Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Cloud Computing MCQ Set 1

1. Which of the following flag is used by backup software to specify whether a file should be backed up or not ?
a) archive bit
b) passive bit
c) active bit
d) all of the mentioned

View Answer

Answer: a [Reason:] The bit is set on for backup and cleared when backup has copied the file.

2. Point out the correct statement:
a) To create an image backup of an active system, you may need to stop all application
b) To create an incremental backup of an active system, you may need to stop all applications
c) Differential backup allows a system to do what is referred to as a bare metal restore
d) All of the mentioned

View Answer

Answer: a [Reason:] Full System backup is also referred to as image backup.

3. Which of the following backups are faster and more efficient from a storage perspective ?
a) Point-in-time
b) Incremental
c) Reverse Delta backup
d) All of the mentioned

View Answer

Answer: b [Reason:] Files in intervening incremental backups may be taken as temporary or scratch versions.

4. Which of the following backups creates a full backup first and then periodically synchronizes the full copy with the live version ?
a) Continuous Data Protection
b) Open file backup
c) Reverse Delta backup
d) None of the mentioned

View Answer

Answer: c [Reason:] The older versions of files that have been changed are archived so that a historical record of the backup exists.

5. Point out the wrong statement:
a) To scale out, the service must allow for stored data to span additional storage systems
b) The data is backed up, and then every so often changes are amended to the backup creating is referred to as an incremental backup
c) A differential backup is related to a full system backup
d) None of the mentioned

View Answer

Answer: c [Reason:] A differential backup is related to an incremental backup.

6. Which of the following backup is used by Apple’s Time Machine ?
a) Continuous Data Protection
b) Open file backup
c) Reverse Delta backup
d) Mirroring

View Answer

Answer: c [Reason:] Software that uses reverse delta backup system is Apple’s Time Machine and the RDIFF-BACKUP utility.

7. Which of the following backup create a cloned copy of your current data or drive ?
a) Continuous Data Protection
b) Open file backup
c) Reverse Delta backup
d) None of the mentioned

View Answer

Answer: a [Reason:] CDP is also referred to as mirroring.

8. Which of the following backup systems are expensive and highly customized to a particular application such as SQL Server ?
a) Continuous Data Protection
b) Open file backup
c) Reverse Delta backup
d) Data archival

View Answer

Answer: b [Reason:] Some applications such as database systems and messaging systems are mission critical and cannot be shut down before being backed up.

9. Which of the following is useful for legal compliance or to provide a long-term historical record ?
a) Continuous Data Protection
b) Open file backup
c) Reverse Delta backup
d) Data archival

View Answer

Answer: d [Reason:] Data archives are often confused with backups.

10. Which of the following is used to specify the migration of data that is no longer in use to tertiary long-term data storage for retention ?
a) replicating
b) scaling
c) archiving
d) all of the mentioned

View Answer

Answer: c [Reason:] You can’t restore your current data set from an archive.

Cloud Computing MCQ Set 2

1. Which of the following is another name for resources mentioned in the following figure ?
cloud-computing-questions-answers-baseline-measurements-q1
a) System Metrics
b) System Baseline
c) System Parameters
d) All of the mentioned

View Answer

Answer: a [Reason:] A machine instance (physical or virtual) is primarily defined by four essential resources.

2. Point out the correct statement :
a) Page views or hits on the Web site, as measured in transactions per second
b) Transactions completed on the database server, as measured by hits per second
c) Performance logs are a primary source of data that everyone should have available for planning purposes
d) All of the mentioned

View Answer

Answer: c [Reason:] There are two important overall workload metrics in the LAMP system.

3. Which of the following command is used to display the level of CPU activity in Linux ?
a) sep
b) sav
c) sar
d) None of the mentioned

View Answer

Answer: c [Reason:] sar is installed in Linux as part of the sysstat package.

4. Which of the following tool captures time-dependent performance data from resources such as a CPU load ?
a) RBTool
b) RRDTool
c) Perfmon
d) None of the mentioned

View Answer

Answer: b [Reason:] RRDTool stands for Round Robin Database tool.

5. Point out the wrong statement :
a) The total workload might be served by a single server instance in the cloud
b) Performance logs are the only source of performance measurements
c) The amount of resources to be deployed depends upon the characterization of the Web servers involved, their potential utilization rates, and other factors
d) All of the mentioned

View Answer

Answer: b [Reason:] Performance logs are not the only source of performance measurements.

6. Which of the following tool is used for Web site monitoring service in LAMP ?
a) Alertra
b) Cacti
c) Collectd
d) None of the mentioned

View Answer

Answer: a [Reason:] Cacti is RRDTool graphing module.

7. Which of the following is used as Open source distributed monitoring system ?
a) Dstat
b) GraphClick
c) Ganglia
d) None of the mentioned

View Answer

Answer: c [Reason:] GraphClick is a digitizer that can create a graph from an image.

8. Which of the following is not a commercial third-party Web site performance monitor ?
a) Keynote
b) Munin
c) Gomez
d) All of the mentioned

View Answer

Answer: b [Reason:] Munin is open source network resource monitoring tool.

9. Which of the following is available as both open source and commercial version ?
a) Zabbix
b) ZenOSS
c) SiteUpTime
d) All of the mentioned

View Answer

Answer: b [Reason:] ZenOSS is used to monitor operations.

10. Which of the following testing seeks to answer maximum load that my current system can support ?
a) Load
b) Security
c) Navigation
d) All of the mentioned

View Answer

Answer: a [Reason:] Load testing is also referred to as performance testing, reliability testing, stress testing, and volume testing.

Cloud Computing MCQ Set 3

1. Which of the following was one of the top 5 cloud applications in 2010 ?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned

View Answer

Answer: d [Reason:] Cloud computing has shifted the economics of software delivery in a manner similar to the way that music downloads have shifted the delivery of commercial music.

2. Point out the correct statement :
a) Google’s cloud includes perhaps some 10 datacenters worldwide
b) Flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic
c) Datacenters have been sited to optimize the overall system latency
d) All of the mentioned

View Answer

Answer: c [Reason:] Datacenter can Keep land costs modest and occupation unobtrusive.

3. Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage ?
a) On-demand self-service
b) Broad network access
c) Resource pooling:
d) All of the mentioned

View Answer

Answer: a [Reason:] A cloud service provider creates resources that are pooled together in a system that supports multi-tenant usage.

4. The _____ is something that you can obtain under contract from your vendor.
a) PoS
b) QoS
c) SoS
d) All of the mentioned

View Answer

Answer: b [Reason:] Depending upon the type of service being offered, you may find that you do not require hardware or software licenses to implement your service.

5. Point out the wrong statement :
a) Internet consumes roughly 1 percent of the world’s total power
b) The cost advantages of cloud computing have enabled new software vendors to create productivity applications
c) A client can provision computer resources without the need for interaction with cloud service provider personnel
d) None of the mentioned

View Answer

Answer: a [Reason:] Datacenters have been sited to have access to low cost power.

6. All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
a) propagation
b) latency
c) noise
d) all of the mentioned

View Answer

Answer: b [Reason:] While cloud computing applications excel at large-scale processing tasks, if your application needs large amounts of data transfer, cloud computing may not be the best model for you.

7. Cloud computing is a _______ system and it is necessarily unidirectional in nature.
a) stateless
b) stateful
c) reliable
d) all of the mentioned

View Answer

Answer: a [Reason:] Cloud computing is a stateless system, as is the Internet in general.

8. Which of the following is most important area of concern in cloud computing ?
a) Security
b) Storage
c) Scalability
d) All of the mentioned

View Answer

Answer: a [Reason:] When your data travels over and rests on systems that are no longer under your control, you have increased risk due to the interception and malfeasance of others.

9. You can’t count on a cloud provider maintaining your _____ in the face of government actions.
a) scalability
b) reliability
c) privacy
d) none of the mentioned

View Answer

Answer: c [Reason:] Cloud computing industry continues to address security concerns.

10. Which of the following architectural standards is working with cloud computing industry ?
a) Service-oriented architecture
b) Standardized Web services
c) Web-application frameworks
d) All of the mentioned

View Answer

Answer: a [Reason:] These standards help to enable different business models that cloud computing vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility computing.

Cloud Computing MCQ Set 4

1. Which of the following architecture is shown in the following figure ?

Service Oriented Modelling practice
Modelling Environments
Modelling Solutions
Best Practices

a) SOMF 2.0
b) SOMF 4.0
c) SOMF 3.5
d) None of the mentioned

View Answer

Answer: a [Reason:] A service in SOMF that is granular and very narrow in scope is referred to as an atomic service.

2. Point out the correct statement:
a) The service object is a container where the service resides
b) The port or endpoint is the unique address of the service
c) The message content is the data and metadata that the service operation is performed on
d) All of the mentioned

View Answer

Answer: d [Reason:] Each message may consist of one or more parts, and each part must include typing information.

3. Which of the following is language standard for Web service interactions ?
a) WS-BPEL
b) WS-XML
c) WS-JSON
d) All of the mentioned

View Answer

Answer: a [Reason:] BPEL is a meta-language comprised of two functions.

4. Which of the following messaging protocol is used with XML in BPEL ?
a) WS-Coordination
b) WS-Addressing
c) WS-Transactions
d) All of the mentioned

View Answer

Answer: d [Reason:] BPEL uses XML with specific support for messaging protocols.

5. Point out the wrong statement:
a) XML schema cannot be separate files
b) A WSDL file contains essential message data for a transaction
c) A service contract codifies the relationship between the data to be processed and also the metadata that accompanies that data
d) None of the mentioned

View Answer

Answer: a [Reason:] The XML document sets up the namespace, defines the interface, specifies the binding, names the service, provides the documentations for the service, and then supplies a schema that may be used to validate the document.

6. Which of the following topology is shown in the following figure ?
cloud-computing-questions-answers-business-process-modelling-1-q6
a) Circular
b) Star
c) Hierarchial
d) All of the mentioned

View Answer

Answer: b [Reason:] In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch.

7. Which of the following statement is incorrect related to BPEL ?
a) Data functions in BPEL support process data and control flow
b) BPEL includes techniques for error handling and scopes transactions
c) BPEL uses Web services for standards and to assemble and decompose processes
d) None of the mentioned

View Answer

Answer: d [Reason:] BPEL does not have a graphical component.

8. _______ is a methodology for representing business processes as a set of connected visual objects.
a) BPNM
b) BPMN
c) BPMM
d) BPNN

View Answer

Answer: b [Reason:] BPMN stands for Business Process Modeling Notation.

9. Which of the following system models creates graphical representation of software systems in the form of a set of diagram types ?
a) SysML
b) UML
c) XMI
d) None of the mentioned

View Answer

Answer: b [Reason:] UML is widely used in the industry for software system modeling.

10. Which of the following topology is shown in the following figure ?
cloud-computing-questions-answers-business-process-modelling-1-q10
a) Circular
b) Star
c) Hierarchial
d) Network

View Answer

Answer: c [Reason:] Hierarchical network models are iterative algorithms for creating networks which are able to reproduce the unique properties of the scale-free topology and the high clustering of the nodes at the same time.

Cloud Computing MCQ Set 5

1. Which of the following is an open-source extension of the part of the UML system dealing with profiles ?
a) UML
b) XMI
c) SysML
d) None of the mentioned

View Answer

Answer: c [Reason:] SysML stands for Systems Modeling Language.

2. Point out the correct statement:
a) The UML standard is the work of the Object Management Group
b) SysML creates graphical representations of software systems in the form of a set of diagram types
c) UML diagrams are separated into four structural types and seven behavior types
d) All of the mentioned

View Answer

Answer: a [Reason:] UML diagrams are separated into seven structural types and four behavior types.

3. Which of the following combines a modeling language with a graphical display of the various SOA components ?
a) Business Process Modeling Notation
b) Service-Oriented Modeling Framework
c) Systems Modeling Language
d) All of the mentioned

View Answer

Answer: b [Reason:] SOMF software allows developers to create an action plan to implement their business processes.

4. Which of the following element in SOMF determines how components are exposed ?
a) Discovery
b) Conceptualization
c) Analysis
d) All of the mentioned

View Answer

Answer: a [Reason:] In SOMF, the modeling is based on the elements of the service life cycle.

5. Point out the wrong statement:
a) Star model is favored in orchestration processes
b) UML models often use XMI as their interchange format
c) XMI files are generally interchangeable between the different modeling languages that can use them
d) None of the mentioned

View Answer

Answer: c [Reason:] XMI has been codified as an international standard by ISO, as IS0/IEC 19503:2005.

6. Which of the following provides information on service and service boundaries, service granularity, and asset analysis ?
a) SMIL
b) SOMA
c) SMA
d) All of the mentioned

View Answer

Answer: b [Reason:] IBM’s Service-Oriented Modeling and Architecture is well-known SOMF modeling technology.

7. How many types of modeling topologies for message passing are used in SOMF ?
a) 1
b) 2
c) 3
d) None of the mentioned

View Answer

Answer: d [Reason:] Four modeling topologies for message passing are used in SOMF.

8. Which of the following topology has no orchestrator in the system ?
a) Circular
b) Hierarchical
c) Network
d) Star

View Answer

Answer: a [Reason:] A circular topology is one where message passing is carried out in a circular fashion.

9. Which of the following topology is useful for services that use broadcasting or multicasting services ?
a) Circular
b) Hierarchical
c) Network
d) Star

View Answer

Answer: d [Reason:] In a star topology, services are designed to connect through a central service.

10. Which of the following topology has a many-to-many relationship between services and their clients ?
a) Circular
b) Hierarchical
c) Network
d) Star

View Answer

Answer: c [Reason:] The advantage of a network topology is that the overhead associated with message passing has been minimized.

.woocommerce-message { background-color: #98C391 !important; }