R4RIN
Articles
Java 8
MCQS
Cloud Computing MCQ Quiz Hub
Cloud Computing Mcq Set 3
Choose a topic to test your knowledge and improve your Cloud Computing skills
1. Which of the following is the operational domain of CSA(Cloud SecurityAlliance)?
scalability
portability andinteroperability
flexibility
None of the mentioned
2. Which of the following is considered an essential element in cloud computingby CSA?
multi-tenancy
identity and accessmanagement
virtualization
all of the mentioned
3. Which of the following is used for Web performance management and loadtesting?
vmware hyperic
webmetrics
univa ud
tapinsystems
4. Point out the correct statement.
paas supplies the infrastructure
iaas adds application development frameworks, transactions, and control structures
saas is an operating environment with applications, management, and the user interface
all of the mentioned
5. Which of the following functional cloud computing hardware/software stackis the Cloud Reference Model?
cas
csa
sac
all of the mentioned
6. For the model, the security boundary may be defined for thevendor to include the software framework and middleware layer.
saas
paas
iaas
all of the mentioned
7. Which of the following model allows vendor to provide security as part of theService Level Agreement?
saas
paas
iaas
all of the mentioned
8. Which of the following cloud does not require mapping?
public
private
hybrid
none of thementioned
9. Which of the following service model is owned in terms of infrastructure byboth vendor and customer?
public
private
hybrid
none of thementioned
10. Which of the following model type is not trusted in terms of security?
public
private
hybrid
None of the mentioned
11. Which of the following has infrastructure security managed and owned bythe vendor?
hybrid
private/community
public
None of the mentioned
12. Point out the wrong statement.
each different type of cloud service delivery model creates a security boundary
any security mechanism below the security boundary must be built into the system
any security mechanism above the security boundary must be maintained by the customer
All of the mentioned
13. is an application for collecting messages sent in RSS and Atomformat from information providers.
google reader
yahoo mail
emailrackspace
All of the mentioned
14. Which of the following application is a newsreader?
google reader
bloglines
newsgator online
All of the mentioned
15. Which of the following was developed an alternative to XML syndication byIETF?
atom publishingprotocol
atom subscribingprotocol
atom subscribeprotocol
none of thementioned
16. How many technologies are used for most of the syndicated content on theInternet?
1
2
3
4
17. The full form of AJAX is
asynchronousjavascript and xml
another java andxml library
abstract json andxml
None of the mentioned
18. Which of the following type of virtualization is also characteristic of cloudcomputing?
storage
application
cpu
All of the mentioned
19. Virtual Machines (VMs) are offered in cloud by
saas B. C.
paas
iaas
None of the mentioned
20. The technology used to distribute service requests to resources is referred toas
load performing
load scheduling
load balancing
all of the mentioned
21. computing refers to applications and services that run on a distributed networkusing virtualized resources.
distributed
cloud
soft
parallel
22. Cloud computing is an abstraction based on the notion of pooling physical resources andpresenting them as a resource.
real
virtual
cloud
None of the mentioned
23. Amazon’s Elastic Compute Cloud (EC2) is a well known .
virtual machine
cloud storage
paas
soa
24. Amazon’s Elastic Compute Cloud (EC2) is a well known . B. cloud storage C. D.
virtual machine
cloud storage
paas
soa
25. virtualization abstracts networking hardware and software into avirtual network that can be managed.
storage
network
software
none of thementioned
26. Which of the following provide system resource access to virtual machines ?
vmm
vmc
vnm
all of the mentioned
27. An operating system running on a Type VM is a full virtualization.
1
2
3
all of the mentioned
28. Point out the wrong statement.
in gmail, you can construct searches with multiple operators using the advanced search feature
rss and atom are prototypes of a class of xml specifications called synchronized markup languages
a typical rss document or feed contains text and metadata that can be used to indicate publication dates
none of the mentioned
29. JavaScript is also called server-side JavaScript.
microsoft
navigator
livewire
none
30. Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into aphysical storage address?
storage
network
software
none of the mentioned
31. Point out the wrong statement.
a virtual network can create virtual network interfaces
instantiating a virtual machine is a very slow process
you can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtualmachines
All of the above
32. AMI(Amazon Machine Image) imaging service is provided by Amazon for
private use
public use
pay-per-use
All of the mentioned
33. AMI(Amazon Machine Image) imaging service is provided by Amazon for
private use
public use
pay-per-use
all of the mentioned
34. Amazon Web Services (AWS) is an example of
software as a service(saas)
infrastructure as aservice (iaas)
platform as a service(paas)
none of thementioned
35. Which of the following is Type 1 Hypervisor ?
wind river simics
virtual server 2005r2
kvm
lynxsecure
36. Which of the following is Type 2 VM ?
virtuallogix vlx
vmware esx
xen
lynxsecure
37. In the virtual machine simulates hardware, so it can be independentof the underlying system hardware.
paravirtualization
full virtualization
emulation
none of thementioned
38. In a scheme, the VM is installed as a Type 1 Hypervisor directlyonto the hardware.
paravirtualization
full virtualization
emulation
none of thementioned
39. Full virtualization Full virtualization
simulates hardware within software
has vms with the same os
clones images
alters the guest os
40. What are the goals of Hypervisor design?
scalability
reliability
isolation
all of the above
41. Bare metal hypervisor sits on top of
physical hardware
virtualized hardware
operating system
None of the above
42. If virtualization occurs at application level, OS level and hardware level, then such service in cloud is
iaas
saas
paas
no such service
43. Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Requestiii) VM in operation iv) VM Provision
ii, i, iii, iv
i, ii, iii & iv
ii, iii, iv & i
ii, iv, iii & i
44. where a VM can be moved from one physicalmachine to another even as it continues to execute.
load balancing
migration
live migration
server consolidation
45. Which type of Hypervisor is shown in the following figure ?
type 1
type 2
type 3
All of the mentioned
46. Which of the following should be placed in second lowermost layer for the following figure ?
host operating system
software
vm
none of the mentioned
47. Which of the following type of virtualization is found in hypervisor such asMicrosoft’s Hyper-V ?
paravirtualization
full virtualization
emulation
none of thementioned
48. Point out the wrong statement :
full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm
guest operating systems in full virtualization systems are generally faster than other virtualization schemes
a process virtual machine instantiates when a command begins a process
All of the mentioned
49. Which of the following operating system support operating systemvirtualization ?
windows nt
sun solaris
windows xp
compliance
50. Which of the following allows a virtual machine to run on two or more physical processors at the same time ?
virtual smp
distributed resource scheduler
vnetwork distributed switch
storage vmotion
51. VMM is
a virtual machine
hardware
host os
a layer of software
52. VMM facilitates sharing of
memory & i/o
cpu, memory & i/o
cpu & memory
i/o & cpu
53. The BEST way to define Virtualization in cloud computing is
virtualization enables simulating compute, network, and storage service platforms from the underlying virtual hardware
virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware
virtualization enables realization of compute, network, and storage service platforms from the underlying virtual hardware
virtualization enables emulating compute, network, and storage service platforms from the underlying virtual hardware
54. Which one is NOT generally a change after Virtualization?
virtual machines can be provisioned to any system
hardware- independence of operating system and applications
can manage os and application as a single unit by encapsulating them into virtual machines.
software and hardware tightly coupled
55. Which one of the statement is generally NOT correct for Microkernelized Hypervisor?
drivers run within guests
simple partitioning functionality
increase reliability and minimize lowest level of the tcb
contains its own drivers model
56. Which one of the statement is generally NOT correct for Microkernelized Hypervisor?
drivers run within guests
simple partitioning functionality
increase reliability and minimize lowest level of the tcb
contains its own drivers model
57. In multiple VM processing, CPU is alloted to the different processes in form of:
A. space slices by the os
different cpus are allocated to differentprocesses
. time slices by the os
frequecy slices by the os
58. In multiple VM processing, CPU is alloted to the different processes in form of:
A. space slices by the os
different cpus are allocated to differentprocesses
. time slices by the os
frequecy slices by the os
59. Appear IQ, Mendix, Amazon Web Services (AWS) Elastic Beanstalk, Google App Engine and Heroku, are some of the example of providing services for:
iaas
saas
paas
none
60. Which one of the cases not impacting major system availability
A. service performance degrade
service outage by unplanned downtime
live migration of vm for load balancing
service outage by planned downtime
61. Which of the following provides a bridge between a company’s existing network and the AWS cloud?
amazon virtual private cloud
aws premium support
amazon fulfillment web services
all of the mentioned
62. Which of the following provides a bridge between a company’s existing network and the AWS cloud?
amazon virtual private cloud
aws premium support
amazon fulfillment web services
all of the mentioned
63. Which of the following provides a bridge between a company’s existing network and the AWS cloud?
amazon virtual private cloud
aws premium support
amazon fulfillment web services
all of the mentioned
64. In multiple VM processing, CPU is alloted to the different processes in form of:
space slices by the os
different cpus are allocated to differentprocesses
time slices by the os
frequecy slices by the os
65. Which of the following is the central application in the AWS portfolio?
amazon elastic compute cloud
amazon simple queue service
amazon simple notification service
amazon simple storage system
66. Which of the following is a message queue or transaction system for distributed Internet-based applications?
amazon elastic compute cloud
amazon simple queue service
amazon simple notification service
amazon simple storage system
67. Point out the wrong statement.
between fba and fws, you can create a nearly virtual store on amazon.com
amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio
fps is exposed as an api that sorts transactions into packages called quick starts that makes it easy to implement
none of the mentioned
68. Which of the following is Amazon’s technical support and consulting business?
amazon virtual private cloud
aws premium support
amazon fulfillment web services
All of the mentioned
69. Which of the following is a method for bidding on unused EC2 capacity basedon the current spot price?
on-demand instance
reserved instances
spot instance
All of the mentioned
70. Which of the following instance has an hourly rate with no long-termcommitment?
A. on-demand instance
reserved instances
spot instance
all of the mentioned
71. Which of the following tool is used for measuring I/O of your systems toestimate these transaction costs?
ebs
iostat
esw
All of the mentioned
72. Point out the wrong statement.
the cost of creating an ebs volume is lesser than creating a similarly sized s3bucket
an ebs volume can be used as an instance boot partition
ebs boot partitions can be stopped and started, and they offer fast ami boottimes
none of the mentioned
73. Which of the following is also referred to edge computing?
cloudwave
cloudfront
cloudspot
All of the mentioned
74. Amazon EMR uses Hadoop processing combined with several products.
aws
asq
amr
awes
75. What is a virtual server platform that allows users to create and run virtualmachines on Amazon’s server farm.
azure
. ec2
ec5
none of thementioned
76. is the central application in the AWS portfolio.
amazon simple queue service
amazon elastic compute cloud
amazon simple notification service
All of the above
77. is the central application in the AWS portfolio.
amazon simple queue service
amazon elastic compute cloud
amazon simple notification service
All of the above
78. Point out the wrong statement.
virtual private servers can provision virtual private clouds connected through virtual private networks B.
amazon web services is based on soa standards
starting in 2012, amazon.com made its web service platform available to developers on a usage-basis model
All of the mentioned
79. Point out the correct statement.
sql server is having enormous impact on cloud computing
amazon.com’s services represent the largest pure infrastructure as aservice (iaas)
ec2 is a platform as a service (paas) market
none of the mentioned
80. Which of the following is a system for creating block level storage devices thatcan be used for Amazon Machine Instances in EC2?
cloudwatch
amazon elastic blockstore
aws import/export
all of the mentioned
Submit