McqMate
1. |
Cloud model relies on |
A. | communication api |
B. | middleware |
C. | web documents |
D. | embedded device |
Answer» A. communication api |
2. |
What widely used service is built on cloud-computing technology? |
A. | |
B. | skype |
C. | gmail |
D. | all of the above |
Answer» D. all of the above |
3. |
HTTP is a protocol |
A. | stateful |
B. | unidirectional |
C. | bidirectional |
D. | full dulpex |
Answer» B. unidirectional |
4. |
websocket is a Protocol |
A. | stateful |
B. | bidirectional |
C. | connection oriented |
D. | all of the above |
Answer» D. all of the above |
5. |
Websocket protocol uses which communication model |
A. | publish-subscribe |
B. | request response |
C. | push-pull |
D. | exclusive pair |
Answer» A. publish-subscribe |
6. |
Which of these techniques is vital for creating cloud-computing centers |
A. | virtualization |
B. | transubstantiation |
C. | cannibalization |
D. | insubordination |
Answer» A. virtualization |
7. |
An internal cloud is… |
A. | an overhanging threat |
B. | a career risk for a cio |
C. | a cloud that sits behind a corporate |
D. | the group of knowledge workers who use a social network for water- cooler gossip |
Answer» D. the group of knowledge workers who use a social network for water- cooler gossip |
8. |
Which of these is not an antecedent of the cloud? |
A. | software as a service |
B. | utility computing |
C. | grid computing |
D. | desktop computing |
Answer» D. desktop computing |
9. |
Which of the following subject area deals with pay-as-you-go usage model? |
A. | accounting management |
B. | compliance |
C. | data privacy |
D. | all of the mentioned |
Answer» A. accounting management |
10. |
Point out the correct statement |
A. | except for tightly managed saas cloud providers |
B. | cloud computing vendors run very reliable networks |
C. | the low barrier to entry cannot be accompanied by a low barrier to provisioning |
D. | all of the mentioned |
Answer» B. cloud computing vendors run very reliable networks |
11. |
captive requires that the cloud accommodate multiple compliance regimes. |
A. | licensed |
B. | policy-based |
C. | variable |
D. | all of the mentioned |
Answer» B. policy-based |
12. |
Security methods such as private encryption, VLANs and firewalls comes under subject area. |
A. | accounting management |
B. | compliance |
C. | data privacy |
D. | all of the mentioned |
Answer» C. data privacy |
13. |
Which of the following captive area deals with monitoring? |
A. | licensed |
B. | variable but under control |
C. | law |
D. | all of the mentioned |
Answer» B. variable but under control |
14. |
Network bottlenecks occur when data sets must be transferred |
A. | large |
B. | small |
C. | big |
D. | all of the mentioned |
Answer» A. large |
15. |
Amazon AWS Consists of following services |
A. | iaas |
B. | paas |
C. | saas |
D. | all of above |
Answer» D. all of above |
16. |
RDS is a type of database |
A. | sql |
B. | nonsql |
C. | simple storage |
D. | all of above |
Answer» A. sql |
17. |
Dynamodb is type of storage |
A. | nonsql |
B. | sql |
C. | simple storage |
D. | all of above |
Answer» A. nonsql |
18. |
Cloud are standardized in order to appeal to the majority of its audience. |
A. | svas |
B. | slas |
C. | sals |
D. | none of the mentioned |
Answer» B. slas |
19. |
The reputation for cloud computing services for the quality of those services is shared by |
A. | replicas |
B. | shards |
C. | tenants |
D. | all of the mentioned |
Answer» C. tenants |
20. |
is a function of the particular enterprise and application in an on- premises deployment. |
A. | vendor lock |
B. | vendor lock-in |
C. | vendor lock-ins |
D. | none of the mentioned |
Answer» B. vendor lock-in |
21. |
computing refers to applications and services that run on a distributed network using virtualized resources. |
A. | distributed |
B. | cloud |
C. | soft |
D. | parallel |
Answer» B. cloud |
22. |
. as a utility is a dream that dates from the beginning of the computing industry itself |
A. | model |
B. | computing |
C. | software |
D. | all of the mentioned |
Answer» B. computing |
23. |
Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on |
A. | iaas |
B. | paas |
C. | saas |
D. | all of the mentioned |
Answer» A. iaas |
24. |
Which of the following is essential concept related to Cloud? |
A. | reliability |
B. | productivity |
C. | abstraction |
D. | all of the mentioned |
Answer» C. abstraction |
25. |
Point out the wrong statement |
A. | applications benefit from deployment in the cloud |
B. | start very small and become big very fast |
C. | technology it is built on is evolutionary |
D. | none of the mentioned |
Answer» C. technology it is built on is evolutionary |
26. |
Which of the cloud concept is related to pooling and sharing of resources |
A. | polymorphism |
B. | abstraction |
C. | virtualization |
D. | none of the mentioned |
Answer» C. virtualization |
27. |
has many of the characteristics of what is now being called cloud computing |
A. | internet |
B. | softwares |
C. | web service |
D. | all of the mentioned |
Answer» A. internet |
28. |
Which of the following can be identified as cloud |
A. | web applications |
B. | intranet |
C. | hadoop |
D. | all of the mentioned |
Answer» C. hadoop |
29. |
Which of the following is the deployment model? |
A. | public |
B. | private |
C. | hybrid |
D. | all of the mentioned |
Answer» D. all of the mentioned |
30. |
Which of the following is best known service model? |
A. | saas |
B. | iaas |
C. | paas |
D. | all of the mentioned |
Answer» D. all of the mentioned |
31. |
Which of the following is the highest degree of integration in cloud computing? |
A. | saas |
B. | iaas |
C. | paas |
D. | all of the mentioned |
Answer» A. saas |
32. |
Which of the architectural layer is used as a front end in cloud computing? |
A. | client |
B. | cloud |
C. | soft |
D. | all of the mentioned |
Answer» A. client |
33. |
Which of the following benefit is provided by the PaaS service provider |
A. | a larger pool of qualified developers |
B. | more reliable operation |
C. | a logical design methodology |
D. | all of the mentioned |
Answer» D. all of the mentioned |
34. |
Communication between services is done widely using protocol |
A. | rest |
B. | soap |
C. | restful |
D. | none of the mentioned |
Answer» C. restful |
35. |
Which of the following provider rely on the virtual machine technology to deliver servers? |
A. | caas |
B. | aaas |
C. | paas |
D. | iaas |
Answer» D. iaas |
36. |
Which of the following component is called hypervisor? |
A. | vgm |
B. | vmc |
C. | vmm |
D. | all of the mentioned |
Answer» C. vmm |
37. |
Applications such as a Web server or database server that can run on a virtual machine image are referred to as |
A. | virtual server |
B. | virtual appliances |
C. | machine imaging |
D. | all of the mentioned |
Answer» B. virtual appliances |
38. |
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes. |
A. | ben |
B. | xen |
C. | ken |
D. | zen |
Answer» B. xen |
39. |
is a CPU emulator and virtual machine monitor |
A. | imaging |
B. | parallels |
C. | qemu |
D. | none of the mentioned |
Answer» C. qemu |
40. |
The source of HDFS architecture in Hadoop originated as |
A. | google distributed filesystem |
B. | yahoo distributed filesystem |
C. | facebook distributed filesystem |
D. | amazon s3 storage |
Answer» A. google distributed filesystem |
41. |
What is HDFS? |
A. | storage layer |
B. | batch processing engine |
C. | resource management layer |
D. | all of the above |
Answer» A. storage layer |
42. |
Which among the following command is used to copy a directory from one node to another in HDFS? |
A. | rcp |
B. | distcp |
C. | dcp |
D. | drcp |
Answer» B. distcp |
43. |
Which utility is used for checking the health of an HDFS file system? |
A. | fsck |
B. | fchk |
C. | fsch |
D. | fcks |
Answer» A. fsck |
44. |
Which among the following is the correct statement |
A. | datanode manage file system namespace |
B. | namenode stores metadata |
C. | namenode stores actual data |
D. | all of the above |
Answer» B. namenode stores metadata |
45. |
What is default replication factor? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 5 |
Answer» C. 3 |
46. |
The namenode knows that the data node is active using a mechanism known as |
A. | active pulse |
B. | data pulse |
C. | heartbeats |
D. | h-signal |
Answer» C. heartbeats |
47. |
What is the default size of HDFS Data Block? |
A. | 16mb |
B. | 32mb |
C. | 64mb |
D. | 128mb |
Answer» D. 128mb |
48. |
What is HDFS Block in Hadoop? |
A. | it is the logical representation of data |
B. | it is the physical representation of data |
C. | both the above |
D. | none of the above |
Answer» B. it is the physical representation of data |
49. |
Which of the following is the correct statement? |
A. | datanode is the slave/worker node and holds the user data in the form of data blocks |
B. | each incoming file is broken into 32 mb by defaul |
C. | namenode stores user data in the form of data blocks |
D. | none of the above |
Answer» A. datanode is the slave/worker node and holds the user data in the form of data blocks |
50. |
The need for data replication can arise in various scenarios like |
A. | replication factor is changed |
B. | datanode goes down |
C. | data blocks get corrupted |
D. | all of the above |
Answer» D. all of the above |
51. |
A file in HDFS that is smaller than a single block size |
A. | cannot be stored in hdfs |
B. | occupies the full block\s size. |
C. | can span over multiple blocks |
D. | occupies only the size it needs and not the full block |
Answer» D. occupies only the size it needs and not the full block |
52. |
Which among the following are the duties of the NameNodes |
A. | manage file system namespace |
B. | it is responsible for storing actual data |
C. | perform read-write operation as per request for the clients |
D. | none of the above |
Answer» A. manage file system namespace |
53. |
If the IP address or hostname of a data node changes |
A. | the namenode updates the mapping between file name and block name |
B. | the data in that data node is lost forever |
C. | the namenode need not update mapping between file name and block name |
D. | there namenode has to be restarted |
Answer» C. the namenode need not update mapping between file name and block name |
54. |
For the frequently accessed HDFS files the blocks are cached in |
A. | the memory of the data node |
B. | in the memory of the namenode |
C. | both the above |
D. | none of the above |
Answer» A. the memory of the data node |
55. |
Which scenario demands highest bandwidth for data transfer between nodes |
A. | different nodes on the same rack |
B. | nodes on different racks in the same data center. |
C. | nodes in different data centers |
D. | data on the same node |
Answer» C. nodes in different data centers |
56. |
When a client contacts the namenode for accessing a file, the namenode responds with |
A. | size of the file requested |
B. | block id and hostname of all the data nodes containing that block |
C. | block id of the file requested |
D. | all of the above |
Answer» B. block id and hostname of all the data nodes containing that block |
57. |
In HDFS the files cannot be |
A. | read |
B. | deleted |
C. | executed |
D. | archived |
Answer» C. executed |
58. |
Which among the following is the duties of the Data Nodes |
A. | manage file system namespace |
B. | stores meta-data |
C. | regulates client’s access to files |
D. | perform read-write operation as per request for the clients |
Answer» D. perform read-write operation as per request for the clients |
59. |
NameNode and DataNode do communicate using |
A. | active pulse |
B. | heartbeats |
C. | h-signal |
D. | data pulse |
Answer» B. heartbeats |
60. |
Amazon EC2 provides virtual computing environments, known as : |
A. | chunks |
B. | instances |
C. | messages |
D. | none of the mentioned |
Answer» B. instances |
61. |
Data stored in domains doesn’t require maintenance of a schema. |
A. | simpledb |
B. | sql server |
C. | oracle |
D. | rds |
Answer» A. simpledb |
62. |
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ? |
A. | cloudwatch |
B. | amazon elastic block store |
C. | aws import/export |
D. | all of the mentioned |
Answer» B. amazon elastic block store |
63. |
Which of the following type of virtualization is also characteristic of cloud computing |
A. | storage |
B. | application |
C. | cpu |
D. | all of the mentioned |
Answer» D. all of the mentioned |
64. |
Which of the following is most important feature of cloud storage listed below ? |
A. | logon authentication |
B. | bare file |
C. | multiplatform support |
D. | adequate bandwidth |
Answer» A. logon authentication |
65. |
Which of the following is open cloud storage management standard by SNIA ? |
A. | cdmi |
B. | occi |
C. | cea |
D. | adequate bandwidth |
Answer» A. cdmi |
66. |
Which of the following system does not provision storage to most users ? |
A. | paas |
B. | iaas |
C. | caas |
D. | saas |
Answer» B. iaas |
67. |
Which of the following service is provided by Google for online storage ? |
A. | drive |
B. | skydrive |
C. | dropbox |
D. | all of the mentioned |
Answer» A. drive |
68. |
Which of the following backup create a cloned copy of your current data or drive ? |
A. | continuous data protection |
B. | open file backup |
C. | reverse delta backup |
D. | none of the mentioned |
Answer» A. continuous data protection |
69. |
Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes ? |
A. | block |
B. | file |
C. | disk |
D. | all of the mentioned |
Answer» A. block |
70. |
Which of the following should be used considering factors shown in the figure? |
A. | simpledb |
B. | rds |
C. | amazon ec2 |
D. | all of the mentioned |
Answer» B. rds |
71. |
Point out the wrong statement. |
A. | the metrics obtained by cloudwatch may be used to enable a feature called auto scaling |
B. | a number of tools are used to support ec2 services |
C. | amazon machine instances are sized at various levels and rented on a computing/hour basis |
D. | none of the mentioned |
Answer» D. none of the mentioned |
72. |
Which of the following is an edge-storage or content-delivery system that caches data in different physical locations? |
A. | amazon relational database service |
B. | amazon simpledb |
C. | amazon cloudfront |
D. | amazon associates web services |
Answer» C. amazon cloudfront |
73. |
Which of the following allows you to create instances of the MySQL database to support your Web sites? |
A. | amazon elastic compute cloud |
B. | amazon simple queue service |
C. | amazon relational database service |
D. | amazon simple storage system |
Answer» C. amazon relational database service |
74. |
. Which of the following allows you to create instances of the MySQL database to support your Web sites? |
A. | amazon elastic compute cloud |
B. | amazon simple queue service |
C. | amazon relational database service |
D. | amazon simple storage system |
Answer» C. amazon relational database service |
75. |
Point out the correct statement. |
A. | amazon elastic cloud is a system for creating virtual disks(volume) |
B. | simpledb interoperates with both amazon ec2 and amazon s3 |
C. | ec3 is an analytics as a service provider |
D. | none of the mentioned |
Answer» B. simpledb interoperates with both amazon ec2 and amazon s3 |
76. |
Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function? |
A. | amazon elastic compute cloud |
B. | amazon associates web services |
C. | alexa web information service |
D. | all of the mentioned |
Answer» B. amazon associates web services |
77. |
Which of the following is a billing and account management service? |
A. | amazon elastic mapreduce |
B. | amazon mechanical turk |
C. | amazon devpay |
D. | multi-factor authentication |
Answer» C. amazon devpay |
78. |
Which of the following is not the feature of Network management systems? |
A. | accounting |
B. | security |
C. | performance |
D. | none of the mentioned |
Answer» D. none of the mentioned |
79. |
Which of the following service provider provides the least amount of built in security? |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» C. iaas |
80. |
Point out the correct statement. |
A. | different types of cloud computing service models provide different levels of security services |
B. | adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required |
C. | data should be transferred and stored in an encrypted format for security purpose |
D. | all of the mentioned |
Answer» D. all of the mentioned |
81. |
Which of the following services that need to be negotiated in Service Level Agreements? |
A. | logging |
B. | auditing |
C. | regulatory compliance |
D. | all of the mentioned |
Answer» D. all of the mentioned |
82. |
The following flowchart is intended to evaluate in any cloud. |
A. | risk |
B. | errors |
C. | inconsistencies |
D. | none of the mentioned |
Answer» A. risk |
83. |
Point out the wrong statement. |
A. | you can use proxy and brokerage services to separate clients from direct access to shared cloud storage |
B. | any distributed application has a much greater attack surface than an application that is closely held on a local area network |
C. | cloud computing doesn’t have vulnerabilities associated with internet applications |
D. | all of the mentioned |
Answer» C. cloud computing doesn’t have vulnerabilities associated with internet applications |
84. |
Which of the following area of cloud computing is uniquely troublesome? |
A. | auditing |
B. | data integrity |
C. | e-discovery for legal compliance |
D. | all of the mentioned |
Answer» D. all of the mentioned |
85. |
Which of the following is the operational domain of CSA(Cloud Security Alliance)? |
A. | scalability |
B. | portability and interoperability |
C. | flexibility |
D. | none of the mentioned |
Answer» B. portability and interoperability |
86. |
Which of the following is considered an essential element in cloud computing by CSA? |
A. | multi-tenancy |
B. | identity and access management |
C. | virtualization |
D. | all of the mentioned |
Answer» A. multi-tenancy |
87. |
Which of the following is used for Web performance management and load testing? |
A. | vmware hyperic |
B. | webmetrics |
C. | univa ud |
D. | tapinsystems |
Answer» B. webmetrics |
88. |
Which of the following service provider provides the highest level of service? |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» A. saas |
89. |
Point out the correct statement. |
A. | paas supplies the infrastructure |
B. | iaas adds application development frameworks, transactions, and control structures |
C. | saas is an operating environment with applications, management, and the user interface |
D. | all of the mentioned |
Answer» C. saas is an operating environment with applications, management, and the user interface |
90. |
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model? |
A. | cas |
B. | csa |
C. | sac |
D. | all of the mentioned |
Answer» A. cas |
91. |
For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer. |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» B. paas |
92. |
Which of the following model allows vendor to provide security as part of the Service Level Agreement? |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» A. saas |
93. |
Which of the following cloud does not require mapping? |
A. | public |
B. | private |
C. | hybrid |
D. | none of the mentioned |
Answer» A. public |
94. |
Which of the following service model is owned in terms of infrastructure by both vendor and customer? |
A. | public |
B. | private |
C. | hybrid |
D. | none of the mentioned |
Answer» C. hybrid |
95. |
Which of the following model type is not trusted in terms of security? |
A. | public |
B. | private |
C. | hybrid |
D. | none of the mentioned |
Answer» A. public |
96. |
Which of the following has infrastructure security managed and owned by the vendor? |
A. | hybrid |
B. | private/community |
C. | public |
D. | none of the mentioned |
Answer» B. private/community |
97. |
Point out the wrong statement. |
A. | each different type of cloud service delivery model creates a security boundary |
B. | any security mechanism below the security boundary must be built into the system |
C. | any security mechanism above the security boundary must be maintained by the customer |
D. | all of the mentioned |
Answer» D. all of the mentioned |
98. |
is an application for collecting messages sent in RSS and Atom format from information providers. |
A. | google reader |
B. | yahoo mail |
C. | emailrackspace |
D. | all of the mentioned |
Answer» A. google reader |
99. |
Which of the following application is a newsreader? |
A. | google reader |
B. | bloglines |
C. | newsgator online |
D. | all of the mentioned |
Answer» D. all of the mentioned |
100. |
Which of the following was developed an alternative to XML syndication by IETF? |
A. | atom publishing protocol |
B. | atom subscribing protocol |
C. | atom subscribe protocol |
D. | none of the mentioned |
Answer» A. atom publishing protocol |
Done Reading?