McqMate
501. |
Which of the following is application and infrastructure management software for hybrid multi-clouds? |
A. | vmware hyperic |
B. | webmetrics |
C. | univa ud |
D. | tapinsystems |
Answer» C. univa ud |
502. |
Which of the following is a compliance standard? |
A. | pci-dss |
B. | hippa |
C. | glba |
D. | all of the mentioned |
Answer» D. all of the mentioned |
503. |
HTTP is a protocol |
A. | stateful |
B. | unidirectional |
C. | bidirectional |
D. | full dulpex |
Answer» B. unidirectional |
504. |
websocket is a Protocol |
A. | stateful |
B. | bidirectional |
C. | connection oriented |
D. | all of the above |
Answer» D. all of the above |
505. |
Which of the following subject area deals with pay-as-you-go usage model? |
A. | accounting management |
B. | compliance |
C. | data privacy |
D. | all of the mentioned |
Answer» A. accounting management |
506. |
Point out the correct statement |
A. | except for tightly managed saas cloud providers |
B. | cloud computing vendors run very reliable networks |
C. | the low barrier to entry cannot be accompanied by a low barrier to provisioning |
D. | all of the mentioned |
Answer» B. cloud computing vendors run very reliable networks |
507. |
captive requires that the cloud accommodate multiple compliance regimes. |
A. | licensed |
B. | policy-based |
C. | variable |
D. | all of the mentioned |
Answer» B. policy-based |
508. |
Security methods such as private encryption, VLANs and firewalls comes under subject area. |
A. | accounting management |
B. | compliance |
C. | data privacy |
D. | all of the mentioned |
Answer» C. data privacy |
509. |
Which of the following captive area deals with monitoring? |
A. | licensed |
B. | variable but under control |
C. | law |
D. | all of the mentioned |
Answer» B. variable but under control |
510. |
Network bottlenecks occur when data sets must be transferred |
A. | large |
B. | small |
C. | big |
D. | all of the mentioned |
Answer» A. large |
511. |
RDS is a type of database |
A. | sql |
B. | nonsql |
C. | simple storage |
D. | all of above |
Answer» A. sql |
512. |
Dynamodb is type of storage |
A. | nonsql |
B. | sql |
C. | simple storage |
D. | all of above |
Answer» A. nonsql |
513. |
Cloud are standardized in order to appeal to the majority of its audience. |
A. | svas |
B. | slas |
C. | sals |
D. | none of the mentioned |
Answer» B. slas |
514. |
The reputation for cloud computing services for the quality of those services is shared by |
A. | replicas |
B. | shards |
C. | tenants |
D. | all of the mentioned |
Answer» C. tenants |
515. |
is a function of the particular enterprise and application in an on- premises deployment. |
A. | vendor lock |
B. | vendor lock-in |
C. | vendor lock-ins |
D. | none of the mentioned |
Answer» B. vendor lock-in |
516. |
computing refers to applications and services that run on a distributed network using virtualized resources. |
A. | distributed |
B. | cloud |
C. | soft |
D. | parallel |
Answer» B. cloud |
517. |
. as a utility is a dream that dates from the beginning of the computing industry itself |
A. | model |
B. | computing |
C. | software |
D. | all of the mentioned |
Answer» B. computing |
518. |
Which of the cloud concept is related to pooling and sharing of resources |
A. | polymorphism |
B. | abstraction |
C. | virtualization |
D. | none of the mentioned |
Answer» C. virtualization |
519. |
has many of the characteristics of what is now being called cloud computing |
A. | internet |
B. | softwares |
C. | web service |
D. | all of the mentioned |
Answer» A. internet |
520. |
Which of the following is the highest degree of integration in cloud computing? |
A. | saas |
B. | iaas |
C. | paas |
D. | all of the mentioned |
Answer» A. saas |
521. |
Communication between services is done widely using protocol |
A. | rest |
B. | soap |
C. | restful |
D. | none of the mentioned |
Answer» C. restful |
522. |
Applications such as a Web server or database server that can run on a virtual machine image are referred to as |
A. | virtual server |
B. | virtual appliances |
C. | machine imaging |
D. | all of the mentioned |
Answer» B. virtual appliances |
523. |
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes. |
A. | ben |
B. | xen |
C. | ken |
D. | zen |
Answer» B. xen |
524. |
is a CPU emulator and virtual machine monitor |
A. | imaging |
B. | parallels |
C. | qemu |
D. | none of the mentioned |
Answer» C. qemu |
525. |
What is HDFS? |
A. | storage layer |
B. | batch processing engine |
C. | resource management layer |
D. | all of the above |
Answer» A. storage layer |
526. |
Which among the following command is used to copy a directory from one node to another in HDFS? |
A. | rcp |
B. | distcp |
C. | dcp |
D. | drcp |
Answer» B. distcp |
527. |
Which among the following is the correct statement |
A. | datanode manage file system namespace |
B. | namenode stores metadata |
C. | namenode stores actual data |
D. | all of the above |
Answer» B. namenode stores metadata |
528. |
The namenode knows that the data node is active using a mechanism known as |
A. | active pulse |
B. | data pulse |
C. | heartbeats |
D. | h-signal |
Answer» C. heartbeats |
529. |
What is HDFS Block in Hadoop? |
A. | it is the logical representation of data |
B. | it is the physical representation of data |
C. | both the above |
D. | none of the above |
Answer» B. it is the physical representation of data |
530. |
Which of the following is the correct statement? |
A. | datanode is the slave/worker node and holds the user data in the form of data blocks |
B. | each incoming file is broken into 32 mb by defaul |
C. | namenode stores user data in the form of data blocks |
D. | none of the above |
Answer» A. datanode is the slave/worker node and holds the user data in the form of data blocks |
531. |
The need for data replication can arise in various scenarios like |
A. | replication factor is changed |
B. | datanode goes down |
C. | data blocks get corrupted |
D. | all of the above |
Answer» D. all of the above |
532. |
A file in HDFS that is smaller than a single block size |
A. | cannot be stored in hdfs |
B. | occupies the full block\s size. |
C. | can span over multiple blocks |
D. | occupies only the size it needs and not the full block |
Answer» D. occupies only the size it needs and not the full block |
533. |
Which among the following are the duties of the NameNodes |
A. | manage file system namespace |
B. | it is responsible for storing actual data |
C. | perform read-write operation as per request for the clients |
D. | none of the above |
Answer» A. manage file system namespace |
534. |
For the frequently accessed HDFS files the blocks are cached in |
A. | the memory of the data node |
B. | in the memory of the namenode |
C. | both the above |
D. | none of the above |
Answer» A. the memory of the data node |
535. |
Which scenario demands highest bandwidth for data transfer between nodes |
A. | different nodes on the same rack |
B. | nodes on different racks in the same data center. |
C. | nodes in different data centers |
D. | data on the same node |
Answer» C. nodes in different data centers |
536. |
Which among the following is the duties of the Data Nodes |
A. | manage file system namespace |
B. | stores meta-data |
C. | regulates client’s access to files |
D. | perform read-write operation as per request for the clients |
Answer» D. perform read-write operation as per request for the clients |
537. |
Amazon EC2 provides virtual computing environments, known as : |
A. | chunks |
B. | instances |
C. | messages |
D. | none of the mentioned |
Answer» B. instances |
538. |
Data stored in domains doesn’t require maintenance of a schema. |
A. | simpledb |
B. | sql server |
C. | oracle |
D. | rds |
Answer» A. simpledb |
539. |
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ? |
A. | cloudwatch |
B. | amazon elastic block store |
C. | aws import/export |
D. | all of the mentioned |
Answer» B. amazon elastic block store |
540. |
Which of the following type of virtualization is also characteristic of cloud computing |
A. | storage |
B. | application |
C. | cpu |
D. | all of the mentioned |
Answer» D. all of the mentioned |
541. |
Which of the following is most important feature of cloud storage listed below ? |
A. | logon authentication |
B. | bare file |
C. | multiplatform support |
D. | adequate bandwidth |
Answer» A. logon authentication |
542. |
Which of the following backup create a cloned copy of your current data or drive ? |
A. | continuous data protection |
B. | open file backup |
C. | reverse delta backup |
D. | none of the mentioned |
Answer» A. continuous data protection |
543. |
Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes ? |
A. | block |
B. | file |
C. | disk |
D. | all of the mentioned |
Answer» A. block |
544. |
. Which of the following allows you to create instances of the MySQL database to support your Web sites? |
A. | amazon elastic compute cloud |
B. | amazon simple queue service |
C. | amazon relational database service |
D. | amazon simple storage system |
Answer» C. amazon relational database service |
545. |
Which of the following is not the feature of Network management systems? |
A. | accounting |
B. | security |
C. | performance |
D. | none of the mentioned |
Answer» D. none of the mentioned |
546. |
The following flowchart is intended to evaluate in any cloud. |
A. | risk |
B. | errors |
C. | inconsistencies |
D. | none of the mentioned |
Answer» A. risk |
547. |
Point out the wrong statement. |
A. | you can use proxy and brokerage services to separate clients from direct access to shared cloud storage |
B. | any distributed application has a much greater attack surface than an application that is closely held on a local area network |
C. | cloud computing doesn’t have vulnerabilities associated with internet applications |
D. | all of the mentioned |
Answer» C. cloud computing doesn’t have vulnerabilities associated with internet applications |
548. |
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model? |
A. | cas |
B. | csa |
C. | sac |
D. | all of the mentioned |
Answer» A. cas |
549. |
For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer. |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» B. paas |
550. |
Which of the following model allows vendor to provide security as part of the Service Level Agreement? |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» A. saas |
551. |
Which of the following cloud does not require mapping? |
A. | public |
B. | private |
C. | hybrid |
D. | none of the mentioned |
Answer» A. public |
552. |
Which of the following service model is owned in terms of infrastructure by both vendor and customer? |
A. | public |
B. | private |
C. | hybrid |
D. | none of the mentioned |
Answer» C. hybrid |
553. |
Which of the following model type is not trusted in terms of security? |
A. | public |
B. | private |
C. | hybrid |
D. | none of the mentioned |
Answer» A. public |
554. |
Which of the following has infrastructure security managed and owned by the vendor? |
A. | hybrid |
B. | private/community |
C. | public |
D. | none of the mentioned |
Answer» B. private/community |
555. |
Point out the wrong statement. |
A. | each different type of cloud service delivery model creates a security boundary |
B. | any security mechanism below the security boundary must be built into the system |
C. | any security mechanism above the security boundary must be maintained by the customer |
D. | all of the mentioned |
Answer» D. all of the mentioned |
556. |
is an application for collecting messages sent in RSS and Atom format from information providers. |
A. | google reader |
B. | yahoo mail |
C. | emailrackspace |
D. | all of the mentioned |
Answer» A. google reader |
557. |
Which of the following was developed an alternative to XML syndication by IETF? |
A. | atom publishing protocol |
B. | atom subscribing protocol |
C. | atom subscribe protocol |
D. | none of the mentioned |
Answer» A. atom publishing protocol |
558. |
How many technologies are used for most of the syndicated content on the Internet? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
559. |
The full form of AJAX is |
A. | asynchronous javascript and xml |
B. | another java and xml library |
C. | abstract json and xml |
D. | none of the mentioned |
Answer» A. asynchronous javascript and xml |
560. |
The advantages of Ajax is |
A. | bandwidth utilization |
B. | more interactive |
C. | speeder retrieval of data |
D. | all of these |
Answer» D. all of these |
561. |
The technology used to distribute service requests to resources is referred to as |
A. | load performing |
B. | load scheduling |
C. | load balancing |
D. | all of the mentioned |
Answer» C. load balancing |
562. |
computing refers to applications and services that run on a distributed network using virtualized resources. |
A. | distributed |
B. | cloud |
C. | soft |
D. | parallel |
Answer» B. cloud |
563. |
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a resource. |
A. | real |
B. | virtual |
C. | cloud |
D. | none of the mentioned |
Answer» B. virtual |
564. |
Amazon’s Elastic Compute Cloud (EC2) is a well known . |
A. | virtual machine |
B. | cloud storage |
C. | paas |
D. | soa |
Answer» A. virtual machine |
565. |
virtualization abstracts networking hardware and software into a virtual network that can be managed. |
A. | storage |
B. | network |
C. | software |
D. | none of the mentioned |
Answer» B. network |
566. |
is used by Amazon Web Services to store copies of a virtual machine. |
A. | ami |
B. | emi |
C. | imi |
D. | application services |
Answer» A. ami |
567. |
In para-virtualization, VMs run on hypervisor that interacts with the hardware. |
A. | true |
B. | false |
Answer» B. false |
568. |
An operating system running on a Type VM is a full virtualization. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | all of the mentioned |
Answer» A. 1 |
569. |
What makes Ajax unique? |
A. | it works as a stand- alone web- development tool |
B. | it works the same with all web browsers |
C. | it uses c++ as its programming language |
D. | it makes data requests asynchronously |
Answer» D. it makes data requests asynchronously |
570. |
JavaScript is also called server-side JavaScript. |
A. | microsoft |
B. | navigator |
C. | livewire |
D. | none |
Answer» C. livewire |
571. |
Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address? |
A. | storage |
B. | network |
C. | software |
D. | none of the mentioned |
Answer» A. storage |
572. |
Point out the wrong statement. |
A. | a virtual network can create virtual network interfaces |
B. | instantiating a virtual machine is a very slow process |
C. | you can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtual machines |
D. | all of the mentioned |
Answer» B. instantiating a virtual machine is a very slow process |
573. |
AMI(Amazon Machine Image) imaging service is provided by Amazon for |
A. | private use |
B. | public use |
C. | pay-per-use |
D. | all of the mentioned |
Answer» D. all of the mentioned |
574. |
Amazon Web Services (AWS) is an example of |
A. | software as a service (saas) |
B. | infrastructure as a service (iaas) |
C. | platform as a service (paas) |
D. | none of the mentioned |
Answer» B. infrastructure as a service (iaas) |
575. |
Which of the following is Type 1 Hypervisor ? |
A. | wind river simics |
B. | virtual server 2005 r2 |
C. | kvm |
D. | lynxsecure |
Answer» D. lynxsecure |
576. |
In the virtual machine simulates hardware, so it can be independent of the underlying system hardware. |
A. | paravirtualization |
B. | full virtualization |
C. | emulation |
D. | none of the mentioned |
Answer» C. emulation |
577. |
In a scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware. |
A. | paravirtualization |
B. | full virtualization |
C. | emulation |
D. | none of the mentioned |
Answer» B. full virtualization |
578. |
Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request iii) VM in operation iv) VM Provision |
A. | ii, i, iii, iv |
B. | i, ii, iii & iv |
C. | ii, iii, iv & i |
D. | ii, iv, iii & i |
Answer» D. ii, iv, iii & i |
579. |
Which type of Hypervisor is shown in the following figure ? |
A. | type 1 |
B. | type 2 |
C. | type 3 |
D. | all of the mentioned |
Answer» B. type 2 |
580. |
where a VM can be moved from one physical machine to another even as it continues to execute. |
A. | load balancing |
B. | migration |
C. | live migration |
D. | server consolidation |
Answer» C. live migration |
581. |
Point out the wrong statement : |
A. | load balancing virtualizes systems and resources by mapping a logical address to a physical address |
B. | multiple instances of various google applications are running on different hosts |
C. | google uses hardware virtualization |
D. | all of the mentioned |
Answer» C. google uses hardware virtualization |
582. |
Which of the following should be placed in second lowermost layer for the following figure ? |
A. | host operating system |
B. | software |
C. | vm |
D. | none of the mentioned |
Answer» A. host operating system |
583. |
Point out the wrong statement : |
A. | some hypervisors are installed over an operating system and are referred to as type 2 or hosted vm |
B. | all cpus support virtual machines |
C. | on a type 2 vm, a software interface is created that emulates the devices with which a system would normally interact |
D. | all of the mentioned |
Answer» B. all cpus support virtual machines |
584. |
Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V ? |
A. | paravirtualization |
B. | full virtualization |
C. | emulation |
D. | none of the mentioned |
Answer» A. paravirtualization |
585. |
Point out the wrong statement : |
A. | full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm |
B. | guest operating systems in full virtualization systems are generally faster than other virtualization schemes |
C. | a process virtual machine instantiates when a command begins a process |
D. | all of the mentioned |
Answer» A. full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm |
586. |
Which of the following operating system support operating system virtualization ? |
A. | windows nt |
B. | sun solaris |
C. | windows xp |
D. | compliance |
Answer» B. sun solaris |
587. |
In multiple VM processing, CPU is alloted to the different processes in form of: |
A. | space slices by the os |
B. | different cpus are allocated to different processes |
C. | time slices by the os |
D. | frequecy slices by the os |
Answer» A. space slices by the os |
588. |
Point out the wrong statement. |
A. | between fba and fws, you can create a nearly virtual store on amazon.com |
B. | amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio |
C. | fps is exposed as an api that sorts transactions into packages called quick starts that makes it easy to implement |
D. | none of the mentioned |
Answer» B. amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio |
589. |
Which of the following is a method for bidding on unused EC2 capacity based on the current spot price? |
A. | on-demand instance |
B. | reserved instances |
C. | spot instance |
D. | all of the mentioned |
Answer» C. spot instance |
590. |
Which of the following instance has an hourly rate with no long-term commitment? |
A. | on-demand instance |
B. | reserved instances |
C. | spot instance |
D. | all of the mentioned |
Answer» A. on-demand instance |
591. |
Which of the following tool is used for measuring I/O of your systems to estimate these transaction costs? |
A. | ebs |
B. | iostat |
C. | esw |
D. | all of the mentioned |
Answer» B. iostat |
592. |
Point out the wrong statement. |
A. | the cost of creating an ebs volume is lesser than creating a similarly sized s3 bucket |
B. | an ebs volume can be used as an instance boot partition |
C. | ebs boot partitions can be stopped and started, and they offer fast ami boot times |
D. | none of the mentioned |
Answer» A. the cost of creating an ebs volume is lesser than creating a similarly sized s3 bucket |
593. |
Amazon EMR uses Hadoop processing combined with several products. |
A. | aws |
B. | asq |
C. | amr |
D. | awes |
Answer» A. aws |
594. |
What is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm. |
A. | azure |
B. | ec2 |
C. | ec5 |
D. | none of the mentioned |
Answer» B. ec2 |
595. |
is the central application in the AWS portfolio. |
A. | amazon simple queue service |
B. | amazon elastic compute cloud |
C. | amazon simple notification service |
D. | all of the above |
Answer» B. amazon elastic compute cloud |
596. |
Point out the correct statement. |
A. | sql server is having enormous impact on cloud computing |
B. | amazon.com’s services represent the largest pure infrastructure as a service (iaas) |
C. | ec2 is a platform as a service (paas) market |
D. | none of the mentioned |
Answer» B. amazon.com’s services represent the largest pure infrastructure as a service (iaas) |
597. |
Which of the following provides access for developers to charge Amazon’s customers for their purchases? |
A. | fws |
B. | fas |
C. | fps |
D. | all of the mentioned |
Answer» C. fps |
598. |
Which of the following uses an authentication device? |
A. | amazon elastic mapreduce |
B. | amazon mechanical turk |
C. | amazon devpay |
D. | multi-factor authentication |
Answer» D. multi-factor authentication |
599. |
Which of the following is a batch processing application? |
A. | ibm smash |
B. | ibm websphere application server |
C. | condor |
D. | windows media server |
Answer» C. condor |
600. |
Amazon cloud-based storage system allows you to store data objects ranging in size from 1 byte up to 5GB. |
A. | s1 |
B. | s2 |
C. | s3 |
D. | s4 |
Answer» C. s3 |
Done Reading?