Cloud Computing mcq questions and answers

Q. 1. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid

Advertisement

Protected

Q. 2. Which of the following architectural standards is working with cloud computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure

Service-oriented architecture

Q. 3. Which of the following provides evidence that the message received is the same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption

Advertisement

Digital Signature

Q. 4. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don’t optimize the system latency

Datacenters have been sited to optimize the overall system latency

Q. 5. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption

Advertisement

Encryption

Q. 6. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File

Advertisement

Open Virtualization Format

Q. 7. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server

Send structured data over network

Q. 8. When you add operating system and applications to the service, the model called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS

Advertisement

SaaS

Q. 9. Which organization supports the development of standards for the cloud computing?
A : IEEE
B : OMG
C : OCC
D : Stateless

Advertisement

OCC

Q. 10. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation

Java Script Object Notation

Q. 11. Which of the following mechanisms are contained by Cloud API for accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation

Advertisement

Authentication

Q. 12. Which of the following Cloud Security Characteristic states that data not having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability

Integrity

Q. 13. Google _______ is a collection of applications and utilities under development and testing.
A : Code
B : Labs
C : Hash
D : Platform

Advertisement

Labs

Q. 14. Volume mapping maps the host server’s directory into the Docker container. The data will remain in a safe and accessible place if you do which of the following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container

migrate the container

Q. 15. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It’s a totally private repository

Advertisement

It’s a totally private repository

Q. 16. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS

Cyclone

Q. 17. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery

Advertisement

MobileMe Gallery

Q. 18. ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing

Cloud Computing

Q. 19. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption

Decryption

Q. 20. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP

Advertisement

Linux, Apache, MySQL, PHP

Q. 21. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010

1990

Q. 22. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service

Platform as a service

Q. 23. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of security services
C : Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose

Advertisement

All delivery models provide similar security services

Q. 24. The characteristic of something having been provided by an authorized source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity

Authenticity

Q. 25. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax

XML

Q. 26. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE

Only soft state

Q. 27. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server

Advertisement

Simple Client-Server

Q. 28. Which of the following occurs when data being transferred to or within a cloud (usually from the cloud consumer to the cloud provider) is passively intercepted by a malicious service agent for illegitimate information gathering
purposes

A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service

Traffic Eavesdropping

Q. 29. Which of the following is used for the packaging and distribution of one or more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP

OVF

Q. 30. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2

Both 1 and 2

Q. 31. ____ is XML based protocol used for near-real-time, extensible instant messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP

Advertisement

XMPP

Q. 32. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2

Both 1 and 2

Q. 33. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible

Google Ad Planner is a free media planning tool that can help you identify websites your audience is likely to visit so you can make better-informed advertising decisions

Q. 34. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users

Clients

Q. 35. Which of the following Integrates local computational environments and public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine

CometCloud autonomic cloud engine

Q. 36. Monitor body functions such as blood pressure, blood sugar levels, stress, and more, and notify the person and adjust the environment to affect those functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing

Advertisement

Intelligent Fabrics

Q. 37. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook

Gmail

Q. 38. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS

PaaS

Q. 39. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers

Workload managers

Q. 40. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC

Advertisement

QoCS

Q. 41. When a teenager enters his or her room, for example, the music will play louder, lights may dim, and the computer might initiate specific Skype connections. If a parent enters the room, the volume will lower, lights will turn on, and the Skype page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing

Home Based Cloud Computing

Q. 42. Which type of computing provides mobile users with data storage and processing services in clouds, obviating the need to have a powerful device configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing

Mobile Cloud Computing

Q. 43. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2

Both 1 and 2

Q. 44. In this type of cloud, an organization rents cloud services from cloud providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid

Public

Q. 45. Which type of computing provides the user to use all computing resources available in this environment, which contains clusters, clouds, grids, desktop grids, supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing

Jungle Computing

Q. 46. Which of the following storage is presented to a user as if it is a ready-touse disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable

Advertisement

Unmanaged

Q. 47. These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users

Cloud users

Q. 48. Azure Storage plays the same role in Azure that ______ plays in Amazon Web Services.
A : S3
B : EC2
C : EC3
D : S2

S3

Q. 49. Which of the following mechanism addresses the challenge of propogating the authentication and authorization information for a cloud service consumer across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography

Advertisement

Singel-Sign On

Q. 50. Which among the following is a type of Computing which is a form of selfmanaging systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing

Autonomic Computing

Q. 51. ____ is the protocol specification for exchanging structured information in the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST

SOAP

Q. 52. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility

Advertisement

Portability and interoperability

Q. 53. Cloud provides multiple cloud consumers with access to IT resources that share underlying hardware but are logically isolated from each other.Which among the following is an inherent risk that cloud consumers could abuse this access to attack the underlying
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack

Virtualization attack

Q. 54. In which of the following clients must have continuous connection to host to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2

POP

Q. 55. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose

Port 5000

Q. 56. Which of the following Cloud Issue addresses If you’re using a virtual network between servers, does your virtualized NIC (Network Interface Card) even support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service

Advertisement

Quality-Of-Service

Q. 57. _________enable multiple users to access the same application logic simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology

Multitenant technology

Q. 58. Cost, Reliability, Availability, aspect ratio, frame rate – these parameters refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity

Quality of Service

Q. 59. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template

grid

Q. 60. The technology used to distribute service requests to resources is referred to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring

Advertisement

Load Balancing

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top