Quiznetik

Cloud Computing | Set 10

1. Point out the correct statement.

Correct : A. with atmos, you can create your own cloud storage system or leverage a public cloud service with atmos online

2. Redundancy has to be implemented at the                    architectural level for effective results in cloud computing.

Correct : B. higher

3. Which of the following can manage data from CIFS and NFS file systems over HTTP networks?

Correct : A. storagegrid

4. Point out the wrong statement.

Correct : D. none of the mentioned

5. A                  is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs and WRITEs.

Correct : C. lun

6. Which of the following use LUNs to define a storage volume that appears to a connected computer as a device?

Correct : D. all of the mentioned

7. Which of the following protocol is used for discovering and retrieving objects from a cloud?

Correct : A. occi

8. Which of the following disk operation is performed When a tenant is granted access to a virtual storage container?

Correct : D. all of the mentioned

9. Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud?

Correct : A. cdmi

10. IBM and                  have announced a major initiative to use Hadoop to support university courses in distributed computer programming.

Correct : D. google

11. Point out the correct statement.

Correct : B. hadoop stores data in hdfs and supports data compression/decompression

12. What license is Hadoop distributed under?

Correct : A. apache license 2.0

13. Sun also has the Hadoop Live CD                  project, which allows running a fully functional Hadoop cluster using a live CD.

Correct : B. opensolaris

14. Hadoop achieves reliability by replicating the data across multiple hosts and hence does not require                  storage on hosts.

Correct : A. raid

15. What was Hadoop written in?

Correct : C. java (programming language)

16. The Hadoop list includes the HBase database, the Apache Mahout                   system, and matrix operations.

Correct : A. machine learning

17. The Mapper implementation processes one line at a time via                    method. TOPIC 5.2 MAPREDUCE

Correct : A. map

18. Point out the correct statement.

Correct : D. none of the mentioned

19. The Hadoop MapReduce framework spawns one map task for each                       generated by the InputFormat for the job.

Correct : B. inputsplit

20. Users can control which keys (and hence records) go to which Reducer by implementing a custom?

Correct : A. partitioner

21. Point out the wrong statement.

Correct : D. none of the mentioned

22. Applications can use the                          to report progress and set application-level status messages.

Correct : C. reporter

23. The right level of parallelism for maps seems to be around                    maps per- node.

Correct : B. 10-100

24. The number of reduces for the job is set by the user via

Correct : B. jobconf.setnumreducetasks(int)

25. The framework groups Reducer inputs by key in                    stage.

Correct : A. sort

26. The output of the reduce task is typically written to the FileSystem via

Correct : A. outputcollector.collect

27. Which type of Hypervisor is shown in the following figure?

Correct : A. type 1

28. Point out the wrong statement.

Correct : C. google uses hardware virtualization

29. Which of the following is another name for the system virtual machine?

Correct : A. hardware virtual machine

30. Which of the following provide system resource access to virtual machines?

Correct : A. vmm

31. An operating system running on a Type              VM is full virtualization.

Correct : A. 1

32. Which of the following is Type 1 Hypervisor?

Correct : D. lynxsecure

33. Which of the following is Type 2 VM?

Correct : C. xen

34. Which of the following will be the host operating system for Windows Server?

Correct : B. microsoft hyper-v

35. Which of the following should be placed in second lowermost layer for the following figure?

Correct : A. host operating system

36. Which of the following algorithm is used by Google to determine the importance of a particular page?

Correct : B. pagerank

37. Point out the correct statement.

Correct : D. all of the mentioned

38. Based on PageRank algorithm, Google returns                      for a query that is parsed for its keywords.

Correct : C. serp

39. Point out the wrong statement.

Correct : B. applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content

40. Which of the following protocol lets a Web site list in an XML file information?

Correct : A. sitemaps

41. Which of the following is not provided by “Deep Web”?

Correct : D. all of the mentioned

42. Dynamic content presented in Google                crawling isn’t normally indexed.

Correct : A. ajax

43. Which of the following google product sends you periodic email alerts based on your search term?

Correct : A. alerts

44. Which of the following is a payment processing system by Google?

Correct : B. checkout

45. How many types of protocols are important for instant messaging?

Correct : B. 3

46. Point out the correct statement.

Correct : C. xmpp stands for extensible messaging and presence protocol

47. Which of the following protocol is adopted for interoperability by top three IM service providers?

Correct : B. simple

48. Which of the following protocol is not an Internet Engineering Task Force standard?

Correct : D. imps

49. Point out the wrong statement.

Correct : D. none of the mentioned

50. Which of the following IM client allow their users to connect to the different major IM services?

Correct : D. all of the mentioned

51. Which of the following is also referred to as Short Message Service?

Correct : B. micro-blogs

52. Which of the following is a good example of an SMS service organized into a social network and blog?

Correct : A. twitter

53. Which of the following language is used to build a message server queue in twitter?

Correct : B. scala

54. Which of the following version of office suite is shown in the figure?

Correct : B. online

55. HTTP is a ______ protocol

Correct : B. unidirectional

56. websocket is a____ Protocol

Correct : D. all of the above

57. Websocket protocol uses which communication model

Correct : A. Publish-Subscribe

58. An internal cloud is…

Correct : D. The group of knowledge workers who use a social network for water-cooler gossip

59. Which of the following subject area deals with pay-as-you-go usage model?

Correct : A. Accounting Management

60. ________ captive requires that the cloud accommodate multiple compliance regimes.

Correct : B. Policy-based

61. Security methods such as private encryption, VLANs and firewalls comes under __________ subject area.

Correct : C. Data Privacy

62. Which of the following captive area deals with monitoring?

Correct : B. Variable but under control

63. Network bottlenecks occur when ______ data sets must be transferred

Correct : A. large

64. RDS is a_____ type of database

Correct : A. SQL

65. Dynamodb is ____ type of storage

Correct : A. NonSQL

66. Cloud ________ are standardized in order to appeal to the majority of its audience.

Correct : B. SLAs

67. The reputation for cloud computing services for the quality of those services is shared by _________

Correct : C. tenants

68. ___________ is a function of the particular enterprise and application in an on-premises deployment.

Correct : B. Vendor lock-in

69. _________ computing refers to applications and services that run on a distributed network using virtualized resources.

Correct : B. Cloud

70. . ________ as a utility is a dream that dates from the beginning of the computing industry itself

Correct : B. Computing

71. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

Correct : A. Iaas

72. ________ has many of the characteristics of what is now being called cloud computing

Correct : A. Internet

73. Which of the following is Cloud Platform by Amazon?

Correct : B. AWS

74. Which of the following is the deployment model?

Correct : D. all of the mentioned

75. Which of the following is best known service model?

Correct : D. All of the mentioned

76. Which of the architectural layer is used as a front end in cloud computing?

Correct : A. client

77. Which of the following benefit is provided by the PaaS service provider

Correct : D. All of the mentioned

78. Communication between services is done widely using _______ protocol

Correct : C. RESTful

79. Which of the following provider rely on the virtual machine technology to deliver servers?

Correct : D. IaaS

80. Which of the following component is called hypervisor?

Correct : C. VMM

81. Applications such as a Web server or database server that can run on a virtual machine image are referred to as __

Correct : B. virtual appliances

82. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.

Correct : B. Xen

83. __________ is a CPU emulator and virtual machine monitor

Correct : C. QEMU

84. Which of the following provider rely on the virtual machine technology to deliver servers?

Correct : D. IaaS

85. __________ is a CPU emulator and virtual machine monitor

Correct : C. QEMU

86. The source of HDFS architecture in Hadoop originated as

Correct : A. Google distributed filesystem

87. What is default replication factor?

Correct : C. 3

88. What is HDFS Block in Hadoop?

Correct : B. It is the physical representation of data

89. The need for data replication can arise in various scenarios like

Correct : D. All of the above

90. If the IP address or hostname of a data node changes

Correct : C. The namenode need not update mapping between file name and block name

91. For the frequently accessed HDFS files the blocks are cached in

Correct : A. The memory of the data node

92. In HDFS the files cannot be

Correct : C. Executed

93. Which of the following is not the feature of Network management systems?

Correct : D. None of the mentioned

94. Which of the following service provider provides the least amount of built in security?

Correct : C. IaaS

95. Point out the correct statement.

Correct : D. All of the mentioned

96. Point out the wrong statement.

Correct : C. Cloud computing doesn’t have vulnerabilities associated with Internet applications

97. Which of the following is the operational domain of CSA(Cloud Security Alliance)?

Correct : B. Portability and interoperability

98. Which of the following is considered an essential element in cloud computing by CSA?

Correct : A. Multi-tenancy

99. Which of the following is used for Web performance management and load testing?

Correct : B. Webmetrics

100. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

Correct : A. CAS