CA. 7.1 Cloud Computing (17-18)
CA. 7.1 Cloud Computing (17-18)
CA. 7.1 Cloud Computing (17-18)
1 Cloud Computing(17-18)
1. The __________ model originally did not require a cloud to use virtualization to pool resources.
a) NEFT (National Electronic Funds Transfer)
b) NIST (National Institute of Standards and Technology)
c) NIT (National Institutes of Technology)
d) All of the mentioned
Ans- B
2. _________ computing refers to applications and services that run on a distributed network using virtualized
resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel
Ans- B
4. ………..is a person or organization that maintains a business relationship with, and uses service from cloud
providers.
A. Cloud consumer
B. Cloud Auditor
C. Cloud Broker
D. Cloud carrier
Ans- A
A. Asset Management
B. Service Management
C. Virtualization
D. Information infrastructure
Ans- B
6. Which of the following are the layers of cloud?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. All of the above
Ans- D
7. It allow accessibility of services & resources( like router, switches, storage) for particular Organization or
individuals but managed internally by 3’rd Party.
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. None of the above
Ans-B
8. Which of the following is Cloud Platform by Amazon ?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned
Ans-C
A. Public-as-a-Service
B. Platform-as-a-Service
C. Community-as-a-Service
D. Public-as-a-Service
Ans- B
12. find out the most common business drivers for cloud transformation.
A. Reduce the operational cost
B. Reduce the capital cost
C. Productivity Enhancement
D. All of the above
Ans-D
13. When you add a software stack, such as an operating system and applications to the service, the model
shifts to _____ model.
A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Ans- A
14. Which of the following is most refined and restrictive service model ?
A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans- C
15. The __________ model originally did not require a cloud to use virtualization to pool resources.
A. NEFT
B. NIST
C. NIT
D. All of the mentioned
Ans- B
16. Which of the following cloud concept is related to pooling and sharing of resources?
A. Polymorphism
B. Abstraction
C. Virtualization
D. None of the mentioned
Ans-C
A. Business Application
B. Management Application
C. Data Protection Application
D. Security Application
Ans-A
A. Application
B. Storage
C. File system
D. None of the above
Ans-C
Ans- B
A. Blocks
B. Objects
C. Files
D. Chunk
Ans- B
22. To decide on a backup strategy for your organization, which of the following should you consider?
a) RPO (Recovery Point Objective)
b) RTO (Recovery Time Objective)
c) Both RPO & RTO
d) None of the mentioned
Ans-C
Ans- A
24. Identify the data storage technology used in the below data center?
A) SAN
B) DAS
C) Both A and B
D) None of these
Ans-A
Ans- B
Ans-A
A. Cache memory
B. Physical Disk
C. Front end
D. Back end
Ans-A
28. Time within which systems, applications or functions must be recovered after an outage is called
A. RPO B. RTO C. DAS D. None of these
Ans- B
29. Which of the following type of virtualization is also characteristic of cloud computing?
a) Storage
b) Application
c) CPU
d) All of the mentioned
Ans-d
30. Which of the following provide system resource access to virtual machines?
a) VMM
b) VMC
c) VNM
d) All of the mentioned
Ans- A
31. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Ans- B
32. Which of the following visualization is most commonly achieved through a mapping mechanism where a
logical storage address is translated into a physical storage address?
a) Storage
b) Network
c) Software
d) None of the mentioned
Ans- A
34. Thin provisioning involves using…………….to gives the appearance of having more physical resources than are
actually available.
A. Virtualization Technology
B. Classic data centre
C. Virtual Provision
D. None of the above
Ans-A
35. What is the definition of provisioning as an automated process related to cloud computing?
A. It handles computing resource management process
B. It adds security constraints to a cloud environment.
C. It moves data from one cloud to another.
D. It provides server consolidation capability.
36. How can IT resource consolidation & virtualization help companies deliver service?
A. It reduces the network traffic.
B. It scales application better than traditional clustering of application servers.
C. IT creates more maintenance work but virtualization makes it easy to scale applications.
D. It allocates computing resources more efficiently & reduces maintenance costs.
Ans- D
38. Which of the following cloud concept is related to pooling and sharing of resources ?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned
Ans-C
39. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them
as a ________ resource.
a) real
b) virtual
c) cloud
d) None of the mentioned
Ans- B
40. _____ is a financial estimate for the costs of the use of a product or service over its lifetime.
a) TCO
b) TOC
c) COT
d) All of the mentioned
Ans-A
Ans- C
42. Applications such as a Web server or database server that can run on a virtual machine image are referred
to as ______________
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned
Ans- B
43. _________ allows different operating systems to run in their own memory space.
A. VMM
B. VMc
C. VMM
D. All of the mentioned
Ans-C
44. A ________ is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs
and WRITEs.
a) GETs
b) PUN
c) LUN
d) All of the mentioned
Ans-C
45. Which of the following use LUNs to define a storage volume that appears to a connected computer as a
device?
a) SAN
b) iSCSI
c) Fibre Channel
d) All of the mentioned
Ans-D
46. Which protocol reduces administrative overhead in a switched network by allowing the
configuration of a new VLAN to be distributed to all the switches in a domain?
A. STP
B. VTP
C. DHCP
ISL
D.
Ans- B
47. It is a technology that allows traffic from multiple VLANs to traverse a single network connection
A. VLAN Trunking
B. VLAN Port
C.VLAN Tagging
D. None of these
Ans-A
48. A logical fabric on an FC SAN that enables communication among a group of nodes, regardless of their
physical location in the fabric.
Ans -B
49. A technique allowing a physical server to use multiple physical paths for transferring data between the
physical server and a LUN on a storage system.
Ans-A
50. The technology used to distribute service requests to resources is referred to as _____________
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
Ans-C
51. Which of the following are the components of VDC Network Infrastructure?
Ans-D
B. Enhance Security
C. Enhance Performance
D. Both B & C
53. Cloud infrastructure management and service creation tools are responsible for managing………………
D. None of these
Ans- A
B. Network Management
C. Compute Management
D. All of these
Ans- D
A. Cloud services
B. VDC
C. CDC
D. None of these
Ans-A
56. It is a form of distributed computing which enables the resources of numerous heterogeneous computers in
a network to work on a single complex task at the same time
A. Utility computing
B. Virtualization
D. Grid computing
Ans- D
A. Enables consumers to get computing resources as and when required, without any human intervention
B. Facilitates consumer to leverage “ready to use” services or, enables to choose required services from the
service catalog
Ans-D
Ans-D
59………………………..cloud is one where the cloud has been organised to serve a common function or purpose by
many organization.
60………………..as a service is a cloud computing infrastructure that creates a development environment upon
which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
Ans- C
Ans- A
A. Infrastructure cost
B. Management cost
Ans-D
63.It is a set of processes that enable & optimize cloud services in order to satisfy business requirements &
provide value to consumers.
B. Infrastructure Management
C. Business Management
D. None of these
Ans-A
64. The goal of……………Management is to monitor, measure, analyse, and improve the performance of cloud
infrastructure and services.
A. Capacity Management
B. Performance Management
C. Incident Management
D. Problem Management
Ans- B
65. Which of the following is the deployment model?
a) public
b) private
c) hybrid
d) all of the mentioned
Ans-D
Ans-A
67. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
Ans- B
68. 9. __________ cloud is one where the cloud has been organized to serve a common function or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Ans-C
69. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned
Ans-D
70. A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound
together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
Ans-D
C. Flexible Scaling
D. All of these
Ans-D
72. Which one of the following a technology works behind the cloud computing platform?
a. Virtualization
b. SOA
c. Grid Computing
d. All of the above
Ans-D
73. Which one of the following statement is true about the Virtualization?
a. It provides a logical name for a physical resource, and on-demand provides an indicator of that physical
resource.
b. In Virtualization, we analyze the strategy related problems that customers may face.
c. In Virtualization, it is necessary to compile the Multitenant properly.
d. All of the above
Ans-A
74. Which one of the following statement is true about the Service-Oriented Architecture?
a. It is possible to exchange data between applications from different vendors without using additional
programming.
b. It provides computational resources on-demand as a metered service.
c. Service-Oriented Architecture allows using the application as a service for other applications.
d. Both A and C
Ans-D
75. Managed IT services are based on the concept of which one of the following?
a. Virtualization
b. Utility Computing
c. Grid Computing
d. SOA
Ans-B
Ans-D
Ans-D
78. What facet of cloud computing helps to guard against downtime and determines costs?
A. Service-level agreements
B. Application programming interfaces
C. Virtual private networks
D. Bandwidth fees
Ans-A
79. Which of the following model allows vendor to provide security as part of the Service Level Agreement?
A. SaaS
B. PaaS
C. IaaS
D. None Of these
Ans-A
80. Which of the following questions should ask before selecting cloud service provider?
C. Both A & B
D. None of these
Ans-C
81. Cloud…….may prevent a consumer from moving one service model to another.
Ans-A
A. Assessment
B. Proof of concept
C. Migration
83. …………….in a virtualized environment presents a single point of security failure for all the VMs running on it.
Ans- B
C. Modifying sensitive areas of the guest OS, for example, MS Windows registry
D. All of these
Ans-D
85. A firewall is implemented on a ……………..and limits access between networks and/or systems in accordance
with a specific security policy.
A. Network Level
B. Storage Level
C. Compute Level
D. Application Level
Ans-C
Ans-C
87. which of the following is not characteristics of cloud computing as per NIST
A. Data Recovery
B. On demand self service
C. Resource Pooling
D. Broad Access Network
Ans-A
89. Which entity manage the relationship between cloud provider and customer?
A. Cloud customer B. Auditor C. Broker D. Provider
Ans-C
93. …………dynamically assigned and reassigned based on the consumer demand in resource pooling.
A. Clients B. Resouces C. storage D. VM
Ans- B
94. Metered service provides……………………information for the Cloud resource used by the consumer
A. billing B. and chargeback C. Both A & B D. None
Ans- C
97. It is the set of all those components that are critical to the security of the system.
98. …….. is a key technique in cloud security to provide confidentiality and integrity of data.
99. Which of the following are the security threats in cloud computing
A. VM Vulnerabilities B. VM Theft C. Denial of service attack D. All of these
Ans- D
100. It enables an attacker to install a rogue hypervisor or Virtual Machine Monitor (VMM) that can take control
of the underlying server resources
A. Hyperjacking B. Data Leakage C. VM Vulnerabilities D. VM Theft
Ans-A