Cloudcomputing
Cloudcomputing
Cloudcomputing
Which of these should a company consider before implementing cloud computing technology?
A. Employee satisfaction
B. Potential cost reduction
C. Information sensitivity
D. All of the above
ANSWER: D
Which of the following is a virtual machine technology now owned by Oracle that can run various operating
systems?
A. Vmachines
B. VirtualBox
C. ThoughtPolice
D. None of the mentioned
ANSWER: B
Applications such as a Web server or database server that can run on a virtual machine image are referred to as
______________
A. virtual server
B. virtual appliances
C. machine imaging
D. all of the mentioned
ANSWER: B
Cloud computing embraces many concepts that were previously touted as the next big thing in information
technology. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Desktop computing
ANSWER: D
IBM, EMC and Boeing Co. were among the companies signing what document whose title is reminiscent of a
famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
ANSWER: D
Link the cloud-based service on the left with the desktop or server application it is designed to displace on the
right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-relationship management
D. Amazon EC24. Backup disk
ANSWER: A
What August event was widely seen as an example of the risky nature of cloud computing?
A. The spread of the Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
ANSWER: B
1 The __________ model originally did not require a cloud to use virtualization to pool resources.
A. NEFT
B. NIST
C. NIT
D. All of the mentioned
ANSWER: B
4 _______ is a complete operating environment with applications, management, and the user interface.
A. IaaS
B. SaaS
C. PaaS
D. All of the mentioned
ANSWER: B
5 Which of the following cloud concept is related to pooling and sharing of resources ?
A. Polymorphism
B. Abstraction
C. Virtualization
D. None of the mentioned
ANSWER: C
6 When you add a software stack, such as an operating system and applications to the service, the model shifts
to _____ model.
A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
ANSWER: A
8 All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN
connectivity.
A. propagation
B. latency
C. noise
D. All of the mentioned
ANSWER: B
15 Applications such as a Web server or database server that can run on a virtual machine image are referred to
as ______________
A. virtual server
B. virtual appliances
C. machine imaging
D. all of the mentioned
ANSWER: B
16 ________ offers various Linux distributions upon which you can build a virtual machine.
A. Bagvapp
B. Jcinacio
C. HelpdeskLive
D. All of the mentioned
ANSWER: B
18 ____________ involves hosting the distribution of workload traffic that resides over the internet.I.Load
balancing II. Virtualization III.Switches
A. Only I
B. I & II
C. I & III
D. II & III
ANSWER: C
19 A ______ is a combination load balancer and application server that is a server placed between a firewall or
router.
A. ABC
B. ACD
C. ADC
D. All of the mentioned
ANSWER: C
20 The most fascinating and significant part of Google's activities is it's targeting advertising business such
as:I.AdSense II.AdWords III. AdCloud IV. Mongo DB
A. Only IV
B. III & IV
C. I & III
D. I & II
ANSWER: D
21 Which of the following is a virtual machine technology now owned by Oracle that can run various
operating systems?
A. Vmachines
B. VirtualBox
C. ThoughtPolice
D. None of the mentioned
ANSWER: B
23 _________ as a Service is a cloud computing infrastructure that creates a development environment upon
which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
ANSWER: C
24 _________ is a cloud computing service model in which hardware is virtualized in the cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
ANSWER: A
25 Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
A. workunit
B. workspace
C. workload
D. all of the mentioned
ANSWER: C
26 How many types of virtual private server instances are partitioned in an IaaS stack?
A. Four
B. One
C. Two
D. Three
ANSWER: D
27 When you deploy an application on Googles PaaS App Engine cloud service, the Administration Console
provides you with the which of the following monitoring capabilities?
A. View data and error logs
B. Analyze your network traffic
C. View the applications scheduled tasks
D. All of the mentioned
ANSWER: D
31 How many types of security boundary values exist in Cloud Cube model?
A. 1
B. 2
C. 3
D. None of the mentioned
ANSWER: B
32 Which of the following system does not provision storage to most users?
A. PaaS
B. IaaS
C. CaaS
D. SaaS
ANSWER: B
33 Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned
to create volumes?
A. block
B. file
C. disk
D. all of the mentioned
ANSWER: A
34 Which of the following describes a message-passing taxonomy for a component-based architecture that
provides services to clients upon demand?
A. SOA
B. EBS
C. GEC
D. All of the mentioned
ANSWER: A
35 Which of the following benefit is related to creates resources that are pooled together in a system that
supports multi-tenant usage?
A. On-demand self-service
B. Broad network access
C. Resource pooling
D. All of the mentioned
ANSWER: A
36 The _____ is something that you can obtain under contract from your vendor.
A. PoS
B. QoS
C. SoS
D. All of the mentioned
ANSWER: B
37 You cant count on a cloud provider maintaining your _____ in the face of government actions.
A. scalability
B. reliability
C. privacy
D. none of the mentioned
ANSWER: C
38 Which of the following architectural standards is working with cloud computing industry?
A. Service-oriented architecture
B. Standardized Web services
C. Web-application frameworks
D. All of the mentioned
ANSWER: A
39 Which of the following element is used by orchestrated business process commonly referred to as?
A. conductor
B. coordinator
C. orchestrator
D. all of the mentioned
ANSWER: C
40 Which of the following protocol lets a Web site list in an XML file information?
A. Sitemaps
B. Mashups
C. Hashups
D. All of the mentioned
ANSWER: A
These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go
model.
A. Cloud providers
B. Clients
C. End users
D. Cloud users
ANSWER: D
Which of the following is not a type of cloud?
A. Private
B. Public
C. Protected
D. Hybrid
ANSWER: C
In this type of Cloud, an organization rents Cloud services from Cloud providers on-demand basis.
A. Private
B. Public.
C. Protected
D. Hybrid
ANSWER: B
In this type of Cloud, the Cloud is Composed of multiple internal or external Cloud.
A. Private
B. Public
C. Protected
D. Hybrid
ANSWER: D
_____________ enables the migration of the virtual image from one physical machine to another.
A. visualization
B. virtualization
C. migration
D. virtual transfer
ANSWER: B
Which of these should a Company Consider before implementing Cloud Computing technology?
A. Employee satisfaction
B. Potential C.ost reduction
C. Information sensitivity
D. All of the above
ANSWER: D
Link the cloud-based service on the left with the desktop or server application it is designed to displace on the
right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-relationship management
D. Amazon EC24. Backup disk
ANSWER: A
When you add a software stack, such as an operating system and applications to the service, the model shifts to
_____ model.
A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
ANSWER: A
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
A. propagation
B. latency
C. noise
D. All of the mentioned
ANSWER: B
Which of the following is used for Web performance management and load testing?
A. VMware Hyperic
B. Web metrics
C. Univa UD
D. Tapinsystems
ANSWER: B
From the standpoint of a ________ it makes no sense to offer non-standard machine instances to customers.
A. CaaS
B. AaaS
C. PaaS
D. IaaS
ANSWER: D
Which of the following describes a message-passing taxonomy for a component-based architecture that
provides services to clients upon demand?
A. SOA
B. EBS
C. GEC
D. All of the mentioned
ANSWER: A
Q1. You can’t count on a cloud provider maintaining your _____ in the face of government
actions.
a) scalability
b) reliability
c) privacy
d) none of the mentioned
Q3. SWIGGY.IN formed a cloud for its all branches but due to its limited resources it obtained the
services of AWS for extended provisioning and thus modified its cloud ; The cloud so formed is
the example of ______
a) Private cloud
b) Public cloud
c) Hybrid cloud
d) community cloud
Q4. Which of the following is best known service model ?
a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
Q6. _______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware
assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Q7 .Usually methods like RAID strategies are used in cloud computing to maintain integrity. What
RAID stands for ?
a) Redundant array of independent disks
b) Redundant arrangements of independent disks
c) Removal of array in independent disks
d) Remove array for integrity dependent
Q13. Which of the following should be replaced with the question mark in the following figure ?
a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
Q14.
a)
b)
c)
d)
What is the biggest disadvantage of community cloud ?
Collaboration has to be maintained with other participants
Less security features
Cloud is used by many organisation for different purposes
Organisation losses business autonomy
Q15. _______ enables batch processing, which greatly speeds up high-processing applications.
a) Scalability
b) Reliability
c) Elasticity
d) Utility
Q17. Cloud computing is also a good option when the cost of infrastructure and management is
______
a) low
b) high
c) moderate
d) none of the mentioned
Q18. Which of the architectural layer is used as backend in cloud computing ?
a) client
b) cloud
c) software
d) Network
Q19. Which of the following is most important area of concern in cloud computing ?
a) Security
b) Storage
c) Scalability
d) All of the mentioned
Q20. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
Q21. SaaS supports multiple users and provides a shared data model through _________ model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) all of the mentioned
Q25 . Which of the architectural layer is used as front end in cloud computing ?
a) client
b) cloud
c) soft
d) all of the mentioned
Q26 . _________ as a Service is a cloud computing infrastructure that creates a development
environment upon which applications may be build.
a) Infrastructure
b) Service
c) Platform
d) All of the mentioned
Q27 Which cloud is deployed when there is a budget constraint but business autonomy is most
essential ?
a) Private cloud
b) Public cloud
c) Hybrid cloud
d) Community cloud
Q28 CaaS vendor offer guaranteed QOS in SLA to their clients .what does QOS stands for ?
a) Quality operating system
b) Quality in other services
c) Quality of service
d) Quality object oriented service
Q29.__________ cloud is one where the cloud has been organized to serve a common function or
purpose by many organisation .
a) Public
b) Private
c) Community
d) All of the mentioned
Q30. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
a) PaaS
b) IaaS
c) CaaS
d) All of the mentioned
Solution
1 c 9 a 17 b 25 a
2 b 10 a 18 b 26 c
3 c 11 b 19 a 27 a
4 d 12 d 20 b 28 c
5 d 13 b 21 b 29 c
6 a 14 d 22 a 30 b
7 a 15 a 23 a 31 d
8 d 16 a 24 b 32 c
These cloud services are of the form of utility computing i.e. the
_________ uses these services pay-as-you-go model.
A. Cloud providers
B. Clients
C. End users
D. Cloud users
ANSWER: D
Link the cloud-based service on the left with the desktop or server
application it is designed to displace on the right.
A. Google Docs 1. Intel servers
B. Salesforce.com 2. Microsoft Office
C. Mozy.com 3. Oracle customer-relationship management
D. Amazon EC2 4. Backup disk
ANSWER: A
All cloud computing applications suffer from the inherent _______ that is
intrinsic in their WAN connectivity.
A. propagation
B. latency
C. noise
D. All of the mentioned
ANSWER: B
Which of the following is used for Web performance management and load
testing?
A. VMware Hyperic
B. Web metrics
C. Univa UD
D. Tapinsystems
ANSWER: B
8 All cloud computing applications suffer from the inherent _______ that
is intrinsic in their WAN connectivity.
A. propagation
B. latencyC. noise
D. All of the mentioned
ANSWER: B
16 ________ offers various Linux distributions upon which you can build
a virtual machine.
A. Bagvapp
B. Jcinacio
C. HelpdeskLive
D. All of the mentioned
ANSWER: B
17 __________ is a CPU emulator and virtual machine monitor.
A. Imaging
B. Parallels
C. QEMU
D. None of the mentioned
ANSWER: C
31 How many types of security boundary values exist in Cloud Cube model?
A. 1
B. 2
C. 3
D. None of the mentioned
ANSWER: B
36 The _____ is something that you can obtain under contract from your
vendor.
A. PoS
B. QoS
C. SoS
D. All of the mentioned
ANSWER: B
40 Which of the following protocol lets a Web site list in an XML file
information?
A. Sitemaps
B. Mashups
C. Hashups
D. All of the mentioned
ANSWER: A
IBM, EMC and Boeing Co. were among the companies signing what document
whose title is reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
ANSWER: D
Link the cloud-based service on the left with the desktop or server
application it is designed to displace on the right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-relationship management
D. Amazon EC24. Backup disk
ANSWER: A
What August event was widely seen as an example of the risky nature of
cloud computing?
A. The spread of the Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
ANSWER: B