CC MCQ Final Exam
CC MCQ Final Exam
1. Storage
2. Application
3. CPU
4. All of the Above
Q.2 The technology used to distribute service requests to resources is referred to as:
1. Load performing
2. Load scheduling
3. Load balancing
Q.3 Point out the correct statement:
1. A client can request access to a cloud service from any location
2. A cloud has multiple application instances and directs requests to an instance based on
conditions
3. Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
4. All of the mentioned
Q.4 Which of the following software can be used to implement load balancing?
1. Apache mod_balancer
2. Apache mod_proxy_balancer
3. F6’s BigIP
Q.5 Which of the following network resources can be load balanced?
1. Connections through intelligent switches
2. DNS
3. Storage resource
4. All of the above
Q.6 Which of the following is a more sophisticated load balancer?
1. Rack server managers
2. Workload managers
3. Workspace managers
Q.7 A ______ is a combination load balancer and application server that is a server placed between a
firewall or router.
1. ABC
2. ACD
3. ADC
Q.8 Which of the following service provider provides the least amount of built-in security?
1. SaaS
2. PaaS
3. IaaS
Q.9 Point out the correct statement:
1. Different types of cloud computing service models provide different levels of security
services
2. Adapting your on-premises systems to a cloud model requires that you determine what
security mechanisms are required and mapping those to controls that exist in your chosen
cloud service provider
3. Data should be transferred and stored in an encrypted format for security purpose
4. All of the above
Q.10 Which of the following services that need to be negotiated in Service Level Agreements?
1. Logging
2. Auditing
3. Regulatory compliance
4. All of the above
Q.11 Point out the wrong statement:
1. You can use proxy and brokerage services to separate clients from direct access to shared
cloud storage
2. Cloud computing doesn’t have vulnerabilities associated with Internet applications
3. Any distributed application has a much greater attack surface than an application that is
closely held on a Local Area Network
Q.12 Which of the following area of cloud computing is uniquely troublesome?
1. Auditing
2. Data Integrity
3. E-Discovery for legal compliance
4. All of the above
Q.13 Which of the following is the operational domain of CSA?
1. Scalability
2. Portability and interoperability
3. Flexibility
Q.14 Which of the following is considered an essential element in cloud computing by CSA?
1. Multi-tenancy
2. Identity and access management
3. Virtualization
Q.15 Which of the following is used for Web performance management and load testing?
1. VMware Hyperic
2. Web metrics
3. Univa UD
4. Tapinsystems
A. 2
B. 3
C. 4
D. 5
Explanation: We can broadly divide the cloud architecture into two parts : Front End and
Back End
Q.3 . Which of the following refers to the client part of cloud computing
system?
A. back End
B. Front End
C. Infrastructure
D. Management
Explanation: The front end refers to the client part of cloud computing system. It consists of
interfaces and applications that are required to access the cloud computing platforms.
A. Client
B. User
C. service provider
D. Stackholders
Explanation: The back end is used by the service provider. It manages all the resources that
are required to provide cloud computing services.
Q.6 Both front end and back end are connected to others through a?
A. Network
B. Database
C. Browser
D. Both A and B
Explanation: Both front end and back end are connected to others through a network,
generally using the internet connection.
A. 2
B. 3
C. 4
D. 5
Explanation: Cloud computing offers the following three type of services: SaaS, PaaS and
IaaS.
A. PaaS
B. IaaS
C. SaaS
D. All of the above
A. Service
B. Application
C. Storage
D. Security
Q.10 Who provide GUI (Graphical User Interface) to interact with the
cloud?
A. Client
B. Application
C. Client Infrastructure
D. Server
Explanation: Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
Q.11 What type of computing technology refers to services and applications that
typically run on a distributed network through virtualized resources?
1. Distributed Computing
2. Cloud Computing
3. Soft Computing
4. Parallel Computing
Q.12 Which one of the following options can be considered as the Cloud?
a. Hadoop
b. Intranet
c. Web Applications
a. Real
b. Cloud
c. Virtual
Q.14 Which of the following has many features of that is now known as cloud
computing?
a. Web Service
b. Softwares
d. Internet
Explanation: Internet provides the abstraction, runs through the same set of protocols
and standards, and uses the same operating system and applications.
Q.15 Which one of the following cloud concepts is related to sharing and pooling
the resources?
a. Polymorphism
b. Virtualization
c. Abstraction
Explanation: The application runs on physical systems that are not specified in real.
The information stored in the locations that are also not specified or unknown,
administration of the systems are outsourced to others and can be accessed by the
user.
b. Cloud computing makes the long-held dream of utility as a payment possible for
you, with an infinitely scalable, universally available system, pay what you use.
Q.17 Which one of the following can be considered as a utility is a dream that
dates from the beginning of the computing industry itself?
a. Computing
b. Model
c. Software
a. Reliability
b. Abstraction
c. Productivity
b. AWS
c. Cloudera
a. Through cloud computing, one can begin with very small and become big in a
rapid manner.
Q.1 In the Planning Phase, Which of the following is the correct step for
performing the analysis?
c. Both A and B
c. Planning Phase
b. We identify the applications that support the business processes and the
technologies required to support enterprise applications and data systems.
c. We formulate all kinds of plans that are required to transform the current
business to cloud computing modes.
a. Service Development
b. Quality of service
c. Plan Development
d. Technical Service
b. IT Architecture Development
Q.6 This phase involves selecting a cloud provider based on the Service Level
Agreement (SLA), which defines the level of service the provider receives.
c. Both A and B
Explanation: This phase involves selecting a cloud provider based on the Service Level
Agreement (SLA), that defines the level of service the provider receives.
Q.7 In which one of the following phases, IT Architecture Development came?
a. Strategy Phase
b. Planning Phase
c. Deployment Phase
d. Development Phase
Q.8 Which of the model involves the special types of services that users can
access on a Cloud Computing platform?
a. Service
b. Planning
c. Deployment
d. Application
Explanation: The service model contains the specials types of services that users
can access on a cloud computing platform.
Q.9 Which one of the following is related to the services provided by Cloud?
a. Sourcing
b. Ownership
c. Reliability
d. PaaS
e. Explanation: Insourced or Outsourced means whether the service is provided
by the customer or the service provider.
a. 2
b. 3
c. 4
d. 5
Explanation: In Cloud Computing Planning, there are usually three phases that
are Strategy Phase, Planning Phase, and Deployment Phase.
Q.12 In how many parts we can broadly divide the architecture of the Cloud?
a. 4
b. 3
c. 2
d. 5
Explanation: The architecture of the Cloud can broadly be divided into two main
parts that are Back-end and Front-end.
Q.13 Which one of the following refers to the user's part of the Cloud Computing
system?
a. back End
b. Management
c. Infrastructure
d. Front End
Explanation: It is the front-end that refers to the user's part of the cloud computing
system. It includes many applications and interfaces that are required to access or use
the cloud computing platform.
Q.14 Which one of the following can be considered as the example of the Front-
end?
a. Web Browser
a. Client
b. User
c. Stockholders
d. service provider
Q.16 Through which, the backend and front-end are connected with each other?
a. Browser
b. Database
c. Network
d. Both A and B
Explanation: Typically using an internet connection, both the front and back end
are connected to the others through a network.
Q.17 How many types of services are there those are offered by the Cloud
Computing to the users?
a. 2
b. 4
c. 3
d. 5
Q.18 The Foce.com and windows Azure are examples of which of the following?
a. IaaS
b. PaaS
c. SaaS
d. Both A and B
Explanation : Both Force.com and Windows Azure are examples of the Platform as a
service
Q.19 Which of the following is one of the backend's built-in components of cloud
computing?
a. Security
b. Application
c. Storage
d. Service
Q.20 Which of the following provides the Graphic User Interface (GUI) for
interaction with the cloud?
a. Client
b. Client Infrastructure
c. Application
d. Server
Q.21 Which one of the following a technology works behind the cloud computing
platform?
a. Virtualization
b. SOA
c. Grid Computing
22) Which one of the following is a kind of technique that allows sharing the
single physical instance of an application or the resources among multiple
organizations/customers?
a. Virtualization
b. Service-Oriented Architecture
c. Grid Computing
d. Utility Computing
a. IT Architecture
b. Multitenant
c. Deployment
d. Business Architecture
b. SOA Model
d. Pay-per-Use model
Q.25 Which one of the following statement is true about the Service-Oriented
Architecture?
a. It is possible to exchange data between applications from different vendors
without using additional programming.
d. Both A and C
a. heterogeneous dispersed.
b. geographically dispersed.
c. Both A and B
Q.27 Managed IT services are based on the concept of which one of the
following?
a. Virtualization
b. Utility Computing
c. Grid Computing
d. SOA
Q.28 Which one of the following refers to the Distributed Computing, in which
several sets of computers distributed on multiple geographical locations and are
connected with each other to achieve a common goal?
a. Virtualization
b. SOA
c. Grid Computing
d. Utility Computing
Q 29. Which one of the following statement is true about Grid Computing?
d. Both A and C
Q.30 Which one of the following given programs provides the isolation
(abstraction) and partitioning?
a. System hypervisor
b. Software hypervisor
c. Hardware hypervisor
d. Virtualization hypervisor
Q.31 On which one of the following hypervisor runs directly on the underlying
host system, it is also known as________?
b. Hosted Hypervisor
c. Native Hypervisor
d. Both A and C
e. Explanation: The Hypervisor runs directly on the underlying host system, and
sometimes it is also known as "Native Hypervisor" or "Bare metal hypervisor."
Q.32 Which of the following behaves like the monitor's entry point and reroutes
the instructions of the virtual machine?
a. Dispatcher
b. Allocator
c. Interpreter
d. Both A and B
Explanation: The Dispatcher acts as the monitor's entry point and reruns the
instructions (statements) of the virtual machine instance to one of the other two
modules.
a. VMA
b. VMM
c. VMS
d. VMR
Explanation: A Virtual Machine Monitor (or VMM) is sometimes also known as the
Hypervisor.
a. 4
b. 3
c. 2
d. 5
a. VMware ESXi
b. Citrix XenServer
d. VMware Player
Explanation: VMware Player is one of the examples of Typ2-Hypervisor not of
the Type1-Hypervisor
Q.36 How many main modules are needed to coordinate in order to emulate the
underlying hardware?
a. 3
b. 2
c. 4
d. 5
o Explanation: In order to emulate the underlying hardware, there are three main
modules needed to coordinate, which are as follows:
o Interpreter
o Allocator
o Dispatcher
a. INTERPRETER
b. TYPE-2 Hypervisor
c. Both A and B
d. DISPATCHER
Q.38 The Parallels Desktop can be considered as the example of which of the
following?
a. TYPE-2 Hypervisor
b. DISPATCHER
c. TYPE-1 Hypervisor
d. INTERPRETER
Explanation: Parallels Desktop or VMware Player is one of the examples of the
Type2-Hypervisor. Almost all the hosted hypervisors are usually found on endpoints
such as PCs.
b. Usually, the guest operating systems are mores faster in full virtualization as
compared to other virtualization schemes.
Q.41 Which one of the following can be considered as the example of the Type2
Virtual Machine monitors?
a. KVM
b. Microsoft Hyper V
c. Parallels Desktop
Chapter -4
1. Iaas
2. PaaS
3. SaaS
4. BPaaS
1. Manage
2. Provisioning
3. Accelerate
4. Build
1. Rackspace
2. Go Grid
3. AWS
4. Eucalyptus
1. AMI
2. IAM
3. EC2
4. Cloud Front
1. IaaS
2. PaaS
3. SaaS
4. All of the mentioned
1. Application
2. Fabric
3. Managing
4. Foundation
Q.9 If you store your data in the cloud, your data are saved locally?
1. Yes
2. No
1. PaaS
2. IaaS
3. SaaS
4. FaaS
a. Chemical explosion
a. Loss of life
b. Damage to property
c. Environmental Damages
a. Seismograph
b. Seismology
c. Both a and b
Q.17. What is the name of instrument used for measuring earthquake intensity?
b. Metrological scale
c. Vernier scale
d. Barometer
b) Web page
a) Cash on delivery
c) Demand draft
d) E-cheque
a) Cash on delivery
b) Debit card
c) Credit card
d) E-cheque
a) Marketing over IP
b) Interactive marketing
c) Mobile marketing
Q.1 Building long-term relationships with customers is essential for any business.
The application of technology to achieve CRM is a key element of e-business but
what does CRM stand for?
Q.2 There are different techniques to both initiate and build relationships with
customers by using a combination of online and offline techniques. What is the
'customer life cycle' though?
Q.3 The four marketing activities within the customer relationship management
include customer selection, customer acquisition, customer retention, plus:
1. Customer extension
2. Customer referrals
3. Customer Up-sell
4. Customer re-sell
5. Customer cross-sell
1. Personalisation
2. Sense and respond communications
3. Customer-centric marketing
4. Electronic customer relationship management
5. Mass customization
Q.5 Using the Internet for relationship marketing involves integrating the customer
database with websites to make the relationship targeted and personalised.
Through doing this there are many benefits to be gained but which of the below is
not an advantage?
1. Lower costs
2. Targeting more effectively
3. Achieve mass customisation of the marketing messages
4. Minimises breadth, depth and nature of relationship
Q.6 Accepting that a customer has agreed to opt-in to receive further information,
with customer profiling the minimum amount of online information that needs to
be collected is an e-mail address. What is really required though to decide if the
customer is a good potential target for further communications?
1. A qualified lead
2. Permission marketing
3. Interruption marketing
4. Opt-out facilities to be removed
Q.7 RACE is a practical framework to help marketers manage and improve the
commercial value gained from digital marketing. The term stands for Reach, Act,
C, Engage. What does 'C' refer to?
Q.8 Companies that understand how customers use digital media in their purchase
decision buying can develop integrated communications strategies to support their
customers at each stage in the buying process. Customers have individual
preferences in the ways they use the web depending upon why they need to use it
and this web use is known as:
1. Directed buyers
2. Directed-information seekers
3. Undirected information-seekers
4. Searching behaviors
Q.10 A marketing campaign will not be successful if the costs of acquiring site
visitors and customers are too high. The term used to describe the cost of
acquiring a new customer is known as:
Q.11 The use of online and offline promotion techniques to increase the audience
of a site is known as a:
Q.12 Online public relations (or e-PR) should aim to maximise favourable mentions
of companies, products, brands, etc which are likely to be visited by target
audiences. Which of the following activities fall within the remit of e-PR?
Q.13 Social media (e.g. Facebook, Twitter) usage has become so widespread that
to discount a social media strategy would be a mistake best avoided. Social
customer relationship management (Social CRM) is a relatively new term which
helps to define the broad scope of social media across the customer life cycle and
value chain. The Altimeter report (2010) provides a framework for reviewing
strategy implementation and is known as:
1. Social media CRM framework
2. The 5Ms
3. Social CRM modeling
4. None of the above
1. Interactive advertising
2. Ad serving
3. Online sponsorship
4. Media multiplier
q.15 E-mail marketing has to make strategic plans regarding outbound and
inbound e-mails. E-mail is most widely used as a prospect conversion and
customer retention tool. A database of customer names, email addresses and
profile information used for e-mail marketing is usually known as: