Cloud Computing - Mcqs

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 46

Introduction to Cloud Computing

1) What type of computing technology refers to services and applications that typically run on a distributed network through
virtualized resources?

a. Distributed Computing

b. Cloud Computing

c. Soft Computing

d. Parallel Computing

Hide Answer Workspace

Answer: B

Explanation: Cloud computing is a computing technique in which applications are accessed by common internet protocols and
networking standards.

2) Which one of the following options can be considered as the Cloud?

a. Hadoop

b. Intranet

c. Web Applications

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Whenever any intranet becomes large enough in size that a diagram is not able to differentiate the individual physical
system, so at that stage intranet also becomes known as a cloud. Hadoop can be considered as a cloud.

3) Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as
_______resources to users.

a. Real

b. Cloud

c. Virtual

d. none of the mentioned

Hide Answer Workspace

Answer: C

Explanation: Cloud Computing is a kind of new model for providing resources for applications such as staging applications,
platform-independent user access to services.
4) Which of the following has many features of that is now known as cloud computing?

Backward Skip 10sPlay VideoForward Skip 10s


ADVERTISEMENT

a. Web Service

b. Softwares

c. All of the mentioned

d. Internet

Hide Answer Workspace

Answer: D

Explanation: Internet provides the abstraction, runs through the same set of protocols and standards, and uses the same operating
system and applications.

5) Which one of the following cloud concepts is related to sharing and pooling the resources?

a. Polymorphism

b. Virtualization

c. Abstraction

d. None of the mentioned

Hide Answer Workspace

Answer: B

Explanation: The application runs on physical systems that are not specified in real. The information stored in the locations that are
also not specified or unknown, administration of the systems are outsourced to others and can be accessed by the user.

6) Which one of the following statements is not true?

a. The popularization of the Internet actually enabled most cloud computing systems.

b. Cloud computing makes the long-held dream of utility as a payment possible for you, with an infinitely scalable, universally
available system, pay what you use.

c. Soft computing addresses a real paradigm in the way in which the system is deployed.

d. All of the mentioned

Hide Answer Workspace

Answer: C

Explanation: Cloud computing is distinguished by the notion that resources are virtual and infinite and describe the physical systems
on which software runs in the abstracted manner from the user.
7) Which one of the following can be considered as a utility is a dream that dates from the beginning of the computing industry itself?

a. Computing

b. Model

c. Software

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns
them into a self-service utility.

8) Which of the following is an essential concept related to Cloud?

a. Reliability

b. Abstraction

c. Productivity

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: Cloud computing hides all the detail of system implementation from users and developers.

9) Which one of the following is Cloud Platform by Amazon?

a. Azure

b. AWS

c. Cloudera

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: Amazon web service is one of the most successful cloud-based businesses, which offers infrastructure as a service and
lets you rent virtual computers on its own infrastructure.

10) Which of the following statement is not true?

ADVERTISEMENT
ADVERTISEMENT
a. Through cloud computing, one can begin with very small and become big in a rapid manner.

b. All applications benefit from deployment in the Cloud.

c. Cloud computing is revolutionary, even though the technology it is built on is evolutionary.

d. None of the mentioned

Show Answer Workspace

Questions and Answers based on the "Planning"

1) In the Planning Phase, Which of the following is the correct step for performing the analysis?

a. Cloud Computing Value Proposition

b. Cloud Computing Strategy Planning

c. Both A and B

d. Business Architecture Development

Hide Answer Workspace

Answer: C

Explanation: In the planning phase, we actually analyze the strategy related problems which customers might face. There are usually
two steps to perform the analysis: Cloud Computing Planning and Cloud Computing Value Proposition.

12) In which one of the following, a strategy record or Document is created respectively to the events, conditions a user may face
while applying cloud computing mode.

a. Cloud Computing Value Proposition

b. Cloud Computing Strategy Planning

c. Planning Phase

d. Business Architecture Development

Show Answer Workspace

3) What is Business Architecture Development?

a. We recognize the risks that might be caused by cloud computing application from a business perspective.

b. We identify the applications that support the business processes and the technologies required to support enterprise
applications and data systems.

c. We formulate all kinds of plans that are required to transform the current business to cloud computing modes.

d. None of the above

Hide Answer Workspace

Answer: A
Explanation: Business Architecture Development: In this phase, we identify the risks that can be caused by a cloud computing
application from a business point of view.

4) Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc.

a. Service Development

b. Quality of service

c. Plan Development

d. Technical Service

Hide Answer Workspace

Answer: B

Explanation: Quality of service refers to the non-functional requirements such as reliability, security, disaster recovery, etc.

5) Which one of the following is a phase of the Deployment process?

a. Selecting Cloud Computing Provider

b. IT Architecture Development

c. Business Architecture Development

d. Transformation Plan Development

Hide Answer Workspace

Answer: D

Explanation: Deployment phase: This phase focuses on both steps. It consists of the following two steps: Selecting a cloud
computing provider, maintenance and technical service.

6) This phase involves selecting a cloud provider based on the Service Level Agreement (SLA), which defines the level of service the
provider receives.

a. Maintenance and Technical Service

b. Selecting Cloud Computing Provider

c. Both A and B

d. None of the above

Hide Answer Workspace

Answer: B

Explanation: This phase involves selecting a cloud provider based on the Service Level Agreement (SLA), that defines the level of
service the provider receives.
7) In which one of the following phases, IT Architecture Development came?

ADVERTISEMENT
ADVERTISEMENT

a. Strategy Phase

b. Planning Phase

c. Deployment Phase

d. Development Phase

Hide Answer Workspace

Answer: B

Explanation: IT Architecture Development steps in Planning Phase

8) Which of the model involves the special types of services that users can access on a Cloud Computing platform?

a. Service

b. Planning

c. Deployment

d. Application

Hide Answer Workspace

Answer: A

Explanation: The service model contains the specials types of services that users can access on a cloud computing platform.

9) Which one of the following is related to the services provided by Cloud?

a. Sourcing

b. Ownership

c. Reliability

d. PaaS

Hide Answer Workspace

Answer: A

Explanation: Insourced or Outsourced means whether the service is provided by the customer or the service provider.

10) How many phases are present in Cloud Computing Planning?

ADVERTISEMENT
ADVERTISEMENT
a. 2

b. 3

c. 4

d. 5

Show Answer Workspace

This set of the following Multiple Choice Questions (MCQ's) focuses on the Cloud Computing Architecture.

1) Cloud computing architecture is a combination of?

a. service-oriented architecture and grid computing

b. Utility computing and event-driven architecture.

c. Service-oriented architecture and event-driven architecture.

d. Virtualization and event-driven architecture.

Hide Answer Workspace

Answer: C

Explanation: Cloud computing architecture is a combination of service-oriented architecture and event-driven architecture.

2) In how many parts we can broadly divide the architecture of the Cloud?

a. 4

b. 3

c. 2

d. 5

Hide Answer Workspace

Answer: C

Explanation: The architecture of the Cloud can broadly be divided into two main parts that are Back-end and Front-end.

ADVERTISEMENT
ADVERTISEMENT

3) Which one of the following refers to the user's part of the Cloud Computing system?

a. back End

b. Management

c. Infrastructure

d. Front End
Hide Answer Workspace

Answer: D

Explanation: It is the front-end that refers to the user's part of the cloud computing system. It includes many applications and
interfaces that are required to access or use the cloud computing platform.

4) Which one of the following can be considered as the example of the Front-end?

a. Web Browser

b. Google Compute Engine

c. Cisco Metapod

d. Amazon Web Services

Hide Answer Workspace

Answer: A

Explanation: From the following given options, we can consider the Web-browser as the perfect example of the Front-end.

25) By whom is the backend commonly used?

a. Client

b. User

c. Stockholders

d. service provider

Hide Answer Workspace

Answer: D

Explanation: It is commonly used by the service provider in order to manage all resources required to provide the Cloud Computing
Services.

6) Through which, the backend and front-end are connected with each other?

a. Browser

b. Database

c. Network

d. Both A and B

Hide Answer Workspace

Answer: C

Explanation: Typically using an internet connection, both the front and back end are connected to the others through a network.
7) How many types of services are there those are offered by the Cloud Computing to the users?

a. 2

b. 4

c. 3

d. 5

Hide Answer Workspace

Answer: C

Explanation: Usually, Cloud Computing offers three types of services to the users that are Platform as a service (or PaaS),
Application as a service (or AssS), and Software as a service (or SaaS).

8) The Foce.com and windows Azure are examples of which of the following?

a. IaaS

b. PaaS

c. SaaS

d. Both A and B

Hide Answer Workspace

Answer: B

Explanation: Both Force.com and Windows Azure are examples of the Platform as a service

ADVERTISEMENT
ADVERTISEMENT

9) Which of the following is one of the backend's built-in components of cloud computing?

a. Security

b. Application

c. Storage

d. Service

Hide Answer Workspace

Answer: A

Explanation: Security is one of the back-end's built-in components of cloud computing.

10) Which of the following provides the Graphic User Interface (GUI) for interaction with the cloud?
a. Client

b. Client Infrastructure

c. Application

d. Server

Hide Answer Workspace

Answer: B

Explanation: The Client Infrastructure is one of the front-end components that provide the way of communication in the form of a
Graphic User Interface to communicate with the Cloud.

Multiple Choice Questions (MCQ's) Based on the "Technologies" used in the Cloud Computing.

1) Which one of the following a technology works behind the cloud computing platform?

a. Virtualization

b. SOA

c. Grid Computing

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: Several technologies work behind the Cloud Computing platforms, which provide features like Flexibility, reliability,
and usability to cloud computing.

2) Which one of the following is a kind of technique that allows sharing the single physical instance of an application or the resources
among multiple organizations/customers?

a. Virtualization

b. Service-Oriented Architecture

c. Grid Computing

d. Utility Computing

Hide Answer Workspace

Answer: A

Explanation: Virtualization is a kind of technique that allows us to share the single physical instance of a resource or application
between several organizations/users.

3) Which one of the following statement is true about the Virtualization?


a. It provides a logical name for a physical resource, and on-demand provides an indicator of that physical resource.

b. In Virtualization, we analyze the strategy related problems that customers may face.

c. In Virtualization, it is necessary to compile the Multitenant properly.

d. All of the above

Hide Answer Workspace

Answer: A

Explanation: It provides a logical name to the physical resource when the demand is correct regarding virtualization and provides an
indicator of that physical resource.

4) In Virtualization, which architecture provides the virtual isolation between the several tenants?

a. IT Architecture

b. Multitenant

c. Deployment

d. Business Architecture

Hide Answer Workspace

Answer: B

Explanation: The Multitenant architecture provides us the virtual isolation in between several tenants. Hence the organization can
easily use and also modify their application as they each have their instances running.

5) On which one of the following utility computing is based?

ADVERTISEMENT
ADVERTISEMENT

a. Grid Computing Model

b. SOA Model

c. virtual isolation Model

d. Pay-per-Use model

Hide Answer Workspace

Answer: D

Explanation: Utility computing is based on the pay-what-you use model.

6) Which one of the following statement is true about the Service-Oriented Architecture?

a. It is possible to exchange data between applications from different vendors without using additional programming.
b. It provides computational resources on-demand as a metered service.

c. Service-Oriented Architecture allows using the application as a service for other applications.

d. Both A and C

Hide Answer Workspace

Answer: D

Explanation: The service-oriented architecture helps to be used as a service for other applications regardless of vendor, product, or
technology type. Therefore, it is possible to exchange data between different vendors' applications without changes in additional
programming or services.

7) In Grid Computing, which types of computer resources are there?

a. heterogeneous dispersed.

b. geographically dispersed.

c. Both A and B

d. None of the above

Hide Answer Workspace

Answer: C

Explanation: In grid computing, heterogeneous types of resources are used that are geographically dispersed.

8) Managed IT services are based on the concept of which one of the following?

a. Virtualization

b. Utility Computing

c. Grid Computing

d. SOA

Hide Answer Workspace

Answer: B

Explanation: In Cloud Computing, managed IT services and grid computing are based on the concept of Utility Computing.

9) Which one of the following refers to the Distributed Computing, in which several sets of computers distributed on multiple
geographical locations and are connected with each other to achieve a common goal?

a. Virtualization

b. SOA

c. Grid Computing
d. Utility Computing

Hide Answer Workspace

Answer: C

Explanation: Grid Computing refers to the Distributed Computing, in which several sets of computers distributed on multiple
geographically dispersed, and are connected with each other to achieve a common goal.

10) Which one of the following statement is true about Grid Computing?

a. Pieces combine small tasks into complex tasks

b. The subscription tier plays an important role in grid computing.

c. Breaks complex tasks into small operations

d. Both A and C

Hide Answer Workspace

Answer: C

Explanation: Grid computing breaks down complex tasks into smaller pieces, which are distributed to the CPU residing within the
grid.

ADVERTISEMENT

Multiple Choice Questions (MCQ's) based on the "Hypervisors" used in the Cloud Computing.

1) Which one of the following given programs provides the isolation (abstraction) and partitioning?

ADVERTISEMENT
ADVERTISEMENT

a. System hypervisor

b. Software hypervisor

c. Hardware hypervisor

d. Virtualization hypervisor

Hide Answer Workspace

Answer: D

Explanation: The virtualization hypervisor program provides the isolation (abstraction) and partitioning

2) On which one of the following hypervisor runs directly on the underlying host system, it is also known as________?

a. Bare metal hypervisor

b. Hosted Hypervisor

c. Native Hypervisor
d. Both A and C

Hide Answer Workspace

Answer: D

Explanation: The Hypervisor runs directly on the underlying host system, and sometimes it is also known as "Native Hypervisor" or
"Bare metal hypervisor."

3) Which of the following behaves like the monitor's entry point and reroutes the instructions of the virtual machine?

a. Dispatcher

b. Allocator

c. Interpreter

d. Both A and B

Hide Answer Workspace

Answer: A

Explanation: The Dispatcher acts as the monitor's entry point and reruns the instructions (statements) of the virtual machine instance
to one of the other two modules.

4) Which one of the following is also known as a Hypervisor?

a. VMA

b. VMM

c. VMS

d. VMR

Hide Answer Workspace

Answer: B

Explanation: A Virtual Machine Monitor (or VMM) is sometimes also known as the Hypervisor.

5) How many kinds of Hypervisor are there?

a. 4

b. 3

c. 2

d. 5

Hide Answer Workspace


Answer: C

Explanation: There are only two kinds of Hypervisors that are Type1-Hypervisor and Type2-Hypervisor.

6) Which one of the following is not an example of the Type1-Hypervisor?

a. VMware ESXi

b. Citrix XenServer

c. Microsoft Hyper-V hypervisor

d. VMware Player

Hide Answer Workspace

Answer: D

Explanation: VMware Player is one of the examples of Typ2-Hypervisor not of the Type1-Hypervisor

7) How many main modules are needed to coordinate in order to emulate the underlying hardware?

a. 3

b. 2

c. 4

d. 5

Hide Answer Workspace

Answer: A

Explanation: In order to emulate the underlying hardware, there are three main modules needed to coordinate, which are as follows:

o Interpreter

o Allocator

o Dispatcher

8) Which one of the following is used to call the allocator?

a. INTERPRETER

b. TYPE-2 Hypervisor

c. Both A and B

d. DISPATCHER

Hide Answer Workspace

Answer: D
Explanation: Each time when the virtual machine wants to execute an operation or instruction, it will result in allowing in changing
the machine's resources associated with the virtual machine. Hence the allocator is called by the Dispatcher.

9) The Parallels Desktop can be considered as the example of which of the following?

a. TYPE-2 Hypervisor

b. DISPATCHER

c. TYPE-1 Hypervisor

d. INTERPRETER

Hide Answer Workspace

Answer: A

Explanation: Parallels Desktop or VMware Player is one of the examples of the Type2-Hypervisor. Almost all the hosted hypervisors
are usually found on endpoints such as PCs.

10) Which one of the following statements is not true?

a. Whenever a command begins a process, immediately the process virtual machine gets instantiated.

b. Usually, the guest operating systems are mores faster in full virtualization as compared to other virtualization schemes.

c. It is necessary for the full virtualization that the host OS (Operating System ) offers a Virtual Machine Interface for the guest
operating system by which the guest operating system can access the hardware through the host VM.

d. All of the above

Hide Answer Workspace

Answer: C

Explanation: The statement give in the option c is not true at all.

11) Which of the following statements is not true?

a. Load balancing virtualizes systems and resources by mapping a logical address to a physical address

b. Multiple instances of various Google applications are running on different hosts

c. Google uses hardware virtualization

d. All of the above

Hide Answer Workspace

Answer: A

Explanation: Google performs the load balancing for distributing the processing load in order to achieve high utilization rates.
12) Which one of the following can be considered as the example of the Type2 Virtual Machine monitors?

a. KVM

b. Microsoft Hyper V

c. Parallels Desktop

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: KVM, Microsoft Hyper V, and Parallels Desktop for Mac are examples of the Type2 Virtual Machine Monitors.

13) Which one of the following is a type of software that supports the virtual machine?

a. Kernel

b. Hypervisor

c. VMM

d. Both B and C

Hide Answer Workspace

Answer: D

Explanation: The VMM and kernel both are a kind of software that supports the Virtual Machine.

14) Which one of the following runs on Xen Hypervisor?

a. Azure

b. AWS EC2

c. C AWS EC3

d. All of the above

Hide Answer Workspace

Answer: B

Explanation: AWS EC2 runs on Xen Hypervisor

15) Which one of the following is the type of a service that manages and creates virtual network interfaces?

ADVERTISEMENT

a. VMware vStorage

b. Application services
c. VMware vCompute

d. VMware vNetwork

Hide Answer Workspace

Answer: D

Explanation: VMware vNetwork is a kind of service that manages and creates virtual network interfaces.

16) In which one of the following, the virtual machine simulates hardware, through which it can be independent of the underlying
system hardware?

a. Para-virtualization

b. Full virtualization

c. Emulation

d. None of the above

Hide Answer Workspace

Answer: C

Explanation: In emulation, the virtual machine simulates hardware, through that it can be independent of the underlying system
hardware

17) Which one of the following will be the host operating system for Windows Server?

a. VirtualLogix VLX

b. Microsoft Hyper-V

c. Xen

d. All of the above

Hide Answer Workspace

Answer: B

Explanation: Type 2 virtual machines are installed over a host operating system.

18) In Which Type of VM, full virtualization can be possible?

a. Type4

b. Type2

c. Type3

d. Type1

Hide Answer Workspace


Answer: D

Explanation: In Type1, the full virtualization can be possible because it provides a complete simulation of the hardware on which it
is currently running.

19) Which one of the following can be considered as another name of Virtual Machine?

a. Software virtual machine

b. Real machine

c. process virtual machine

d. Virtualization hypervisor

Hide Answer Workspace

Answer: C

Explanation: Some kinds of Virtual Machines are specially designed so that they can able to run only a single process or application.
Hence, these kinds of virtual machines are referred as the process Virtual Machines.

MCQ's based on the SaaS

1) Which of the following is the correct full form of SaaS?

ADVERTISEMENT

a. Storage-as-a-Service

b. Server-as-a-Software

c. Software-as-a-Service

d. None of the above

Hide Answer Workspace

Answer: C

Explanation: The term "SaaS" stands for the "Software as a Service," a type of model that allows to offer Software application as a
service for the customers. For Example: MailChimp, Google Apps, Dropbox, Salesforce, etc

2) Through which one of the following models, SaaS supports multiple users and offers a shared data model?

a. single-tenancy

b. multiple-instance

c. multi-tenancy

d. None of the above

Hide Answer Workspace


Answer: C

Explanation: There is also an alternate of the Software virtualization of the single individual instances that exist, although it is not
that common.

3) Which of the following is the SaaS's Characteristics?

a. Usually, the license is subscription-based or usage-based and is billed on a recurring basis.

b. The software and the service are observed and maintained usually by the vendor.

c. Software mostly available over the internet across the world and can be provided according to the demand through the
browser.

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: Sometimes it may be the client-side executable code. Still, it is not the end-user's responsibility to maintain that code
and maintain its interaction with the services at all.

4) Which of the following is a characteristic of the SaaS applications?

a. SaaS applications are reliable

b. SaaS applications are not customizable

c. SaaS applications are customizable

d. Non-reliable

Hide Answer Workspace

Answer: C

Explanation: SaaS offers Application Programming Interface (API) to the users, which allows the users/developers to develop a
customized application.

5) Which types of issues are associated with the SaaS?

a. Modest software tools

b. Multitenant solutions

c. Centralized management and data

d. Network dependence

Hide Answer Workspace

Answer: D
Explanation: There are many issues associated with the SaaS (Software as a Service), such as Lack of portability between SaaS
clouds, Web-browser related issues, and Network dependence.

6) Which one of the following statements can be considered as the true characteristics of software as a Service (SaaS) model?

a. Software applications are generally maintained by the service provider (or vendor)

b. SaaS provides the best cost-effective applications because they do not need any maintenance at the customer side.

c. They can easily scale up or scale down according to the conditions.

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: All the statements provided in the above question are the characteristics of the SaaS or Software as a Service model.

7) Which one of the following is not the correct statement?

a. SaaS may be also be described as software deployed on a hosted service.

b. The platform can be based on the types of software development languages, frameworks, and several other constructs.

c. SaaS is the cloud-based equivalent of shrink-wrapped software

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: SaaS can be accessed globally through the internet, usually in a browser.

8) Which one of the following can be considered as the most complete cloud computing service model?

a. PaaS

b. IaaS

c. CaaS

d. SaaS

Hide Answer Workspace

Answer: D

Explanation: The most complete cloud computing service model must contain the computing hardware and software, as well as the
solution itself. Hence the SaaS model has all these features.

9) In SaaS, the used open-source software are also known as_____


a. Closed

b. Free

c. Open

d. all of the mentioned

Hide Answer Workspace

Answer: C

Explanation: In general, a huge part of the SaaS Software's is based on the open-sourced software.

10) Which one of the following statements is not true about SaaS?

a. SaaS applications are offered in all shapes and sizes.

b. All users with a little knowledge or know how to operate a computer also know about the SaaS.

c. SaaS software is not customizable.

d. None of the above

Hide Answer Workspace

Answer: D

Explanation: Every computer user is well familiar with SaaS, which is an alternate for the locally installed software.

ADVERTISEMENT

MCQ's based on the Paas (Platform as a service)

1) Which type of PaaS does not contains any type of license or technical dependencies on specific SaaS applications?

a. Add-on development facilities

b. Application delivery-only environments

c. Open Platform as a service

d. Stand-alone development environments

Hide Answer Workspace

Answer: D

Explanation: The PaaS is a type of stand-alone, works as the independent entity for the unique function. It also does not require
technical dependencies and licensing on any special SaaS (Software as a service) applications.

2) Which one of the following is associated heavily with vendor lock-in?

a. DaaS
b. SaaS

c. IaaS

d. PaaS

Hide Answer Workspace

Answer: D

Explanation: The main problem with the "Platform as a service" (or PaaS) is that it normally tie the developer and the customer in
such a solution, in which both the developer and customers have to depend on the platform vendor.

3) Which one of the following is a type of PaaS that usually allows customizing the existing SaaS platform?

a. Stand-alone development environments

b. Add-on development facilities

c. Open Platform as a service

d. Application delivery-only environments

Hide Answer Workspace

Answer: B

Explanation: Add-on development facilities are a type of Paas that allows us to customize the existing SaaS platform.

4) Which one of the following of PaaS type that involves on-demand scaling and application security?

a. Stand-alone development environments

b. Open Platform as a service

c. Application delivery-only environments

d. Add-on development facilities

Hide Answer Workspace

Answer: C

Explanation: The application delivery-only environment contains features like application security and on-demand scaling.

5) How many types of PaaS are there?

a. 4

b. 3

c. 2

d. 5
Hide Answer Workspace

Answer: A

Explanation: On the basis of function, there are four types of PaaS.

6) Which one of the following can be considered as the benefit of PaaS?

a. Lower administrative overhead

b. Lower total cost of ownership

c. More current system software

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: Lower administrative overhead, the lower total cost of ownership and more current network all are the benefits of the
PaaS (Platform as a service).

7) In AWS, which of the following is the AWS Management Console?

a. CAS

b. CDSS

c. CCS

d. CDA

Hide Answer Workspace

Answer: C

Explanation: CSS is the AWS Management Console in the AWS.

8) Which of the following can be considered PaaS offering?

a. Youtube

b. Google Earth

c. Google Adsense

d. Google Maps

Hide Answer Workspace

Answer: D

Explanation: In most cases, vendors of PaaS solutions are the developer who provides a complete solution to the customer.
9) Which one of the following is not the correct statement?

a. The customer assumes no responsibility for maintaining the hardware, software or the development of applications.

b. Google's App Engine platform is one of the IaaS offerings.

c. The vendor is usually responsible for all operational aspects of the services.

d. All of the above

Hide Answer Workspace

Answer: B

Explanation: The customer is generally responsible only for his interaction with the Platform.

10) Which one of the following statements is correct about the PaaS?

a. The platform as a service (or PaaS) systems usually support standards like JavaScript, HTML, and several other rich media
technologies.

b. Platform as a service provides the runtime environment for the applications.

c. The platform as a service is a completely integrated development environment.

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: All statements mentioned in the above questions are true about the PaaS, so that the correct option will be the D.

ADVERTISEMENT

MCQ's based on the IaaS

1) The terms "Iaas" stand for?

a. IT-as-a-Service

b. Infrastructure-as-a-Service

c. Internet-as-a-Service

d. Interoperability-as-a-Service

Hide Answer Workspace

Answer: B

Explanation: The full form of the term IaaS is "Infrastructure as a Service."


2) The resources like IP addresses and VLANs are provided to the end-users by which of the following?

a. Server virtualization.

b. Client virtualization.

c. End-user virtualization.

d. IaaS

Hide Answer Workspace

Answer: A

Explanation: Resources such as the IP addresses and VLANs are offered to the end-users through the server virtualization.

3) Which one of the following is a kind of open standard protocol?

a. SOAP

b. WSDL

c. DHML

d. SIMPLE

Hide Answer Workspace

Answer: D

Explanation: The term "SIMPLE" is a type of open standard protocol.

4) In the virtual appliance, the content can be _____.

a. structured

b. unstructured

c. Both A and B

d. None of the above

Hide Answer Workspace

Answer: C

Explanation: In a virtual appliance, the content can be either structured or unstructured.

5) How many kinds of virtual private server instances are there partitioned in the IaaS stack?

a. 3

b. 2

c. 4
d. 5

Hide Answer Workspace

Answer: A

Explanation: There are only three types of workloads that need three different sizes of computers, such as large, medium, and small.

6) Which of the following forms the basis for almost all web services stacks?

a. WSDL

b. SOAP

c. UDDI

d. VMCC. SOA

Hide Answer Workspace

Answer: B

Explanation: The term "SOAP" stands for the Simple Object Access Protocol, and it forms the basis for most Web Service Stacks.

7) Which of the following is the most commonly used model for description and discovery and is also used with SOAP messaging?

a. DHML

b. VMC

c. WSDL

d. SOA

Hide Answer Workspace

Answer: C

Explanation: Web Services Description Language (WSDL) is the model that is usually used for description and discovery, and it is
also used with SOAP messaging.

8) The Infrastructure as a service (IaaS) provides a type of isolated environment to each customer individually by using_____.

a. renting

b. virtual machine sprawl

c. security vulnerabilities

d. hypervisor

Hide Answer Workspace

Answer: D
Explanation: The Infrastructure as a service (or IaaS) provides a type of isolated environment to each customer individually through
the hypervisors.

9) IaaS usually shares issues with the ______.

a. PaaS

b. SaaS

c. Both A and B

d. None of the above

Hide Answer Workspace

Answer: C

Explanation: It usually shares issues with both PaaS (Platform as a service) and SaaS (Software as a service)

10) Which of the following is an advantage of IaaS (Infrastructure as service)?

a. Efficient and flexible renting of computer hardware.

b. Portability, interoperability with legacy applications.

c. Complete control of the computing resources through administrative access to VMs.

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: All statements mentioned in the above questions are the advantages of the IaaS (Infrastructure as a service)

MCQ Based on the DIaaS

1) Which one of the following is not a correct statement?

ADVERTISEMENT

a. The Distributed Audit Service offers accountability for users accessing a system.

b. The CardSpace and OpenID specifications support the authentication type of data object.

c. Distributed transaction systems like as Cloud Computing Systems, Internetworks and several others usually increases the
obstacles faced by identity management systems.

d. All of the above

Hide Answer Workspace

Answer: B
Explanation: OpenID is a type of developing industry standard to authenticate the End Users, by sorting the digital identity of the
users in a specific format.

2) Which one of the following frameworks uses i-Card metaphor?

a. Higgins

b. Hughes

c. Hinges

d. XACML

Hide Answer Workspace

Answer: A

Explanation: The Higgins open source identity framework is typically used to create a vendor-neutral cloud-based authentication
service

3) Which of the following is a type of XML request or response language commonly used to integrate and interrupt services that
handle requests?

a. XACML

b. FIDM

c. SSP

d. SPML

Hide Answer Workspace

Answer: D

Explanation: SPML is a type an XML request/response language, which usually used to integrate and interoperate service
provisioning requests.

4) In order to provide more secure authentication, which of the following is required at least?

a. three-factor authentication.

b. two -factor authentication.

c. four-factor authentication.

d. None of the above

Hide Answer Workspace

Answer: B

Explanation: In order to provide more secure authentication, the two-factor authentication is required at least.
5) Which one of the following groups is usually dedicated to supporting technologies that implement enterprise mashups?

a. Open Mashup Alliance

b. Open Alliance Apache

c. Open Tech Alliance

d. None of the above

Hide Answer Workspace

Answer: A

Explanation: Open Mashup Alliances group usually predicts that the use of mashups will increase by a factor of 10 within just some
years.

6) Which one of the following statements is correct about the FIDM?

a. SAML have access control

b. It typically uses the Security Markup Language (SAML) for packaging the user's security credentials.

c. It describes the protocols and technologies.

d. All of the above

Hide Answer Workspace

Answer: D

Explanation: FIDM addresses the protocols and technologies that enable a user for packaging the security credentials across the
security domains.

Usually, the SAML (or Security Markup Language) is used to package the user's security credentials.

7) Which of the following allows the users to login into a several different websites with the same single account ?

a. OpenID

b. FIDM

c. SSO

d. Identity

Hide Answer Workspace

Answer: A

Explanation: OpenID allows users to login into several different websites with the same single account. Google, Myspace, Yahoo!,
Flickr and several others are the companies which support the OpenID.

8) Which one of the following statements is true about the SSO?


a. It has multiple authentication servers

b. It manages single accesses to other systems

c. In SSO, User sends the ticket to intranet server.

d. All of the above

Hide Answer Workspace

Answer: C

Explanation: It has the single authentication instead of multiple authentication servers and manages multiple accessed to the other
systems. In this, the user sends the ticket/token to intranet server.

9) Among the following, which one has the single authentication server and manages multiple accesses to the other systems?

a. SOAP

b. IDaaS

c. SSO

d. SOA

Hide Answer Workspace

Answer: C

Explanation: It is the SSO, which has the one single authentication server, and manages the multiple accesses to the other systems.

10) The term "IDaaS" stands for?

a. ID-as-a-Service

b. Interoperability-as-a-Service

c. Intranet-as-a-service

d. Identity-as-a-Service

Hide Answer Workspace

Answer: D

Explanation: In order to solve the several other problems a new technology is introduced known as the IDaas or Identity as a Service.

Multiple-choice Questions Based on the Cloud Type-1.

1) Which of the following can be referred to the location and management of the cloud's infrastructure?

a. Service

b. Deployment
c. Application

d. None of the mentioned

Hide Answer Workspace

Answer: B

Explanation: The deployment model tells us where the cloud is located.

2) _________ model consists of the particular types of services that you can access on a cloud computing platform.

a. Service

b. Deployment

c. Application

d. None of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Service models describe the type of service that the service provider is offering.

3) Which one of the following statements is wrong?

a. The use of the word "cloud" makes reference to the two essential concepts.

b. Cloud computing abstracts systems by pooling and sharing resources

c. Cloud computing is nothing more than the Internet.

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: Abstraction and virtualization are the two essential concepts.

4) Which of the following is the deployment model?

a. Public

b. Private

c. Hybrid

d. All of the mentioned

Hide Answer Workspace

Answer: D
Explanation: Public, private, community and hybrid clouds are the deployment models.

5) Which one of the following statements is wrong?

a. Cloud Computing has two distinct sets of models.

b. Amazon has built a worldwide network of data centers to service its search engine.

c. Azure enables .NET Framework applications to run over the Internet.

d. None of the mentioned

Hide Answer Workspace

Answer: B

Explanation: Google has built mega data centers for its search engine. Hence it not true that Amazon has built a worldwide network
of data centers to services its search engine.

6) Which one of the following is considered the best-known service model?

a. SaaS

b. IaaS

c. PaaS

d. All of the mentioned

Hide Answer Workspace

Answer: D

Explanation: The best-known service models are Software as a Service, Platform as a Service, and Infrastructure as a Service?the
SPI model.

7) The __________ model originally did not require a cloud to use virtualization to pool resources.

a. NEFT

b. NIST

c. NIT

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: NIST stands for the National Institute of Standards and Technology.

8) Which one of the following dimensions is related to the organization's boundaries?


a. The physical location of data

b. Ownership

c. Security boundary

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Internal (I) / External (E) determines the organization's boundaries so that the correct option will be A.

9) How many types of dimensions exist in the Cloud Cube Model?

a. One

b. Two

c. Three

d. Four

Hide Answer Workspace

Answer: D

Explanation: There are four types of dimensions in Cloud Cube Model.

10) _______ model attempts to categorize a cloud network based on four-dimensional factors.

a. Cloud Square

b. Cloud Service

c. Cloud Cube

d. All of the mentioned

Hide Answer Workspace

Answer: C

Explanation: The Cloud Cube model is mainly used for secure collaboration.

Multiple-choice Questions Based on the Cloud Type-2.

1) A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are bound together as a unit.

a. Public

b. Private

c. Community
d. Hybrid

Hide Answer Workspace

Answer: D

Explanation: A hybrid cloud can offer standardized or proprietary access to data and applications, as well as application portability.

2) Which one of the following is the wrong statement?

a. A deployment model defines the purpose of the cloud and the nature of how the cloud is located.

b. The service model defines the purpose of the cloud and the nature of how the cloud is located.

c. Cloud Square Model is meant to show us that the traditional notion of a network boundary being the network's firewall no
longer applies in cloud computing.

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Four types of deployment models exist.

3) Which one of the following is the wrong statement?

a. Public Cloud may be managed by the constituent organization(s) or by a third party.

b. A community cloud may be managed by the constituent organization(s) or by a third party.

c. Private clouds may be either on- or off-premises

d. None of the mentioned

Hide Answer Workspace

Answer: A

Explanation: The public cloud infrastructure is available for public use, alternatively for a large industry group.

4) How many types of security threshold values are actually present in the cloud cube model?

a. 1

b. 2

c. 3

d. None of the mentioned

Hide Answer Workspace

Answer: B
Explanation: There are only two types of depending upon the network firewall.

5) Which of the following is offered by the ownership dimension of the Cloud Cube Model?

a. Proprietary

b. Owner

c. P

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: P stands for Proprietary ownership

6) Which of the following is a measure of knowing whether the operation is inside or outside the security limits?

a. Per

b. P

c. Pre

d. All of the mentioned

Hide Answer Workspace

Answer: D

Explanation: All options mentioned in the above questions are the ways of knowing whether the operation is inside or outside the
security limits, we can also call it a network firewall.

7) Which one of the following is related to the services offered by the Cloud?

a. Sourcing

b. Ownership

c. Reliability

d. AaaS

Hide Answer Workspace

Answer: A

Explanation: It can be understood as the Outsourced or Insourced, which refers to the services that are provided by the service
provider.

8) Which one of the following dimensions corresponds to two different states in the possible eight cloud forms?
a. The physical location of data

b. Ownership

c. Security boundary

d. None of the mentioned

Hide Answer Workspace

Answer: D

Explanation: None of the following given dimension corresponds to two different states in the eight possible cloud forms.

9) Which one of the following options is correct cloud infrastructure operated for the exclusive use of an organization?

a. Public

b. Private

c. Community

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: The Cloud can be managed by the third party or by that organization.

10) Which one of the following is a type of the Cloud that is organized in such a way to serve the common purpose or the functions?

a. Public

b. Private

c. Community

d. All of the mentioned

Hide Answer Workspace

Answer: C

Explanation: The management of a community cloud can be managed by the constituent organization(s) or a third party.

This set of Cloud Computing Questions & Answers for entrance exams Based on "Cloud Types - 3".

1) Which one of the following is the wrong statement?

ADVERTISEMENT

a. Everything from application to infrastructure is the responsibility of the vendor.


b. AaaS provides several sources such as the applications, development frameworks, operating systems, virtual machines,
control structures, transactions, etc.

c. In the deployment model, different types of clouds are referred to as an expression of the infrastructure's approach.

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: It is the Paas (the Platform As A Services) that provides several sources or services such as the applications,
development frameworks, operating systems, virtual machines, control structures, and transactions etc. not the AaaS (or the
Application As A Service).

2) Which one of the following provides the resources or services such as the virtual infrastructure, virtual machines, virtual storage,
and several other hardware assets?

a. IaaS

b. SaaS

c. PaaS

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: The IaaS (or Infrastructure As A Service) service provider maintains all infrastructure, while on the other hand client is
responsible for several other deployment aspects.

3) Which one of the following offers the control structures and development frameworks?

a. IaaS

b. SaaS

c. PaaS

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: The correct answer is the IaaS (the infrastructure As a Service) because it is a kind of cloud computing that uniquely
provides resources such as the virtualized computing over the internet.

4) Which one of the following is the wrong statement?

a. The Platform as a service includes the integration features, middleware, and several other orchestrations choreography
services to the IaaS model.
b. Hybrid Cloud Computing offers xaas or "anything as a service" as the delivery of IT as a service.

c. MaaS (or the Monitoring as a Service) is currently still an emerging piece of Cloud Jigsaw.

d. None of the mentioned

Hide Answer Workspace

Answer: C

Explanation: Monitoring as a service (or MaaS) provides the option of unloading a large portion of those costs from running as a
service as opposed to a complete investment in-home tool.

5) Which one of the following was owned by an organization that sells cloud services?

a. Hybrid

b. Private

c. Community

d. Public

Hide Answer Workspace

Answer: D

Explanation: The public Cloud is one of the cloud infrastructures that are available for public use as the alternative for the large
industry group.

6) Find out which one can be considered the complete operating environment with applications, management?

a. IaaS

b. SaaS

c. PaaS

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: In the Software as a Service model (the SAAS), the application is usually provided to the users through a thin client
interface.

7) Which one of the following is considered a type of cloud computing model involving the three different service models together?

a. CPI

b. SIP

c. SPI
d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: SPI is actually an acronym( or we can say the Short form of any words) for the most standard cloud computing services
models, such as the infrastructure as a Service, Platform as a Service, and Software as a Service.

8) The term "Caas" stands for_____ as a service?

a. Compliance as a service

b. Computer as a service

c. Community as a service

d. Communication as a service

Hide Answer Workspace

Answer: D

Explanation: The term "CAAS" stands for Communication as a service, which enables the clients to utilize resources like the Unified
Communications, and Enterprise Level PBX, VPNs, VoIP without the expense of hosting, purchasing, and maintaining the
infrastructure.

9) Which one of the following is a type of infrastructure as a service?

a. EC2

b. EC1

c. EC10

d. Hybrid

Hide Answer Workspace

Answer: A

Explanation: Amazon EC2 stands for the Amazon Elastic Compute Cloud that offers the scalable computing capacity in the AWS (or
Amazon Web Services) cloud to its clients. One can eliminate his investment in hardware upfront using the Amazon Elastic Compute
Cloud and boost the development and deployment application process.

Multiple-choice Questions based on the Advantages and Disadvantages of Cloud Computing

ADVERTISEMENT

1) Which one of the following was one of the top 5 cloud applications in late 2010?

a. Cloud backup

b. Web applications
c. Business applications

d. All of the mentioned

Hide Answer Workspace

Answer: D

Explanation: The economics of software delivery has been shifted in a significant manner, just like the music downloads has been
shifted the delivery of the music.

2) Which one of the following statements is not true?

a. Google's cloud involves approx ten data-centers in all over the world.

b. Data centers are sited in such a way that the overall system latency can be optimized.

c. The online shopping website, such as Flipkart.com, has the infrastructure built so that it can support the elastic demand so the
system will be capable of accommodating peak traffic.

d. All of the above

Hide Answer Workspace

Answer: B

Explanation: Data-centers can help lower land costs and reduce occupations.

3) Which of the following benefits is related to creating stored resources together in a system that supports multi-tenant use?

a. On-demand self-service

b. Extensive network access

c. Resource pooling

d. All of the above

Hide Answer Workspace

Answer: A

Explanation: The cloud service provider creates resources that support multi-tenant usage in a system.

4) Which one of the following is something that a user can obtain it under the contract from his/her vendor?

a. PoS

b. SoS

c. QoS

d. All of the mentioned


Hide Answer Workspace

Answer: C

Explanation: Usually, it totally depends on the type of services being offered. One can find that he/she does not require any software
or hardware licensees in order to implement his/her services.

5) All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.

a. Propagation

b. Latency

c. Noise

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: While cloud computing applications excel at large-scale processing tasks, if your application needs large amounts of
data transfer, cloud computing may not be the best model for you.

6) Which of the following architectural standards is working with the cloud computing industry?

a. Service-oriented architecture

b. Standardized Web services

c. Web-application frameworks

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: These standards help to enable different business models that cloud computing vendors can support, most notably
Software as a Service (SaaS), Web 2.0 applications, and utility computing. When your data travels over and rests on systems that are
no longer under your control, you have increased risk due to others' interception and malfeasance.

7) Which one of the following is the most important subject of concern in cloud computing?

a. Security

b. Storage

c. Scalability

d. All of the mentioned

Hide Answer Workspace

Answer: A
Explanation: When your data travels over and rests on systems that are no longer under your control, you have increased risk due to
others' interception and malfeasance.

8) You cannot rely on a cloud provider for maintaining its _____ in the event of government work.

a. Scalability

b. Reliability

c. Privacy

d. None of the mentioned

Hide Answer Workspace

Answer: C

Explanation: The Cloud computing industry continues to address security concerns.

9) _______ enables batch processing, which greatly speeds up high-processing applications.

ADVERTISEMENT

a. Scalability

b. Reliability

c. Elasticity

d. Utility

Hide Answer Workspace

Answer: A

Explanation: This feature obviates the need for planning and provisioning.

10) _______ feature allows you to optimize your system and capture all possible transactions.

a. Scalability

b. Reliability

c. Elasticity

d. none of the mentioned

Hide Answer Workspace

Answer: C

Explanation: You have the ability to right-size resources as required.


11) _______ is a pay-as-you-go model matches resources to need on an ongoing basis.

a. Utility

b. Elasticity

c. Low barrier to entry

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: This eliminates waste and has the added benefit of shifting risk from the client.

12) Which of the following is the most refined and restrictive service model?

a. IaaS

b. CaaS

c. PaaS

d. All of the mentioned

Hide Answer Workspace

Answer: C

Explanation: When the service requires the client to use a complete hardware/software/application stack, it is used the most refined
and restrictive service model.

13) When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.

a. SaaS

b. PaaS

c. IaaS

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Microsoft's Windows Azure Platform is best described as currently using the SaaS model.

14) Which one of the following is a false statement?

a. A cloud is defined as the combination of the infrastructure of a data-center with the ability to provision hardware and
software.
b. High touch applications are best done on-premises.

c. The Google App Engine follows IaaS.

d. None of the mentioned

Hide Answer Workspace

Answer: C

Explanation: The Google App Engine follows PaaS (or Platform as a service).

15) Service that generally focuses on the hardware follows which one of the following service models?

a. IaaS

b. CaaS

c. PaaS

d. All of the mentioned

Hide Answer Workspace

Answer: A

Explanation: Amazon web service follows the PaaS model.

16) Which of the following types of applications works with cloud computing that has low risks, low margins?

a. High touch

b. Low touch

c. Moderate touch

d. All of the mentioned

Hide Answer Workspace

Answer: B

Explanation: The "low touch" applications that come with low margins require committed resources and pose less risk.

17) Which one of the following statements is false?

a. Service Level Agreements (SLAs) is a small aspect of cloud computing.

b. Cloud computing does not have an impact on Software licensing.

c. Cloud computing present new opportunities to users and developers.

d. All of the mentioned

Hide Answer Workspace


Answer: C

Explanation: The answer will be the C because it is based on the paradigm of a shared multi-tenant utility.

18) Which one of the following is a special attribute of cloud computing?

a. utility type of delivery

b. elasticity

c. low barrier to entry

d. all of the mentioned

Hide Answer Workspace

Answer: C

Explanation: These attributes change how applications are created, priced, and delivered.

You might also like