Cloud Computing MCQ Unit I Introduction
Cloud Computing MCQ Unit I Introduction
Answer: c
Explanation: Through hardware
virtualization on Xen hypervisors,
b) Amazon.com has made it possible to create
private virtual servers that you can run
worldwide.
Answer: a
Explanation: Amazon Elastic Compute
Cloud enables the creation, use, and
c) management of virtual private servers
running the Linux or Windows operating
system over a Xen hypervisor.
Answer: b
d) None of the mentioned Explanation: In a loosely coupled SOA
system, a transaction manager is required to
Answer: a ensure that messages are not lost when a
Explanation: Amazon Elastic Compute component isn’t available.
Cloud is the central application in the AWS
portfolio. 5. Point out the correct statement.
a) SQL Server is having enormous impact on
2. Point out the wrong statement. cloud computing
a) Virtual private servers can provision virtual b) Amazon.com’s services represent the
Answer: b
Explanation: Autoscaling is part of Amazon TOPIC 1.7 ON-DEMAND
Cloudwatch and available at no additional PROVISIONING
charge.
1. Which of the following cloud storage is
8. Which of the following is a Web service mainly meant for developers and to support
that can publish messages from an application applications built using Web services?
and deliver them to other applications or to a) Managed
subscribers? b) Unmanaged
a) Amazon Elastic Compute Cloud c) Disk
b) Amazon Simple Queue Service d) All of the mentioned
c) Amazon Simple Notification Service
d) Amazon Simple Storage System Answer: a
Explanation: Managed cloud storage is
provisioned and provided as a raw disk.
www.studymaterialz.in
TECHNOLOGIES Answer: a
Explanation: A business task is a
composition of services.
TOPIC 2.1 SERVICE ORIENTED
ARCHITECTURE 4. Which of the following module of SOA is
shown in the following figure?
1. Which of the following describes a
message-passing taxonomy for a component-
based architecture that provides services to
clients upon demand? a) Description
a) SOA b) Messaging
b) EBS c) Business Process
c) GEC d) QOS
d) All of the mentioned
Answer: d
Answer: a Explanation: QoS is established, and the
Explanation: Clients access a component that service is instantiated.
complies with SOA by passing a message
containing metadata to be acted upon in a 5. Point out the wrong statement.
standard format. a) SOA provides the standards that transport
www.studymaterialz.in
Answer: a Answer: a
Explanation: Publishing message is handled Explanation: Publish() method also accepts
www.studymaterialz.in
arbitrary keyword arguments, which are called as str, and in python 2 it is called as
passed along as attributes of the message. unicode.
6. The topic in the publish method is in which 10. When you publish a message is
form? automatically created?
a) Binomial form a) Client
b) Canonical form b) Server
c) Nominal form c) Batch
d) Message form d) Server
Answer: b Answer: c
Explanation: The topic is passed along as a Explanation: Whenever we publish a
string; all topics have the canonical form of message, a batch is automatically created.
projects/{project_name}/topic/{topic_name}. This way, if you publish a large volume of
messages, it reduces the number of requests
7. The message in pub/sub is an opaque blob made to the server.
of
a) Bits 11. When the batch is created, it begins a
b) Bytes countdown that publishes the batch once
c) Word sufficient time has elapsed.
d) Nibble a) True
b) False
Answer: b
Explanation: The message in pub/sub is an Answer: a
opaque blob of bytes, and as such, you must Explanation: When the batch is created, it
send a bytes object in python 3. begins a countdown that publishes the batch
once sufficient time has elapsed.
8. error will show if we try to send
text string instead of bytes. 12. What is the time elapsed after a batch is
a) TypeError created?
b) Error a) 0.5 seconds
c) Linker error b) 0.05 seconds
d) Compiler error c) 1.5 seconds
d) 1 second
Answer: a
Explanation: If we send a text string the Answer: b
method will raise TypeError. TypeError will Explanation: When the batch is created, it
show if we try to send text string instead of begins a countdown that publishes the batch
bytes. once sufficient time has elapsed by default it
is 0.05 seconds.
9. What do we call string in python 2?
a) Str 13. Every call to publish() will return a class
b) Unicode that conforms to the interface.
c) Strs a) Batch
d) Unicades b) Client
c) Server
Answer: b d) Future
Explanation: In python 2 the text string is
www.studymaterialz.in
Answer: d
Explanation: Every call to publish() will
return a class that conforms to the future
interface. You can use this to ensure that the
publish.
Answer: a
TOPIC 2.6 TYPES OF Explanation: You can define the features in
VIRTUALIZATION software and hardware that enables flexibility
as conforming to one or more of the mobility
patterns.
TOPIC 2.7 IMPLEMENTATION
LEVELS OF VIRTUALIZATION 2. Point out the wrong statement.
a) Abstraction enables the key benefit of
cloud computing: shared, ubiquitous access
TOPIC 2.8 VIRTUALIZATION b) Virtualization assigns a logical name for a
STRUCTURES physical resource and then provides a pointer
to that physical resource when a request is
1. Which of the following correctly represents made
different types of mobile patterns? c) All cloud computing applications combine
a) their resources into pools that can be assigned
on demand to users
d) All of the mentioned
Answer: c
Explanation: Several important cloud
computing approaches use a strictly
hardware-based approach to abstraction.
Answer: d
c) Explanation: To enable these characteristics,
resources must be highly configurable and
flexible.
Answer: b
Explanation: Load balancing can be used to
increase utilization and throughput, lower
latency, reduce response time, and avoid
system overload.
of the first four of five key attributes of cloud b) The devices connected using I/O mapping
computing. have a bigger buffer space
c) The devices have to deal with fewer
address lines
TOPIC 2.9 TOOLS AND d) No advantage as such
MECHANISMS
VIRTUALIZATION OF CPU, Answer: c
MEMORY AND I/O DEVICES Explanation: Since the I/O mapped devices
have a separate address space the address
lines are limited by the amount of the space
1. In memory-mapped I/O
allocated.
a) The I/O devices and the memory share the
same address space 5. The system is notified of a read or write
b) The I/O devices have a separate address operation by
space a) Appending an extra bit of the address
c) The memory and I/O devices have an b) Enabling the read or write bits of the
associated address space devices
d) A part of the memory is specifically set c) Raising an appropriate interrupt signal
aside for the I/O operation d) Sending a special signal along the BUS
Answer: a Answer: d
Explanation: Its the different modes of Explanation: It is necessary for the processor
accessing the i/o devices. to send a signal intimating the request as
either read or write.
2. The usual BUS structure used to connect
the I/O devices is 6. To overcome the lag in the operating
a) Star BUS structure speeds of the I/O device and the processor we
b) Multiple BUS structure use
c) Single BUS structure a) BUffer spaces
d) Node to Node BUS structure b) Status flags
c) Interrupt signals
Answer: c
d) Exceptions
Explanation: BUS is a collection of address,
control and data lines used to connect the Answer: b
various devices of the computer. Explanation: The processor operating is
much faster than that of the I/O devices, so by
3. In intel’s IA-32 architecture there is a
using the status flags the processor need not
separate 16 bit address space for the I/O
wait till the I/O operation is done. It can
devices.
continue with its work until the status flag is
a) False
set.
b) True
7. The method of accessing the I/O devices
Answer: b
by repeatedly checking the status flags is
Explanation: This type of access is called as
I/O mapped devices. a) Program-controlled I/O
b) Memory-mapped I/O
4. The advantage of I/O mapped devices to
c) I/O mapped
memory mapped is
d) None of the mentioned
a) The former offers faster transfer of data
CS8791 Cloud Computing CSE - Rw
egw
ulw
at.isotnusd2y
0m
17aterialz.in
Answer: a
TOPIC 2.10 VIRTUALIZATION
Explanation: In this method, the processor
constantly checks the status flags, and when it SUPPORT AND DISASTER
finds that the flag is set it performs the RECOVERY
appropriate operation.
This set of SAN multiple choice questions
8. The method of synchronising the processor and answers focuses on Backup and
with the I/O device in which the device sends Recovery.
a signal when it is ready is?
a) Exceptions 1. The purpose of backup is:
b) Signal handling a) To restore a computer to an operational
c) Interrupts state following a disaster
d) DMA b) To restore small numbers of files after they
have been accidentally deleted
Answer: c c) To restore one among many version of the
Explanation: This is a method of accessing same file for multiple backup environment
the I/O devices which gives the complete d) All of the mentioned
power to the devices, enabling them to
intimate the processor when they’re ready for Answer: d
transfer.
2. Backup of the source data can be created
9. The method which offers higher speeds of a) On the same device
I/O transfers is b) On another device
a) Interrupts c) At some other location
b) Memory mapping d) All of the mentioned
c) Program-controlled I/O
d) DMA Answer: d
Answer: d
Answer: d Answer: d
Answer: c
Answer: d c) All of the mentioned
Explanation: The static structure of the d) None of the mentioned
Layered style is to partition software units
into modular layers whereas The dynamic Answer: d
structure of the Layered style is nothing more Explanation: Each layer is allowed to depend
than a constraint on interactions between on the layer below it being present and
layers. correct. A layer may call other layers above
and below it, as long as it does not use them.
3. What is Relaxed Layered Style?
a) Each layer can be constrained to use only 6. What is Onion diagram illustrates?
the layer directly below it a) It illustrates the connection between the
b) Sometimes this constraint is relaxed layers in communications protocols, such as
slightly to allow each layer to use all the the International Standards Organization
layers below it Open Systems Interconnection (ISO OSI)
c) All of the mentioned model,or the layers in user interface and
d) None of the mentioned windowing systems, such as the X Window
System
Answer: b b) It often illustrates operating system layers,
Explanation: Each layer can be constrained with the kernel at the core
to use only the layer directly below it—this is c) All of the mentioned
a Strict Layered style whereas Sometimes this d) None of the mentioned
constraint is relaxed slightly to allow each
layer to use all the layers below it—this is a Answer: d
Relaxed Layered style. Explanation: Onion diagram illustrates
operating system layers, with the kernel at the
4. Which of the following is correct? core.
a) Module A uses Module B if a correct
version of B must be present for A to execute 7. In particular, layers have which of the
correctly following characteristics?
b) Module A calls (or invokes ) module B if a) Layers are by definition highly cohesive,
B triggers execution of A thus satisfying the Principle of Cohesion
c) All of the mentioned b) Layers doesn’t support information hiding
d) None of the mentioned c) Layers are constrained to use only above
layers
Answer: a d) All of the mentioned
Explanation: Module A uses Module B if a
correct version of B must be present for A to Answer: a
execute correctly and Module A calls (or Explanation: Layers are by definition highly
invokes ) module B if A triggers execution of cohesive, thus satisfying the Principle of
B. Cohesion. Layers support information hiding
Layers are constrained to use only lower
5. Which of the following is true with respect layers.
to layered architecture?
a) Each layer is allowed to depend on the 8. Which of the following is incorrect?
layer above it being present and correct a) Layered architectures are highly
b) A layer may call other layers above and changeable, so this pattern can be used when
below it, as long as it uses them changeability is an important quality attribute
b) Layered-style programs are easy to modify
because changes can be made to a layer 1. Which of the following is one of the unique
independently of the rest of the program attributes of Cloud Computing?
c) All of the mentioned a) utility type of delivery
d) None of the mentioned b) elasticity
c) low barrier to entry
Answer: d d) all of the mentioned
Explanation: All of the mentioned are
correct. Answer: d
Explanation: These attributes change how
9. What are the drawbacks for Layers? applications are created, priced, and
a) It is often necessary to pass data through delivered.
many layers, which can slow performance
significantly 2. Point out the correct statement.
b) Layers support information hiding a) Service Level Agreements (SLAs) is small
c) Multi-layered programs can be hard to aspect of cloud computing
debug because operations tend to be b) Cloud computing does not have impact on
implemented through a series of calls across software licensing
layers c) Cloud computing presents new
d) None of the mentioned opportunities to users and developers
d) All of the mentioned
Answer: c
Explanation: Layers support information Answer: c
hiding is an advantage and not a drawback. Explanation: Because it is based on the
paradigm of a shared multi-tenant utility.
10. Which of the following is correct?
a) Layers are not strongly coupled to the 3. Applications that work with cloud
layers above them computing that have low margins and usually
b) Each layer is strongly coupled only to the low risk are
layer immediately below it a) high touch
c) Overall Layered-style architectures are b) low touch
loosely coupled c) moderate touch
d) All of the mentioned d) all of the mentioned
Answer: d Answer: b
Explanation: Layers are not strongly coupled Explanation: The “high touch” applications
to the layers above them. If a program uses that come with high margins require
theStrict Layered style, then each layer is committed resources and pose more of a risk.
strongly coupled only to the layer
immediately below it. As a result, overall 4. A service that concentrates on hardware
Layered-style architectures are loosely follows the as a Service model.
coupled. a) IaaS
b) CaaS
c) PaaS
TOPIC 3.2 NIST CLOUD d) All of the mentioned
COMPUTING REFERENCE
ARCHITECTURE Answer: a
Explanation: Amazon web service follows
PaaS model.
5. Point out the wrong statement. Answer: a
a) A cloud is defined as the combination of Explanation: This eliminates waste and has
the infrastructure of a datacenter with the the added benefit of shifting risk from the
ability to provision hardware and software client.
b) High touch applications are best done on-
premises 9. feature allows you to optimize
c) The Google App Engine follows IaaS your system and capture all possible
d) None of the mentioned transactions.
a) scalability
Answer: c b) reliability
Explanation: The Google App Engine c) elasticity
follows PaaS. d) none of the mentioned
Answer: c
Explanation: Load balancing is an
d) All of the mentioned optimization technique.
Answer: a 5. Point out the correct statement.
Explanation: You can define the features in a) A client can request access to a cloud
software and hardware that enables flexibility service from any location
as conforming to one or more of the mobility b) A cloud has multiple application instances
patterns. and directs requests to an instance based on
conditions
2. Point out the wrong statement. c) Computers can be partitioned into a set of
a) Abstraction enables the key benefit of virtual machines with each machine being
cloud computing: shared, ubiquitous access assigned a workload
b) Virtualization assigns a logical name for a d) All of the mentioned
physical resource and then provides a pointer
to that physical resource when a request is Answer: d
made Explanation: Alternatively, systems can be
c) All cloud computing applications combine virtualized through load-balancing
their resources into pools that can be assigned technologies.
on demand to users
d) All of the mentioned 6. Which of the following software can be
used to implement load balancing?
Answer: c a) Apache mod_balancer
Explanation: Several important cloud b) Apache mod_proxy_balancer
computing approaches use a strictly c) F6’s BigIP
hardware-based approach to abstraction. d) All of the mentioned
3. Which of the following type of Answer: b
virtualization is also characteristic of cloud Explanation: Load balancing can be used to
computing? increase utilization and throughput, lower
a) Storage latency, reduce response time, and avoid
b) Application system overload.
c) CPU
d) All of the mentioned 7. Which of the following network resources
can be load balanced?
Answer: d a) Connections through intelligent switches
Explanation: To enable these characteristics, b) DNS
resources must be highly configurable and c) Storage resources
flexible. d) All of the mentioned
4. The technology used to distribute service Answer: d
requests to resources is referred to as Explanation: Load balancing provides the
necessary redundancy to make an intrinsically of the first four of five key attributes of cloud
unreliable system reliable through managed computing.
redirection.
Answer: d
Explanation: Mapping process involves
determining the critical application features
and then matching them to the cloud
provider’s offering to see if those features can
be supported.
a) Abstraction
b) Virtualization 3. data represents more than 50
c) Mobility Pattern percent of the data created every day.
d) All of the mentioned a) Shadow
b) Light
Answer: b c) Dark
Explanation: Virtualization is a key enabler d) All of the mentioned
Answer: a c) Analytics
Explanation: Lots of shadow data does get d) None of the mentioned
retained, having never been touched by a
human being. Answer: a
Explanation: Most users interact with cloud
4. Cloud storage data usage in the year 2020 storage using backup, synchronization,
is estimated to be percent archiving, staging, caching, or some other
resident by IDC. sort of software.
a) 10
b) 15 8. How many categories of storage devices
c) 20 broadly exist in cloud?
d) None of the mentioned a) 1
b) 2
Answer: d c) 3
Explanation: There will be a steady growth d) None of the mentioned
of cloud storage at the expense of online
storage over the next decade. Answer: b
Explanation: Storage devices may be broadly
5. Point out the wrong statement. categorized as either block storage devices or
a) Some APIs are both exposed as SOAP and file storage devices.
REST
b) The role of a cloud vendor specific API 9. Which of the following storage devices
has impact on porting an application exposes its storage to clients as Raw storage
c) There are mainly three types of cloud that can be partitioned to create volumes?
storage a) block
d) None of the mentioned b) file
c) disk
Answer: c d) all of the mentioned
Explanation: Cloud storage can be either
unmanaged or managed. Answer: a
Explanation: It is up to the operating system
6. Which of the following system does not to create and manage the file system.
provision storage to most users?
a) PaaS 10. Which of the following impose additional
b) IaaS overhead on clients and offer faster transfer?
c) CaaS a) Block storage
d) SaaS b) File Storage
c) File Server
Answer: b d) All of the mentioned
Explanation: Cloud storage is storage
accessed by a Web service API. Answer: a
Explanation: File-oriented storage devices
7. The addition of a software package on top are generally slower, but require less
of a cloud storage volume makes most cloud overhead from attached clients.
storage offerings conform to a as a
Service model.
a) Software
TOPIC 3.8 AMAZON S3
b) Platform
1. Which of the following should be used c) Amazon Cloudfront
considering factors shown in the figure? d) Amazon Associates Web Services
Answer: c
Explanation: Cloudfront is similar to systems
such as Akamai.com, but is proprietary to
Amazon.com and is set up to work with
Amazon Simple Storage
System (Amazon S3).
2. Point out the wrong statement. 5. Point out the correct statement.
a) Amazon Machine Instances are sized at a) Amazon Elastic Cloud is a system for
various levels and rented on a creating virtual disks(volume)
computing/hour basis b) SimpleDB interoperates with both Amazon
b) The metrics obtained by CloudWatch may EC2 and Amazon S3
be used to enable a feature called Auto c) EC3 is an Analytics as a Service provider
Scaling d) None of the mentioned
c) A number of tools are used to support EC2
services Answer: b
d) None of the mentioned Explanation: Amazon SimpleDB stores data
in “buckets” and without requiring the
Answer: d creation of a database schema.
Explanation: Through hardware
virtualization on Xen hypervisors, 6. Which of the following is a structured data
Amazon.com has made it possible to create store that supports indexing and data queries
private virtual servers that you can run to both EC2 and S3?
worldwide. a) CloudWatch
b) Amazon SimpleDB
3. Which of the following is an edge-storage c) Amazon Cloudfront
or content-delivery system that caches data in d) All of the mentioned
different physical locations?
a) Amazon Relational Database Service Answer: b
b) Amazon SimpleDB Explanation: SimpleDB isn’t a full database
implementation.
7. Which of the following is the machinery c) Amazon DevPay
for interacting with Amazon’s vast product d) Multi-Factor Authentication
data and eCommerce catalog function?
a) Amazon Elastic Compute Cloud Answer: a
b) Amazon Associates Web Services Explanation: Amazon Elastic MapReduce is
c) Alexa Web Information Service an interactive data analysis tool for
d) All of the mentioned performing indexing.
Answer: b
Explanation: This service, which was called
Amazon E-Commerce Service (ECS), is the
means for vendors to add their products to the UNIT IV RESOURCE
Amazon.com site MANAGEMENT AND
and take orders and payments.
SECURITY IN CLOUD
8. Which of the following is a billing and
account management service?
a) Amazon Elastic MapReduce TOPIC 4.1 INTER CLOUD
b) Amazon Mechanical Turk RESOURCE MANAGEMENT
c) Amazon DevPay
d) Multi-Factor Authentication 1. The properties necessary to guarantee a
reliable transaction in databases and other
Answer: c applications is referred to as
Explanation: DevPay provides a developer a) BASE
API that eliminates the need for application b) ACID
developers to build order pipelines. c) ATOM
d) All of the mentioned
9. Which of the following is a means for
accessing human researchers or consultants to Answer: b
help solve problems on a contractual or Explanation: In computer science, ACID
temporary basis? (Atomicity, Consistency, Isolation,
a) Amazon Elastic MapReduce Durability) is a set of properties that
b) Amazon Mechanical Turk guarantee that database transactions are
c) Amazon DevPay processed reliably.
d) Multi-Factor Authentication
2. Point out the wrong statement.
Answer: b a) In theory, any application can run either
Explanation: Problems solved by this human completely or partially in the cloud
workforce have included object identification, b) The location of an application or service
video or audio recording, data duplication, plays a fundamental role in how the
and data research. application must be written
c) An application or process that runs on a
10. Which of the following is built on top of a desktop or server is executed coherently, as a
Hadoop framework using the Elastic unit, under the control of an integrated
Compute Cloud? program
a) Amazon Elastic MapReduce d) None of the mentioned
b) Amazon Mechanical Turk
Answer: d 6. Which of the following component is
Explanation: An action triggers a program required for both online and local data access
call, code executes, and a result is returned in hybrid application?
and may be acted upon. a) local
b) cloud
3. Which of the following is property of c) both local and cloud
ACID principle? d) none of the mentioned
a) Atomicity
b) Consistency Answer: c
c) Isolation Explanation: If the application needed to
d) All of the mentioned access data only when the client was online,
then access to cloud-based storage would be
Answer: d the only data store your application would
Explanation: The ACID principle is used required.
today by any application that is reading and
writing to a stored data set. 7. Which of the following factors might offset
the cost of offline access in hybrid
4. Which of the following ACID property applications?
states that the system must go from one a) scalability
known state to another and that the system b) costs
integrity must be maintained? c) ubiquitous access
a) Atomicity d) all of the mentioned
b) Consistency
c) Isolation Answer: d
d) Durability Explanation: These factors make the cloud
more attractive.
Answer: b
Explanation: The ACID rules were 8. An application that needed
developed by Jim Gray to apply to database storage alone might not benefit from a cloud
technology in the late 1970s. deployment at all.
a) online
5. Point out the wrong statement. b) offline
a) Taken as a unit, “Request => Process => c) virtual
Response” is not an atomic transaction d) all of the mentioned
b) A coherent transaction either succeeds and
is enacted, or fails and is rolled back Answer: b
c) When rollback is not possible due to Explanation: You could safely conclude that
optimistic transaction commitment in a an application that gets the most value from a
multiuser application, durability requires cloud deployment is one that uses online
correcting the condition storage without the need for offline storage.
d) None of the mentioned
9. The property states that the
Answer: a system must have a mechanism to recover
Explanation: Taken as a unit, “Request => from committed transactions should that be
Process => Response” is an atomic necessary.
transaction. a) Atomicity
b) Consistency
c) Isolation 2. Point out the correct statement.
d) Durability a) Eucalyptus and Rackspace both use
Amazon EC2 and S3 services
Answer: d b) The RightScale user interface provides
Explanation: The isolation property states real-time measurements of individual server
that the system cannot have other transactions instances
operate on data that is currently being c) RightScale server templates and the
processed by a transaction. Rightscript technology are highly
configurable and can be run under batch
10. Which of the following property defines a control
transaction as something that cannot be d) All of the mentioned
subdivided and must be completed or
abandoned as a unit? Answer: d
a) Atomicity Explanation: Eucalyptus is open source and
b) Consistency portable.
c) Isolation
d) Durability 3. Which of the following is an industry
organization that develops industry system
Answer: a management standards for platform
Explanation: The isolation property states interoperability?
that the system cannot have other transactions a) DMTF
operate on data that is currently being b) DMS
processed by a transaction. c) EBS
d) All of the mentioned
TOPIC 4.2 RESOURCE Answer: a
PROVISIONING AND Explanation: DMTF stands for Distributed
RESOURCE PROVISIONING Management Task Force.
METHODS
4. Which of the following is used to extend
CIM to virtual computer system
1. Which of the following is a core
management?
management feature offered by most cloud
a) OVF
management service products?
b) VMAN
a) Support of different cloud types
c) OCSI
b) Creation and provisioning of different
d) None of the mentioned
types of cloud resources, such as machine
instances, storage, or staged applications Answer: b
c) Performance reporting including Explanation: VMAN has resulted in the
availability and uptime, response time, creation of the Open Virtualization Format
resource quota usage, and other (OVF), which describes a standard method
characteristics for creating, packaging, and provisioning
d) All of the mentioned virtual appliances.
Answer: d 5. Point out the wrong statement.
Explanation: Automated deployment on IaaS a) Cloudkick’s Insight module is powerful
systems represents one class of cloud and particularly easy to use
management services. b) Both Cloudkick and RightScale are known
to be easy to use with Window virtual servers
and less so with Linux instances
c) All of the service models support
monitoring solutions
d) All of the mentioned
Answer: b
Explanation: Cloudkick and RightScale are
known to be easy to use with Linux virtual
servers and less so with Windows instances.
d) None of the mentioned
6. Which of the following initiative tries to
provide a way of measuring cloud computing Answer: b
services along dimension like cost? Explanation: Taken together, these products
a) CCE form the basis for CA’s Cloud Connected
b) OCCI Management Suite.
c) SMI
8. Which of the following is open and both
d) All of the mentioned
hypervisor and processor-architecture-
Answer: c agnostic?
Explanation: SMI stands for Service a) Dell Scalent
Measurement Index. b) CloudKick
c) Elastra
7. Which of the following figure correctly d) All of the mentioned
describes products by CA technologies?
a) Answer: a
Explanation: OVF is essentially a container
and a file format.
Answer: c
Explanation: You get the least amount of
built in security with an Infrastructure as a
Service provider, and the most with a
Software as a Service provider.
6. Which of the following area of cloud 10. Which of the following is application and
computing is uniquely troublesome? infrastructure management software for
a) Auditing hybrid multi-clouds?
b) Data integrity a) VMware Hyperic
c) e-Discovery for legal compliance b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: d
Explanation: Storing data in the cloud is of Answer: c
particular concern. Explanation: Tapinsystems is provisioning
and management service.
7. Which of the following is the operational
domain of CSA?
a) Scalability TOPIC 4.4 CLOUD SECURITY
b) Portability and interoperability CHALLENGES
c) Flexibility
d) None of the mentioned 1. Which of the following is a compliance
standard?
Answer: b a) PCI-DSS
Explanation: CSA is an industry working b) HIPPA
group that studies security issues in cloud c) GLBA
computing and offers recommendations to its d) All of the mentioned
members.
Answer: d
8. Which of the following is considered an Explanation: A compliance standard can be
essential element in cloud computing by any government regulatory framework.
CSA?
a) Multi-tenancy 2. Point out the correct statement.
b) Identity and access management a) The cloud service model you choose does
c) Virtualization not determine the variety of security features,
d) All of the mentioned compliance auditing, and other requirements
b) To determine the particular security
Answer: a mechanisms you need, you must perform a
Explanation: Multi-tenancy adds a number mapping of the particular cloud service model
of additional security concerns to cloud to the particular application you are deploying
computing that need to be accounted for. c) A security control model includes the
security that you normally use for your
9. Which of the following is used for Web applications only
performance management and load testing? d) All of the mentioned
a) VMware Hyperic
Answer: b 6. Which of the following are a common
Explanation: These mechanisms must be means for losing encrypted data?
supported by the various controls that are a) lose the keys
provided by your service provider, your b) lose the encryption standard
organization, or a third party. c) lose the account
d) all of the mentioned
3. Which of the following is a key mechanism
for protecting data? Answer: a
a) Access control Explanation: Keys should have a defined life
b) Auditing cycle.
c) Authentication
d) All of the mentioned 7. Which of the following is the standard for
interoperable cloud-based key management?
Answer: d a) KMIP
Explanation: Whatever service model you b) PMIK
choose should have mechanisms operating in c) AIMK
all above mentioned areas that meet your d) None of the mentioned
security requirements.
Answer: a
4. How many security accounts per client is Explanation: KMIP stands for Key
provided by Microsoft? Management Interoperability Protocol.
a) 1
b) 3 8. Which of the following was one of the
c) 5 weaker aspects of early cloud computing
d) 7 service offerings?
a) Logging
Answer: c b) Integrity checking
Explanation: On Amazon Web Service, you c) Consistency checking
can create multiple keys and rotate those keys d) None of the mentioned
during different sessions.
Answer: a
5. Point out the wrong statement. Explanation: Cloud service providers often
a) Securing data sent to, received from, and have proprietary log formats.
stored in the cloud is the single largest
security concern 9. Which of the following is one of the most
b) The problem with the data you store in the actively developing and important areas of
cloud is that it can be located anywhere in the cloud computing technology?
cloud service provider’s system a) Logging
c) One and only approach to isolating storage b) Auditing
in the cloud from direct client access is to c) Regulatory compliance
create layered access to the data d) None of the mentioned
d) All of the mentioned
Answer: c
Answer: c Explanation: For any company with clients
Explanation: The location of the proxy and in multiple countries, the burden of regulatory
the broker is not important. compliance is onerous.
10. Amazon Web Services supports c) Adoption drivers
Type II Audits. d) None of the mentioned
a) SAS70
b) SAS20 Answer: b
c) SAS702 Explanation: With the exception of the user
d) None of the mentioned interaction with the software, all other aspects
of the service are abstracted away.
Answer: a
Explanation: Becoming a cloud service 4. Which of the following SaaS platform is
provider requires a large investment. with an exposed API?
a) salesforce.com
b) amazon.com
TOPIC 4.5 SOFTWARE-AS-A- c) flipkart.com
SERVICE d) all of the mentioned
10. The componentized nature of SaaS 3. Which of the following functional cloud
solutions enables many solutions to support a computing hardware/software stack is the
feature called Cloud Reference Model?
a) workspace a) CAS
b) workloads b) CSA
c) mashups c) SAC
d) all of the mentioned d) All of the mentioned
Answer: c Answer: b
Explanation: A mashup is an application that Explanation: Cloud Security Alliance (CSA)
is a not-for-profit organization with a mission 7. Which of the following cloud does not
to “promote the use of best practices for require mapping?
providing security assurance within Cloud. a) Public
b) Private
4. For the model, the security c) Hybrid
boundary may be defined for the vendor to d) None of the mentioned
include the software framework and
middleware layer. Answer: a
a) SaaS Explanation: Private cloud may be internal
b) PaaS or external to an organization.
c) IaaS
d) All of the mentioned 8. Which of the following service model is
owned in terms of infrastructure by both
Answer: b vendor and customer?
Explanation: In the PaaS model, the a) Public
customer would be responsible for the b) Private
security of the application and UI at the top of c) Hybrid
the stack. d) None of the mentioned
Answer: b
10. Which of the following standard connect
Explanation: Data compression can be
distributed hosts or tenants to their
achieved using compression algorithms like
provisioned storage in the cloud?
bzip2, gzip, LZO, etc. Different algorithms
a) CDMI
can be used in different scenarios based on
b) OCMI
their capabilities.
c) COA
d) All of the mentioned 3. What license is Hadoop distributed under?
a) Apache License 2.0
Answer: a
b) Mozilla Public License
Explanation: CDMI stands for Cloud Data
c) Shareware
Management Interface.
d) Commercial
Answer: a
Explanation: Hadoop is Open Source,
UNIT V CLOUD released under Apache 2 license.
TECHNOLOGIES AND
4. Sun also has the Hadoop Live CD Answer: c
project, which allows running a Explanation: Hadoop has support for cross-
fully functional Hadoop cluster using a live platform operating system.
CD.
a) OpenOffice.org 8. Hadoop achieves reliability by replicating
b) OpenSolaris the data across multiple hosts and hence does
c) GNU not require storage on hosts.
d) Linux a) RAID
b) Standard RAID levels
Answer: b c) ZFS
Explanation: The OpenSolaris Hadoop d) Operating system
LiveCD project built a bootable CD-ROM
image. Answer: a
Explanation: With the default replication
5. Which of the following genres does value, 3, data is stored on three nodes: two on
Hadoop produce? the same rack, and one on a different rack.
a) Distributed file system
b) JAX-RS 9. Above the file systems comes the
c) Java Message Service engine, which consists of one Job
d) Relational Database Management System Tracker, to which client applications submit
MapReduce jobs.
Answer: a a) MapReduce
Explanation: The Hadoop Distributed File b) Google
System (HDFS) is designed to store very c) Functional programming
large data sets reliably, and to stream those d) Facebook
data sets at high bandwidth to the user.
Answer: a
6. What was Hadoop written in? Explanation: MapReduce engine uses to
a) Java (software platform) distribute work around a cluster.
b) Perl
c) Java (programming language) 10. The Hadoop list includes the HBase
d) Lua (programming language) database, the Apache Mahout
system, and matrix operations.
Answer: c a) Machine learning
Explanation: The Hadoop framework itself is b) Pattern recognition
mostly written in the Java programming c) Statistical classification
language, with some native code in C and d) Artificial intelligence
command-line utilities written as shell-
scripts. Answer: a
Explanation: The Apache Mahout project’s
7. Which of the following platforms does goal is to build a scalable machine learning
Hadoop run on? tool.
a) Bare metal
b) Debian
c) Cross-platform
TOPIC 5.2 MAPREDUCE
d) Unix-like
1. The Mapper implementation processes one
line at a time via method.
a) map by specifying a Comparator via
b) reduce JobConf.setOutputKeyComparatorClass(Class)
c) mapper
d) reducer 5. Point out the wrong statement.
a) The Mapper outputs are sorted and then
Answer: a partitioned per Reducer
Explanation: The Mapper outputs are sorted b) The total number of partitions is the same
and then partitioned per Reducer. as the number of reduce tasks for the job
c) The intermediate, sorted outputs are always
2. Point out the correct statement. stored in a simple (key-len, key, value-len,
a) Mapper maps input key/value pairs to a set value) format
of intermediate key/value pairs d) None of the mentioned
b) Applications typically implement the
Mapper and Reducer interfaces to provide the Answer: d
map and reduce methods Explanation: All intermediate values
c) Mapper and Reducer interfaces form the associated with a given output key are
core of the job subsequently grouped by the framework, and
d) None of the mentioned passed to the Reducer(s) to determine the
final output.
Answer: d
Explanation: The transformed intermediate 6. Applications can use the to
records do not need to be of the same type as report progress and set application-level
the input records. status messages.
a) Partitioner
3. The Hadoop MapReduce framework b) OutputSplit
spawns one map task for each c) Reporter
generated by the InputFormat for the job. d) All of the mentioned
a) OutputSplit
b) InputSplit Answer: c
c) InputSplitStream Explanation: Reporter is also used to update
d) All of the mentioned Counters, or just indicate that they are alive.
Answer: b
Explanation: Reducer has 3 primary phases:
shuffle, sort and reduce.
Answer: a
Explanation: Some virtual machines are
designed to run only a single application or
process and are referred to as process virtual
machines.
4. Which of the following provide system c) KVM
resource access to virtual machines? d) LynxSecure
a) VMM
b) VMC Answer: d
c) VNM Explanation: Type 1 VMs have no host
d) All of the mentioned operating system because they are installed
on a bare system.
Answer: a
Explanation: VMM is another name for 8. Which of the following is Type 2 VM?
Hypervisor. a) VirtualLogix VLX
b) VMware ESX
5. Point out the correct statement. c) Xen
a) A virtual machine is a computer that is d) LynxSecure
walled off from the physical computer that
the virtual machine Answer: c
is running on Explanation: Xen is used by Amazon Web
b) Virtual machines provide the capability of Services to provide Amazon Machine
running multiple machine instances, each Instances (AMIs).
with their own operating system
c) The downside of virtual machine 9. Which of the following will be the host
technologies is that having resources operating system for Windows Server?
indirectly addressed means there is some a) VirtualLogix VLX
level of overhead b) Microsoft Hyper-V
d) All of the mentioned c) Xen
d) All of the mentioned
Answer: d
Explanation: This makes virtual machine Answer: b
technology very useful for running old Explanation: Type 2 virtual machines are
versions of operating systems, testing installed over a host operating system.
applications in what amounts to a sandbox.
10. Which of the following should be placed
6. An operating system running on a Type in second lowermost layer for the following
VM is full virtualization. figure?
a) 1
b) 2
c) 3
d) All of the mentioned
Answer: a
Explanation: Because it is a complete
simulation of the hardware that it is running
on.
Answer: d
Explanation: Wolf lets you work with Adobe
Flash or Flex or with Microsoft Silverlight.
Answer: a
Explanation: Examples of Type 2 Virtual
Machine Monitors are Containers, KVM,
Microsoft Hyper V and Parallels Desktop for
Mac.
Answer: b
Explanation: Content on pages is scanned up
to a certain number of words and placed into
an index.
6. Which of the following protocol lets a Web
site list in an XML file information?
a) Sitemaps
b) Mashups
c) Hashups
d) All of the mentioned
Answer: a
Explanation: Sitemaps can be useful in
allowing content that isn’t browsable to be
d) All of the mentioned crawled.
Answer: a a) Offline
Explanation: It is sometimes referred to as b) Online
the SMS of the Internet or as a form of c) Online and Offline
Internet Relay Chat (IRC). d) None of the mentioned