1120+ Cloud Computing Solved MCQs

1.

Cloud model relies on

A. communication api
B. middleware
C. web documents
D. embedded device
Answer» A. communication api
2.

What widely used service is built on cloud-computing technology?

A. twitter
B. skype
C. gmail
D. all of the above
Answer» D. all of the above
3.

HTTP is a protocol

A. stateful
B. unidirectional
C. bidirectional
D. full dulpex
Answer» B. unidirectional
4.

websocket is a         Protocol

A. stateful
B. bidirectional
C. connection oriented
D. all of the above
Answer» D. all of the above
5.

Websocket protocol uses which communication model

A. publish-subscribe
B. request response
C. push-pull
D. exclusive pair
Answer» A. publish-subscribe
6.

Which of these techniques is vital for creating cloud-computing centers

A. virtualization
B. transubstantiation
C. cannibalization
D. insubordination
Answer» A. virtualization
7.

An internal cloud is…

A. an overhanging threat
B. a career risk for a cio
C. a cloud that sits behind a corporate
D. the group of knowledge workers who use a social network for water- cooler gossip
Answer» D. the group of knowledge workers who use a social network for water- cooler gossip
8.

Which of these is not an antecedent of the cloud?

A. software as a service
B. utility computing
C. grid computing
D. desktop computing
Answer» D. desktop computing
9.

Which of the following subject area deals with pay-as-you-go usage model?

A. accounting management
B. compliance
C. data privacy
D. all of the mentioned
Answer» A. accounting management
10.

Point out the correct statement

A. except for tightly managed saas cloud providers
B. cloud computing vendors run very reliable networks
C. the low barrier to entry cannot be accompanied by a low barrier to provisioning
D. all of the mentioned
Answer» B. cloud computing vendors run very reliable networks
11.

                 captive requires that the cloud accommodate multiple compliance regimes.

A. licensed
B. policy-based
C. variable
D. all of the mentioned
Answer» B. policy-based
12.

Security methods such as private encryption, VLANs and firewalls comes under subject area.

A. accounting management
B. compliance
C. data privacy
D. all of the mentioned
Answer» C. data privacy
13.

Which of the following captive area deals with monitoring?

A. licensed
B. variable but under control
C. law
D. all of the mentioned
Answer» B. variable but under control
14.

Network bottlenecks occur when              data sets must be transferred

A. large
B. small
C. big
D. all of the mentioned
Answer» A. large
15.

Amazon AWS Consists of following services

A. iaas
B. paas
C. saas
D. all of above
Answer» D. all of above
16.

RDS is a type of database

A. sql
B. nonsql
C. simple storage
D. all of above
Answer» A. sql
17.

Dynamodb is type of storage

A. nonsql
B. sql
C. simple storage
D. all of above
Answer» A. nonsql
18.

Cloud                  are standardized in order to appeal to the majority of its audience.

A. svas
B. slas
C. sals
D. none of the mentioned
Answer» B. slas
19.

The reputation for cloud computing services for the quality of those services is shared by

A. replicas
B. shards
C. tenants
D. all of the mentioned
Answer» C. tenants
20.

                       is a function of the particular enterprise and application in an on- premises deployment.

A. vendor lock
B. vendor lock-in
C. vendor lock-ins
D. none of the mentioned
Answer» B. vendor lock-in
21.

                   computing refers to applications and services that run on a distributed network using virtualized resources.

A. distributed
B. cloud
C. soft
D. parallel
Answer» B. cloud
22.

.                  as a utility is a dream that dates from the beginning of the computing industry itself

A. model
B. computing
C. software
D. all of the mentioned
Answer» B. computing
23.

Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

A. iaas
B. paas
C. saas
D. all of the mentioned
Answer» A. iaas
24.

Which of the following is essential concept related to Cloud?

A. reliability
B. productivity
C. abstraction
D. all of the mentioned
Answer» C. abstraction
25.

Point out the wrong statement

A. applications benefit from deployment in the cloud
B. start very small and become big very fast
C. technology it is built on is evolutionary
D. none of the mentioned
Answer» C. technology it is built on is evolutionary
26.

Which of the cloud concept is related to pooling and sharing of resources

A. polymorphism
B. abstraction
C. virtualization
D. none of the mentioned
Answer» C. virtualization
27.

                 has many of the characteristics of what is now being called cloud computing

A. internet
B. softwares
C. web service
D. all of the mentioned
Answer» A. internet
28.

Which of the following can be identified as cloud

A. web applications
B. intranet
C. hadoop
D. all of the mentioned
Answer» C. hadoop
29.

Which of the following is the deployment model?

A. public
B. private
C. hybrid
D. all of the mentioned
Answer» D. all of the mentioned
30.

Which of the following is best known service model?

A. saas
B. iaas
C. paas
D. all of the mentioned
Answer» D. all of the mentioned
31.

Which of the following is the highest degree of integration in cloud computing?

A. saas
B. iaas
C. paas
D. all of the mentioned
Answer» A. saas
32.

Which of the architectural layer is used as a front end in cloud computing?

A. client
B. cloud
C. soft
D. all of the mentioned
Answer» A. client
33.

Which of the following benefit is provided by the PaaS service provider

A. a larger pool of qualified developers
B. more reliable operation
C. a logical design methodology
D. all of the mentioned
Answer» D. all of the mentioned
34.

Communication between services is done widely using                protocol

A. rest
B. soap
C. restful
D. none of the mentioned
Answer» C. restful
35.

Which of the following provider rely on the virtual machine technology to deliver servers?

A. caas
B. aaas
C. paas
D. iaas
Answer» D. iaas
36.

Which of the following component is called hypervisor?

A. vgm
B. vmc
C. vmm
D. all of the mentioned
Answer» C. vmm
37.

Applications such as a Web server or database server that can run on a virtual machine image are referred to as      

A. virtual server
B. virtual appliances
C. machine imaging
D. all of the mentioned
Answer» B. virtual appliances
38.

Amazon Machine Images are virtual appliances that have been packaged to run on the grid of          nodes.

A. ben
B. xen
C. ken
D. zen
Answer» B. xen
39.

                     is a CPU emulator and virtual machine monitor

A. imaging
B. parallels
C. qemu
D. none of the mentioned
Answer» C. qemu
40.

The source of HDFS architecture in Hadoop originated as

A. google distributed filesystem
B. yahoo distributed filesystem
C. facebook distributed filesystem
D. amazon s3 storage
Answer» A. google distributed filesystem
41.

What is HDFS?

A. storage layer
B. batch processing engine
C. resource management layer
D. all of the above
Answer» A. storage layer
42.

Which among the following command is used to copy a directory from one node to another in HDFS?

A. rcp
B. distcp
C. dcp
D. drcp
Answer» B. distcp
43.

Which utility is used for checking the health of an HDFS file system?

A. fsck
B. fchk
C. fsch
D. fcks
Answer» A. fsck
44.

Which among the following is the correct statement

A. datanode manage file system namespace
B. namenode stores metadata
C. namenode stores actual data
D. all of the above
Answer» B. namenode stores metadata
45.

What is default replication factor?

A. 1
B. 2
C. 3
D. 5
Answer» C. 3
46.

The namenode knows that the data node is active using a mechanism known as

A. active pulse
B. data pulse
C. heartbeats
D. h-signal
Answer» C. heartbeats
47.

What is the default size of HDFS Data Block?

A. 16mb
B. 32mb
C. 64mb
D. 128mb
Answer» D. 128mb
48.

What is HDFS Block in Hadoop?

A. it is the logical representation of data
B. it is the physical representation of data
C. both the above
D. none of the above
Answer» B. it is the physical representation of data
49.

Which of the following is the correct statement?

A. datanode is the slave/worker node and holds the user data in the form of data blocks
B. each incoming file is broken into 32 mb by defaul
C. namenode stores user data in the form of data blocks
D. none of the above
Answer» A. datanode is the slave/worker node and holds the user data in the form of data blocks
50.

The need for data replication can arise in various scenarios like

A. replication factor is changed
B. datanode goes down
C. data blocks get corrupted
D. all of the above
Answer» D. all of the above
51.

A file in HDFS that is smaller than a single block size

A. cannot be stored in hdfs
B. occupies the full block\s size.
C. can span over multiple blocks
D. occupies only the size it needs and not the full block
Answer» D. occupies only the size it needs and not the full block
52.

Which among the following are the duties of the NameNodes

A. manage file system namespace
B. it is responsible for storing actual data
C. perform read-write operation as per request for the clients
D. none of the above
Answer» A. manage file system namespace
53.

If the IP address or hostname of a data node changes

A. the namenode updates the mapping between file name and block name
B. the data in that data node is lost forever
C. the namenode need not update mapping between file name and block name
D. there namenode has to be restarted
Answer» C. the namenode need not update mapping between file name and block name
54.

For the frequently accessed HDFS files the blocks are cached in

A. the memory of the data node
B. in the memory of the namenode
C. both the above
D. none of the above
Answer» A. the memory of the data node
55.

Which scenario demands highest bandwidth for data transfer between nodes

A. different nodes on the same rack
B. nodes on different racks in the same data center.
C. nodes in different data centers
D. data on the same node
Answer» C. nodes in different data centers
56.

When a client contacts the namenode for accessing a file, the namenode responds with

A. size of the file requested
B. block id and hostname of all the data nodes containing that block
C. block id of the file requested
D. all of the above
Answer» B. block id and hostname of all the data nodes containing that block
57.

In HDFS the files cannot be

A. read
B. deleted
C. executed
D. archived
Answer» C. executed
58.

Which among the following is the duties of the Data Nodes

A. manage file system namespace
B. stores meta-data
C. regulates client’s access to files
D. perform read-write operation as per request for the clients
Answer» D. perform read-write operation as per request for the clients
59.

NameNode and DataNode do communicate using

A. active pulse
B. heartbeats
C. h-signal
D. data pulse
Answer» B. heartbeats
60.

Amazon EC2 provides virtual computing environments, known as :

A. chunks
B. instances
C. messages
D. none of the mentioned
Answer» B. instances
61.

Data stored in                      domains doesn’t require maintenance of a schema.

A. simpledb
B. sql server
C. oracle
D. rds
Answer» A. simpledb
62.

Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

A. cloudwatch
B. amazon elastic block store
C. aws import/export
D. all of the mentioned
Answer» B. amazon elastic block store
63.

Which of the following type of virtualization is also characteristic of cloud computing

A. storage
B. application
C. cpu
D. all of the mentioned
Answer» D. all of the mentioned
64.

Which of the following is most important feature of cloud storage listed below ?

A. logon authentication
B. bare file
C. multiplatform support
D. adequate bandwidth
Answer» A. logon authentication
65.

Which of the following is open cloud storage management standard by SNIA ?

A. cdmi
B. occi
C. cea
D. adequate bandwidth
Answer» A. cdmi
66.

Which of the following system does not provision storage to most users ?

A. paas
B. iaas
C. caas
D. saas
Answer» B. iaas
67.

Which of the following service is provided by Google for online storage ?

A. drive
B. skydrive
C. dropbox
D. all of the mentioned
Answer» A. drive
68.

Which of the following backup create a cloned copy of your current data or drive ?

A. continuous data protection
B. open file backup
C. reverse delta backup
D. none of the mentioned
Answer» A. continuous data protection
69.

Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes ?

A. block
B. file
C. disk
D. all of the mentioned
Answer» A. block
70.

Which of the following should be used considering factors shown in the figure?

A. simpledb
B. rds
C. amazon ec2
D. all of the mentioned
Answer» B. rds
71.

Point out the wrong statement.

A. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling
B. a number of tools are used to support ec2 services
C. amazon machine instances are sized at various levels and rented on a computing/hour basis
D. none of the mentioned
Answer» D. none of the mentioned
72.

Which of the following is an edge-storage or content-delivery system that caches data in different physical locations?

A. amazon relational database service
B. amazon simpledb
C. amazon cloudfront
D. amazon associates web services
Answer» C. amazon cloudfront
73.

Which of the following allows you to create instances of the MySQL database to support your Web sites?

A. amazon elastic compute cloud
B. amazon simple queue service
C. amazon relational database service
D. amazon simple storage system
Answer» C. amazon relational database service
74.

. Which of the following allows you to create instances of the MySQL database to support your Web sites?

A. amazon elastic compute cloud
B. amazon simple queue service
C. amazon relational database service
D. amazon simple storage system
Answer» C. amazon relational database service
75.

Point out the correct statement.

A. amazon elastic cloud is a system for creating virtual disks(volume)
B. simpledb interoperates with both amazon ec2 and amazon s3
C. ec3 is an analytics as a service provider
D. none of the mentioned
Answer» B. simpledb interoperates with both amazon ec2 and amazon s3
76.

Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?

A. amazon elastic compute cloud
B. amazon associates web services
C. alexa web information service
D. all of the mentioned
Answer» B. amazon associates web services
77.

Which of the following is a billing and account management service?

A. amazon elastic mapreduce
B. amazon mechanical turk
C. amazon devpay
D. multi-factor authentication
Answer» C. amazon devpay
78.

Which of the following is not the feature of Network management systems?

A. accounting
B. security
C. performance
D. none of the mentioned
Answer» D. none of the mentioned
79.

Which of the following service provider provides the least amount of built in security?

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» C. iaas
80.

Point out the correct statement.

A. different types of cloud computing service models provide different levels of security services
B. adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
C. data should be transferred and stored in an encrypted format for security purpose
D. all of the mentioned
Answer» D. all of the mentioned
81.

Which of the following services that need to be negotiated in Service Level Agreements?

A. logging
B. auditing
C. regulatory compliance
D. all of the mentioned
Answer» D. all of the mentioned
82.

The following flowchart is intended to evaluate                      in any cloud.

A. risk
B. errors
C. inconsistencies
D. none of the mentioned
Answer» A. risk
83.

Point out the wrong statement.

A. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B. any distributed application has a much greater attack surface than an application that is closely held on a local area network
C. cloud computing doesn’t have vulnerabilities associated with internet applications
D. all of the mentioned
Answer» C. cloud computing doesn’t have vulnerabilities associated with internet applications
84.

Which of the following area of cloud computing is uniquely troublesome?

A. auditing
B. data integrity
C. e-discovery for legal compliance
D. all of the mentioned
Answer» D. all of the mentioned
85.

Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A. scalability
B. portability and interoperability
C. flexibility
D. none of the mentioned
Answer» B. portability and interoperability
86.

Which of the following is considered an essential element in cloud computing by CSA?

A. multi-tenancy
B. identity and access management
C. virtualization
D. all of the mentioned
Answer» A. multi-tenancy
87.

Which of the following is used for Web performance management and load testing?

A. vmware hyperic
B. webmetrics
C. univa ud
D. tapinsystems
Answer» B. webmetrics
88.

Which of the following service provider provides the highest level of service?

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» A. saas
89.

Point out the correct statement.

A. paas supplies the infrastructure
B. iaas adds application development frameworks, transactions, and control structures
C. saas is an operating environment with applications, management, and the user interface
D. all of the mentioned
Answer» C. saas is an operating environment with applications, management, and the user interface
90.

Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A. cas
B. csa
C. sac
D. all of the mentioned
Answer» A. cas
91.

For the                    model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» B. paas
92.

Which of the following model allows vendor to provide security as part of the Service Level Agreement?

A. saas
B. paas
C. iaas
D. all of the mentioned
Answer» A. saas
93.

Which of the following cloud does not require mapping?

A. public
B. private
C. hybrid
D. none of the mentioned
Answer» A. public
94.

Which of the following service model is owned in terms of infrastructure by both vendor and customer?

A. public
B. private
C. hybrid
D. none of the mentioned
Answer» C. hybrid
95.

Which of the following model type is not trusted in terms of security?

A. public
B. private
C. hybrid
D. none of the mentioned
Answer» A. public
96.

Which of the following has infrastructure security managed and owned by the vendor?

A. hybrid
B. private/community
C. public
D. none of the mentioned
Answer» B. private/community
97.

Point out the wrong statement.

A. each different type of cloud service delivery model creates a security boundary
B. any security mechanism below the security boundary must be built into the system
C. any security mechanism above the security boundary must be maintained by the customer
D. all of the mentioned
Answer» D. all of the mentioned
98.

                       is an application for collecting messages sent in RSS and Atom format from information providers.

A. google reader
B. yahoo mail
C. emailrackspace
D. all of the mentioned
Answer» A. google reader
99.

Which of the following application is a newsreader?

A. google reader
B. bloglines
C. newsgator online
D. all of the mentioned
Answer» D. all of the mentioned
100.

Which of the following was developed an alternative to XML syndication by IETF?

A. atom publishing protocol
B. atom subscribing protocol
C. atom subscribe protocol
D. none of the mentioned
Answer» A. atom publishing protocol
Tags
Question and answers in Cloud Computing, Cloud Computing multiple choice questions and answers, Cloud Computing Important MCQs, Solved MCQs for Cloud Computing, Cloud Computing MCQs with answers PDF download