Quiznetik
Cloud Computing | Set 10
1. Point out the correct statement.
A. with atmos, you can create your own cloud storage system or leverage a public cloud service with atmos online
B. ibm is a major player in cloud computing particularly for businesses
C. in managed storage, the storage service provider makes storage capacity available to users
D. all of the mentioned
Correct : A. with atmos, you can create your own cloud storage system or leverage a public cloud service with atmos online
2. Redundancy has to be implemented at the architectural level for effective results in cloud computing.
A. lower
B. higher
C. middle
D. all of the mentioned
Correct : B. higher
3. Which of the following can manage data from CIFS and NFS file systems over HTTP networks?
A. storagegrid
B. datagrid
C. diskgrid
D. all of the mentioned
Correct : A. storagegrid
4. Point out the wrong statement.
A. aws s3 essentially lets you create your own cloud storage
B. aws created “availability zones” within regions, which are sets of systems that are isolated from one another
C. amazon web services (aws) adds redundancy to its iaas systems by allowing ec2 virtual machine instances
D. none of the mentioned
Correct : D. none of the mentioned
5. A is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs and WRITEs.
A. gets
B. pun
C. lun
D. all of the mentioned
Correct : C. lun
6. Which of the following use LUNs to define a storage volume that appears to a connected computer as a device?
A. san
B. iscsi
C. fibre channel
D. all of the mentioned
Correct : D. all of the mentioned
7. Which of the following protocol is used for discovering and retrieving objects from a cloud?
A. occi
B. smtp
C. http
D. all of the mentioned
Correct : A. occi
8. Which of the following disk operation is performed When a tenant is granted access to a virtual storage container?
A. crud
B. file system modifications
C. partitioning
D. all of the mentioned
Correct : D. all of the mentioned
9. Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud?
A. cdmi
B. ocmi
C. coa
D. all of the mentioned
Correct : A. cdmi
10. IBM and have announced a major initiative to use Hadoop to support university courses in distributed computer programming.
A. google latitude
B. android (operating system)
C. google variations
D. google
Correct : D. google
11. Point out the correct statement.
A. hadoop is an ideal environment for extracting and transforming small volumes of data
B. hadoop stores data in hdfs and supports data compression/decompression
C. the giraph framework is less useful than a mapreduce job to solve graph and machine learning
D. none of the mentioned
Correct : B. hadoop stores data in hdfs and supports data compression/decompression
12. What license is Hadoop distributed under?
A. apache license 2.0
B. mozilla public license
C. shareware
D. commercial
Correct : A. apache license 2.0
13. Sun also has the Hadoop Live CD project, which allows running a fully functional Hadoop cluster using a live CD.
A. openoffice.org
B. opensolaris
C. gnu
D. linux
Correct : B. opensolaris
14. Hadoop achieves reliability by replicating the data across multiple hosts and hence does not require storage on hosts.
A. raid
B. standard raid levels
C. zfs
D. operating system
Correct : A. raid
15. What was Hadoop written in?
A. java (software platform)
B. perl
C. java (programming language)
D. lua (programming language)
Correct : C. java (programming language)
16. The Hadoop list includes the HBase database, the Apache Mahout system, and matrix operations.
A. machine learning
B. pattern recognition
C. statistical classification
D. artificial intelligence
Correct : A. machine learning
17. The Mapper implementation processes one line at a time via method. TOPIC 5.2 MAPREDUCE
A. map
B. reduce
C. mapper
D. reducer
Correct : A. map
18. Point out the correct statement.
A. mapper maps input key/value pairs to a set of intermediate key/value pairs
B. applications typically implement the mapper and reducer interfaces to provide the map and reduce methods
C. mapper and reducer interfaces form the core of the job
D. none of the mentioned
Correct : D. none of the mentioned
19. The Hadoop MapReduce framework spawns one map task for each generated by the InputFormat for the job.
A. outputsplit
B. inputsplit
C. inputsplitstream
D. all of the mentioned
Correct : B. inputsplit
20. Users can control which keys (and hence records) go to which Reducer by implementing a custom?
A. partitioner
B. outputsplit
C. reporter
D. all of the mentioned
Correct : A. partitioner
21. Point out the wrong statement.
A. the mapper outputs are sorted and then partitioned per reducer
B. the total number of partitions is the same as the number of reduce tasks for the job
C. the intermediate, sorted outputs are always stored in a simple (key-len, key, value-len, value) format
D. none of the mentioned
Correct : D. none of the mentioned
22. Applications can use the to report progress and set application-level status messages.
A. partitioner
B. outputsplit
C. reporter
D. all of the mentioned
Correct : C. reporter
23. The right level of parallelism for maps seems to be around maps per- node.
A. 1-10
B. 10-100
C. 100-150
D. 150-200
Correct : B. 10-100
24. The number of reduces for the job is set by the user via
A. jobconf.setnumtasks(int)
B. jobconf.setnumreducetasks(int)
C. jobconf.setnummaptasks(int)
D. all of the mentioned
Correct : B. jobconf.setnumreducetasks(int)
25. The framework groups Reducer inputs by key in stage.
A. sort
B. shuffle
C. reduce
D. none of the mentioned
Correct : A. sort
26. The output of the reduce task is typically written to the FileSystem via
A. outputcollector.collect
B. outputcollector.get
C. outputcollector.receive
D. outputcollector.put
Correct : A. outputcollector.collect
27. Which type of Hypervisor is shown in the following figure?
A. type 1
B. type 2
C. type 3
D. all of the mentioned
Correct : A. type 1
28. Point out the wrong statement.
A. load balancing virtualizes systems and resources by mapping a logical address to a physical address
B. multiple instances of various google applications are running on different hosts
C. google uses hardware virtualization
D. all of the mentioned
Correct : C. google uses hardware virtualization
29. Which of the following is another name for the system virtual machine?
A. hardware virtual machine
B. software virtual machine
C. real machine
D. none of the mentioned
Correct : A. hardware virtual machine
30. Which of the following provide system resource access to virtual machines?
A. vmm
B. vmc
C. vnm
D. all of the mentioned
Correct : A. vmm
31. An operating system running on a Type VM is full virtualization.
A. 1
B. 2
C. 3
D. all of the mentioned
Correct : A. 1
32. Which of the following is Type 1 Hypervisor?
A. wind river simics
B. virtual server 2005 r2
C. kvm
D. lynxsecure
Correct : D. lynxsecure
33. Which of the following is Type 2 VM?
A. virtuallogix vlx
B. vmware esx
C. xen
D. lynxsecure
Correct : C. xen
34. Which of the following will be the host operating system for Windows Server?
A. virtuallogix vlx
B. microsoft hyper-v
C. xen
D. all of the mentioned
Correct : B. microsoft hyper-v
35. Which of the following should be placed in second lowermost layer for the following figure?
A. host operating system
B. software
C. vm
D. none of the mentioned
Correct : A. host operating system
36. Which of the following algorithm is used by Google to determine the importance of a particular page?
A. svd
B. pagerank
C. fastmap
D. all of the mentioned
Correct : B. pagerank
37. Point out the correct statement.
A. with paas, the goal is to create hosted scalable applications that are used in a software as a service model
B. applications built using paas tools need to be standards-based
C. in wolf, the data and transaction management conforms to the business rules you create
D. all of the mentioned
Correct : D. all of the mentioned
38. Based on PageRank algorithm, Google returns for a query that is parsed for its keywords.
A. sep
B. sap
C. serp
D. business objects build
Correct : C. serp
39. Point out the wrong statement.
A. wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
B. applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
C. google applications are cloud-based applications
D. none of the mentioned
Correct : B. applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
40. Which of the following protocol lets a Web site list in an XML file information?
A. sitemaps
B. mashups
C. hashups
D. all of the mentioned
Correct : A. sitemaps
41. Which of the following is not provided by “Deep Web”?
A. database generated web pages
B. private or limited access web pages
C. pages without links
D. all of the mentioned
Correct : D. all of the mentioned
42. Dynamic content presented in Google crawling isn’t normally indexed.
A. ajax
B. java
C. javascript
D. all of the mentioned
Correct : A. ajax
43. Which of the following google product sends you periodic email alerts based on your search term?
A. alerts
B. blogger
C. calendar
D. all of the mentioned
Correct : A. alerts
44. Which of the following is a payment processing system by Google?
A. paytm
B. checkout
C. code
D. all of the mentioned
Correct : B. checkout
45. How many types of protocols are important for instant messaging?
A. 2
B. 3
C. 4
D. all of the mentioned
Correct : B. 3
46. Point out the correct statement.
A. every third-party im clients aim to allow their users to connect to the different major im services
B. sip stands for secure initiation protocol
C. xmpp stands for extensible messaging and presence protocol
D. all of the mentioned
Correct : C. xmpp stands for extensible messaging and presence protocol
47. Which of the following protocol is adopted for interoperability by top three IM service providers?
A. sip
B. simple
C. xmpp
D. imps
Correct : B. simple
48. Which of the following protocol is not an Internet Engineering Task Force standard?
A. sip
B. simple
C. xmpp
D. imps
Correct : D. imps
49. Point out the wrong statement.
A. all im clients use peer-to-peer messaging
B. im software aimed at businesses such as xmpp, lotus sametime, and microsoft office communicator use a client/server architecture
C. instant messaging is as popular in business as it is in personal communications
D. none of the mentioned
Correct : D. none of the mentioned
50. Which of the following IM client allow their users to connect to the different major IM services?
A. pidgin
B. miranda im
C. trillian
D. all of the mentioned
Correct : D. all of the mentioned
51. Which of the following is also referred to as Short Message Service?
A. mini-blogs
B. micro-blogs
C. nano-blogs
D. none of the mentioned
Correct : B. micro-blogs
52. Which of the following is a good example of an SMS service organized into a social network and blog?
A. twitter
B. facebook
C. instagram
D. none of the mentioned
Correct : A. twitter
53. Which of the following language is used to build a message server queue in twitter?
A. ruby
B. scala
C. java
D. all of the mentioned
Correct : B. scala
54. Which of the following version of office suite is shown in the figure?
A. offline
B. online
C. online and offline
D. none of the mentioned
Correct : B. online
55. HTTP is a ______ protocol
A. stateful
B. unidirectional
C. bidirectional
D. full dulpex
Correct : B. unidirectional
56. websocket is a____ Protocol
A. stateful
B. bidirectional
C. connection oriented
D. all of the above
Correct : D. all of the above
57. Websocket protocol uses which communication model
A. Publish-Subscribe
B. Request Response
C. Push-Pull
D. Exclusive Pair
Correct : A. Publish-Subscribe
58. An internal cloud is…
A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate
D. The group of knowledge workers who use a social network for water-cooler gossip
Correct : D. The group of knowledge workers who use a social network for water-cooler gossip
59. Which of the following subject area deals with pay-as-you-go usage model?
A. Accounting Management
B. Compliance
C. Data Privacy
D. All of the mentioned
Correct : A. Accounting Management
60. ________ captive requires that the cloud accommodate multiple compliance regimes.
A. Licensed
B. Policy-based
C. Variable
D. All of the mentioned
Correct : B. Policy-based
61. Security methods such as private encryption, VLANs and firewalls comes under __________ subject area.
A. Accounting Management
B. Compliance
C. Data Privacy
D. All of the mentioned
Correct : C. Data Privacy
62. Which of the following captive area deals with monitoring?
A. Licensed
B. Variable but under control
C. Law
D. All of the mentioned
Correct : B. Variable but under control
63. Network bottlenecks occur when ______ data sets must be transferred
A. large
B. small
C. big
D. all of the mentioned
Correct : A. large
64. RDS is a_____ type of database
A. SQL
B. NonSQL
C. Simple storage
D. all of above
Correct : A. SQL
65. Dynamodb is ____ type of storage
A. NonSQL
B. SQL
C. Simple storage
D. all of above
Correct : A. NonSQL
66. Cloud ________ are standardized in order to appeal to the majority of its audience.
A. SVAs
B. SLAs
C. SALs
D. None of the mentioned
Correct : B. SLAs
67. The reputation for cloud computing services for the quality of those services is shared by _________
A. replicas
B. shards
C. tenants
D. all of the mentioned
Correct : C. tenants
68. ___________ is a function of the particular enterprise and application in an on-premises deployment.
A. Vendor lock
B. Vendor lock-in
C. Vendor lock-ins
D. None of the mentioned
Correct : B. Vendor lock-in
69. _________ computing refers to applications and services that run on a distributed network using virtualized resources.
A. Distributed
B. Cloud
C. Soft
D. Parallel
Correct : B. Cloud
70. . ________ as a utility is a dream that dates from the beginning of the computing industry itself
A. Model
B. Computing
C. Software
D. All of the mentioned
Correct : B. Computing
71. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on
A. Iaas
B. Paas
C. Saas
D. All of the mentioned
Correct : A. Iaas
72. ________ has many of the characteristics of what is now being called cloud computing
A. Internet
B. Softwares
C. Web Service
D. All of the mentioned
Correct : A. Internet
73. Which of the following is Cloud Platform by Amazon?
A. Azure
B. AWS
C. Cloudera
D. All of the mentioned
Correct : B. AWS
74. Which of the following is the deployment model?
A. public
B. private
C. hybrid
D. all of the mentioned
Correct : D. all of the mentioned
75. Which of the following is best known service model?
A. SaaS
B. IaaS
C. PaaS
D. All of the mentioned
Correct : D. All of the mentioned
76. Which of the architectural layer is used as a front end in cloud computing?
A. client
B. cloud
C. soft
D. all of the mentioned
Correct : A. client
77. Which of the following benefit is provided by the PaaS service provider
A. A larger pool of qualified developers
B. More reliable operation
C. A logical design methodology
D. All of the mentioned
Correct : D. All of the mentioned
78. Communication between services is done widely using _______ protocol
A. REST
B. SOAP
C. RESTful
D. None of the mentioned
Correct : C. RESTful
79. Which of the following provider rely on the virtual machine technology to deliver servers?
A. CaaS
B. AaaS
C. PaaS
D. IaaS
Correct : D. IaaS
80. Which of the following component is called hypervisor?
A. VGM
B. VMc
C. VMM
D. All of the mentioned
Correct : C. VMM
81. Applications such as a Web server or database server that can run on a virtual machine image are referred to as __
A. virtual server
B. virtual appliances
C. machine imaging
D. all of the mentioned
Correct : B. virtual appliances
82. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.
A. Ben
B. Xen
C. Ken
D. Zen
Correct : B. Xen
83. __________ is a CPU emulator and virtual machine monitor
A. Imaging
B. Parallels
C. QEMU
D. None of the mentioned
Correct : C. QEMU
84. Which of the following provider rely on the virtual machine technology to deliver servers?
A. CaaS
B. AaaS
C. PaaS
D. IaaS
Correct : D. IaaS
85. __________ is a CPU emulator and virtual machine monitor
A. Imaging
B. Parallels
C. QEMU
D. None of the mentioned
Correct : C. QEMU
86. The source of HDFS architecture in Hadoop originated as
A. Google distributed filesystem
B. Yahoo distributed filesystem
C. Facebook distributed filesystem
D. Amazon S3 storage
Correct : A. Google distributed filesystem
87. What is default replication factor?
A. 1
B. 2
C. 3
D. 5
Correct : C. 3
88. What is HDFS Block in Hadoop?
A. It is the logical representation of data
B. It is the physical representation of data
C. Both the above
D. None of the above
Correct : B. It is the physical representation of data
89. The need for data replication can arise in various scenarios like
A. DataNode is the slave/worker node and holds the user data in the form of Data Blocks
B. DataNode goes down
C. Data Blocks get corrupted
D. All of the above
Correct : D. All of the above
90. If the IP address or hostname of a data node changes
A. The namenode updates the mapping between file name and block name
B. The data in that data node is lost forever
C. The namenode need not update mapping between file name and block name
D. There namenode has to be restarted
Correct : C. The namenode need not update mapping between file name and block name
91. For the frequently accessed HDFS files the blocks are cached in
A. The memory of the data node
B. In the memory of the namenode
C. Both the above
D. None of the above
Correct : A. The memory of the data node
92. In HDFS the files cannot be
A. Read
B. Deleted
C. Executed
D. Archived
Correct : C. Executed
93. Which of the following is not the feature of Network management systems?
A. Accounting
B. Security
C. Performance
D. None of the mentioned
Correct : D. None of the mentioned
94. Which of the following service provider provides the least amount of built in security?
A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Correct : C. IaaS
95. Point out the correct statement.
A. Different types of cloud computing service models provide different levels of security services
B. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required
C. Data should be transferred and stored in an encrypted format for security purpose
D. All of the mentioned
Correct : D. All of the mentioned
96. Point out the wrong statement.
A. You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B. Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
C. Cloud computing doesn’t have vulnerabilities associated with Internet applications
D. All of the mentioned
Correct : C. Cloud computing doesn’t have vulnerabilities associated with Internet applications
97. Which of the following is the operational domain of CSA(Cloud Security Alliance)?
A. Scalability
B. Portability and interoperability
C. Flexibility
D. None of the mentioned
Correct : B. Portability and interoperability
98. Which of the following is considered an essential element in cloud computing by CSA?
A. Multi-tenancy
B. Identity and access management
C. Virtualization
D. All of the mentioned
Correct : A. Multi-tenancy
99. Which of the following is used for Web performance management and load testing?
A. VMware Hyperic
B. Webmetrics
C. Univa UD
D. Tapinsystems
Correct : B. Webmetrics
100. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
A. CAS
B. CSA
C. SAC
D. All of the mentioned
Correct : A. CAS