Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Cloud Computing MCQ Set 1

1. Which of the following algorithm is used by Google to determine the importance of a particular page ?
a) SVD
b) PageRank
c) FastMap
d) All of the mentioned

View Answer

Answer: b [Reason:] Content on pages is scanned up to a certain number of words and placed into an index.

2. Point out the correct statement :
a) With PaaS, the goal is to create hosted scalable applications that are used in a Software as a Service model
b) Applications built using PaaS tools need to be standards-based
c) In Wolf, the data and transaction management conforms to the business rules you create
d) All of the mentioned

View Answer

Answer: d [Reason:] Wolf lets you work with Adobe Flash or Flex or with Microsoft Silverlight.

3. Which of the following figure correctly describe major features provided by Google App Engine ?
a) cloud-computing-questions-answers-google-web-services-q3a
b) cloud-computing-questions-answers-google-web-services-q3b
c) cloud-computing-questions-answers-google-web-services-q3c
d) All of the mentioned

View Answer

Answer: d [Reason:] For an application to run on GAE, it must comply with Google’s platform standards, which narrows the range of applications that can be run and severely limits those applications’ portability.

4. Based on PageRank algorithm, Google returns __________ for a query that is parsed for its keywords.
a) SEP
b) SAP
c) SERP
d) Business Objects Build

View Answer

Answer: c [Reason:] SERP stands for Search Engine Results Page.

5. Point out the wrong statement:
a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database
b) Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content
c) Google applications are cloud-based applications
d) None of the mentioned

View Answer

Answer: b [Reason:] Wolf has architected its platform so applications can be built without the need to write technical code.

6. Which of the following protocol lets a Web site list in an XML file information ?
a) Sitemaps
b) Mashups
c) Hashups
d) All of the mentioned

View Answer

Answer: a [Reason:] Sitemaps can be useful in allowing content that isn’t browsable to be crawled.

7. Which of the following is not privided by “Deep Web” ?
a) Database generated Web pages
b) Private or limited access Web pages
c) Pages without links
d) All of the mentioned

View Answer

Answer: d [Reason:] Online content that isn’t indexed by search engines belongs to what has come to be called the “Deep Web”.

8. Dynamic content presented in Google _______ crawling isn’t normally indexed.
a) AJAX
b) Java
c) Javascript
d) All of the mentioned

View Answer

Answer: a [Reason:] Google now has a procedure that helps the Google engine crawl this information.

9. Which of the following google product sends you periodic email alerts based on your search term ?
a) Alerts
b) Blogger
c) Calendar
d) All of the mentioned

View Answer

Answer: a [Reason:] By creating a Google Alert, you can get email notifications any time Google finds new results on a topic that interests you.

10. Which of the following is a payment processing system by Google ?
a) Paytm
b) Checkout
c) Code
d) All of the mentioned

View Answer

Answer: b [Reason:] Google Checkout was an online payment processing service provided by Google aimed at simplifying the process of paying for online purchases.

Cloud Computing MCQ Set 2

1. Which type of Hypervisor is shown in the following figure ?
cloud-computing-questions-answers-hypervisors-1-q1
a) Type 1
b) Type 2
c) Type 3
d) All of the mentioned

View Answer

Answer: a [Reason:] :A hypervisor running on bare metal is a Type 1 VM or native VM.

2. Point out the wrong statement :
a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address
b) Multiple instances of various Google applications are running on different hosts
c) Google uses hardware virtualization
d) All of the mentioned

View Answer

Answer: c [Reason:] Google performs server load balancing to distribute the processing load and to get high utilization rates.

3. Which of the following is another name for system virtual machine ?
a) hardware virtual machine
b) software virtual machine
c) real machine
d) None of the mentioned

View Answer

Answer: a [Reason:] Some virtual machines are designed to run only a single application or process and are referred to as process virtual machines.

4. Which of the following provide system resource access to virtual machines ?
a) VMM
b) VMC
c) VNM
d) All of the mentioned

View Answer

Answer: a [Reason:] VMM is another name for Hypervisor.

5. Point out the correct statement :
a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine
is running on
b) Virtual machines provide the capability of running multiple machine instances, each with their own operating system
c) The downside of virtual machine technologies is that having resources indirectly addressed means there is some level of overhead
d) All of the mentioned

View Answer

Answer: d [Reason:] This makes virtual machine technology very useful for running old versions of operating systems, testing applications in what amounts to a sandbox.

6. An operating system running on a Type __ VM is a full virtualization.
a) 1
b) 2
c) 3
d) All of the mentioned

View Answer

Answer: a [Reason:] Because it is a complete simulation of the hardware that it is running on.

7. Which of the following is Type 1 Hypervisor ?
a) Wind River Simics
b) Virtual Server 2005 R2
c) KVM
d) LynxSecure

View Answer

Answer: d [Reason:] Type 1 VMs have no host operating system because they are installed on a bare system.

8. Which of the following is Type 2 VM ?
a) VirtualLogix VLX
b) VMware ESX
c) Xen
d) LynxSecure

View Answer

Answer: c [Reason:] Xen is used by Amazon Web Services to provide Amazon Machine Instances (AMIs).

9. Which of the following will be host operating system for Windows Server ?
a) VirtualLogix VLX
b) Microsoft Hyper-V
c) Xen
d) All of the mentioned

View Answer

Answer: b [Reason:] Type 2 virtual machines are installed over a host operating system.

10. Which of the following should be placed in second lowermost layer for the following figure ?
cloud-computing-questions-answers-hypervisors-1-q10
a) Host Operating System
b) Software
c) VM
d) None of the mentioned

View Answer

Answer: a [Reason:] Examples of Type 2 Virtual Machine Monitors are Containers, KVM, Microsoft Hyper V and Parallels Desktop for Mac.

Cloud Computing MCQ Set 3

1. Which of the following is done by Identity management ?
a) controlling access to data in the cloud
b) maintaining user roles
c) preventing unauthorized uses
d) all of the mentioned

View Answer

Answer: d [Reason:] Identity management is a primary mechanism for controlling access to data in the cloud, preventing unauthorized uses, maintaining user roles, and complying with regulations.

2. Point out the correct statement:
a) Identities are not tied to the concept of accounts and can be used for contacts or “ID cards”
b) Identities are important from a reliability standpoint
c) Presence is important in cloud computing because it adds context that can modify services and service delivery
d) All of the mentioned

View Answer

Answer: c [Reason:] Identities can be used to authenticate client requests for services in a distributed network system.

3. Which of the following is required by Cloud Computing ?
a) That you establish an identity
b) That the identity be authenticated
c) That the authentication be portable
d) All of the mentioned

View Answer

Answer: d [Reason:] When applied to a number of users in a cloud computing system, these requirements describe systems that must provision identities.

4. Which of the following standard is the key to creating Single Sign-On (SSO) systems ?
a) OpenID 2.0
b) CHAP
c) SMAL
d) None of the mentioned

View Answer

Answer: a [Reason:] Some cloud service providers have adopted OpenID as a service.

5. Point out the wrong statement:
a) OpenID 2.0 is the standard associated with creating an identity
b) OpenID doesn’t specify the means for authentication of an identity,
c) OpenID provides access to important Web sites
d) None of the mentioned

View Answer

Answer: d [Reason:] Authentication can be by a Challenge and Response Protocol (CHAP).

6. Which of the following is a complimentary mechanism to OpenID and is used to create SSO systems ?
a) OpenSSL
b) CHAP
c) SMAL
d) None of the mentioned

View Answer

Answer: c [Reason:] Taken as a unit, OpenID and SAML are being positioned to be the standard authentication mechanism for clients accessing cloud services.

7. Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials ?
a) serving party
b) relieving party
c) relaying party
d) none of the mentioned

View Answer

Answer: c [Reason:] The OpenID is presented to a service that provides access to the resource that is desired.

8. Which of the following provides a token service that can be used to present validated access to resources ?
a) OAuth
b) OCheck
c) SAML
d) None of the mentioned

View Answer

Answer: a [Reason:] OAuth is similar to OpenID.

9. Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards ?
a) Windows Wor kflow
b) Windows Identity
c) Windows compliance
d) None of the mentioned

View Answer

Answer: b [Reason:] ASP.NET Web applications created with WIF integrate the Windows Communication Foundation SOAP service (WCF-SOAP) into a unified object model.

10. __________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
a) AD FS
b) AC
c) SAS
d) None of the mentioned

View Answer

Answer: a [Reason:] AD FS uses WS-Federation, WS-Trust, and SAML, which allows users to access a system based on IBM, Novel, SAP, and many other vendors.

Cloud Computing MCQ Set 4

1. _________ computing refers to applications and services that run on a distributed network using virtualized resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel

View Answer

Answer: b [Reason:] Cloud Computing applications are accessed by common Internet protocols and networking standards.

2. Point out the wrong statement :
a) The massive scale of cloud computing systems was enabled by the popularization of the Internet
b) Soft computing represents a real paradigm shift in the way in which systems are deployed
c) Cloud computing makes the long-held dream of utility computing possible with a pay-as-you-go, infinitely scalable, universally available system
d) All of the mentioned

View Answer

Answer: b [Reason:] Cloud Computing is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted from the user.

3. ________ as a utility is a dream that dates from the beginning of the computing industry itself.
a) Model
b) Computing
c) Software
d) All of the mentioned

View Answer

Answer: b [Reason:] Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility.

4. Which of the following is essential concept related to Cloud ?
a) Reliability
b) Productivity
c) Abstraction
d) All of the mentioned

View Answer

Answer: c [Reason:] Cloud computing abstracts the details of system implementation from users and developers.

5. Point out the wrong statement :
a) All applications benefit from deployment in the cloud
b) With cloud computing, you can start very small and become big very fast
c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary
d) None of the mentioned

View Answer

Answer: a [Reason:] Issues with latency, transaction control, and in particular security and regulatory compliance are of particular concern.

6. Which of the following cloud concept is related to pooling and sharing of resources ?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned

View Answer

Answer: c [Reason:] Applications run on physical systems that aren’t specified, data is stored in locations that are unknown, administration of systems is outsourced to others, and access by users is ubiquitous.

7. ________ has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned

View Answer

Answer: a [Reason:] The Internet offers abstraction, runs using the same set of protocols and standards, and uses the same applications and operating systems.

8. Which of the following can be identified as cloud ?
a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned

View Answer

Answer: c [Reason:] When an intranet becomes large enough that a diagram no longer wishes to differentiate between individual physical systems, the intranet too becomes identified as a cloud.

9. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.
a) real
b) virtual
c) cloud
d) none of the mentioned

View Answer

Answer: b [Reason:] Cloud Computing is a new model for provisioning resources, for staging applications, and for platform-independent user access to services.

10. Which of the following is Cloud Platform by Amazon ?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned

View Answer

Answer: b [Reason:] One of the most successful cloud-based businesses is Amazon Web Services, which is an Infrastructure as a Service offering that lets you rent virtual computers on Amazon’s own infrastructure.

Cloud Computing MCQ Set 5

1. _______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand.
a) Leading
b) Pooling
c) Virtualization
d) All of the mentioned

View Answer

Answer: b [Reason:] The virtualization of pooled resources—processors or compute engines, storage, and network connectivity—optimizes these investments and allows the cloud provider to pass along these economies to customers.

2. Point out the correct statement :
a) A branded cloud computing platform cannot extend customer relationships by offering additional service options
b) A cloud computing platform extends the company’s products and defends their franchise
c) The economies of scale cannot make a profitable business
d) All of the mentioned

View Answer

Answer: b [Reason:] This is the case for Microsoft’s Windows Azure Platform.

3. A _____ is a facility that is a self-contained semiconductor assembly line.
a) fab
b) touch
c) rep
d) all of the mentioned

View Answer

Answer: a [Reason:] Companies such as TSMC (Taiwan Semiconductor Manufacturing Company) have come along that provide fabrication based on customer designs, spreading their risk and optimizing their operation.

4. How many laws exist for Cloudonomics by Wienman ?
a) 4
b) 5
c) 10
d) 15

View Answer

Answer: c [Reason:] Joe Wienman of AT&T Global Services has concisely stated the advantages that cloud computing offers over a private or captured system.

5. Point out the wrong statement :
a) Google App Engine allows a developer to scale an application immediately
b) The customer relationship management provider SalesForce.com has a development platform called Force.com that is a IaaS offering
c) A cloud computing provider can become a hub master at the center of many ISV’s offerings
d) None of the mentioned

View Answer

Answer: b [Reason:] For Google, its office applications can be rolled out quickly and to large audiences.

6. Cutting latency in half requires ______ times the number of nodes in a system.
a) two
b) three
c) four
d) all of the mentioned

View Answer

Answer: c [Reason:] Latency, or the delay in getting a response to a request, requires both large-scale and multi-site deployments that are a characteristic of cloud providers.

7. Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems do.
a) sniffers
b) botnets
c) trojan horse
d) all of the mentioned

View Answer

Answer: b [Reason:] Superiority in numbers is the most important factor in the result of a combat.

8. The reliability of a system with n redundant components and a reliability of r is :
a) 1-(1-r)n
b) 1-(1+r)n
c) 1+(1-r)n
d) All of the mentioned

View Answer

Answer: a [Reason:] Therefore, when a datacenter achieves a reliability of 99 percent, two redundant datacenters have a reliability of 99.99 percent (four nines) and three redundant datacenters can achieve a reliability of 99.9999 percent (six nines).

9. A __________ site is one that is environmentally friendly: locations that are on a network backbone.
a) greenfield
b) redfield
c) greenful
d) none of the mentioned

View Answer

Answer: a [Reason:] Private datacenters tend to be located in places where the company or unit was founded or acquired.

10. The peak of the sum is never ________ than the sum of the peaks.
a) smaller
b) greater
c) equal to
d) none of the mentioned

View Answer

Answer: b [Reason:] A cloud can deploy less capacity because the peaks of individual tenants in a shared system are averaged over time by the group of tenants.