge or know how to operate a computer also know about
the SaaS.
3. SaaS software is not customizable.
4. None of the above
Answer: D
Answer: D
Answer: D
3) Which one of the following is a type of PaaS that usually allows customizing the existing
SaaS platform?
1. Stand-alone development environments
2. Add-on development facilities
3. Open Platform as a service
4. Application delivery-only environments
Answer: B
4) Which one of the following of PaaS type that involves on-demand scaling and
application security?
1. Stand-alone development environments
2. Open Platform as a service
3. Application delivery-only environments
4. Add-on development facilities
Answer: C
Answer: A
Answer: C
Answer: D
Answer: B
10) Which one of the following statements is correct about the PaaS?
1. The platform as a service (or PaaS) systems usually support standards like
JavaScript, HTML, and several other rich media technologies.
2. Platform as a service provides the runtime environment for the applications.
3. The platform as a service is a completely integrated development environment.
4. All of the above
Answer: D
Answer: B
2) The resources like IP addresses and VLANs are provided to the end-users by which of
the following?
1. Server virtualization.
2. Client virtualization.
3. End-user virtualization.
4. IaaS
Answer: A
Explanation: Resources such as the IP addresses and VLANs are offered to the end-users through
the server virtualization.
Answer: C
5) How many kinds of virtual private server instances are there partitioned in the IaaS
stack? 1. 3
2. 2
3. 4
4. 5
Answer: A
6) Which of the following forms the basis for almost all web services stacks?
1. WSDL
2. SOAP
3. UDDI
4. VMCC. SOA
Answer: B
7) Which of the following is the most commonly used model for description and discovery and
is also used with SOAP messaging?
1. DHML
2. VMC
3. WSDL
4. SOA
Answer: C
8) The Infrastructure as a service (IaaS) provides a type of isolated environment to each
customer individually by using .
1. renting
2. virtual machine sprawl
3. security vulnerabilities
4. hypervisor
Answer: D
Answer: C
Answer: D
Answer: A
3) Which of the following is a type of XML request or response language commonly used
to integrate and interrupt services that handle requests?
1. XACML
2. FIDM
3. SSP
4. SPML
Answer: D
4) In order to provide more secure authentication, which of the following is required at least?
1. three-factor authentication.
2. two -factor authentication.
3. four-factor authentication.
4. None of the above
Answer: B
Explanation: In order to provide more secure authentication, the two-factor authentication is
required at least.
Answer: A
6) Which one of the following statements is correct about the FIDM?
1. SAML have access control
2. It typically uses the Security Markup Language (SAML) for packaging the user's
security credentials.
3. It describes the protocols and technologies.
4. All of the above
Answer: D
7) Which of the following allows the users to login into a several different websites with the
same single account ?
1. OpenID
2. FIDM
3. SSO
4. Identity
Answer: A
Answer: C
9) Among the following, which one has the single authentication server and manages
multiple accesses to the other systems?
1. SOAP
2. IDaaS
3. SSO
4. SOA
Answer: C
Answer: D
Answer: B
2) model consists of the particular types of services that you can access on a
cloud computing platform.
1. Service
2. Deployment
3. Application
4. None of the mentioned
Answer: A
Answer: B
Explanation: Abstraction and virtualization are the two essential concepts.
Answer: D
`
Answer: B
Answer: D
7) The model originally did not require a cloud to use virtualization to pool resources.
1. NEFT
2. NIST
3. NIT
4. All of the mentioned
Answer: B
Answer: A
Answer: D
Answer: C
Multiple-choice Questions Based on the Cloud Type-2.
1) A hybrid cloud combines multiple clouds where those clouds retain their unique identities but
are bound together as a unit.
1. Public
2. Private
3. Community
4. Hybrid
Answer: D
Answer: A
Answer: A
`
4) How many types of security threshold values are actually present in the cloud cube
model? 1. 1
2. 2
3. 3
4. None of the mentioned
Answer: B
`
5) Which of the following is offered by the ownership dimension of the Cloud Cube Model?
1. Proprietary
2. Owner
3. P
4. All of the mentioned
Answer: B
`
6) Which of the following is a measure of knowing whether the operation is inside or outside
the security limits?
1. Per
2. P
3. Pre
4. All of the mentioned
7) Which one of the following is related to the services offered by the Cloud?
1. Sourcing
2. Ownership
3. Reliability
4. AaaS
Answer: A
`
8) Which one of the following dimensions corresponds to two different states in the possible
eight cloud forms?
1. The physical location of data
2. Ownership
3. Security boundary
4. None of the mentioned
Answer: D
9) Which one of the following options is correct cloud infrastructure operated for the exclusive
use of an organization?
1. Public
2. Private
3. Community
4. All of the mentioned
Answer: B
10) Which one of the following is a type of the Cloud that is organized in such a way to serve
the common purpose or the functions?
1. Public
2. Private
3. Community
4. All of the mentioned
Answer: C
Answer: B
.
2) Which one of the following provides the resources or services such as the virtual
infrastructure, virtual machines, virtual storage, and several other hardware assets?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: A
3) Which one of the following offers the control structures and development frameworks?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: A
Answer: C
5) Which one of the following was owned by an organization that sells cloud services?
1. Hybrid
2. Private
3. Community
4. Public
Answer: D
.
6) Find out which one can be considered the complete operating environment with
applications, management?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: B
7) Which one of the following is considered a type of cloud computing model involving the
three different service models together?
1. CPI
2. SIP
3. SPI
4. All of the mentioned
Answer: A
Answer: D
Answer: D
Answer: B
3) Which of the following benefits is related to creating stored resources together in a system
that supports multi-tenant use?
1. On-demand self-service
2. Extensive network access
3. Resource pooling
4. All of the above
Answer: A
4) Which one of the following is something that a user can obtain it under the contract from
his/her vendor?
1. PoS
2. SoS
3. QoS
4. All of the mentioned
Answer: C
5) All cloud computing applications suffer from the inherent that is intrinsic in their WAN
connectivity.
1. Propagation
2. Latency
3. Noise
4. All of the mentioned
Answer: B
6) Which of the following architectural standards is working with the cloud computing industry?
1. Service-oriented architecture
2. Standardized Web services
3. Web-application frameworks
4. All of the mentioned
Answer: A
7) Which one of the following is the most important subject of concern in cloud computing?
1. Security
2. Storage
3. Scalability
4. All of the mentioned
Answer: A
8) You cannot rely on a cloud provider for maintaining its in the event of government work.
1. Scalability
2. Reliability
3. Privacy
4. None of the mentioned
Answer: C
Answer: A
10) feature allows you to optimize your system and capture all possible transactions.
1. Scalability
2. Reliability
3. Elasticity
4. none of the mentioned
Answer: C
Answer: A
12) Which of the following is the most refined and restrictive service model?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned
Answer: C
13) When you add a software stack, such as an operating system and applications to the service,
the model shifts to model.
1. SaaS
2. PaaS
3. IaaS
4. All of the mentioned
Answer: A
Answer: C
15) Service that generally focuses on the hardware follows which one of the following
service models?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned
Answer: A
16) Which of the following types of applications works with cloud computing that has low
risks, low margins?
1. High touch
2. Low touch
3. Moderate touch
4. All of the mentioned
Answer: B
Answer: C
Answer: C
1. What second programming language did Google add for App Engine
development?
A. C++
B. Flash
C. Java
D. Visual Basic
Ans:C
6. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working Group
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
ANS:B
8. What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics
ANS:A
12. Which vendor recently launched a cloud-based test and development service
for enterprises?
A. HP
B. Cisco
C. IBM
D. Oracle
ANS:C
14. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service
ANS:C
15. Cloud computing networks are designed to support only private or hybrid
clouds.
A. True
B. False
Ans: B
17. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True
B. False
Ans: B
18. The typical three-layer switching topology will not create latency within a
cloud network.
A. True
B. False
Ans: B
23. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service (SAAS)
B. Platform as a Service (PAAS)
C. Infrastructure as a Service (IAAS)
A.ns:C
27. Which of the following statements about Google App Engine (GAE) is
INCORRECT.
A. It's a Platform as a Service (PaaS) model.
B. Automatic Scalability is built in with GAE. As a developer you don't need to worry
about application scalability
C. You can decide on how many physical servers required for hosting your application.
D. The applications deployed on GAE have the same security, privacy and data protection policies
as that of Google's applications. So, applications can take advantage of reliability, performance
and security of Google's infrastructure.
Ans:C
28. I've a website containing all static pages. Now I want to provide a simple
Feedback form for end users. I don't have software developers, and would like
to spend minimum time and money. What should I do?
A. Hire software developers, and build dynamic page.
B. Use ZOHO creator to build the required form, and embed in html page.
C. Use Google App Engine (GAE) to build and deploy dynamic
page. Ans:B
29. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working.
B. Cloud Security Alliance.
C. Cloud Security WatchDog.
D. Security in the Cloud Alliance.
Ans:B
35. What is the name of the organization helping to foster security standards for
cloud computing?
A. Cloud Security Standards Working
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
Ans: B
38. Which company recently shut the doors on its cloud storage service?
A. Hitachi Data Systems
B. Savvis
C. Iron Mountain
D. Symantec
Ans: C
47. IBM, EMC and Boeing Co. were among the companies signing what
document whose title is reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Ans: D
49. Link the cloud-based service on the left with the desktop or server
application it is designed to displace on the right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-
rela- tionship management
D. Amazon EC24. Backup disk
Ans: A
50. What August event was widely seen as an example of the risky nature of
cloud computing?
A. Spread of Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
Ans: B
UNIT-1 Questions
1. Which of the following advantages’ is not true about traditional server concept?
%1.0 Easy to conceptualize
%2.0 Deployment is easy
%3.0 Difficult to backup
%4.0 Virtually any application/service can be run from this type of setup
2. Which Cloud service model has got the maximum privileges to the user?
Q IaaS
R PaaS
S SaaS
T None of these
3. Which of the following is a type of computing technology in which various services and applications
runs on a distributed network and makes use of virtualized resources?
Q Parallel Computing
R Grid Computing
S Cloud Computing
T Utility Computing
4. The architecture of the Cloud is majorly divided into ____ parts.
E. 5
F. 4
G. 3
H. 2
5. ____and _____ are examples of Platform as a Service (PaaS) model?
E. The Foce.com and windows Azure
F. Gmail and Zoom
G. Salesforce and Dropbox
H. Netflix and Amazon Prime
6. Which one of the following is not an example of the Type2-Hypervisor?
E. VMware Player
F. VMware ESXi
G. Oracle VirtualBox
H. VMware Workstation
7.________supports the Infrastructure as a Service (IaaS) cloud service model?
E. EC5
F. EC4
G. EC3
H. EC2
8. What are the different operations involved in VSAN?
F. Virtual SAN Cluster
G. Disk Groups and Virtual SAN Data Store
H. Booting and Data Transfer
I. Both (a) and (b)
9. _________is the ability to migrate an application from one cloud service to another or between a
customer’s environment and a cloud service.
E. Cloud application portability
F. Switching cloud service providers
G. Directly linked cloud services
H. Hybrid cloud configuration
10. Pick up the wrong statement about VSAN?
E. A software-defined storage provisions and manages storage based on policies, regardless
of the underlying hardware.
F. It is a storage product that is used in collaboration with VMware ESXi hypervisor.
G. It does not use the object-based storage architecture where each object represents a
block of data within the underlying Virtual Machine (VM)
H. VSAN reduces the cost and complexity.
11. Which of the following statement is the exact definition of type 1 hypervisor?
E. A hypervisor runs on the host system without an OS.
F. A host OS is installed on the host system and a hypervisor runs on it.
G. A hypervisor runs on the host system with an OS.
H. A host OS is installed on the host system and a hypervisor does not run on it.
12. Which of the following types of virtualization involves the modification of OS kernel?
F. Application Virtualization
G. Para Virtualization
H. Storage Virtualization
I. Network Virtualization
13. Imagine you have 3 physical servers with individual dedicated purposes. One is a mail server,
another is a web server, and the last one runs internal legacy applications. Which technology would be
best opted for the maximum utilization so that instead of having dedicated servers we can make use of
all them into one?
E. Cloud Computing
F. Virtualization
G. Triple Booting
H. Grid Computing
14._______ virtualization is the process of grouping physical storage using software to represent what
appears to be a single storage device in a virtual format.
E. Network
F. Storage
G. Client
H. Application
15. Which of the following is not a benefit of Virtualization?
16. A ___ is a group of devices on one or more LANs that are configured to communicate as if they
were attached to the same wire, when in fact they are located on a number of different ____segments.
D. VSAN, SAN
E. VLAN, SAN
F. VSAN, LAN
G. VLAN, LAN
17. Select the appropriate phase which involves the selection of a cloud vendor based on the Service Level
Agreement (SLA), and then defines the level of service the provider receives.
18. What is that model called which makes use of pay-as-you-go feature and matches the resources that
you are required.
E. Scalability
F. Utility
a) VMware Hyperic
b) Univa UD
c) Web metrics
d) Tapinsystems
a) errors
b) inconsistencies
c) risk
d) none of the mentioned
12. Which computing model is used for decreasing the complexity of computing
systems and thus seeks to improve systems by decreasing human involvement
in their operation
a) Utility
b) Grid
c) Cloud
d) Autonomic
13. What is false about 5th Iterative step (Augment) of seven step model for
migration into cloud?
a) It deals with Bandwidth
b) It deals with Security
c) Mapping the libraries and runtime approximation
d) Seek Low-cost augmentations
14. Which of the following is not a risk in cloud computing?
a) Compliance
b) Changes
c) Privacy
d) Measured Service
15. Which one of the following is not considered as a challenge in cloud
computing?
a) Security Issues
b) On- demand self service
c) Performance
d) Lack of resources/expertise
16. An OVF package cannot be used by:
a) an independent software vendor (ISV) to publish a software solution
b) a client to a software solution
c) a customer to archive a software solution
d) other use case that can be met by having a standardized package for a
software solution
17. Select the wrong statement
a) ESXi provides a virtualization layer that abstracts the CPU, storage,
memory and networking resources of the physical host into multiple
virtual machine.
b) ESXi is supported on Intel processors (Xeon and above) and AMD
Opteron processors.
c) ESXi support up to 2,096 virtual processors per host, 30 logical CPUs
per host, 15 virtual machines per host and up 2 GB of RAM per host.
d) ESXi can be installed on a hard disk, USB device, or SD card
18. ____ defines a way to make software components reusable via service
interfaces.
a) service-computing architecture
b) service-oriented architecture
c) service-level architecture
d) service-managed architecture
19. Which model from the following acts as one of the roots for cloud
computing model?
a) Grid Computing
b) Utility Computing
c) Autonomic Computing
d) All the mentioned above
20. From the following choose the common characteristic a cloud should have:
a) pay-per-use (no ongoing commitment, utility prices)
b) elastic capacity and the illusion of infinite resources
c) resources that are abstracted or virtualized
d) All the mentioned above
UNIT-III Questions
6. When you have___ as your cloud stack you lose a little control over the
applications
a) PaaS
b) SaaS
c) IaaS
d) CaaS
7. Which is the role of cloud usage monitor from the following statements?
a) It can carry out run time tracking and data processing
b) It is used for monitoring the system as may be required to fulfil
legal requirements
c) It is used to manage workloads and virtual hosts that require
distribution
d) It is used to support work load balancing between cluster nodes
8. What is the name of that architecture which is used for billing the cloud
storage based on an actual usage, rather than fluctuating storage
consumption?
a) Elastic disk provisioning
b) Work load distribution
c) Cloud burst
d) Cloud capacity planning
10. What is the name of the technology which is used to distribute various
service requests to the multiple resources?
a) Load scheduling
b) Load balancing
c) Load performing
d) Load manipulating
11. Choose the correct option from the following that specifies the parameter
of SLA?
a) Responsibilities of each party
b) Response times and Warranties
c) Both (b) and (c)
d) All of the mentioned
12.
1) What type of computing technology refers to services and applications that
typically run on a distributed network through virtualized resources? 1
1. Distributed Computing
2. Cloud Computing
3. Soft Computing
4. Parallel Computing
Answer: B
1. Hadoop
2. Intranet
3. Web Applications
4. All of the mentioned
Answer: A
1. Real
2. Cloud
3. Virtual
4. none of the mentioned
Answer: C
4) Which of the following has many features of that is now known as cloud
computing?
1. Web Service
2. Softwares
3. All of the mentioned
4. Internet
Answer: D
Explanation: Internet provides the abstraction, runs through the same set of protocols
and standards, and uses the same operating system and applications.
5) Which one of the following cloud concepts is related to sharing and pooling the
resources?
1. Polymorphism
2. Virtualization
3. Abstraction
4. None of the mentioned
Answer: B
Explanation: The application runs on physical systems that are not specified in real.
The information stored in the locations that are also not specified or unknown,
administration of the systems are outsourced to others and can be accessed by the
user.
Answer: C
7) Which one of the following can be considered as a utility is a dream that dates from
the beginning of the computing industry itself?
1. Computing
2. Model
3. Software
4. All of the mentioned
Answer: A
1. Reliability
2. Abstraction
3. Productivity
4. All of the mentioned
Answer: B
1. Azure
2. AWS
3. Cloudera
4. All of the mentioned
Answer: B
1. Through cloud computing, one can begin with very small and become big in a
rapid manner.
2. All applications benefit from deployment in the Cloud.
3. Cloud computing is revolutionary, even though the technology it is built on is
evolutionary.
4. None of the mentioned
Answer: B
Explanation: A variety of issues, such as issues with latency, security, and regulatory
compliance, all are subject to concern. AWS is one of the most successful cloud-based
businesses, which is a type of infrastructure as a service and lets you rent virtual
computers on its own infrastructure.
Answer: C
Explanation: In the planning phase, we actually analyze the strategy related problems
which customers might face. There are usually two steps to perform the analysis:
Cloud Computing Planning and Cloud Computing Value Proposition.
Answer: B
Answer: A
4) Which one of the following refers to the non-functional requirements like disaster
recovery, security, reliability, etc.
1. Service Development
2. Quality of service
3. Plan Development
4. Technical Service
Answer: B
Answer: D
6) This phase involves selecting a cloud provider based on the Service Level
Agreement (SLA), which defines the level of service the provider receives.
Answer: B
1. Strategy Phase
2. Planning Phase
3. Deployment Phase
4. Development Phase
Answer: B
8) Which of the model involves the special types of services that users can access on a
Cloud Computing platform?
1. Service
2. Planning
Answer: A
Explanation: The service model contains the specials types of services that users can
access on a cloud computing platform.
1. Sourcing
2. Ownership
3. Reliability
4. PaaS
Answer: A
1. 2
2. 3
3. 4
4. 5
Answer: B
Explanation: In Cloud Computing Planning, there are usually three phases that are
Strategy Phase, Planning Phase, and Deployment Phase.
Answer: C
2) In how many parts we can broadly divide the architecture of the Cloud?
1. 4
2. 3
3. 2
4. 5
Answer: C
Explanation: The architecture of the Cloud can broadly be divided into two main
parts that are Back-end and Front-end.
3) Which one of the following refers to the user's part of the Cloud Computing
system?
1. back End
2. Management
3. Infrastructure
4. Front End
Answer: D
Explanation: It is the front-end that refers to the user's part of the cloud computing
system. It includes many applications and interfaces that are required to access or use
the cloud computing platform.
4) Which one of the following can be considered as the example of the Front-end?
1. Web Browser
2. Google Compute Engine
3. Cisco Metapod
4. Amazon Web Services
Answer: A
1. Client
2. User
3. Stockholders
4. service provider
Answer: D
6) Through which, the backend and front-end are connected with each other?
Answer: C
Explanation: Typically using an internet connection, both the front and back end are
connected to the others through a network.
7) How many types of services are there those are offered by the Cloud Computing to
the users?
1. 2
2. 4
3. 3
4. 5
Answer: C
8) The Foce.com and windows Azure are examples of which of the following?
1. IaaS
2. PaaS
3. SaaS
4. Both A and B
Answer: B
1. Security
2. Application
3. Storage
4. Service
Answer: A
10) Which of the following provides the Graphic User Interface (GUI) for interaction
with the cloud?
1. Client
2. Client Infrastructure
3. Application
4. Server
Answer: B
1. Virtualization
2. SOA
3. Grid Computing
4. All of the above
Answer: D
2) Which one of the following is a kind of technique that allows sharing the single
physical instance of an application or the resources among multiple
organizations/customers?
1. Virtualization
2. Service-Oriented Architecture
3. Grid Computing
4. Utility Computing
Answer: A
Answer: A
Explanation: It provides a logical name to the physical resource when the demand is
correct regarding virtualization and provides an indicator of that physical resource.
1. IT Architecture
2. Multitenant
3. Deployment
4. Business Architecture
Answer: B
Answer: D
Answer: D
1. heterogeneous dispersed.
2. geographically dispersed.
3. Both A and B
4. None of the above
Answer: C
Explanation: In grid computing, heterogeneous types of resources are used that are
geographically dispersed.
8) Managed IT services are based on the concept of which one of the following?
1. Virtualization
2. Utility Computing
3. Grid Computing
4. SOA
9) Which one of the following refers to the Distributed Computing, in which several
sets of computers distributed on multiple geographical locations and are connected
with each other to achieve a common goal?
1. Virtualization
2. SOA
3. Grid Computing
4. Utility Computing
Answer: C
10) Which one of the following statement is true about Grid Computing?
Answer: C
Explanation: Grid computing breaks down complex tasks into smaller pieces, which
are distributed to the CPU residing within the grid.
1. System hypervisor
2. Software hypervisor
3. Hardware hypervisor
4. Virtualization hypervisor
Answer: D
2) On which one of the following hypervisor runs directly on the underlying host
system, it is also known as________?
Answer: D
3) Which of the following behaves like the monitor's entry point and reroutes the
instructions of the virtual machine?
1. Dispatcher
2. Allocator
Answer: A
Explanation: The Dispatcher acts as the monitor's entry point and reruns the
instructions (statements) of the virtual machine instance to one of the other two
modules.
1. VMA
2. VMM
3. VMS
4. VMR
Answer: B
Explanation: A Virtual Machine Monitor (or VMM) is sometimes also known as the
Hypervisor.
1. 4
2. 3
3. 2
4. 5
Answer: C
Explanation: There are only two kinds of Hypervisors that are Type1-Hypervisor and
Type2-Hypervisor.
1. VMware ESXi
2. Citrix XenServer
3. Microsoft Hyper-V hypervisor
4. VMware Player
Answer: D
7) How many main modules are needed to coordinate in order to emulate the
underlying hardware?
1. 3
2. 2
3. 4
4. 5
Answer: A
Explanation: In order to emulate the underlying hardware, there are three main
modules needed to coordinate, which are as follows:
Interpreter
Allocator
Dispatcher
1. INTERPRETER
2. TYPE-2 Hypervisor
3. Both A and B
4. DISPATCHER
Answer: D
9) The Parallels Desktop can be considered as the example of which of the following?
1. TYPE-2 Hypervisor
2. DISPATCHER
3. TYPE-1 Hypervisor
4. INTERPRETER
Answer: A
Answer: C
Answer: A
Explanation: Google performs the load balancing for distributing the processing load
in order to achieve high utilization rates.
12) Which one of the following can be considered as the example of the Type2
Virtual Machine monitors?
1. KVM
2. Microsoft Hyper V
3. Parallels Desktop
4. All of the above
Answer: D
Explanation: KVM, Microsoft Hyper V, and Parallels Desktop for Mac are examples
of the Type2 Virtual Machine Monitors.
13) Which one of the following is a type of software that supports the virtual
machine?
1. Kernel
2. Hypervisor
3. VMM
4. Both B and C
Answer: D
Explanation: The VMM and kernel both are a kind of software that supports the
Virtual Machine.
1. Azure
2. AWS EC2
3. C AWS EC3
4. All of the above
Answer: B
15) Which one of the following is the type of a service that manages and creates
virtual network interfaces?
1. VMware vStorage
2. Application services
3. VMware vCompute
4. VMware vNetwork
Answer: D
16) In which one of the following, the virtual machine simulates hardware, through
which it can be independent of the underlying system hardware?
Answer: C
17) Which one of the following will be the host operating system for Windows
Server?
1. VirtualLogix VLX
2. Microsoft Hyper-V
3. Xen
4. All of the above
Answer: B
1. Type4
2. Type2
3. Type3
4. Type1
Answer: D
Answer: C
Explanation: Some kinds of Virtual Machines are specially designed so that they can
able to run only a single process or application. Hence, these kinds of virtual machines
are referred as the process Virtual Machines.
1. Storage-as-a-Service
2. Server-as-a-Software
3. Software-as-a-Service
4. None of the above
Answer: C
Explanation: The term "SaaS" stands for the "Software as a Service," a type of model
that allows to offer Software application as a service for the customers. For Example:
MailChimp, Google Apps, Dropbox, Salesforce, etc
2) Through which one of the following models, SaaS supports multiple users and
offers a shared data model?
1. single-tenancy
Answer: C
Answer: D
Answer: C
Answer: D
Explanation: There are many issues associated with the SaaS (Software as a Service),
such as Lack of portability between SaaS clouds, Web-browser related issues, and
Network dependence.
6) Which one of the following statements can be considered as the true characteristics
of software as a Service (SaaS) model?
Answer: D
Explanation: All the statements provided in the above question are the characteristics
of the SaaS or Software as a Service model.
Answer: D
8) Which one of the following can be considered as the most complete cloud
computing service model?
1. PaaS
2. IaaS
3. CaaS
4. SaaS
Answer: D
Explanation: The most complete cloud computing service model must contain the
computing hardware and software, as well as the solution itself. Hence the SaaS
model has all these features.
1. Closed
2. Free
3. Open
4. all of the mentioned
Answer: C
10) Which one of the following statements is not true about SaaS?
Answer: D
Answer: D
Answer: D
Explanation: The main problem with the "Platform as a service" (or PaaS) is that it
normally tie the developer and the customer in such a solution, in which both the
developer and customers have to depend on the platform vendor.
3) Which one of the following is a type of PaaS that usually allows customizing the
existing SaaS platform?
Answer: B
4) Which one of the following of PaaS type that involves on-demand scaling and
application security?
Answer: C
1. 4
2. 3
3. 2
4. 5
Answer: A
Answer: D
1. CAS
2. CDSS
3. CCS
4. CDA
1. Youtube
2. Google Earth
3. Google Adsense
4. Google Maps
Answer: D
Explanation: In most cases, vendors of PaaS solutions are the developer who
provides a complete solution to the customer.
Answer: B
Explanation: The customer is generally responsible only for his interaction with the
Platform.
10) Which one of the following statements is correct about the PaaS?
1. The platform as a service (or PaaS) systems usually support standards like
JavaScript, HTML, and several other rich media technologies.
2. Platform as a service provides the runtime environment for the applications.
Provided BY Waris Ali
3. The platform as a service is a completely integrated development environment.
4. All of the above
Answer: D
Explanation: All statements mentioned in the above questions are true about the
PaaS, so that the correct option will be the D.
1. IT-as-a-Service
2. Infrastructure-as-a-Service
3. Internet-as-a-Service
4. Interoperability-as-a-Service
Answer: B
2) The resources like IP addresses and VLANs are provided to the end-users by which
of the following?
1. Server virtualization.
2. Client virtualization.
3. End-user virtualization.
4. IaaS
Answer: A
Explanation: Resources such as the IP addresses and VLANs are offered to the end-
users through the server virtualization.
1. SOAP
2. WSDL
3. DHML
4. SIMPLE
Answer: D
1. structured
2. unstructured
3. Both A and B
4. None of the above
Answer: C
5) How many kinds of virtual private server instances are there partitioned in the IaaS
stack?
1. 3
2. 2
3. 4
4. 5
Answer: A
Provided BY Waris Ali
Explanation: There are only three types of workloads that need three different sizes
of computers, such as large, medium, and small.
6) Which of the following forms the basis for almost all web services stacks?
1. WSDL
2. SOAP
3. UDDI
4. VMCC. SOA
Answer: B
Explanation: The term "SOAP" stands for the Simple Object Access Protocol, and it
forms the basis for most Web Service Stacks.
7) Which of the following is the most commonly used model for description and
discovery and is also used with SOAP messaging?
1. DHML
2. VMC
3. WSDL
4. SOA
Answer: C
1. renting
2. virtual machine sprawl
Answer: D
1. PaaS
2. SaaS
3. Both A and B
4. None of the above
Answer: C
Explanation: It usually shares issues with both PaaS (Platform as a service) and SaaS
(Software as a service)
Answer: D
Answer: B
1. Higgins
2. Hughes
3. Hinges
4. XACML
Answer: A
1. XACML
2. FIDM
Answer: D
1. three-factor authentication.
2. two -factor authentication.
3. four-factor authentication.
4. None of the above
Answer: B
Answer: A
Explanation: Open Mashup Alliances group usually predicts that the use of mashups
will increase by a factor of 10 within just some years.
Answer: D
Explanation: FIDM addresses the protocols and technologies that enable a user for
packaging the security credentials across the security domains.
Usually, the SAML (or Security Markup Language) is used to package the user's
security credentials.
7) Which of the following allows the users to login into a several different websites
with the same single account ?
1. OpenID
2. FIDM
3. SSO
4. Identity
Answer: A
Explanation: OpenID allows users to login into several different websites with the
same single account. Google, Myspace, Yahoo!, Flickr and several others are the
companies which support the OpenID.
Answer: C
9) Among the following, which one has the single authentication server and manages
multiple accesses to the other systems?
1. SOAP
2. IDaaS
3. SSO
4. SOA
Answer: C
Explanation: It is the SSO, which has the one single authentication server, and
manages the multiple accesses to the other systems.
1. ID-as-a-Service
2. Interoperability-as-a-Service
3. Intranet-as-a-service
4. Identity-as-a-Service
Answer: D
1. Service
2. Deployment
3. Application
4. None of the mentioned
Answer: B
2) _________ model consists of the particular types of services that you can access on
a cloud computing platform.
1. Service
2. Deployment
3. Application
4. None of the mentioned
Answer: A
Explanation: Service models describe the type of service that the service provider is
offering.
1. The use of the word "cloud" makes reference to the two essential concepts.
Answer: B
1. Public
2. Private
3. Hybrid
4. All of the mentioned
Answer: D
Answer: B
Explanation: Google has built mega data centers for its search engine. Hence it not
true that Amazon has built a worldwide network of data centers to services its search
engine.
1. SaaS
2. IaaS
3. PaaS
4. All of the mentioned
Answer: D
7) The __________ model originally did not require a cloud to use virtualization to
pool resources.
1. NEFT
2. NIST
3. NIT
4. All of the mentioned
Answer: B
Answer: A
Provided BY Waris Ali
Explanation: Internal (I) / External (E) determines the organization's boundaries so
that the correct option will be A.
1. One
2. Two
3. Three
4. Four
Answer: D
1. Cloud Square
2. Cloud Service
3. Cloud Cube
4. All of the mentioned
Answer: C
1. Public
2. Private
Answer: D
Explanation: A hybrid cloud can offer standardized or proprietary access to data and
applications, as well as application portability.
1. A deployment model defines the purpose of the cloud and the nature of how the
cloud is located.
2. The service model defines the purpose of the cloud and the nature of how the
cloud is located.
3. Cloud Square Model is meant to show us that the traditional notion of a
network boundary being the network's firewall no longer applies in cloud
computing.
4. All of the mentioned
Answer: A
Answer: A
4) How many types of security threshold values are actually present in the cloud cube
model?
1. 1
2. 2
3. 3
4. None of the mentioned
Answer: B
Explanation: There are only two types of depending upon the network firewall.
5) Which of the following is offered by the ownership dimension of the Cloud Cube
Model?
1. Proprietary
2. Owner
3. P
4. All of the mentioned
Answer: B
1. Per
2. P
3. Pre
Answer: D
Explanation: All options mentioned in the above questions are the ways of knowing
whether the operation is inside or outside the security limits, we can also call it a
network firewall.
7) Which one of the following is related to the services offered by the Cloud?
1. Sourcing
2. Ownership
3. Reliability
4. AaaS
Answer: A
8) Which one of the following dimensions corresponds to two different states in the
possible eight cloud forms?
Answer: D
1. Public
2. Private
3. Community
4. All of the mentioned
Answer: B
10) Which one of the following is a type of the Cloud that is organized in such a way
to serve the common purpose or the functions?
1. Public
2. Private
3. Community
4. All of the mentioned
Answer: C
Answer: B
Explanation: It is the Paas (the Platform As A Services) that provides several sources
or services such as the applications, development frameworks, operating systems,
virtual machines, control structures, and transactions etc. not the AaaS (or the
Application As A Service).
2) Which one of the following provides the resources or services such as the virtual
infrastructure, virtual machines, virtual storage, and several other hardware assets?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: A
3) Which one of the following offers the control structures and development
frameworks?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: C
5) Which one of the following was owned by an organization that sells cloud
services?
1. Hybrid
2. Private
3. Community
4. Public
Answer: D
Explanation: The public Cloud is one of the cloud infrastructures that are available
for public use as the alternative for the large industry group.
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: B
1. CPI
2. SIP
3. SPI
4. All of the mentioned
Answer: A
Explanation: SPI is actually an acronym( or we can say the Short form of any words)
for the most standard cloud computing services models, such as the infrastructure as a
Service, Platform as a Service, and Software as a Service.
1. Compliance as a service
2. Computer as a service
3. Community as a service
4. Communication as a service
Answer: D
1. EC2
2. EC1
3. EC10
4. Hybrid
Answer: A
Explanation: Amazon EC2 stands for the Amazon Elastic Compute Cloud that offers
the scalable computing capacity in the AWS (or Amazon Web Services) cloud to its
clients. One can eliminate his investment in hardware upfront using the Amazon
Elastic Compute Cloud and boost the development and deployment application
process.
1. Cloud backup
2. Web applications
3. Business applications
4. All of the mentioned
Answer: D
Provided BY Waris Ali
Explanation: The economics of software delivery has been shifted in a significant
manner, just like the music downloads has been shifted the delivery of the music.
1. Google's cloud involves approx ten data-centers in all over the world.
2. Data centers are sited in such a way that the overall system latency can be
optimized.
3. The online shopping website, such as Flipkart.com, has the infrastructure built
so that it can support the elastic demand so the system will be capable of
accommodating peak traffic.
4. All of the above
Answer: B
1. On-demand self-service
2. Extensive network access
3. Resource pooling
4. All of the above
Answer: A
4) Which one of the following is something that a user can obtain it under the contract
from his/her vendor?
Answer: C
5) All cloud computing applications suffer from the inherent _______ that is intrinsic
in their WAN connectivity.
1. Propagation
2. Latency
3. Noise
4. All of the mentioned
Answer: B
1. Service-oriented architecture
2. Standardized Web services
3. Web-application frameworks
4. All of the mentioned
7) Which one of the following is the most important subject of concern in cloud
computing?
1. Security
2. Storage
3. Scalability
4. All of the mentioned
Answer: A
Explanation: When your data travels over and rests on systems that are no longer
under your control, you have increased risk due to others' interception and
malfeasance.
8) You cannot rely on a cloud provider for maintaining its _____ in the event of
government work.
1. Scalability
2. Reliability
3. Privacy
4. None of the mentioned
Answer: C
1. Scalability
2. Reliability
3. Elasticity
4. Utility
Answer: A
10) _______ feature allows you to optimize your system and capture all possible
transactions.
1. Scalability
2. Reliability
3. Elasticity
4. none of the mentioned
Answer: C
1. Utility
2. Elasticity
3. Low barrier to entry
4. All of the mentioned
Answer: A
12) Which of the following is the most refined and restrictive service model?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned
Answer: C
13) When you add a software stack, such as an operating system and applications to
the service, the model shifts to _____ model.
1. SaaS
2. PaaS
3. IaaS
4. All of the mentioned
Answer: A
Answer: C
15) Service that generally focuses on the hardware follows which one of the following
service models?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned
Answer: A
16) Which of the following types of applications works with cloud computing that has
low risks, low margins?
1. High touch
2. Low touch
3. Moderate touch
4. All of the mentioned
Answer: B
Explanation: The "low touch" applications that come with low margins require
committed resources and pose less risk.
Answer: C
Answer: C
3. Which of the following services that need to be negotiated in Service Level Agreements?
a) Logging
b) Auditing
c) Regulatory compliance
d) All of the mentioned
View Answer
Answer: d
9. Which of the following is used for Web performance management and load testing?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems
View Answer
Answer: b
10. Which of the following is application and infrastructure management software for hybrid multi-
clouds?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems
View Answer
Answer: c
1. Which of the following correctly represents different types of mobile patterns?
a)
b)
c)
d) All of the mentioned
View Answer
Answer: a
8. __________ scaling allows you to use a virtual system to run more virtual machines.
a) Horizontal
b) Vertical
c) Out
d) All of the mentioned
View Answer
Answer: b
9. Which of the following is used to evaluate your own cloud application’s network performance?
a) Path Cloud
b) PathView Cloud
c) View Cloud
d) All of the mentioned
View Answer
Answer: b
10. Scaling _____ indefinitely leads you to an architecture with a large number of servers.
a) out
b) in
c) vertically
d) all of the mentioned
View Answer
Answer: a
1. Which of the following type is missing in the following figure?
a) High-CPU
b) High-Disk
c) High-ROM
d) All of the mentioned
View Answer
Answer: a
3. Which of the following instance has 68.4GB of memory and 26 EC2 Compute Units?
a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) Micro Instance
d) High-CPU Extra Large Instance
View Answer
4. Which of the following instance is used by default in AMI?
a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) Micro Instance
d) High-CPU Extra Large Instance
View Answer
Answer: b
a)
b)
c)
d) None of the mentioned
View Answer
Answer: a
10. Which of the following cloud computing infrastructures automatically manage your capacity?
a) High-Memory Quadruple Extra Large Instance
b) Small Instance
c) High-CPU Extra Large Instance
d) All of the mentioned
View Answer
Answer: b
1. Which of the following is storage data interchange interface for stored data objects?
a) OCC
b) OCCI
c) OCMI
d) All of the mentioned
View Answer
Answer: b
3. ________ data represents more than 50 percent of the data created every day.
a) Shadow
b) Light
c) Dark
d) All of the mentioned
View Answer
Answer: a
4. Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by
IDC.
a) 10
b) 15
c) 20
d) None of the mentioned
View Answer
Answer: d
6. Which of the following system does not provision storage to most users?
a) PaaS
b) IaaS
c) CaaS
d) SaaS
View Answer
Answer: b
7. The addition of a software package on top of a cloud storage volume makes most cloud storage
offerings conform to a ________ as a Service model.
a) Software
b) Platform
c) Analytics
d) None of the mentioned
View Answer
option A
9. Which of the following storage devices exposes its storage to clients as Raw storage that can be
partitioned to create volumes?
a) block
b) file
c) disk
d) all of the mentioned
View Answer
Answer: a
10. Which of the following impose additional overhead on clients and offer faster transfer?
a) Block storage
b) File Storage
c) File Server
d) All of the mentioned
View Answer
Answer: a
1. Which of the following feature make cloud-based storage systems highly reliable?
a) Redundant networks
b) Redundant name servers
c) Replication
d) All of the mentioned
View Answer
Answer: d
3. Redundancy has to be implemented at the _________ architectural level for effective results in
cloud computing.
a) lower
b) higher
c) middle
d) all of the mentioned
View Answer
Answer: b
4. Which of the following can manage data from CIFS and NFS file systems over HTTP networks?
a) StorageGRID
b) DataGRID
c) DiskGRID
d) All of the mentioned
View Answer
Answer: a
advertisement
6. A ________ is a logical unit that serves as the target for storage operations, such as the SCSI
protocol READs and WRITEs.
a) GETs
b) PUN
c) LUN
d) All of the mentioned
View Answer
Answer: c
7. Which of the following use LUNs to define a storage volume that appears to a connected
computer as a device?
a) SAN
b) iSCSI
c) Fibre Channel
d) All of the mentioned
View Answer
Answer: d
8. Which of the following protocol is used for discovering and retrieving objects from a cloud?
a) OCCI
b) SMTP
c) HTTP
d) All of the mentioned
View Answer
Answer: a
9. Which of the following disk operation is performed When a tenant is granted access to a virtual
storage container?
a) CRUD
b) File system modifications
c) Partitioning
d) All of the mentioned
View Answer
Answer: d
10. Which of the following standard connect distributed hosts or tenants to their provisioned storage
in the cloud?
a) CDMI
b) OCMI
c) COA
d) All of the mentioned
View Answer
Answer: a
1. If you have a local version of a file, then a version of that file stored in the cloud conforms to all
three of the ______ backup rules.
a) 3-2-1
b) One-two-three
c) 1-2-3
d) All of the mentioned
View Answer
Answer: c
3. Which of the following is the first rule according to 3-2-1 Backup Rule by Peter Krogh?
a) Retain three copies of any file—an original and two backups
b) Files must be on two different media types
c) One copy must be stored offsite
d) All of the mentioned
View Answer
Answer: c
6. Which of the following is the most important feature of cloud storage listed below?
a) Logon authentication
b) Bare file
c) Multiplatform support
d) Adequate bandwidth
View Answer
Answer: a
7. How many bits of encryption is at least required for cloud backup storage solution?
a) 56
b) 84
c) 128
d) None of the mentioned
View Answer
8. Which of the following is the most important client to back up in the cloud?
a) Windows
b) Mac
c) Linux
d) All of the mentioned
View Answer
Answer: d
9. Which of the following service does not support backup on the Linux platform?
a) Backblaze
b) Crashplan
c) Datapreserve
d) ADrive
View Answer
Answer: a
10. Which of the following is the least important feature of cloud storage listed below?
a) Multisite storage or replication
b) 24×7 technical support
c) Data versioning
d) All of the mentioned
View Answer
Answer: a
1. What second programming language did Google add for App Engine development?
A. C++
B. Flash
C. Java
D. Visual Basic
2. What facet of cloud computing helps to guard against downtime and determines costs?
A. Service-level agreements
B. Application programming interfaces
C. Virtual private networks
D. Bandwidth fees
3. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
4. Cloud Services have a________ relationship with their customers.
A. Many-to-many
B. One-to-many
C. One-to-one
5. What is the name of Rackspace’s cloud service?
A. Cloud On-Demand
B. Cloud Servers
C. EC2
6. What is the name of the organization helping to foster security standards for cloud
computing?
A. Cloud Security Standards Working Group
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance
7. Which of these companies specializes in cloud computing management tools and services?
A. RightScale
B. Google
C. Salesforce.com
D. Savis
8. What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics
9. Virtual Machine Ware (VMware) is an example of
A. Infrastructure Service
B. Platform Service
C. Software Service
10. Cloud Service consists of
A. Platform, Software, Infrastructure
B. Software, Hardware, Infrastructure
C. Platform, Hardware, Infrastructure
11. Google Apps Engine is a type of
A. SaaS
B. PaaS
C. IaaS
D. NA
12. Which vendor recently launched a cloud-based test and development service for
enterprises?
A. HP
B. Cisco
C. IBM
D. Oracle
13. Geographic distribution of data across a cloud provider’s network is a problem for many
enterprises because it:
A. Breaks compliance regulations
B. Adds latency
C. Raises security concerns
D. Makes data recovery harder
14. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service
15. Cloud computing networks are designed to support only private or hybrid clouds.
A. True
B. False
16. A good cloud computing network can be adjusted to provide bandwidth on demand.
A. True
B. False
17. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True
B. False
18. The typical three-layer switching topology will not create latency within a cloud network.
A. True
B. False
19. The term ‘Cloud’ in cloud-computing refers to ______.
A. The Internet
B. Cumulus Clouds
C. A Computer
D. Thin Clients
20. In order to participate in cloud-computing, you must be using the following OS _______ .
A. Windows
B. Mac OS
C. Linux
D. All of the above
21. Which of the following is true of cloud computing?
A. It’s always going to be less expensive and more secure than local computing.
B. You can access your data from any computer in the world, as long as you have an Internet
connection.
C. Only a few small companies are investing in the technology, making it a risky venture.
22. What is private cloud?
A. A standard cloud service offered via the Internet
B. A cloud architecture maintained within an enterprise data center.
C. A cloud service inaccessible to anyone but the cultural elite
23. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service (SAAS)
B. Platform as a Service (PAAS)
C. Infrastructure as a Service (IAAS)
24. Google Docs is a type of cloud computing.
A. True
B. False
25. What is Cloud Foundry?
A. A factory that produces cloud components
B. An industry wide PaaS initiative
C. VMware-led open source Paas.
26. This is a software distribution model in which applications are hosted by a vendor or
service provider and made available to customers over a network, typically the Internet.
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS).
27. Which of the following statements about Google App Engine (GAE) is INCORRECT.
A. It’s a Platform as a Service (PaaS) model.
B. Automatic Scalability is built in with GAE. As a developer you don’t need to worry about
application scalability
C. You can decide on how many physical servers required for hosting your application.
D. The applications deployed on GAE have the same security, privacy and data protection policies
as that of Google’s applications. So, applications can take advantage of reliability, performance and
security of Google’s infrastructure.
28. I’ve a website containing all static pages. Now I want to provide a simple Feedback form
for end users. I don’t have software developers, and would like to spend minimum time and
money. What should I do?
A. Hire software developers, and build dynamic page.
B. Use ZOHO creator to build the required form, and embed in html page.
C. Use Google App Engine (GAE) to build and deploy dynamic page.
29. What is the name of the organization helping to foster security standards for cloud
computing?
A. Cloud Security Standards Working.
B. Cloud Security Alliance.
C. Cloud Security WatchDog.
D. Security in the Cloud Alliance.
30. “Cloud” in cloud computing represents what?
A. Wireless
B. Hard drives
C. People
D. Internet
1. Which of the following sells a server referred to as Cloud Attached Storage?
a) CEAT
b) CTERA
c) OCCI
d) All of the mentioned
View Answer
Answer: b
3. The development of systems on a chip has enabled CTERA to create a scaled-down version of
the CTERA server called the CTERA __________
a) CloudPlug
b) NextCloud
c) CloudNext
d) All of the mentioned
View Answer
Answer: a
Explanation: This palm-sized low-power device converts a USB/eSATA drive and your Ethernet
network and turns the hard drive into a NAS server.
advertisement
6. Which of the following is the open cloud storage management standard by SNIA?
a) CDMI
b) OCCI
c) CEA
d) Adequate bandwidth
View Answer
Answer: a
7. Which of the following standard uses the same authorization and authentication mechanism as
CDMI?
a) SIA
b) NFS
c) NTFS
d) None of the mentioned
View Answer
Answer: b
8. While working with the storage domain model, CDMI allows for interoperation of which of the
following clouds?
a) public
b) private
c) hybrid
d) all of the mentioned
View Answer
Answer: d
9. In the Cloud Data Management Interface (CDMI), the storage space is partitioned into units
called _________
a) containers
b) workspace
c) replicas
d) none of the mentioned
View Answer
Answer: a
10. Which of the following server performs the backups of clients without requiring any client-
based software?
a) Next3
b) OBackup
c) CTERA
d) All of the mentioned
View Answer
Answer: c
1. _______ blurs the differences between a small deployment and a large one because scale
becomes tied only to demand.
a) Leading
b) Pooling
c) Virtualization
d) All of the mentioned
View Answer
Answer: b
advertisement
7. Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better
than smaller systems do.
a) sniffers
b) botnets
c) trojan horse
d) all of the mentioned
View Answer
Answer: b
9. A __________ site is one that is environmentally friendly: locations that are on a network
backbone.
a) greenfield
b) redfield
c) greenful
d) none of the mentioned
View Answer
Answer: a
10. The peak of the sum is never ________ than the sum of the peaks.
a) smaller
b) greater
c) equal to
d) none of the mentioned
View Answer
Answer: b
3. The costs associated with resources in the cloud computing model _______ can be unbundled to
a greater extent than the costs associated with CostDATACENTER.
a) CLOUD
b) CostCLOUD
c) CCLOUD
d) All of the mentioned
View Answer
Answer: b
4. Security methods such as private encryption, VLANs and firewalls comes under __________
subject area.
a) CostDATACENTER = 1nΣ(UnitCostDATACENTER / (Revenue
–(CostDATACENTER/Utilization))SYSTEMn
b) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue
–(CostDATACENTER/Utilization))SYSTEMn
c) CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue
+(CostDATACENTER/Utilization))SYSTEMn
d) All of the mentioned
View Answer
Answer: b
Explanation: Sum includes terms for System 1, System 2, System 3, and so on.
6. For a server with a four-year lifetime, you would therefore need to include an overhead roughly
equal to ___ percent of the system’s acquisition cost.
a) 10
b) 20
c) 25
d) All of the mentioned
View Answer
Answer: c
advertisement
8. Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their
cloud computing provider.
a) Dex
b) OpEx
c) Pex
d) All of the mentioned
View Answer
Answer: b
10. Cloud computing is also a good option when the cost of infrastructure and management is
______
a) low
b) high
c) moderate
d) none of the mentioned
View Answer
Answer: b
1. ______ sizing is possible when the system load is cyclical or in some cases when there are
predictable bursts or spikes in the load.
a) Left
b) Right
c) Top
d) All of the mentioned
View Answer
Answer: b
3. _____ is a financial estimate for the costs of the use of a product or service over its lifetime.
a) TCO
b) TOC
c) COT
d) All of the mentioned
View Answer
Answer: a
4. The Microsoft ____ Platform ROI wizard provides a quick and dirty analysis of your TCO for a
cloud deployment on Windows Azure in an attractive report format.
a) AWS
b) EC2
c) Azure
d) All of the mentioned
View Answer
Answer: c
6. A ________ Level Agreement (SLA) is the contract for performance negotiated between you and
a service provider.
a) Service
b) Application
c) Deployment
d) All of the mentioned
View Answer
Answer: a
advertisement
7. Which of the following is specified parameter of SLA?
a) Response times
b) Responsibilities of each party
c) Warranties
d) All of the mentioned
View Answer
Answer: d
Explanation: Some SLAs are enforceable as contracts.
8. When you purchase shrink-wrapped software, you are using that software based on a licensing
agreement called ________
a) EULA
b) EUL
c) ELA
d) All of the mentioned
View Answer
Answer: a
10. Which of the following service is used for backing up a licensed computer?
a) CarbonT
b) Karbonite
c) Carbonite
d) None of the mentioned
View Answer
Answer: c