Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Cloud Computing MCQ Set 1

1. Which of the following mechanisms are contained by Cloud API for accessing cloud services ?
a) Abstraction
b) Authentication
c) Replication
d) All of the mentioned

View Answer

Answer: b [Reason:] The cloud API contains the authentication and authorization mechanisms needed to access cloud services.

2. Point out the correct statement:
a) The nature of a cloud provider’s Cloud API will impact ability to move an application to the cloud
b) Cloud APIs are the Application Programming Interface to functions that exchange information in and with the cloud
c) Each cloud vendor has its own specific API
d) All of the mentioned

View Answer

Answer: d [Reason:] The nature of a cloud provider also affects the way many of your application features operate.

3. Which of the following is cross-platform API based on generalizing the major cloud vendors APIs ?
a) Deltacloud
b) Simple Cloud API
c) Design Cloud
d) All of the mentioned

View Answer

Answer: d [Reason:] Efforts are underway to create more standardized cloud APIs.

4. Applications using managed cloud storage are __________ as a Service Web services.
a) Infrastructure
b) Platform
c) Service
d) All of the mentioned

View Answer

Answer: a [Reason:] In an IaaS model, a third-party provider hosts hardware, software, servers, storage and other infrastructure components on behalf of its users.

5. Point out the wrong statement:
a) Some APIs are both exposed as SOAP and REST
b) Most APIs are exposed as SOAP
c) Few APIs are exposed as REST
d) None of the mentioned

View Answer

Answer: d [Reason:] Each API provides specific calls required by that vendor’s infrastructure and service.

6. Which of the following presents developer with their own APIs ?
a) VMWare vCloud
b) Racksapce Cloud Servers
c) RimuHosting
d) Racksapce Cloud Servers

View Answer

Answer: d [Reason:] Individual services such as Windows Azure SQL, Flickr, and Google Maps present a service cloud API.

7. Which of the following storage is presented to a user as if it is a ready-to-use disk drive ?
a) Managed
b) Unmanaged
c) Unavailable
d) None of the mentioned

View Answer

Answer: b [Reason:] The user has little control over the nature of how the disk is used.

8. Which of the following cloud storage involves the provisioning of raw virtualized disk ?
a) Managed
b) Unmanaged
c) Unavailable
d) All of the mentioned

View Answer

Answer: a [Reason:] Cloud storage can be either un-managed or managed.

9. Which of the following storage option is available for managed storage ?
a) formatting
b) partitioning
c) replicating data
d) all of the mentioned

View Answer

Answer: d [Reason:] Applications using un-managed cloud storage are Software as a Service (SaaS) Web services.

10. Which of the following cloud storage is consumed by file sharing software ?
a) Managed
b) Unmanaged
c) UnAvailable
d) All of the mentioned

View Answer

Answer: b [Reason:] Most user-oriented software such as file-sharing and backup consume un-managed cloud storage.

Cloud Computing MCQ Set 2

1. Which of the following correctly describes the following figure ?
cloud-computing-questions-answers-capacity-planning-q1
a) Capacity Planning
b) Performance Planning
c) Network Planning
d) None of the mentioned

View Answer

Answer: a [Reason:] Capacity planning measures the maximum amount of work that can be done using the current technology and then adds resources to do more work as needed.

2. Point out the correct statement :
a) Capacity planning seeks to match demand to available resources
b) Capacity planning examines what systems are in place, measures their performance, and determines patterns in usage that enables the planner to predict demand
c) Resources are provisioned and allocated to meet demand
d) All of the mentioned

View Answer

Answer: d [Reason:] Performance tuning and optimization is not a primary goal of capacity planners.

3. What is the relation of capacity attribute to performance ?
a) same
b) different
c) similar
d) None of the mentioned

View Answer

Answer: b [Reason:] With capacity, you are concerned about how much work a system can do, whereas with performance, you are concerned with the rate at which work gets done.

4. What does L in LAMP stands for ?
a) Lamp
b) Linux
c) Lone
d) None of the mentioned

View Answer

Answer: b [Reason:] LAMP stacks based on Red Hat Linux are more common than the other distributions.

5. Point out the wrong statement :
a) Network capacity is one of the easiest factors to determine
b) A system uses resources to satisfy cloud computing demands that include processor, memory, storage, and network capacity
c) Scaling a system can be done by scaling up vertically to more powerful systems
d) All of the mentioned

View Answer

Answer: a [Reason:] Network performance is affected by network I/O at the server, network traffic from the cloud to Internet service providers, and over the last mile from ISPs to homes and offices.

6. Which of the following is one of the major categories of Amazon Machine Instances that you can create on the Amazon Web Service ?
a) WAMP
b) XAMPP
c) LAMP
d) None of the mentioned

View Answer

Answer: c [Reason:] On Amazon Web Services, machine instances are offered for both Red Hat Linux and for Ubuntu.

7. Which of the following is used as substitute for PHP as scripting language in LAMP ?
a) Scala
b) Perl
c) Ruby
d) None of the mentioned

View Answer

Answer: b [Reason:] Either Perl or Python is often substituted for PHP as the scripting language used.

8. Which of the following RDBMS is used by LAMP ?
a) SQL Server
b) DB2
c) MySQL
d) All of the mentioned

View Answer

Answer: c [Reason:] MySQL is the database server developed by the Swedish company MySQL AB, owned by Oracle Corporation through its acquisition of Sun Microsystems.

9. Which of the following is critical step in capacity planning ?
a) Predict the future based on historical trends and other factors
b) Load the system until it is overloaded
c) Deploy or tear down resources to meet your predictions
d) All of the mentioned

View Answer

Answer: b [Reason:] Knowing when systems fail under load and what factor(s) is responsible for the failure is the critical step in capacity planning.

10. Which of the following is hardest factor to determine ?
a) Network performance
b) Network capacity
c) Network delay
d) All of the mentioned

View Answer

Answer: b [Reason:] It is the goal of a capacity planner to identify the critical resource that has this resource ceiling and add more resources to move the bottleneck to higher levels of demand.

Cloud Computing MCQ Set 3

1. Which of the following subject area deals with pay-as-you-go usage model ?
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned

View Answer

Answer: a [Reason:] For cloud computing, the pay-as-you-go usage model allows for costs to be applied to individual accounts directly.

2. Point out the correct statement :
a) Except for tightly managed SaaS cloud providers, the burden of resource management is still in the hands of the user
b) Cloud computing vendors run very reliable networks
c) The low barrier to entry cannot be accompanied by a low barrier to provisioning
d) All of the mentioned

View Answer

Answer: b [Reason:] Often, cloud data is load-balanced between virtual systems and replicated between sites.

3. ________ captive requires that the cloud accommodate multiple compliance regimes.
a) Licensed
b) Policy-based
c) Variable
d) All of the mentioned

View Answer

Answer: b [Reason:] Compliance to laws and policies varies by geographical area.

4. Security methods such as private encryption, VLANs and firewalls comes under __________ subject area
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned

View Answer

Answer: c [Reason:] To ensure data privacy in the cloud, additional security methods such as private encryption, VLANs, firewalls, and local storage of sensitive data is necessary.

5. Point out the wrong statement :
a) Large cloud providers with geographically dispersed sites worldwide therefore achieve reliability rates that are hard for private systems to achieve
b) Private datacenters tend to be located in places where the company or unit was founded or acquired
c) A network backbone is a very low-capacity network connection
d) None of the mentioned

View Answer

Answer: c [Reason:] On the Internet, an Internet backbone consists of the high-capacity routes and routers that are typically operated by an individual service provider such as a government or commercial entity.

6. Which of the following captive area deals with monitoring ?
a) Licensed
b) Variable but under control
c) Low
d) All of the mentioned

View Answer

Answer: b [Reason:] For private systems, any monitoring system the organization wishes to deploy can be brought to bear.

7. Network bottlenecks occur when ______ data sets must be transferred.
a) large
b) small
c) big
d) all of the mentioned

View Answer

Answer: a [Reason:] This is the case for staging,

8. The reputation for cloud computing services for the quality of those services is shared by _________
a) replicas
b) shards
c) tenants
d) all of the mentioned

View Answer

Answer: c [Reason:] Clouds often have higher reliability than private systems.

9. Cloud ________ are standardized in order to appeal to the majority of its audience.
a) SVAs
b) SLAs
c) SALs
d) None of the mentioned

View Answer

Answer: b [Reason:] Custom SLAs that allow for multiple data sources are difficult to obtain or enforce.

10. ___________ is a function of the particular enterprise and application in an on-premises deployment.
a) Vendor lock
b) Vendor lock-in
c) Vendor lock-ins
d) None of the mentioned

View Answer

Answer: b [Reason:] Vendor lock-in for a cloud computing solution in a PaaS model is very high.

Cloud Computing MCQ Set 4

1. If you have a local version of a file, then a version of that file stored in the cloud conforms to all three of the ______ backup rules.
a) 3-2-1
b) One-two-three
c) 1-2-3
d) All of the mentioned

View Answer

Answer: c [Reason:] Peter Krogh’s 3-2-1 Rule for data protection is a good one to follow.

2. Point out the correct statement:
a) Replication creates a copy of the data which is not synchronized
b) An archive removes older information that is no longer operational and saves it for long-term storage
c) Reverse delta backup allows a system to do what is referred to as a bare metal restore
d) All of the mentioned

View Answer

Answer: b [Reason:] A backup creates a copy of the data whereas an archive removes older information.

3. Which of the following is first rule according to 3-2-1 Backup Rule by Peter Krogh ?
a) Retain three copies of any file—an original and two backups
b) Files must be on two different media types
c) One copy must be stored offsite
d) All of the mentioned

View Answer

Answer: c [Reason:] Files must be on two different media types such as hard drives and optical media to protect against different types of hazards.

4. Which of the following is incorrect feature of cloud storage backup solution ?
a) Logon authentication
b) Low Encryption
c) Fast backup
d) None of the mentioned

View Answer

Answer: b [Reason:] High Encryption is provided by Cloud Backup Storage.

5. Point out the wrong statement:
a) In a differential backup, the backup software can obtain the up-to-date backup from the last full backup and the last incremental backup alone
b) Incremental backup analyzes the transactions that are in progress
c) A cloud storage system contains a certain built-in latency, so unless the original data set is quiescent, the mirror lags behind the original in concurrency
d) None of the mentioned

View Answer

Answer: b [Reason:] An open file backup analyzes the transactions that are in progress.

6. Which of the following is most important feature of cloud storage listed below ?
a) Logon authentication
b) Bare file
c) Multiplatform support
d) Adequate bandwidth

View Answer

Answer: a [Reason:] The interactive logon process is the first step in user authentication and authorization.

7. How many bits of encryption is at least required for cloud backup storage solution ?
a) 56
b) 84
c) 128
d) None of the mentioned

View Answer

Answer: c [Reason:] High encryption of data transfers is carried out preferably end-to-end, but at least for the data that is transferred over the Internet.

8. Which of the following is the most important client to back up in the cloud ?
a) Windows
b) Mac
c) Linux
d) All of the mentioned

View Answer

Answer: d [Reason:] Cloud storage solution should have multiplatform support.

9. Which of the following service does not support backup on Linux platform ?
a) Backblaze
b) Crashplan
c) Datapreserve
d) ADrive

View Answer

Answer: a [Reason:] Data backed up to the cloud cannot be viewed without adequate safeguards or restrictions due to legal regulations.

10. Which of the following is least important feature of cloud storage listed below ?
a) Multisite storage or replication
b) 24×7 technical support
c) Data versioning
d) All of the mentioned

View Answer

Answer: a [Reason:] Data versioning has ability to retrieve historical versions of files from different backups.

Cloud Computing MCQ Set 5

1. Which of the following factors are deemed to be important considerations for evaluating cloud solutions ?
a) Seamless maintenance and upgrades
b) Performance characteristics
c) Client self-service
d) All of the mentioned

View Answer

Answer: d [Reason:] In addition to assigning security-provisioned cloud storage to a client or service requester, a cloud storage service provider must be able to deliver a measured level of service.

2. Point out the correct statement:
a) QoS levels may be applied to different services against a single virtual storage container
b) An SLA might specify that a particular Quality of Service (QoS) for a virtual storage container may be measured in terms of the I/O per second
c) To provide for scaling, a virtual storage container must be easily migrated from one storage system to another
d) All of the mentioned

View Answer

Answer: d [Reason:] One unique characteristic of cloud-based storage solutions is that they permit rapid scaling, both in terms of performance and storage capacity.

3.Which of the following figure is correct according to categories shown ?
a) cloud-computing-questions-answers-cloud-backup-solutions-q3a
b) cloud-computing-questions-answers-cloud-backup-solutions-q3b
c) cloud-computing-questions-answers-cloud-backup-solutions-q3c
d) All of the mentioned

View Answer

Answer: b [Reason:] Backups may be categorized as belonging to one of the above types.

4. How many categories of backup exist in cloud storage ?
a) 3
b) 4
c) 5
d) None of the mentioned

View Answer

Answer: d [Reason:] Seven categories of backup exist for cloud storage.

5. Point out the wrong statement:
a) To scale in, the service must allow for stored data to span additional storage systems
b) To scale up, the service must allow for more disks and more spindles to be provisioned
c) To increase the capacity of a storage provision, it is necessary to provide the capability to scale up or scale out across storage systems
d) None of the mentioned

View Answer

Answer: a [Reason:] Cloud storage systems that successfully scale their provisioned storage for clients often allow for the multiple storage systems to be geographically dispersed and often provide load-balancing services across different storage instances.

6. Which of the following is not a backup category ?
a) Full system backup
b) Half system backup
c) Image backup
d) All of the mentioned

View Answer

Answer: b [Reason:] An image backup creates a complete copy of a volume.

7. Which of the following backup is also referred to as snapshots ?
a) Point-in-time
b) Differential
c) Image backup
d) All of the mentioned

View Answer

Answer: a [Reason:] Software such as Carbonite may take several days to backup a system, but minutes to create the snapshot.

8. Which of the following software supplies full system backup ?
a) Carbonite
b) Ghost
c) RDIFF-BACKUP
d) All of the mentioned

View Answer

Answer: b [Reason:] An image backup allows a system to do what is referred to as a bare metal restore.

9. Which of the following backup lets you restore your data to a point in time and saves multiple copies of any file that has been changed ?
a) Point-in-time
b) Differential
c) Reverse backup
d) None of the mentioned

View Answer

Answer: a [Reason:] At least 10 to 30 copies of previous versions of files should be saved.

10. The amount of time needed to backup a system is referred to as its:
a) backup time
b) backup sheet
c) backup window
d) all of the mentioned

View Answer

Answer: c [Reason:] The first backup is quite slow over an Internet connection, but the incremental backup can be relatively fast.

.woocommerce-message { background-color: #98C391 !important; }