1. Cloud model relies on
A. Communication API
B. Middleware
C. Web Documents
D. Embedded Device
ANSWER: A. Communication API
2. What widely used service is built on cloud-computing technology?
A. Twitter
B. Skype
C. Gmail
D. All of the above
ANSWER: D. All of the above
3. HTTP is a protocol
A. Stateful
B. Unidirectional
C. Bidirectional
D. Full Duplex
ANSWER: B. Unidirectional
4. Websocket is a Protocol
A. Stateful
B. Bidirectional
C. Connection oriented
D. All of the above
ANSWER: D. All of the above
5. Websocket protocol uses which communication model
A. Publish-Subscribe
B. Request-Response
C. Push-Pull
D. Exclusive pair
ANSWER: A. Publish-Subscribe
6. Which of these techniques is vital for creating cloud-computing centers
A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
ANSWER: A. Virtualization
7. An internal cloud is…
A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate
D. The group of knowledge workers who use a social network for water-cooler gossip
ANSWER: D. The group of knowledge workers who use a social network for water-cooler gossip
8. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Grid computing
D. Desktop computing
ANSWER: D. Desktop computing
9. Which of the following subject area deals with pay-as-you-go usage model?
A. Accounting Management
B. Compliance
C. Data privacy
D. All of the mentioned
ANSWER: A. Accounting Management
10. Point out the correct statement
A. Except for tightly managed saas cloud providers
B. Cloud computing vendors run very reliable networks
C. The low barrier to entry cannot be accompanied by a low barrier to provisioning
D. All of the mentioned
ANSWER: B. Cloud computing vendors run very reliable networks
11. captive requires that the cloud accommodate multiple complianceregimes.
A. Licensed
B. Policy-based
C. Variable
D. All of the mentioned
ANSWER: B. Policy-based
12. Security methods such as private encryption, VLANs and firewalls comesunder subject area.
A. Accounting Management
B. Compliance
C. Data privacy
D. All of the mentioned
ANSWER: C. Data privacy
13. Which of the following captive area deals with monitoring?
A. Licensed
B. Variable but under control
C. Law
D. All of the mentioned
ANSWER: B. Variable but under control
14. Network bottlenecks occur when data sets must be transferred
A. Large
B. Small
C. Big
D. All of the mentioned
ANSWER: A. Large
15. Amazon AWS Consists of following services
A. IaaS
B. PaaS
C. SaaS
D. All of above
ANSWER: D. All of above
16. RDS is a type of database
A. SQL
B. Non SQL
C. Simple Storage
D. All of above
ANSWER: A. SQL
17. Dynamodb is type of storage
A. Non SQL
B. SQL
C. Simple Storage
D. All of above
ANSWER: A. Non SQL
18. Cloud are standardized in order to appeal to the majority of itsaudience.
A. SVAS
B. SLAS
C. SALS
D. None of the mentioned
ANSWER: B. SLAS
19. The reputation for cloud computing services for the quality of those services isshared by
A. Replicas
B. Shards
C. Tenants
D. All of the mentioned
ANSWER: C. Tenants
20. is a function of the particular enterprise and application in an on-premises deployment.
A. Vendor lock
B. Vendor lock-in
C. Vendor lock-ins
D. None of the mentioned
ANSWER: B. Vendor lock-in
21. computing refers to applications and services that run on a distributed network using virtualized resources.
A. Distributed
B. Cloud
C. Soft
D. Parallel
ANSWER: B. Cloud
22. . as a utility is a dream that dates from the beginning of thecomputing industry itself
A. Model
B. Computing
C. Software
D. All of the mentioned
ANSWER: B. Computing
23. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on
A. IaaS
B. PaaS
C. SaaS
D. All of the mentioned
ANSWER: A. IaaS
24. Which of the following is essential concept related to Cloud?
A. Reliability
B. Productivity
C. Abstraction
D. All of the mentioned
ANSWER: C. Abstraction
25. Point out the wrong statement
A. Applications benefit from deployment in the cloud
B. Start very small and become big very fast
C. Technology it is built on is evolutionary
D. None of the mentioned
ANSWER: C. Technology it is built on is evolutionary
26. Which of the cloud concept is related to pooling and sharing of resources
A. Polymorphism
B. Abstraction
C. Virtualization
D. none of the mentioned
ANSWER: C. Virtualization
27. has many of the characteristics of what is now being called cloudcomputing
A. Internet
B. Softwares
C. Web service
D. All of the mentioned
ANSWER: A. Internet
28. Which of the following can be identified as cloud
A. Web applications
B. Intranet
C. Hadoop
D. All of the mentioned
ANSWER: C. Hadoop
29. Which of the following is the deployment model?
A. Public
B. Private
C. Hybrid
D. All of the mentioned
ANSWER: D. All of the mentioned
30. Which of the following is best known service model?
A. SaaS
B. IaaS
C. PaaS
D. All of the mentioned
ANSWER: D. All of the mentioned
31. Which of the following is the highest degree of integration in cloudcomputing?
A. SaaS
B. IaaS
C. PaaS
D. All of the mentioned
ANSWER: A. SaaS
32. Which of the architectural layer is used as a front end in cloud computing?
A. Client
B. Cloud
C. Soft
D. All of the mentioned
ANSWER: A. Client
33. Which of the following benefit is provided by the PaaS service provider
A. A larger pool of qualified developers
B. More reliable operation
C. A logical design methodology
D. All of the mentioned
ANSWER: D. All of the mentioned
34. Communication between services is done widely using protocol
A. REST
B. SOAP
C. Restful
D. None of the mentioned
ANSWER: C. Restful
35. Which of the following provider rely on the virtual machine technology to deliver servers?
A. CaaS
B. AaaS
C. PaaS
D. IaaS
ANSWER: D. IaaS
36. Which of the following component is called hypervisor?
A. VGM
B. VMC
C. VMM
D. All of the mentioned
ANSWER: C. VMM
37. Applications such as a Web server or database server that can run on a virtual machine image are referred to as
A. Virtual server
B. Virtual appliances
C. Machine imaging
D. All of the mentioned
ANSWER: B. Virtual appliances
38. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes.
A. Ben
B. Xen
C. Ken
D. Zen
ANSWER: B. Xen
39. is a CPU emulator and virtual machine monitor
A. Imaging
B. Parallels
C. Qemu
D. None of the mentioned
ANSWER: C. Qemu
40. The source of HDFS architecture in Hadoop originated as
A. Google distributed filesystem
B. Yahoo distributed filesystem
C. Facebook distributed filesystem
D. Amazon S3 storage
ANSWER: A. Google distributed filesystem
41. What is HDFS?
A. Storage layer
B. Batch processing engine
C. Resource management layer
D. All of the above
ANSWER: A. Storage layer
42. Which among the following command is used to copy a directory from onenode to another in HDFS?
A. RCP
B. DISTCP
C. DCP
D. DRCP
ANSWER: B. DISTCP
43. Which utility is used for checking the health of an HDFS file system?
A. fsck
B. fchk
C. fsch
D. fcks
ANSWER: A. fsck
44. Which among the following is the correct statement
A. Data node manage file system namespace
B. Namenode stores metadata
C. Namenode stores actual data
D. All of the above
ANSWER: B. Namenode stores metadata
45. What is default replication factor?
A. 1
B. 2
C. 3
D. 5
ANSWER: C. 3
46. The namenode knows that the data node is active using a mechanism knownas
A. Active pulse
B. Data pulse
C. Heartbeats
D. H-signal
ANSWER: C. Heartbeats
47. What is the default size of HDFS Data Block?
A. 16MB
B. 32MB
C. 64MB
D. 128MB
ANSWER: D. 128MB
48. What is HDFS Block in Hadoop?
A. It is the logicalrepresentation of data
B. It is the physicalrepresentation of data
C. Both the above
D. None of the above
ANSWER: B. It is the physicalrepresentation of data
49. Which of the following is the correct statement?
A. Data node is the slave/worker node and holds the user data in the form of data blocks
B. Each incoming file is broken into 32 mb by defaul
C. Namenode stores user data in the form of data blocks
D. None of the above
ANSWER: A. Data node is the slave/worker node and holds the user data in the form of data blocks
50. The need for data replication can arise in various scenarios like
A. Replication factor ischanged
B. Datanode goes down
C. Data blocks getcorrupted
D. All of the above
ANSWER: D. All of the above