CA. 7.1 Cloud Computing (17-18)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

CA. 7.

1 Cloud Computing(17-18)

1. The __________ model originally did not require a cloud to use virtualization to pool resources. 
a) NEFT (National Electronic Funds Transfer) 
b) NIST (National Institute of Standards and Technology)
 c) NIT (National Institutes of Technology) 
d) All of the mentioned
Ans- B

2.  _________ computing refers to applications and services that run on a distributed network using virtualized
resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel
Ans- B

3.  Which of the following can be identified as cloud?


a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned
Ans- C

4. ………..is a person or organization that maintains a business relationship with, and uses service from cloud
providers.
A. Cloud consumer
B. Cloud Auditor
C. Cloud Broker
D. Cloud carrier
Ans- A

5. ……..offers business transparency across pillars of business.

A. Asset Management
B. Service Management
C.  Virtualization
D.  Information infrastructure
Ans- B
6. Which of the following are the layers of cloud?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. All of the above
Ans- D

7. It allow accessibility of services & resources( like router, switches, storage) for particular Organization or
individuals but managed internally by 3’rd Party.
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. None of the above
Ans-B
8. Which of the following is Cloud Platform by Amazon ?
a) Azure
b) AWS
c) Cloudera
d) All of the mentioned
Ans-C

9. Which of these companies is not a leader in cloud computing?


A. Google
B. Amazon
C. Blackboard
D. Microsoft
Ans- C 

10. Which of the following is a type of Service Models?

A. Public-as-a-Service
B. Platform-as-a-Service
C. Community-as-a-Service
D. Public-as-a-Service
Ans- B

11. What is private cloud?


A. A standard cloud service offered via the internet.
B.  A cloud architecture maintained within an enterprise data centre.
C. A cloud service inaccessible to anyone but the cultural elite.
D. None 
Ans- B

12. find out the most common business drivers for cloud transformation.
A. Reduce the operational cost 
B. Reduce the capital cost
C. Productivity Enhancement
D. All of the above
Ans-D

13. When you add a software stack, such as an operating system and applications to the service, the model
shifts to _____ model.

A. SaaS
B. PaaS
C. IaaS
D. All of the mentioned
Ans- A

14. Which of the following is most refined and restrictive service model ?

A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned

Ans- C

15. The __________ model originally did not require a cloud to use virtualization to pool resources.
A. NEFT
B. NIST
C. NIT
D. All of the mentioned

Ans- B

16. Which of the following cloud concept is related to pooling and sharing of resources?

A. Polymorphism
B. Abstraction
C. Virtualization
D. None of the mentioned
Ans-C

17. Enterprise resource planning is an example of which application.

A. Business Application
B. Management Application
C. Data Protection Application
D. Security Application
Ans-A

18. Which of the following is a logical component of compute system?

A. Application
B. Storage
C. File system
D. None of the above
Ans-C

19. Channel technology provides……….protocol overhead due to tight coupling.

A. High  B. Low C. Medium D. All of the above

Ans- B

20. In object based storage data is stored in the form of……………

A. Blocks

B. Objects

C. Files

D. Chunk

21. Which of the following backup technique is most space efficient?


a) Full backup
b) Incremental backup
c) Differential backup
d) All of the mentioned

Ans- B
22.  To decide on a backup strategy for your organization, which of the following should you consider?
a) RPO (Recovery Point Objective)
b) RTO (Recovery Time Objective)
c) Both RPO & RTO
d) None of the mentioned

Ans-C

23.  iSCSI allows what type of access


a) block level
b) file level
c) both block and file level
d) none of the mentioned

Ans- A

24. Identify the data storage technology used in the below data center?
A) SAN
B) DAS
C) Both A and B
D) None of these

Ans-A

25. Fiber Optic Cable uses


a) Electronic pulses to transmit Information down copper lines
b) light pulses to transmit Information down fiber lines
c) Does not send any pulses
d) Requires a connector to send any pulses

Ans- B

26.  What is the full form of RAID ?


A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks

Ans-A

27. What will be the important aspects of intelligent storage system

A. Cache memory

B. Physical Disk

C. Front end

D. Back end

Ans-A

28. Time within which systems, applications or functions must be recovered after an outage is called
A. RPO B. RTO C. DAS D. None of these

Ans- B

29. Which of the following type of virtualization is also characteristic of cloud computing?
a) Storage
b) Application
c) CPU
d) All of the mentioned

Ans-d

30. Which of the following provide system resource access to virtual machines?
a) VMM
b) VMC
c) VNM
d) All of the mentioned

Ans- A

31. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned

Ans- B

32. Which of the following visualization is most commonly achieved through a mapping mechanism where a
logical storage address is translated into a physical storage address?
a) Storage
b) Network
c) Software
d) None of the mentioned

Ans- A

33. The software that supports Virtual machines, is called a


A. Virtual machine monitor
B. Hypervisor
C. Kernel
D. Both a & b
Ans- D

34. Thin provisioning involves using…………….to gives the appearance of having more physical resources than are
actually available.
A. Virtualization Technology
B. Classic data centre
C. Virtual Provision
D. None of the above
Ans-A

35. What is the definition of provisioning as an automated process related to cloud computing?
A. It handles computing resource management process
B. It adds security constraints to a cloud environment.
C. It moves data from one cloud to another.
D. It provides server consolidation capability.

36. How can IT resource consolidation & virtualization help companies deliver service?
A. It reduces the network traffic.
B. It scales application better than traditional clustering of application servers.
C. IT creates more maintenance work but virtualization makes it easy to scale applications.
D. It allocates computing resources more efficiently & reduces maintenance costs.
Ans- D

37.  which statement is true about bare metal hypervisor?


A. It can  only be hosted on an existing operating system.
B. It requires a separate license for the native operating system.
C. It has minimum functionality to support only one type of operating system.
D. It runs directly on server hardware to provide virtual machines with timesharing resources.
Ans- D

38. Which of the following cloud concept is related to pooling and sharing of resources ?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned
Ans-C

39. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them
as a ________ resource.
a) real
b) virtual
c) cloud
d) None of the mentioned

Ans- B

40. _____ is a financial estimate for the costs of the use of a product or service over its lifetime.
a) TCO
b) TOC
c) COT
d) All of the mentioned

Ans-A

41.  Which of the following component is called hypervisor?


a) VGM
b) VMc
c) VMM
d) All of the mentioned

Ans- C

42. Applications such as a Web server or database server that can run on a virtual machine image are referred
to as ______________
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned

Ans- B

43. _________ allows different operating systems to run in their own memory space.

A. VMM
B. VMc
C. VMM
D. All of the mentioned

Ans-C

44. A ________ is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs
and WRITEs.
a) GETs
b) PUN
c) LUN
d) All of the mentioned

Ans-C

45. Which of the following use LUNs to define a storage volume that appears to a connected computer as a
device?
a) SAN
b) iSCSI
c) Fibre Channel
d) All of the mentioned

Ans-D

46. Which protocol reduces administrative overhead in a switched network by allowing the
configuration of a new VLAN to be distributed to all the switches in a domain?

A. STP

B. VTP

C. DHCP

ISL
D.

Ans- B

47. It is a technology that allows traffic from multiple VLANs to traverse a single network connection

A. VLAN Trunking

B. VLAN Port

C.VLAN Tagging 
D. None of these

Ans-A

48. A logical fabric on an FC SAN that enables communication among a group of nodes, regardless of their
physical location in the fabric.

A.VLAN B.VSAN C. Trunking D. Tagging

Ans -B

49. A technique allowing a physical server to use multiple physical paths for transferring data between the
physical server and a LUN on a storage system.

A. Multipathing B.Traffic shapping C. Limit & share D. storm control

Ans-A

50. The technology used to distribute service requests to resources is referred to as _____________

a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned

Ans-C

51. Which of the following are the components of VDC Network Infrastructure?

A. Virtual NIC B. Virtual HBA C. Virtual switch D. All of the mentioned

Ans-D

52. Benefits of Network Virtualization

A. Increase the CAPEXP

B. Enhance Security

C. Enhance Performance 

D. Both B & C

53. Cloud infrastructure management and service creation tools are responsible for managing………………

A. Physical and virtual infrastructures

B. Only Physical infrastructure

C. Only Virtual infrastructure

D. None of these

Ans- A

54. Virtual infrastructure management software includes


A. Storage Management

B. Network Management

C. Compute Management

D. All of these

Ans- D

55. The key function of a unified management software is to create………..

A. Cloud services

B. VDC 

C. CDC

D. None of these

Ans-A

56. It is a form of distributed computing which enables the resources of numerous heterogeneous computers in
a network to work on a single complex task at the same time

A. Utility computing

B. Virtualization

C. Service Oriented Architecture (SOA)

D. Grid computing

Ans- D

57. Which one of the following is benefit of On-demand Self-service

A. Enables consumers to get computing resources as and when required, without any human intervention

B. Facilitates consumer to leverage “ready to use” services or, enables to choose required services from the
service catalog 

C. Allows provisioning of resources using self-service interface

D. All of the above

Ans-D

58. Which of the following is best known service model?

A. Saas B. Paas C. Iass D. All of the above

Ans-D

59………………………..cloud is one where the cloud has     been organised to serve a common function or purpose by
many organization.

A. Public B. Private C. Community D. All of the mentioned


Ans- C

60………………..as a service is a cloud computing infrastructure that creates a development environment upon
which applications may be build.

A. Infrastructure
B. Service
C. Platform
D. All of the mentioned

Ans- C 

61. On-premise private Clouds, also known as

A. Internal Cloud B. corporate cloud C. Supportive cloud D. None of these

Ans- A

62. Cloud provides which of the following key cost savings

A. Infrastructure cost 

B. Management cost

C. Power and energy cost

D. All of the mentioned

Ans-D

63.It is a set of processes that enable & optimize cloud services in order to satisfy business requirements &
provide value to consumers.

A. Cloud Service Management

B. Infrastructure Management

C. Business Management

D. None of these

Ans-A

64. The goal of……………Management is to monitor, measure, analyse, and improve the performance of cloud
infrastructure and services.

A. Capacity Management

B. Performance Management

C. Incident Management

D. Problem Management

Ans- B
65. Which of the following is the deployment model?
a) public
b) private
c) hybrid
d) all of the mentioned

Ans-D

66.  Point out the correct statement.


a) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
b) Service model defines the purpose of the cloud and the nature of how the cloud is located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary being the
network’s firewall no longer applies in cloud computing
d) All of the mentioned

Ans-A

67. The ________ cloud infrastructure is operated for the exclusive use of an organization.

a) Public
b) Private
c) Community
d) All of the mentioned

Ans- B

68. 9. __________ cloud is one where the cloud has been organized to serve a common function or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned

Ans-C

69. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned

Ans-D

70. A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound
together as a unit.
a) Public
b) Private
c) Community
d) Hybrid

Ans-D

71. Which of the following is benefits of cloud computing


A. Reduce IT cost

B. Business agility support

C. Flexible Scaling 

D. All of these

Ans-D

72. Which one of the following a technology works behind the cloud computing platform?

a. Virtualization
b. SOA
c. Grid Computing
d. All of the above

Ans-D

73. Which one of the following statement is true about the Virtualization?

a. It provides a logical name for a physical resource, and on-demand provides an indicator of that physical
resource.
b. In Virtualization, we analyze the strategy related problems that customers may face.
c. In Virtualization, it is necessary to compile the Multitenant properly.
d. All of the above

Ans-A

74. Which one of the following statement is true about the Service-Oriented Architecture?

a. It is possible to exchange data between applications from different vendors without using additional
programming.
b. It provides computational resources on-demand as a metered service.
c. Service-Oriented Architecture allows using the application as a service for other applications.
d. Both A and C

Ans-D

75.  Managed IT services are based on the concept of which one of the following?

a. Virtualization
b. Utility Computing
c. Grid Computing
d. SOA

Ans-B

76.Point out the correct statement.


a) Different types of cloud computing service models provide different levels of security services
b) Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms
are required and mapping those to controls that exist in your chosen cloud service provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All of the mentioned

Ans-D

77.Which of the following is done by Identity management?


a) controlling access to data in the cloud
b) maintaining user roles
c) preventing unauthorized uses
d) all of the mentioned

Ans-D

78. What facet of cloud computing helps to guard against downtime and determines costs?
A.   Service-level agreements
B.   Application programming interfaces
C.   Virtual private networks
D.   Bandwidth fees
Ans-A

79.  Which of the following model allows vendor to provide security as part of the Service Level Agreement?

A. SaaS
B. PaaS
C. IaaS
D. None Of these
Ans-A

80. Which of the following questions should ask before selecting cloud service provider?

A. How long has the provider been providing the service.

B. How easy is it to add/ remove service.

C. Both A & B

D. None of these

Ans-C

81. Cloud…….may prevent a consumer from moving one service model to another.

A. Vender B. Client C. Both A &  B D. None of these

Ans-A

82. Cloud Adoption phases includes

A. Assessment
B. Proof of concept

C. Migration

D. All of the above

83. …………….in a virtualized environment presents a single point of security failure for all the VMs running on it.

A. Cloud B. Hypervisor C. Configuration D. None of these

Ans- B 

84. Application hardening measures include disallowing a vulnerable application from 

A. Launching any (untrusted) executable file

B. Creating or modifying executable files

C. Modifying sensitive areas of the guest OS, for example, MS Windows registry

D. All of these

Ans-D

85. A firewall is implemented on a ……………..and limits access between networks and/or systems in accordance
with a specific security policy.

A. Network Level

B. Storage Level

C. Compute Level

D. Application Level

Ans-C

86. Which of the following is a characteristic of the SaaS applications?

a. SaaS applications are reliable


b. SaaS applications are not customizable
c. SaaS applications are customizable
d. Non-reliable

Ans-C

87. which of the following is not characteristics of cloud computing as per NIST
A. Data Recovery
B. On demand self service
C. Resource Pooling
D. Broad Access Network
Ans-A

88. Which of the following is not part of cloud reference model?


A. Customer B. Broker C. Auditor D. None of the above
Ans- D

89. Which entity manage the relationship between cloud provider and customer?
A. Cloud customer B. Auditor C. Broker D. Provider
Ans-C

90. Which of the following is a intermediate between OS and Hardware in virtualization 


A. Hypervisor B.VMM C. Both A & B   D. None of the above    
Ans-C

91. Amazon web service is the example of 


A. Public cloud B. Private Cloud C. Hybrid Cloud D. None of the above
Ans –A

92. Service Layer of cloud reference model includes


A. Iaas B. Paas C. Saas D. All of thses
Ans-D

93. …………dynamically assigned and reassigned based on the consumer demand in resource pooling.
A. Clients  B. Resouces C. storage D. VM 
Ans- B 

94. Metered service provides……………………information for the Cloud resource used by the consumer
A. billing B. and chargeback  C. Both A & B   D. None 
Ans- C

95. What is the full from of TCB in cloud security?


A. Trusted computing Based
B. Taking care of Business
C. Task control Block
D. Transmission control Block
Ans- A

96. Point out the correct multifactor authentication?


A. What does a user know?
B. What does a user have?
C. Who is the user?
D. All of these
Ans-D

97. It is the set of all those components that are critical to the security of the system.

A. TCB B. Encyption C. Defence-in-Depth D. None


Ans-A

98. …….. is a key technique in cloud security to provide confidentiality and integrity of data.

A. TCB B. Encyption C. Defence-in-Depth D. None


Ans-B

99. Which of the following are the security threats in cloud computing 
A. VM Vulnerabilities B. VM Theft C. Denial of service attack  D. All of these
Ans- D
100. It enables an attacker to install a rogue hypervisor or Virtual Machine Monitor (VMM) that can take control
of the underlying server resources
A. Hyperjacking B. Data Leakage C. VM Vulnerabilities D. VM Theft

Ans-A

You might also like