

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .
501. |
Which of the following is application and infrastructure management software for hybrid multi-clouds? |
A. | vmware hyperic |
B. | webmetrics |
C. | univa ud |
D. | tapinsystems |
Answer» C. univa ud |
502. |
Which of the following is a compliance standard? |
A. | pci-dss |
B. | hippa |
C. | glba |
D. | all of the mentioned |
Answer» D. all of the mentioned |
503. |
HTTP is a protocol |
A. | stateful |
B. | unidirectional |
C. | bidirectional |
D. | full dulpex |
Answer» B. unidirectional |
504. |
websocket is a Protocol |
A. | stateful |
B. | bidirectional |
C. | connection oriented |
D. | all of the above |
Answer» D. all of the above |
505. |
Which of the following subject area deals with pay-as-you-go usage model? |
A. | accounting management |
B. | compliance |
C. | data privacy |
D. | all of the mentioned |
Answer» A. accounting management |
506. |
Point out the correct statement |
A. | except for tightly managed saas cloud providers |
B. | cloud computing vendors run very reliable networks |
C. | the low barrier to entry cannot be accompanied by a low barrier to provisioning |
D. | all of the mentioned |
Answer» B. cloud computing vendors run very reliable networks |
507. |
captive requires that the cloud accommodate multiple compliance regimes. |
A. | licensed |
B. | policy-based |
C. | variable |
D. | all of the mentioned |
Answer» B. policy-based |
508. |
Security methods such as private encryption, VLANs and firewalls comes under subject area. |
A. | accounting management |
B. | compliance |
C. | data privacy |
D. | all of the mentioned |
Answer» C. data privacy |
509. |
Which of the following captive area deals with monitoring? |
A. | licensed |
B. | variable but under control |
C. | law |
D. | all of the mentioned |
Answer» B. variable but under control |
510. |
Network bottlenecks occur when data sets must be transferred |
A. | large |
B. | small |
C. | big |
D. | all of the mentioned |
Answer» A. large |
511. |
RDS is a type of database |
A. | sql |
B. | nonsql |
C. | simple storage |
D. | all of above |
Answer» A. sql |
512. |
Dynamodb is type of storage |
A. | nonsql |
B. | sql |
C. | simple storage |
D. | all of above |
Answer» A. nonsql |
513. |
Cloud are standardized in order to appeal to the majority of its audience. |
A. | svas |
B. | slas |
C. | sals |
D. | none of the mentioned |
Answer» B. slas |
514. |
The reputation for cloud computing services for the quality of those services is shared by |
A. | replicas |
B. | shards |
C. | tenants |
D. | all of the mentioned |
Answer» C. tenants |
515. |
is a function of the particular enterprise and application in an on- premises deployment. |
A. | vendor lock |
B. | vendor lock-in |
C. | vendor lock-ins |
D. | none of the mentioned |
Answer» B. vendor lock-in |
516. |
computing refers to applications and services that run on a distributed network using virtualized resources. |
A. | distributed |
B. | cloud |
C. | soft |
D. | parallel |
Answer» B. cloud |
517. |
. as a utility is a dream that dates from the beginning of the computing industry itself |
A. | model |
B. | computing |
C. | software |
D. | all of the mentioned |
Answer» B. computing |
518. |
Which of the cloud concept is related to pooling and sharing of resources |
A. | polymorphism |
B. | abstraction |
C. | virtualization |
D. | none of the mentioned |
Answer» C. virtualization |
519. |
has many of the characteristics of what is now being called cloud computing |
A. | internet |
B. | softwares |
C. | web service |
D. | all of the mentioned |
Answer» A. internet |
520. |
Which of the following is the highest degree of integration in cloud computing? |
A. | saas |
B. | iaas |
C. | paas |
D. | all of the mentioned |
Answer» A. saas |
521. |
Communication between services is done widely using protocol |
A. | rest |
B. | soap |
C. | restful |
D. | none of the mentioned |
Answer» C. restful |
522. |
Applications such as a Web server or database server that can run on a virtual machine image are referred to as |
A. | virtual server |
B. | virtual appliances |
C. | machine imaging |
D. | all of the mentioned |
Answer» B. virtual appliances |
523. |
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes. |
A. | ben |
B. | xen |
C. | ken |
D. | zen |
Answer» B. xen |
524. |
is a CPU emulator and virtual machine monitor |
A. | imaging |
B. | parallels |
C. | qemu |
D. | none of the mentioned |
Answer» C. qemu |
525. |
What is HDFS? |
A. | storage layer |
B. | batch processing engine |
C. | resource management layer |
D. | all of the above |
Answer» A. storage layer |
526. |
Which among the following command is used to copy a directory from one node to another in HDFS? |
A. | rcp |
B. | distcp |
C. | dcp |
D. | drcp |
Answer» B. distcp |
527. |
Which among the following is the correct statement |
A. | datanode manage file system namespace |
B. | namenode stores metadata |
C. | namenode stores actual data |
D. | all of the above |
Answer» B. namenode stores metadata |
528. |
The namenode knows that the data node is active using a mechanism known as |
A. | active pulse |
B. | data pulse |
C. | heartbeats |
D. | h-signal |
Answer» C. heartbeats |
529. |
What is HDFS Block in Hadoop? |
A. | it is the logical representation of data |
B. | it is the physical representation of data |
C. | both the above |
D. | none of the above |
Answer» B. it is the physical representation of data |
530. |
Which of the following is the correct statement? |
A. | datanode is the slave/worker node and holds the user data in the form of data blocks |
B. | each incoming file is broken into 32 mb by defaul |
C. | namenode stores user data in the form of data blocks |
D. | none of the above |
Answer» A. datanode is the slave/worker node and holds the user data in the form of data blocks |
531. |
The need for data replication can arise in various scenarios like |
A. | replication factor is changed |
B. | datanode goes down |
C. | data blocks get corrupted |
D. | all of the above |
Answer» D. all of the above |
532. |
A file in HDFS that is smaller than a single block size |
A. | cannot be stored in hdfs |
B. | occupies the full block\s size. |
C. | can span over multiple blocks |
D. | occupies only the size it needs and not the full block |
Answer» D. occupies only the size it needs and not the full block |
533. |
Which among the following are the duties of the NameNodes |
A. | manage file system namespace |
B. | it is responsible for storing actual data |
C. | perform read-write operation as per request for the clients |
D. | none of the above |
Answer» A. manage file system namespace |
534. |
For the frequently accessed HDFS files the blocks are cached in |
A. | the memory of the data node |
B. | in the memory of the namenode |
C. | both the above |
D. | none of the above |
Answer» A. the memory of the data node |
535. |
Which scenario demands highest bandwidth for data transfer between nodes |
A. | different nodes on the same rack |
B. | nodes on different racks in the same data center. |
C. | nodes in different data centers |
D. | data on the same node |
Answer» C. nodes in different data centers |
536. |
Which among the following is the duties of the Data Nodes |
A. | manage file system namespace |
B. | stores meta-data |
C. | regulates client’s access to files |
D. | perform read-write operation as per request for the clients |
Answer» D. perform read-write operation as per request for the clients |
537. |
Amazon EC2 provides virtual computing environments, known as : |
A. | chunks |
B. | instances |
C. | messages |
D. | none of the mentioned |
Answer» B. instances |
538. |
Data stored in domains doesn’t require maintenance of a schema. |
A. | simpledb |
B. | sql server |
C. | oracle |
D. | rds |
Answer» A. simpledb |
539. |
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ? |
A. | cloudwatch |
B. | amazon elastic block store |
C. | aws import/export |
D. | all of the mentioned |
Answer» B. amazon elastic block store |
540. |
Which of the following type of virtualization is also characteristic of cloud computing |
A. | storage |
B. | application |
C. | cpu |
D. | all of the mentioned |
Answer» D. all of the mentioned |
541. |
Which of the following is most important feature of cloud storage listed below ? |
A. | logon authentication |
B. | bare file |
C. | multiplatform support |
D. | adequate bandwidth |
Answer» A. logon authentication |
542. |
Which of the following backup create a cloned copy of your current data or drive ? |
A. | continuous data protection |
B. | open file backup |
C. | reverse delta backup |
D. | none of the mentioned |
Answer» A. continuous data protection |
543. |
Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes ? |
A. | block |
B. | file |
C. | disk |
D. | all of the mentioned |
Answer» A. block |
544. |
. Which of the following allows you to create instances of the MySQL database to support your Web sites? |
A. | amazon elastic compute cloud |
B. | amazon simple queue service |
C. | amazon relational database service |
D. | amazon simple storage system |
Answer» C. amazon relational database service |
545. |
Which of the following is not the feature of Network management systems? |
A. | accounting |
B. | security |
C. | performance |
D. | none of the mentioned |
Answer» D. none of the mentioned |
546. |
The following flowchart is intended to evaluate in any cloud. |
A. | risk |
B. | errors |
C. | inconsistencies |
D. | none of the mentioned |
Answer» A. risk |
547. |
Point out the wrong statement. |
A. | you can use proxy and brokerage services to separate clients from direct access to shared cloud storage |
B. | any distributed application has a much greater attack surface than an application that is closely held on a local area network |
C. | cloud computing doesn’t have vulnerabilities associated with internet applications |
D. | all of the mentioned |
Answer» C. cloud computing doesn’t have vulnerabilities associated with internet applications |
548. |
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model? |
A. | cas |
B. | csa |
C. | sac |
D. | all of the mentioned |
Answer» A. cas |
549. |
For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer. |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» B. paas |
550. |
Which of the following model allows vendor to provide security as part of the Service Level Agreement? |
A. | saas |
B. | paas |
C. | iaas |
D. | all of the mentioned |
Answer» A. saas |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.