CCS335 CLOUD COMPUTING MCQ Questions
CCS335 CLOUD COMPUTING MCQ Questions
MCQ QUESTIONS
Cloud Architecture: System Models for Distributed and Cloud Computing – NIST Cloud
Computing Reference Architecture – Cloud deployment models – Cloud service models; Cloud
Infrastructure: Architectural Design of Compute and Storage Clouds – Design Challenges
2. What cloud deployment model provides computing resources to the general public over
the internet?
- A) Private cloud
- B) Community cloud
- C) Public cloud
- D) Hybrid cloud
3. In which cloud service model do consumers have control over the operating system,
storage, and deployed applications, but not over the underlying infrastructure?
- A) Infrastructure as a Service (IaaS)
- B) Platform as a Service (PaaS)
- C) Software as a Service (SaaS)
- D) Function as a Service (FaaS)
4. Which cloud infrastructure design principle ensures that resources are dynamically
allocated and released based on demand?
- A) Elasticity
- B) Scalability
- C) Redundancy
- D) Homogeneity
5. What is a major design challenge for ensuring data security in a cloud environment?
- A) Resource pooling
- B) Multi-tenancy
- C) On-demand self-service
- D) Broad network access
6. Which cloud deployment model is suitable for organizations that require a high degree
of control over their data and infrastructure?
- A) Public cloud
- B) Private cloud
- C) Hybrid cloud
- D) Community cloud
10. Which cloud infrastructure design principle refers to the ability to scale resources up
or down based on workload changes?
- A) Redundancy
- B) Scalability
- C) Elasticity
- D) Multi-tenancy
Answers:
1. C) Proprietary technologies
2. C) Public cloud
3. A) Infrastructure as a Service (IaaS)
4. A) Elasticity
5. B) Multi-tenancy
6. B) Private cloud
7. A) Sharing physical resources across different organizations
8. B) Platform as a Service (PaaS)
9. B) Redundancy
10. C) Elasticity
11. Which organization defines the NIST Cloud Computing Reference Architecture?
- A) IETF
- B) IEEE
- C) NIST
- D) ISO
13.In cloud computing, what does the term "resource pooling" refer to?
- A) Allocating resources in real-time based on demand
- B) Sharing physical and virtual resources among multiple consumers
- C) Providing access to cloud services via the internet
- D) Ensuring high availability of cloud services
14. Which cloud deployment model is typically used by multiple organizations with
shared concerns over security and compliance?
- A) Public cloud
- B) Private cloud
- C) Hybrid cloud
- D) Community cloud
15. Which cloud service model provides access to software applications and databases
over the internet?
- A) Infrastructure as a Service (IaaS)
- B) Platform as a Service (PaaS)
- C) Software as a Service (SaaS)
- D) Function as a Service (FaaS)
16. What is a key benefit of the Platform as a Service (PaaS) cloud service model?
- A) Consumers have full control over the underlying infrastructure.
- B) Consumers can focus on developing and deploying applications without managing the
underlying hardware and software layers.
- C) It offers virtualized computing resources on-demand.
- D) It provides fully managed databases and storage solutions.
17. Which cloud infrastructure design challenge refers to ensuring that data is not lost
and can be recovered in case of failures?
- A) Elasticity
- B) Scalability
- C) Fault tolerance
- D) Multi-tenancy
18. What is a characteristic of cloud computing that enables users to increase or decrease
resources dynamically?
- A) Elasticity
- B) Scalability
- C) Redundancy
- D) Service orientation
19. Which cloud deployment model is suitable for an organization that needs to keep
sensitive data behind a firewall but still wants some flexibility in computing resources?
- A) Public cloud
- B) Private cloud
- C) Hybrid cloud
- D) Community cloud
20. Which cloud service model allows consumers to deploy applications as small, modular
pieces of code that are executed in response to events?
- A) Infrastructure as a Service (IaaS)
- B) Platform as a Service (PaaS)
- C) Software as a Service (SaaS)
- D) Function as a Service (FaaS)
Answers:
11. C) NIST
12. C) It provides a conceptual framework for understanding cloud computing.
13. B) Sharing physical and virtual resources among multiple consumers
14. D) Community cloud
15. C) Software as a Service (SaaS)
16. B) Consumers can focus on developing and deploying applications without managing
the underlying hardware and software layers.
17. C) Fault tolerance
18. A) Elasticity
19. B) Private cloud
20. D) Function as a Service (FaaS)
21. According to the NIST Cloud Computing Reference Architecture, which component
manages the virtualization layer and provides virtualized computing resources to
consumers?
- A) Cloud Consumer
- B) Cloud Provider
- C) Cloud Broker
- D) Cloud Controller
23. Which cloud service model provides consumers with access to virtualized hardware
resources over the internet?
- A) Infrastructure as a Service (IaaS)
- B) Platform as a Service (PaaS)
- C) Software as a Service (SaaS)
- D) Function as a Service (FaaS)
24. What is a primary challenge in ensuring data security and compliance in cloud
computing environments?
- A) Achieving scalability
- B) Managing multi-tenancy
- C) Implementing fault tolerance
- D) Establishing connectivity
25. Which cloud infrastructure design principle focuses on maintaining the availability
and reliability of services during hardware or software failures?
- A) Elasticity
- B) Redundancy
- C) Scalability
- D) Service orientation
Answers:
21. D) Cloud Controller
22. D) Community cloud
23. A) Infrastructure as a Service (IaaS)
24. B) Managing multi-tenancy
25. B) Redundancy
3. In the context of virtualization, what does the term "host" refer to?
- A) The physical machine running one or more virtual machines.
- B) The guest operating system inside a virtual machine.
- C) The hypervisor managing virtual machines.
- D) The cloud provider offering virtualization services.
15. Which virtualization technology allows direct access to physical hardware from
virtual machines, bypassing the hypervisor for improved performance?
- A) Para virtualization
- B) Full virtualization
- C) Hardware virtualization
- D) Container virtualization
16. In which type of virtualization do guest operating systems need to be modified to run
on the hypervisor?
- A) Full virtualization
- B) Para virtualization
- C) Hardware virtualization
- D) Container virtualization
18. Which component of a virtual machine environment is responsible for allocating and
managing virtualized memory?
- A) Hypervisor
- B) Virtual memory manager
- C) Guest operating system
- D) Virtual CPU
20. Which type of virtualization provides each virtual machine with its own virtualized
hardware resources, including CPU, memory, and I/O devices?
- A) Full virtualization
- B) Para virtualization
- C) Hardware virtualization
- D) Container virtualization
Answers:
24. Which type of hypervisor runs directly on the host hardware without requiring a
separate host operating system?
- A) Type 1 hypervisor
- B) Type 2 hypervisor
- C) Embedded hypervisor
- D) Cloud hypervisor
25. In the context of virtualization, what does the term "live migration" refer to?
- A) Transferring a virtual machine from one physical server to another without shutting it
down.
- B) Upgrading the hypervisor software without affecting virtual machines.
- C) Moving a virtual machine to a different data center for disaster recovery.
- D) Changing the operating system of a running virtual machine.
27. Which component of a virtual machine environment is responsible for managing and
allocating virtualized CPU resources?
- A) Hypervisor
- B) Virtual CPU
- C) Virtual memory manager
- D) Guest operating system
28. Which virtualization type requires modifications to the guest operating system for
optimal performance?
- A) Full virtualization
- B) Para virtualization
- C) Hardware virtualization
- D) Container virtualization
29. What is the purpose of hardware-assisted virtualization extensions such as Intel VT-x
or AMD-V?
- A) To improve hypervisor management capabilities.
- B) To provide better compatibility with legacy operating systems.
- C) To enable direct access to physical hardware from virtual machines.
- D) To enhance virtual machine backup and recovery processes.
30. Which component of virtualization technology ensures that each virtual machine has
its own isolated instance of physical memory?
- A) Virtual CPU
- B) Hypervisor
- C) Virtual memory manager
- D) Guest operating system
Answers:
21. B) A software-based emulation of a physical computer.
22. C) Improved server utilization.
23. B) It translates virtual machine instructions to host hardware instructions.
24. A) Type 1 hypervisor
25. A) Transferring a virtual machine from one physical server to another without
shutting it down.
26. B) A pre-configured virtual machine image with applications and an operating
system.
27. B) Virtual CPU
28. B) Para virtualization
29. C) To enable direct access to physical hardware from virtual machines.
30. C) Virtual memory manager
31. What is a virtual machine (VM) in the context of computing?
- A) A physical server running virtualization software.
- B) A software-based simulation of a physical computer.
- C) A network protocol used for virtual machine communication.
- D) A dedicated hardware device for virtualization.
38. Which type of virtualization requires modification to the guest operating system for
optimal performance?
- A) Full virtualization
- B) Para virtualization
- C) Hardware virtualization
- D) Container virtualization
39. What is the purpose of hardware-assisted virtualization extensions like Intel VT-x or
AMD-V?
- A) Enhances performance of virtual machines.
- B) Provides compatibility with legacy applications.
- C) Enables direct access to physical hardware from virtual machines.
- D) Simplifies virtual machine backup and recovery.
40. Which component of virtualization ensures that each virtual machine has its own
isolated instance of physical memory?
- A) Virtual CPU
- B) Hypervisor
- C) Virtual memory manager
- D) Guest operating system
Answers:
31. B) A software-based simulation of a physical computer.
32. C) Software emulation of hardware components.
33. A) Manages virtual machines' hardware resources.
34. A) Type 1 hypervisor
35. B) Isolating and running applications in lightweight virtual environments.
36. A) Manages traffic between virtual machines.
37. B) Virtual CPU
38. B) Para virtualization
39. A) Enhances performance of virtual machines.
40. C) Virtual memory manager
Answers:
1. C) Centralized management of desktop environments.
2. B) Dynamic configuration and management of network resources.
3. A) Centralized management of storage devices.
4. A) System-level operating virtualization
5. A) Simplified application deployment and management.
6. A) Ensuring optimal use of physical server resources.
7. A) Containers share the host operating system kernel, while virtual machines have their own
kernel.
8. C) A containerization platform for developing, shipping, and running applications.
9. B) A lightweight, executable package of software that includes everything needed to run an
application.
10. B) To store and distribute Docker containers.
20. Containers are more lightweight than virtual machines primarily because:
A. They use a hypervisor
B. They do not require a guest OS
C. They cannot share resources
D. They are slower to start
**Answer: B. They do not require a guest OS**
26. Which technology allows users to access their desktop environment remotely?
A. SAN (Storage Area Network)
B. VPN (Virtual Private Network)
C. VDI (Virtual Desktop Infrastructure)
D. CDN (Content Delivery Network)
**Answer: C. VDI (Virtual Desktop Infrastructure)**
28. Which technology enables the creation of virtual networks that are independent of
physical hardware?
A. SDN (Software-defined Networking)
B. RAID (Redundant Array of Independent Disks)
C. FTP (File Transfer Protocol)
D. VLAN (Virtual Local Area Network)
**Answer: A. SDN (Software-defined Networking)**
30. Which technology allows storage resources to be pooled and managed centrally?
A. SAN (Storage Area Network)
B. VLAN (Virtual Local Area Network)
C. NAT (Network Address Translation)
D. SMTP (Simple Mail Transfer Protocol)
**Answer: A. SAN (Storage Area Network)**
14. Which programming languages are officially supported by Google App Engine?
A. Python, Java, and PHP
B. C#, Ruby, and Perl
C. JavaScript, TypeScript, and Rust
D. Swift, Kotlin, and Objective-C
**Answer: A. Python, Java, and PHP**
15. Which AWS service provides scalable computing capacity in the cloud?
A. Amazon EC2
B. Amazon S3
C. Amazon RDS
D. Amazon Route 53
**Answer: A. Amazon EC2**
16. Which AWS service is used for object storage in the cloud?
A. Amazon EC2
B. Amazon S3
C. Amazon RDS
D. Amazon Route 53
**Answer: B. Amazon S3**
19. Which term describes a cloud computing service that provides applications over the
Internet?
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS)
D. Network as a Service (NaaS)
**Answer: C. Software as a Service (SaaS)**
24. Which service model does Google App Engine belong to?
A. Infrastructure as a Service (IaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Function as a Service (FaaS)
**Answer: B. Platform as a Service (PaaS)**
28. Which cloud service provides server less computing capabilities in Microsoft Azure?
A. Azure Functions
B. Azure SQL Database
C. Azure Blob Storage
D. Azure Virtual Machines
**Answer: A. Azure Functions**
9. Which IAM practice involves regularly reviewing and updating user access
permissions?
A. Least privilege
B. Access monitoring
C. Identity federation
D. Access recertification
Answer: D. Access recertification
11. Which attack involves moving a running VM from one physical host to another
without proper authorization:
A. Guest hopping
B. VM migration attack
C. Hyper jacking
D. VM escape
Answers:
10. B. Unauthorized access between guest VMs
11. B. VM migration attack
12. B. Taking control of the hypervisor
13. C. Credential management
14. B. Role-based access control (RBAC)
15. A. Authenticating users
23. Which attack technique involves an attacker gaining control over the hypervisor to
compromise VMs?
A. Guest hopping
B. VM migration attack
C. Hyperjacking
D. Hypervisor hijacking
28. Which IAM approach assigns permissions based on job roles and responsibilities?
A. Attribute-based access control (ABAC)
B. Role-based access control (RBAC)
C. Mandatory access control (MAC)
D. Discretionary access control (DAC)
29. What does IAM architecture typically include to manage user identities?
A. Network firewalls
B. Single sign-on (SSO) solutions
C. Intrusion detection systems (IDS)
D. File encryption tools
30. Which IAM component is responsible for authenticating users based on their
credentials?
A. Access control lists (ACLs)
B. Identity providers (IdPs)
C. Security information and event management (SIEM)
D. Public key infrastructure (PKI)
35. IAM solutions often integrate with which system to facilitate user authentication
across multiple applications?
A. Virtual Private Network (VPN)
B. Domain Name System (DNS)
C. Lightweight Directory Access Protocol (LDAP)
D. Secure Shell (SSH)
Answers:
16. B. Unauthorized access between guest VMs
17. D. Privilege escalation
18. B. Taking control of the hypervisor
19. B. Loss of data integrity
20. D. VM escape attack
21. B. Vulnerabilities in guest VM operating systems
22. C. Hypervisor-level firewalls
23. D. Hypervisor hijacking
24. B. Using secure hypervisor APIs
25. D. VM eavesdropping
26. C. User authentication and authorization
27. B. Integrating legacy systems
28. B. Role-based access control (RBAC)
29. B. Single sign-on (SSO) solutions
30. B. Identity providers (IdPs)
31. B. User access rules
32. D. Revoking access promptly upon employee termination
33. A. Identity federation
34. C. Protecting sensitive data from unauthorized access
35. C. Lightweight Directory Access Protocol (LDAP)