Quiznetik

Cloud Computing | Set 1

1. Cloud model relies on

Correct : A. communication api

2. What widely used service is built on cloud-computing technology?

Correct : D. all of the above

3. HTTP is a protocol

Correct : B. unidirectional

4. websocket is a         Protocol

Correct : D. all of the above

5. Websocket protocol uses which communication model

Correct : A. publish-subscribe

6. Which of these techniques is vital for creating cloud-computing centers

Correct : A. virtualization

7. An internal cloud is…

Correct : D. the group of knowledge workers who use a social network for water- cooler gossip

8. Which of these is not an antecedent of the cloud?

Correct : D. desktop computing

9. Which of the following subject area deals with pay-as-you-go usage model?

Correct : A. accounting management

10. Point out the correct statement

Correct : B. cloud computing vendors run very reliable networks

11. captive requires that the cloud accommodate multiple compliance regimes.

Correct : B. policy-based

12. Security methods such as private encryption, VLANs and firewalls comes under subject area.

Correct : C. data privacy

13. Which of the following captive area deals with monitoring?

Correct : B. variable but under control

14. Network bottlenecks occur when              data sets must be transferred

Correct : A. large

15. Amazon AWS Consists of following services

Correct : D. all of above

16. RDS is a type of database

Correct : A. sql

17. Dynamodb is type of storage

Correct : A. nonsql

18. Cloud                  are standardized in order to appeal to the majority of its audience.

Correct : B. slas

19. The reputation for cloud computing services for the quality of those services is shared by

Correct : C. tenants

20. is a function of the particular enterprise and application in an on- premises deployment.

Correct : B. vendor lock-in

21. computing refers to applications and services that run on a distributed network using virtualized resources.

Correct : B. cloud

22. .                  as a utility is a dream that dates from the beginning of the computing industry itself

Correct : B. computing

23. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

Correct : A. iaas

24. Which of the following is essential concept related to Cloud?

Correct : C. abstraction

25. Point out the wrong statement

Correct : C. technology it is built on is evolutionary

26. Which of the cloud concept is related to pooling and sharing of resources

Correct : C. virtualization

27. has many of the characteristics of what is now being called cloud computing

Correct : A. internet

28. Which of the following can be identified as cloud

Correct : C. hadoop

29. Which of the following is the deployment model?

Correct : D. all of the mentioned

30. Which of the following is best known service model?

Correct : D. all of the mentioned

31. Which of the following is the highest degree of integration in cloud computing?

Correct : A. saas

32. Which of the architectural layer is used as a front end in cloud computing?

Correct : A. client

33. Which of the following benefit is provided by the PaaS service provider

Correct : D. all of the mentioned

34. Communication between services is done widely using                protocol

Correct : C. restful

35. Which of the following provider rely on the virtual machine technology to deliver servers?

Correct : D. iaas

36. Which of the following component is called hypervisor?

Correct : C. vmm

37. Applications such as a Web server or database server that can run on a virtual machine image are referred to as

Correct : B. virtual appliances

38. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of          nodes.

Correct : B. xen

39. is a CPU emulator and virtual machine monitor

Correct : C. qemu

40. The source of HDFS architecture in Hadoop originated as

Correct : A. google distributed filesystem

41. What is HDFS?

Correct : A. storage layer

42. Which among the following command is used to copy a directory from one node to another in HDFS?

Correct : B. distcp

43. Which utility is used for checking the health of an HDFS file system?

Correct : A. fsck

44. Which among the following is the correct statement

Correct : B. namenode stores metadata

45. What is default replication factor?

Correct : C. 3

46. The namenode knows that the data node is active using a mechanism known as

Correct : C. heartbeats

47. What is the default size of HDFS Data Block?

Correct : D. 128mb

48. What is HDFS Block in Hadoop?

Correct : B. it is the physical representation of data

49. Which of the following is the correct statement?

Correct : A. datanode is the slave/worker node and holds the user data in the form of data blocks

50. The need for data replication can arise in various scenarios like

Correct : D. all of the above

51. A file in HDFS that is smaller than a single block size

Correct : D. occupies only the size it needs and not the full block

52. Which among the following are the duties of the NameNodes

Correct : A. manage file system namespace

53. If the IP address or hostname of a data node changes

Correct : C. the namenode need not update mapping between file name and block name

54. For the frequently accessed HDFS files the blocks are cached in

Correct : A. the memory of the data node

55. Which scenario demands highest bandwidth for data transfer between nodes

Correct : C. nodes in different data centers

56. When a client contacts the namenode for accessing a file, the namenode responds with

Correct : B. block id and hostname of all the data nodes containing that block

57. In HDFS the files cannot be

Correct : C. executed

58. Which among the following is the duties of the Data Nodes

Correct : D. perform read-write operation as per request for the clients

59. NameNode and DataNode do communicate using

Correct : B. heartbeats

60. Amazon EC2 provides virtual computing environments, known as :

Correct : B. instances

61. Data stored in                      domains doesn’t require maintenance of a schema.

Correct : A. simpledb

62. Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

Correct : B. amazon elastic block store

63. Which of the following type of virtualization is also characteristic of cloud computing

Correct : D. all of the mentioned

64. Which of the following is most important feature of cloud storage listed below ?

Correct : A. logon authentication

65. Which of the following is open cloud storage management standard by SNIA ?

Correct : A. cdmi

66. Which of the following system does not provision storage to most users ?

Correct : B. iaas

67. Which of the following service is provided by Google for online storage ?

Correct : A. drive

68. Which of the following backup create a cloned copy of your current data or drive ?

Correct : A. continuous data protection

69. Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes ?

Correct : A. block

70. Which of the following should be used considering factors shown in the figure?

Correct : B. rds

71. Point out the wrong statement.

Correct : D. none of the mentioned

72. Which of the following is an edge-storage or content-delivery system that caches data in different physical locations?

Correct : C. amazon cloudfront

73. Which of the following allows you to create instances of the MySQL database to support your Web sites?

Correct : C. amazon relational database service

74. . Which of the following allows you to create instances of the MySQL database to support your Web sites?

Correct : C. amazon relational database service

75. Point out the correct statement.

Correct : B. simpledb interoperates with both amazon ec2 and amazon s3

76. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?

Correct : B. amazon associates web services

77. Which of the following is a billing and account management service?

Correct : C. amazon devpay

78. Which of the following is not the feature of Network management systems?

Correct : D. none of the mentioned

79. Which of the following service provider provides the least amount of built in security?

Correct : C. iaas

80. Point out the correct statement.

Correct : D. all of the mentioned

81. Which of the following services that need to be negotiated in Service Level Agreements?

Correct : D. all of the mentioned

82. The following flowchart is intended to evaluate                      in any cloud.

Correct : A. risk

83. Point out the wrong statement.

Correct : C. cloud computing doesn’t have vulnerabilities associated with internet applications

84. Which of the following area of cloud computing is uniquely troublesome?

Correct : D. all of the mentioned

85. Which of the following is the operational domain of CSA(Cloud Security Alliance)?

Correct : B. portability and interoperability

86. Which of the following is considered an essential element in cloud computing by CSA?

Correct : A. multi-tenancy

87. Which of the following is used for Web performance management and load testing?

Correct : B. webmetrics

88. Which of the following service provider provides the highest level of service?

Correct : A. saas

89. Point out the correct statement.

Correct : C. saas is an operating environment with applications, management, and the user interface

90. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

Correct : A. cas

91. For the                    model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

Correct : B. paas

92. Which of the following model allows vendor to provide security as part of the Service Level Agreement?

Correct : A. saas

93. Which of the following cloud does not require mapping?

Correct : A. public

94. Which of the following service model is owned in terms of infrastructure by both vendor and customer?

Correct : C. hybrid

95. Which of the following model type is not trusted in terms of security?

Correct : A. public

96. Which of the following has infrastructure security managed and owned by the vendor?

Correct : B. private/community

97. Point out the wrong statement.

Correct : D. all of the mentioned

98. is an application for collecting messages sent in RSS and Atom format from information providers.

Correct : A. google reader

99. Which of the following application is a newsreader?

Correct : D. all of the mentioned

100. Which of the following was developed an alternative to XML syndication by IETF?

Correct : A. atom publishing protocol