Cloud Computing MCQ Set 1
1. How many types of security boundary values exist in Cloud Cube model ?
a) 1
b) 2
c) 3
d) None of the mentioned
Answer
Answer: b [Reason:] There are two types depending upon network firewall.
2. Point out the correct statement :
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
Answer
Answer: a [Reason:] Four types of deployment models exist.
3. Which of the following is provided by ownership dimension of Cloud Cube Model ?
a) Proprietary
b) Owner
c) P
d) All of the mentioned
Answer
Answer: b [Reason:] P stands for Proprietary ownership.
4. __________is a measure of whether the operation is inside or outside the security boundary or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned
Answer
Answer: d [Reason:] Per stands for Perimeterised.
5. Point out the wrong statement :
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned
Answer
Answer: a [Reason:] The public cloud infrastructure is available for public use alternatively for a large industry group.
6. Which of the following is related to service provided by Cloud ?
a) Sourcing
b) Ownership
c) Reliability
d) AaaS
Answer
Answer: a [Reason:] Insourced or Outsourced means whether the service is provided by the customer or the service provider.
7. ________ dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data
b) Ownership
c) Security boundary
d) None of the mentioned
Answer
Answer: d [Reason:] The sourcing dimension addresses the deliverer of the service.
8. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer
Answer: b [Reason:] The cloud may be managed by that organization or a third party.
9. __________ cloud is one where the cloud has been organized to serve a common function or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer
Answer: c [Reason:] A community cloud may be managed by the constituent organization(s) or by a third party.
10. A hybrid cloud combines multiple clouds where those clouds retain their unique identities, but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
Answer
Answer: d [Reason:] A hybrid cloud may offer standardized or proprietary access to data and applications, as well as application portability.
Cloud Computing MCQ Set 2
1. Any software application that complies with the standard accepts an _______ that is authenticated by a trusted provider.
a) OpenID
b) OpenUser
c) OpenSSD
d) None of the mentioned
Answer
Answer: a [Reason:] When an identity is created in an OpenID system, that information is stored in the system of any OpenID service provider and translated into a unique identifier.
2. Point out the wrong statement :
a) XML checks the ID request against its policies and either allows or denies the request
b) SPML in most instances operates as a reply/request mechanism
c) User centric authentication takes place usually in the form of knowledge cards
d) All of the mentioned
Answer
Answer: b [Reason:] In SAML, a service provider passes a statement or set of statements (called assertions) to an identity provider that must be evaluated.
3. Which of the following allows a distributed ID system to write and enforce custom policy expressions ?
a) XACML
b) XML
c) SOAP
d) None of the mentioned
Answer
Answer: a [Reason:] This is a general-purpose authorization policy language.
4. _________ is a standard of OASIS’s PSTC that conforms to the SOA architecture.
a) XACML
b) SPML
c) SML
d) All of the mentioned
Answer
Answer: b [Reason:] SPML is an XML request/response language that is used to integrate and interoperate service provisioning requests.
5. Point out the wrong statement :
a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
b) The Distributed Audit Service provides accountability for users accessing a system
c) The OpenID and CardSpace specifications support authentication type of data object
d) None of the mentioned
Answer
Answer: c [Reason:] OpenID is a developing industry standard for authenticating “end users” by storing their digital identity in a common format.
6. Which of the following standard is concerned with the exchange and control of identity information ?
a) IGK
b) IDF
c) IGF
d) All of the mentioned
Answer
Answer: c [Reason:] The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.
7. _______ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.
a) IHA
b) EHA
c) CardSpace
d) None of the mentioned
Answer
Answer: c [Reason:] CardSpace was introduced with .NET Frameworks 3.0 and can be installed on Windows XP, Server 2003, and later.
8. The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.
a) Higgins
b) Hughes
c) Hinges
d) All of the mentioned
Answer
Answer: a [Reason:] The Higgins Open Source Identity Framework uses an i-Card metaphor.
9. Which of the following is authorization markup language ?
a) eXtensible Access Control Markup Language
b) intrinsic Access Control Markup Language
c) hypertext Access Control Markup Language
d) all of the mentioned
Answer
Answer: a [Reason:] A policy in XACML describes a subject element that requests an action from a resource.
10. Which of the following should come in place of question mark for the following figure ?
a) Policy Enforcement Point
b) Policy Decision Point
c) Policy Insertion Point
d) All of the mentioned
Answer
Answer: b [Reason:] SAML integrates with XACML to implement a policy engine in a Service Oriented Architecture to support identity services authorization.
Cloud Computing MCQ Set 3
1. Which of the following provider rely on virtual machine technology to deliver servers ?
a) CaaS
b) AaaS
c) PaaS
d) IaaS
Answer
Answer: d [Reason:] Most large Infrastructure as a Service (IaaS) providers rely on virtual machine technology that can run applications.
2. Point out the correct statement :
a) Virtual machines are containers that are assigned specific resources
b) Applications need not be mindful of how they use cloud resources
c) When a developer creates an application that uses a cloud service, the developer cannot attach to the appropriate service
d) All of the mentioned
Answer
Answer: a [Reason:] The software that runs in the virtual machines is what defines the utility of the cloud computing system.
3. Which of the following component is called hypervisor ?
a) VMM
b) VMc
c) VMM
d) All of the mentioned
Answer
Answer: c [Reason:] VMM component is also called hypervisor.
4. Applications such as a Web server or database server that can run on a virtual machine image are referred to as :
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned
Answer
Answer: b [Reason:] The name virtual appliance is a little misleading because it conjures up the image of a machine that serves a narrow purpose.
5. Point out the wrong statement :
a) Platforms represent nearly the full cloud software stack
b) A platform in the cloud is a software layer that is used to create higher levels of service
c) Platforms often come replete with tools and utilities to aid in application design and deployment
d) None of the mentioned
Answer
Answer: d [Reason:] Most platforms begin by establishing a developer community to support the work done in the environment.
6. _________ allows different operating systems to run in their own memory space.
a) VMM
b) VMc
c) VMM
d) All of the mentioned
Answer
Answer: c [Reason:] VMM manages I/O for the virtual machines.
7. Amazon Machine Images are virtual appliances that have been packaged to run on the gird of ____ nodes.
a) Ben
b) Xen
c) Ken
d) Zen
Answer
Answer: b [Reason:] You run across virtual appliances in IaaS systems such as Amazon’s Elastic Compute Cloud.
8. Which of the following offers virtual appliances, including ones based on Windows, all of which run on VMware Player ?
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
Answer
Answer: a [Reason:] Virtual appliances have begun to affect the PC industry in much the same way that application stores have affected the cell phone industry.
9. ________ offers various Linux distributions upon which you can build a virtual machine.
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
Answer
Answer: b [Reason:] Jcinacio has Ubuntu appliances.
10. __________ is a CPU emulator and virtual machine monitor.
a) Imaging
b) Parallels
c) QEMU
d) None of the mentioned
Answer
Answer: c [Reason:] Parallels hosts a variety of appliances that includes Linux distros, server software, and other products.
Cloud Computing MCQ Set 4
1. Which of the following generates alerts sent to e-mail, mobile device, or Windows Messenger ?
a) Windows Live Calendar
b) Windows Live Alerts
c) Windows Live Admin Center
d) None of the mentioned
Answer
Answer: b [Reason:] Windows Live Admin Center is used to provide email hosting for web site owners.
2. Point out the wrong statement:
a) Windows Live is a collection of cloud-based applications and services
b) Windows Live Essentials applications are a collection of server-side applications
c) Windows Live Essentials is available from the Start menu as a set of commands
d) None of the mentioned
Answer
Answer: b [Reason:] Windows Live Essentials applications are a collection of client-side applications.
3. Which of the following is used for synchronization and remote access service for files stored on PCs and mobile devices ?
a) Windows Live Family Safety
b) Windows Live Devices
c) Windows Live Essentials
d) All of the mentioned
Answer
Answer: b [Reason:] Windows Live Family Safety allows you to manage and monitor your children’s Internet activity so they can surf the Web more safely.
4. Which of the following has address book service with synchronization feature ?
a) Windows Live Calendar
b) Windows Live Alerts
c) Windows Live Contacts
d) None of the mentioned
Answer
Answer: c [Reason:] Windows Live Calendar contains calendar service with appointments, meetings, and events shared with others.
5. Point out the correct statement:
a) Windows Live Suite is the central access page or portal for the Windows Live suite
b) Windows Live House is the central access page or portal for the Windows Live suite
c) Microsoft has a number of Windows Live services that are specifically meant to be run on mobile devices
d) All of the mentioned
Answer
Answer: c [Reason:] Some of these services run on the Windows Mobile platform, some are Web-based applications that conform to the lightweight Wireless Application Protocol.
6. Which of the following adds an RSS feed to digital photo frame devices ?
a) Windows Live FrameIt
b) Windows Live Gallery
c) Windows Live Groups
d) Windows Live Hotmail
Answer
Answer: a [Reason:] Windows Live Gallery is a collection of developer add-ons for Windows Live products.
7. ___________ is a personalization Web page and tool for Windows Live with status information and navigation features.
a) Windows Live Home
b) Windows Live Gallery
c) Windows Live Groups
d) Windows Live Hotmail
Answer
Answer: a [Reason:] Windows Live Groups is a group discussion, collaboration, sharing, and coordination tool.
8. Which of the following is Web-based free e-mail service with contacts and calendar ?
a) Windows Live Home
b) Windows Live ID
c) Windows Live Groups
d) Windows Live Hotmail
Answer
Answer: d [Reason:] Windows Live ID is a sign-on service shared by Windows Live applications.
9. Which of the following service allows you to create beautiful, memorable movies ?
a) Windows Live OneCare Safety Scanner
b) Windows Live ID
c) Windows Live Movie Maker
d) Windows Live Photos
Answer
Answer: c [Reason:] Windows Live Movie Maker consists of a PC scanner for viruses, spyware, and other malware.
10. Which of the following is a photo storage and sharing service ?
a) Windows Live OneCare Safety Scanner
b) Windows Live ID
c) Windows Live Movie Maker
d) Windows Live Photos
Answer
Answer: d [Reason:] You can use the service to publish photos to third-party photo services.
Cloud Computing MCQ Set 5
1. Which does C in FCAPS stands for ?
a) Consistency
b) Contact
c) Configuration
d) None of the mentioned
Answer
Answer: c [Reason:] Your management responsibilities depend on the particular service model for your cloud deployment.
2. Point out the wrong statement:
a) Cloud computing deployments must be monitored and managed in order to be optimized for best performance
b) To the problems associated with analyzing distributed network applications, the cloud adds the complexity of virtual infrastructure
c) Cloud management software provides capabilities for managing faults
d) None of the mentioned
Answer
Answer: d [Reason:] Framework products are being re-positioned to work with cloud systems.
3. Which of the following aims to deploy methods for measuring various aspects of cloud performance in a standard way ?
a) RIM
b) SIM
c) SMI
d) All of the mentioned
Answer
Answer: c [Reason:] SMI stands for Service Measurement Index.
4. Which of the following is not the feature of Network management systems ?
a) Accounting
b) Security
c) Performance
d) None of the mentioned
Answer
Answer: d [Reason:] Most network management packages have one or more of these characteristics.
5. Point out the correct statement:
a) Cloud management includes not only managing resources in the cloud, but managing resources on-premises
b) The management of resources in the cloud requires new technology
c) Management of resources on-premises allows vendors to use well-established network management technologies
d) All of the mentioned
Answer
Answer: d [Reason:] The lifecycle of a cloud application includes six defined parts, and each must be managed.
6. Which of the following package package provides all five elements of FCAPS ?
a) FrameIt
b) RackStar
c) Unicenter
d) None of the mentioned
Answer
Answer: d [Reason:] No single package provides all five elements of FCAPS.
7. ___________ is a framework tool for managing cloud infrastructure.
a) IBM Tivoli Service Automation Manager
b) Microsoft Tivoli Service Automation Manager
c) Google Service Automation Manager
d) Windows Live Hotmail
Answer
Answer: a [Reason:] Tivoli Service Automation Manager lets you create and stage cloud-based servers.
8. Which of the following “cloudly” characteristics that cloud management service must have ?
a) Billing is on a pay-as-you-go basis
b) The management service is extremely scalable
c) The management service is ubiquitous
d) All of the mentioned
Answer
Answer: d [Reason:] Communication between the cloud and other systems uses cloud networking standards.
9. How many categories need to be monitored for entire cloud computing ?
a) 1
b) 2
c) 4
d) None of the mentioned
Answer
Answer: d [Reason:] To monitor an entire cloud computing deployment stack, you monitor six different categories.
10. Which of the following is a standard protocol for network monitoring and discovery ?
a) SNMP
b) CMDB
c) WMI
d) All of the mentioned
Answer
Answer: d [Reason:] WMI stands for Windows Management Instrumentation (WMI).