You are on page 1of 19

1. What second programming language did Google add for App Engine development?

A. C++

B. Flash

C. Java

D. Visual Basic

Ans:C

2. What facet of cloud computing helps to guard against downtime and determines costs?

A. Service-level agreements

B. Application programming interfaces

C. Virtual private networks

D. Bandwidth fees

ANS:A

3. Which of these is not a major type of cloud computing usage?

A. Hardware as a Service

B. Platform as a Service

C. Software as a Service

D. Infrastructure as a Service

ANS:A

4. Cloud Services have a________ relationship with their customers.

A. Many-to-many

B. One-to-many

C. One-to-one
ANS:B

5. What is the name of Rackspace’s cloud service?

A. Cloud On-Demand

B. Cloud Servers

C. EC2

ANS:B

6. What is the name of the organization helping to foster security standards for cloud computing?

A. Cloud Security Standards Working Group

B. Cloud Security Alliance

C. Cloud Security WatchDog

D. Security in the Cloud Alliance

ANS:B

7. Which of these companies specializes in cloud computing management tools and services?

A. RightScale

B. Google

C. Salesforce.com

D. Savis

ANS:A

8. What’s the most popular use case for public cloud computing today?

A. Test and development

B. Website hosting
C. Disaster recovery

D. Business analytics

ANS:A

9. Virtual Machine Ware (VMware) is an example of

A. Infrastructure Service

B. Platform Service

C. Software Service

ANS:A

10. Cloud Service consists of

A. Platform, Software, Infrastructure

B. Software, Hardware, Infrastructure

C. Platform, Hardware, Infrastructure

ANS:A

11. Google Apps Engine is a type of

A. SaaS

B. PaaS

C. IaaS

D. NA

ANS:D

12. Which vendor recently launched a cloud-based test and development service for enterprises?

A. HP
B. Cisco

C. IBM

D. Oracle

ANS:C

13. Geographic distribution of data across a cloud provider’s network is a problem for many enterprises
because it:

A. Breaks compliance regulations

B. Adds latency

C. Raises security concerns

D. Makes data recovery harder

ANS:A

14. Amazon Web Services is which type of cloud computing distribution model?

A. Software as a Service

B. Platform as a Service

C. Infrastructure as a Service

ANS:C

15. Cloud computing networks are designed to support only private or hybrid clouds.

A. True

B. False

Ans: B

16. A good cloud computing network can be adjusted to provide bandwidth on demand.
A. True

B. False

Ans: A

17. A larger cloud network can be built as either a layer 3 or layer 4 network.

A. True

B. False

Ans: B

18. The typical three-layer switching topology will not create latency within a cloud network.

A. True

B. False

Ans: B

19. The term ‘Cloud’ in cloud-computing refers to ______.

A. The Internet

B. Cumulus Clouds

C. A Computer

D. Thin Clients

Ans: A

20. In order to participate in cloud-computing, you must be using the following OS _______ .

A. Windows

B. Mac OS

C. Linux
D. All of the above

Ans: D

21. Which of the following is true of cloud computing?

A. It’s always going to be less expensive and more secure than local computing.

B. You can access your data from any computer in the world, as long as you have an Internet connection.

C. Only a few small companies are investing in the technology, making it a risky venture.

Ans:B

22. What is private cloud?

A. A standard cloud service offered via the Internet

B. A cloud architecture maintained within an enterprise data center.

C. A cloud service inaccessible to anyone but the cultural elite

Ans:B

23. Amazon Web Services is which type of cloud computing distribution model?

A. Software as a Service (SAAS)

B. Platform as a Service (PAAS)

C. Infrastructure as a Service (IAAS)

A.ns:C

24. Google Docs is a type of cloud computing.

A. True

B. False

Ans: A
25. What is Cloud Foundry?

A. A factory that produces cloud components

B. An industry wide PaaS initiative

C. VMware-led open source PaaS.

Ans: C

26 This is a software distribution model in which applications are hosted by a vendor or service provider
and made available to customers over a network, typically the Internet.

A. Platform as a Service (PaaS)

B. Infrastructure as a Service (IaaS)

C. Software as a Service (SaaS).

Ans:C

27. Which of the following statements about Google App Engine (GAE) is INCORRECT.

A. It’s a Platform as a Service (PaaS) model.

B. Automatic Scalability is built in with GAE. As a developer you don’t need to worry about application
scalability

C. You can decide on how many physical servers required for hosting your application.

D. The applications deployed on GAE have the same security, privacy and data protection policies as that
of Google’s applications. So, applications can take advantage of reliability, performance and security of
Google’s infrastructure.

Ans:C

28. I’ve a website containing all static pages. Now I want to provide a simple Feedback form for end
users. I don’t have software developers, and would like to spend minimum time and money. What
should I do?

A. Hire software developers, and build dynamic page.


B. Use ZOHO creator to build the required form, and embed in html page.

C. Use Google App Engine (GAE) to build and deploy dynamic page.

Ans:B

29. What is the name of the organization helping to foster security standards for cloud computing?

A. Cloud Security Standards Working.

B. Cloud Security Alliance.

C. Cloud Security WatchDog.

D. Security in the Cloud Alliance.

Ans:B

30. “Cloud” in cloud computing represents what?

A. Wireless

B. Hard drives

C. People

D. Internet

Ans:D

1.       How does Cloud computing change the relationship between provider and customer?

A. Increased focus on service level agreements (SLAs)

B. less compliance to standards

C. less focus on service level agreements (SLAs)

D. more focus on training

2.       Which cloud characteristic refers to the ability of a subscriber to increase or decrease its
computing requirements as needed without having to contact a human representative of the cloud
provider?
a.       Rapid elasticity

b. On-demand self service                                 

c. Broad network access

d. Resource pooling

3.       Which one of the following types of risks cannot be mitigated solely with cloud-specific security
technologies?

a. Identity management

b. Virtual sprawl

c. Denial-of-service attacks

d. Intellectual property protection

e. Administrative access control

4.      Which of the following is not a true statement about using encryption with enterprise cloud
computing implementations?

a. Encryption is required for regulatory compliance.

b. Encryption can be used to solve the data segregation issue.

c. Data being processed is always encrypted.

d. Encryption for data in transit has a speed/strength tradeoff.

5.       Which of the following is not true about cloud-based virtual server management platforms?

a. Cloud-based management platforms can support multiple cloud-virtual server vendors.

b. Cloud-based management platforms can support multiple cloud-virtual server operating systems.

c. Cloud-based management platforms cannot support internally hosted server platforms.

d. Cloud-based management platforms can support change management methodologies.

6.       Which of the following risks is actually increased by cloud-specific security technologies?

a.       Increased/shared attack surface

b.      Configuration and vulnerability management

c.       Identity management
d.      Administrative access control

e.      None of the above

7.       How can confidentiality of information be achieved?

a.       By ensuring enough resources to make information available for all users

b.      By preventing unauthorized changes

c.       By regularly backing up the information

d.      By restricting access to information

8.       What is a Virtual Private Network (VPN)?

a.       A secured connection for remote access to a local area network

b.      A secured private cloud for a single user

c.       A virtual network device for private purposes

d.      An operating system for private network systems


9.       What are different data types used in cloud computing?

Cloud computing is going all together for a different look as it now includes different data types like
emails, contracts, images, blogs, etc. The amount of data increasing day by day and cloud computing is
requiring new and efficient data types to store them. For example if you want to save video then you
need a data type to save that. Latency requirements are increasing as the demand is increasing.
Companies are going for lower latency for many applications.

10.   What is Simple multi-tenancy ?

In this each user has its own resources that are different from other users. It is an inefficient mode
where the user has to put more time and money to add more infrastructure if the demand rises in less
time to deliver. 

11.   What is Fine grain multi-tenancy ?

In this the functionality remains the same that the resources can be shared to many. But it is more
efficient as the resources are shared not the data and permission within an application.

12.   What is Hadoop ?
Hadoop is a free, Java-based programming framework that supports the processing of large data sets
in a distributed computing environment. It is part of the Apache project sponsored by the Apache
Software Foundation.

13.   Map() procedure performs

a.       filtering and sorting

b.      performs a summary operation

c.       processing large data sets with a parallel and distributed algorithm on a cluster

d.      Both a and b

e.      All of the above

14.   Reduce() procedure performs

a.       filtering and sorting

b.      performs a summary operation

c.       processing large data sets with a parallel and distributed algorithm on a cluster

d.      Both a and b

e.      All of the above

15.   CRM is an example of

a.       SaaS

b.      PaaS

c.       IaaS

d.      Both a and B

e.      All of the above

16.   What is benefit of storage availability in the Cloud?

A. Additional storage does not require budget for new large storage devices.

B. Storage in the Cloud has a higher availability than storage devices in the local area network.

C. Storage in the Cloud has shorter access times than storage in the local area network.
D. Storage in the Cloud is easier to protect against intrusion

17.   Why is a trial period needed when considering to use Software-as-a-Service?

a.       To establish the required bandwidth for using the cloud services

b.      To evaluate whether the cloud services will be useful

c.       To find out whether the vendor will meet the Service agreement

d.      To have time to accommodate the local network to use of the new services

18.   Google App Engine (often referred to as GAE or simply App Engine) is

a.       Is a Platform as a Service

b.      Is a Software as a Service

c.       Is a Infrastructure as a Service

d.      All of the above

19.   What is Azure ? (2-3 lines)

Windows Azure is a cloud computing platform and infrastructure, created by Microsoft, for building,
deploying and managing applications and services through a global network of Microsoft-
managed datacenters.

20.   Heroku was acquired by

a.       Microsoft

b.      Salesforce.com

c.       Vmware

d.      Red Hat

21.   Which of the following is not cloud service provider ?

a.       Amazon

b.      Amazon EC2

c.       Hadoop

d.      GAE

e.      Azure
22.   What is Data Segregation ?

How vendors keep certain degree of separation between one customer data and another's.

23.   Define vulnerability

Vulnerabilities in Cloud can be defined as the loopholes in the security architecture of Cloud, which
can be exploited by an adversary via sophisticated techniques to gain access to the network and other
infrastructure resources.

24.   What is threat?

A threat in the Cloud is a potential (or actual adverse) event that may be malicious or incidental (i.e.
failure of a storage device), compromising Cloud resources.

25.   In which attack an attacker tries to flood the victim by sending requests from innocent hosts in the
network.

a.       Man – in – middle

b.      DOS

c.       DDOS

d.      Zombies

e.      Phishing

26.   The Cloud may be overloaded to serve a number of requests, and hence exhausted, which can
cause

a.       Zombies

b.      DOS

c.       DDOS

d.      Backdoor channel attack

e.      Both b & c

f.        All of the above

27.   What are the uses of cloud storage ?

a.       Backup
b.      File sharing

c.       Data synchronization

d.      Media Distribution

e.      Data Archiving

28.   Which of the following is disadvantage of FADE?

a.       Time and Space are the major overhead of this scheme

b.      Unable to support both public verification and dynamic data correctness.

c.       In case user forgot where the data stored, it will become difficult for users.

d.      Both a and b

29.   Client Server system refers to accessing information, processing or storage on a typically more
powerful separate system from a less powerful computer.

a.       TRUE

b.      FALSE

30.   What is Caas ?

a.       Communication as a service

b.      Client as a Service

c.       Computer as a Service

d.      Common platform as a Service

31.   Which of the following is an example of a cloud computing application?

a.       Facebook Apps

b.      Skype

c.       Twitter or RSS

d.      Salesforce.com

e.      Google Apps

f.        Sky drives

g.       None of the above.


32.   What is benefit of storage availability in the Cloud?

a.       Additional storage does not require budget for new large storage devices.

b.      Storage in the Cloud has a higher availability than storage devices in the local area network.

c.       Storage in the Cloud has shorter access times than storage in the local area network.

d.      Storage in the Cloud is easier to protect against intrusion

33.   Open source software is not free. There are maintenance costs and support costs

a.       TRUE

b.      FALSE

34.   How many types of deployment models are used in cloud?

a.       Public cloud

b.      Private cloud

c.       Community cloud

d.      Hybrid cloud

e.      Only A & B

f.        All of the above

g.       Only A,B & D

35.   Why is a trial period needed when considering to use Software-as-a-Service?

a.       To establish the required bandwidth for using the cloud services

b.      To evaluate whether the cloud services will be useful

c.       To find out whether the vendor will meet the Service agreement

d.      To have time to accommodate the local network to use of the new services
36.   Which service model allows the customer to choose more layers in the computing 
architecture?

a.       Infrastructure as a Service (IaaS)

b.      Platform as a Service (PaaS)


c.       Software as a Service (SaaS)

d.      There is no difference between the service models.

37.   How can confidentiality of information be achieved?

a.       By ensuring enough resources to make information available for all users

b.      By preventing unauthorized changes

c.       By regularly backing up the information

d.      By restricting access to information


38.   What is a Virtual Private Network (VPN)?

a.       A secured connection for remote access to a local area network

b.      B. A secured private cloud for a single user

c.       C. A virtual network device for private purposes

d.      D. An operating system for private network systems

39.   How does Cloud computing change the relationship between provider and customer?

a.       Increased focus on service level agreements (SLAs)

b.      B. less compliance to standards

c.       C. less focus on service level agreements (SLAs)

d.      D. more focus on training

40.   What is cloud computing replacing?

a.       Corporate data centers

b.      Expensive personal computer hardware

c.       Expensive software upgrades

d.      All of the above

41.   How can confidentiality of information be achieved?

a.       By ensuring enough resources to make information available for all users

b.      By preventing unauthorized changes


c.       By regularly backing up the information

d.      By restricting access to information

42.   What is a Virtual Private Network (VPN)?

a.       Secured connection for remote access to a local area network

b.      A secured private cloud for a single user

c.        A virtual network device for private purposes

d.       An operating system for private network systems

43.   How does Cloud computing change the relationship between provider and customer?

a.       Increased focus on service level agreements (SLAs)

b.      less compliance to standards

c.       less focus on service level agreements (SLAs)

d.      more focus on training

44.   What is cloud computing replacing?

a.       Corporate data centers

b.      Expensive personal computer hardware

c.        Expensive software upgrades

d.       All of the above

45.   What is the number one concern about cloud computing?

a.       Too expensive

b.      Security concerns

c.       Too many platforms

d.      Accessibility

46.   Which of these is not a major type of cloud computing usage ?

a.       Hardware as a Service
b.       Platform as a Service

c.        Software as a Service

d.       Infrastructure as a Service

47.   Which of these companies is not a leader in cloud computing?

a.       Google

b.      Amazon

c.        Blackboard

d.      Microsoft

48.   Which cloud deployment model is operated solely for a single organization and its authorized
users?

a.       Community cloud

b.      Hybrid cloud

c.       Public cloud

d.      Private cloud

49.   Which cloud characteristic refers to the ability of a subscriber to increase or decrease its computing
requirements as needed without having to contact a human representative of the cloud provider?

a.       Rapid elasticity

b.      On-demand self service                                      

c.       Broad network access

d.      Resource pooling

50.   Which cloud deployment model is managed by a cloud provider, has an infrastructure that is
offsite, and is accessible to the general public?

a.       Community cloud

b.      Hybrid cloud

c.       Public cloud                                                                              

d.      Private cloud
51.   In which category of SaaS services does customer relationship management (CRM) software fall?

a.       Consumer services

b.      Communication services

c.       Infrastructure services

d.      Business services

52.   Which is considered the most widely used cloud computing service?

a.       Infrastructure-as-a-Service (IaaS)

b.      Platform-as-a-Service (PaaS)

c.       Communication-as-a-Service (CaaS)

d.      Software-as-a-Service (SaaS)  

You might also like