Cloud Computing Solved MCQs for Engineering Set 1

mcques-cloud-computing-mcqs

1. Cloud model relies on

A. Communication API

B. Middleware

C. Web Documents

D. Embedded Device

ANSWER: A. Communication API

2. What widely used service is built on cloud-computing technology?

A. Twitter

B. Skype

C. Gmail

D. All of the above

ANSWER: D. All of the above

3. HTTP is a protocol

A. Stateful

B. Unidirectional

C. Bidirectional

D. Full Duplex

ANSWER: B. Unidirectional

4. Websocket is a         Protocol

A. Stateful

B. Bidirectional

C. Connection oriented

D. All of the above

ANSWER: D. All of the above

5. Websocket protocol uses which communication model

A. Publish-Subscribe

B. Request-Response

C. Push-Pull

D. Exclusive pair

ANSWER: A. Publish-Subscribe

6. Which of these techniques is vital for creating cloud-computing centers

A. Virtualization

B. Transubstantiation

C. Cannibalization

D. Insubordination

ANSWER: A. Virtualization

7. An internal cloud is…

A. An overhanging threat

B. A career risk for a CIO

C. A cloud that sits behind a corporate

D. The group of knowledge workers who use a social network for water-cooler gossip

ANSWER: D. The group of knowledge workers who use a social network for water-cooler gossip

8. Which of these is not an antecedent of the cloud?

A. Software as a service

B. Utility computing

C. Grid computing

D. Desktop computing

ANSWER: D. Desktop computing

9. Which of the following subject area deals with pay-as-you-go usage model?

A. Accounting Management

B. Compliance

C. Data privacy

D. All of the mentioned

ANSWER: A. Accounting Management

10. Point out the correct statement

A. Except for tightly managed saas cloud providers

B. Cloud computing vendors run very reliable networks

C. The low barrier to entry cannot be accompanied by a low barrier to provisioning

D. All of the mentioned

ANSWER: B. Cloud computing vendors run very reliable networks

11.                  captive requires that the cloud accommodate multiple complianceregimes.

A. Licensed

B. Policy-based

C. Variable

D. All of the mentioned

ANSWER: B. Policy-based

12. Security methods such as private encryption, VLANs and firewalls comesunder subject area.

A. Accounting Management

B. Compliance

C. Data privacy

D. All of the mentioned

ANSWER: C. Data privacy

13. Which of the following captive area deals with monitoring?

A. Licensed

B. Variable but under control

C. Law

D. All of the mentioned

ANSWER: B. Variable but under control

14. Network bottlenecks occur when              data sets must be transferred

A. Large

B. Small

C. Big

D. All of the mentioned

ANSWER: A. Large

15. Amazon AWS Consists of following services

A. IaaS

B. PaaS

C. SaaS

D. All of above

ANSWER: D. All of above

16. RDS is a type of database

A. SQL

B. Non SQL

C. Simple Storage

D. All of above

ANSWER: A. SQL

17. Dynamodb is type of storage

A. Non SQL

B. SQL

C. Simple Storage

D. All of above

ANSWER: A. Non SQL

18. Cloud                  are standardized in order to appeal to the majority of itsaudience.

A. SVAS

B. SLAS

C. SALS

D. None of the mentioned

ANSWER: B. SLAS

19. The reputation for cloud computing services for the quality of those services isshared by

A. Replicas

B. Shards

C. Tenants

D. All of the mentioned

ANSWER: C. Tenants

20.                        is a function of the particular enterprise and application in an on-premises deployment.

A. Vendor lock

B. Vendor lock-in

C. Vendor lock-ins

D. None of the mentioned

ANSWER: B. Vendor lock-in

21.                    computing refers to applications and services that run on a distributed network using virtualized resources.

A. Distributed

B. Cloud

C. Soft

D. Parallel

ANSWER: B. Cloud

22. .                  as a utility is a dream that dates from the beginning of thecomputing industry itself

A. Model

B. Computing

C. Software

D. All of the mentioned

ANSWER: B. Computing

23. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

A. IaaS

B. PaaS

C. SaaS

D. All of the mentioned

ANSWER: A. IaaS

24. Which of the following is essential concept related to Cloud?

A. Reliability

B. Productivity

C. Abstraction

D. All of the mentioned

ANSWER: C. Abstraction

25. Point out the wrong statement

A. Applications benefit from deployment in the cloud

B. Start very small and become big very fast

C. Technology it is built on is evolutionary

D. None of the mentioned

ANSWER: C. Technology it is built on is evolutionary

26. Which of the cloud concept is related to pooling and sharing of resources

A. Polymorphism

B. Abstraction

C. Virtualization

D. none of the mentioned

ANSWER: C. Virtualization

27.                  has many of the characteristics of what is now being called cloudcomputing

A. Internet

B. Softwares

C. Web service

D. All of the mentioned

ANSWER: A. Internet

28. Which of the following can be identified as cloud

A. Web applications

B. Intranet

C. Hadoop

D. All of the mentioned

ANSWER: C. Hadoop

29. Which of the following is the deployment model?

A. Public

B. Private

C. Hybrid

D. All of the mentioned

ANSWER: D. All of the mentioned

30. Which of the following is best known service model?

A. SaaS

B. IaaS

C. PaaS

D. All of the mentioned

ANSWER: D. All of the mentioned

31. Which of the following is the highest degree of integration in cloudcomputing?

A. SaaS

B. IaaS

C. PaaS

D. All of the mentioned

ANSWER: A. SaaS

32. Which of the architectural layer is used as a front end in cloud computing?

A. Client

B. Cloud

C. Soft

D. All of the mentioned

ANSWER: A. Client

33. Which of the following benefit is provided by the PaaS service provider

A. A larger pool of qualified developers

B. More reliable operation

C. A logical design methodology

D. All of the mentioned

ANSWER: D. All of the mentioned

34. Communication between services is done widely using                protocol

A. REST

B. SOAP

C. Restful

D. None of the mentioned

ANSWER: C. Restful

35. Which of the following provider rely on the virtual machine technology to deliver servers?

A. CaaS

B. AaaS

C. PaaS

D. IaaS

ANSWER: D. IaaS

36. Which of the following component is called hypervisor?

A. VGM

B. VMC

C. VMM

D. All of the mentioned

ANSWER: C. VMM

37. Applications such as a Web server or database server that can run on a virtual machine image are referred to as      

A. Virtual server

B. Virtual appliances

C. Machine imaging

D. All of the mentioned

ANSWER: B. Virtual appliances

38. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of          nodes.

A. Ben

B. Xen

C. Ken

D. Zen

ANSWER: B. Xen

39.                      is a CPU emulator and virtual machine monitor

A. Imaging

B. Parallels

C. Qemu

D. None of the mentioned

ANSWER: C. Qemu

40. The source of HDFS architecture in Hadoop originated as

A. Google distributed filesystem

B. Yahoo distributed filesystem

C. Facebook distributed filesystem

D. Amazon S3 storage

ANSWER: A. Google distributed filesystem

41. What is HDFS?

A. Storage layer

B. Batch processing engine

C. Resource management layer

D. All of the above

ANSWER: A. Storage layer

42. Which among the following command is used to copy a directory from onenode to another in HDFS?

A. RCP

B. DISTCP

C. DCP

D. DRCP

ANSWER: B. DISTCP

43. Which utility is used for checking the health of an HDFS file system?

A. fsck

B. fchk

C. fsch

D. fcks

ANSWER: A. fsck

44. Which among the following is the correct statement

A. Data node manage file system namespace

B. Namenode stores metadata

C. Namenode stores actual data

D. All of the above

ANSWER: B. Namenode stores metadata

45. What is default replication factor?

A. 1

B. 2

C. 3

D. 5

ANSWER: C. 3

46. The namenode knows that the data node is active using a mechanism knownas

A. Active pulse

B. Data pulse

C. Heartbeats

D. H-signal

ANSWER: C. Heartbeats

47. What is the default size of HDFS Data Block?

A. 16MB

B. 32MB

C. 64MB

D. 128MB

ANSWER: D. 128MB

48. What is HDFS Block in Hadoop?

A. It is the logicalrepresentation of data

B. It is the physicalrepresentation of data

C. Both the above

D. None of the above

ANSWER: B. It is the physicalrepresentation of data

49. Which of the following is the correct statement?

A. Data node is the slave/worker node and holds the user data in the form of data blocks

B. Each incoming file is broken into 32 mb by defaul

C. Namenode stores user data in the form of data blocks

D. None of the above

ANSWER: A. Data node is the slave/worker node and holds the user data in the form of data blocks

50. The need for data replication can arise in various scenarios like

A. Replication factor ischanged

B. Datanode goes down

C. Data blocks getcorrupted

D. All of the above

ANSWER: D. All of the above