Cloud Computing Solved MCQs for Engineering Set 2

mcques-cloud-computing-mcqs

1. A file in HDFS that is smaller than a single block size

A. cannot be stored in hdfs

B. occupies the full block\s size.

C. can span over multiple blocks

D. occupies only the size it needs and not thefull block

ANSWER: D. occupies only the size it needs and not thefull block

2. Which among the following are the duties of the NameNodes

A. manage file system namespace

B. it is responsible for storing actual data

C. perform read-write operation as per request for theclients

D. none of the above

ANSWER: A. manage file system namespace

3. If the IP address or hostname of a data node changes

A. the namenode updates the mapping between file name and block name

B. the data in that data node is lost forever

C. the namenode need not update mapping between file name and block name

D. there namenode has to be restarted

ANSWER: C. the namenode need not update mapping between file name and block name

4. For the frequently accessed HDFS files the blocks are cached in

A. the memory of thedata node

B. in the memory of thenamenode

C. both the above

D. none of the above

ANSWER: A. the memory of thedata node

5. Which scenario demands highest bandwidth for data transfer between nodes

A. different nodes on the same rack

B. nodes on differentracks in the same data center.

C. nodes in different data centers

D. data on the same node

ANSWER: C. nodes in different data centers

6. When a client contacts the namenode for accessing a file, the namenode responds with

A. size of the file requested

B. block id and hostname of all the data nodes containing that block

C. block id of the file requested

D. all of the above

ANSWER: B. block id and hostname of all the data nodes containing that block

7. In HDFS the files cannot be

A. read

B. deleted

C. executed

D. archived

ANSWER: C. executed

8. Which among the following is the duties of the Data Nodes

A. manage file system namespace

B. stores meta-data

C. regulates client’s access to files

D. perform read-write operation as per request for theclients

ANSWER: D. perform read-write operation as per request for theclients

9. NameNode and DataNode do communicate using

A. active pulse

B. heartbeats

C. h-signal

D. data pulse

ANSWER: B. heartbeats

10. Amazon EC2 provides virtual computing environments, known as :

A. chunks

B. instances

C. messages

D. none of the mentioned

ANSWER: B. instances

11. Data stored in                      domains doesn’t require maintenance of a schema.

A. simpledb

B. sql server

C. oracle

D. rds

ANSWER: A. simpledb

12. Which of the following is a system for creating block level storage devices thatcan be used for Amazon Machine Instances in EC2 ?

A. cloudwatch

B. amazon elastic blockstore

C. aws import/export

D. all of the mentioned

ANSWER: B. amazon elastic blockstore

13. Which of the following type of virtualization is also characteristic of cloudcomputing

A. storage

B. application

C. cpu

D. all of the mentioned

ANSWER: D. all of the mentioned

14. Which of the following is most important feature of cloud storage listed below?

A. logon authentication

B. bare file

C. multiplatformsupport

D. adequate bandwidth

ANSWER: A. logon authentication

15. Which of the following is open cloud storage management standard by SNIA ?

A. cdmi

B. occi

C. cea

D. adequate bandwidth

ANSWER: A. cdmi

16. Which of the following system does not provision storage to most users ?

A. paas

B. iaas

C. caas

D. saas

ANSWER: B. iaas

17. Which of the following service is provided by Google for online storage ?

A. drive

B. skydrive

C. dropbox

D. all of the mentioned

ANSWER: A. drive

18. Which of the following backup create a cloned copy of your current data ordrive ?

A. continuous dataprotection

B. open file backup

C. reverse delta backup

D. none of thementioned

ANSWER: A. continuous dataprotection

19. Which of the following storage devices exposes its storage to clients as Rawstorage that can be partitioned to create volumes ?

A. block

B. file

C. disk

D. all of the mentioned

ANSWER: A. block

20. Which of the following should be used considering factors shown in the figure?

A. simpledb

B. rds

C. amazon ec2

D. all of the mentioned

ANSWER: B. rds

21. Point out the wrong statement.

A. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

B. a number of tools are used to support ec2 services

C. amazon machine instances are sized at various levels and rented on a computing/hour basis

D. none of the mentioned

ANSWER: D. none of the mentioned

22. Which of the following is an edge-storage or content-delivery system thatcaches data in different physical locations?

A. amazon relationaldatabase service

B. amazon simpledb

C. amazon cloudfront

D. amazon associatesweb services

ANSWER: C. amazon cloudfront

23. Which of the following allows you to create instances of the MySQL databaseto support your Web sites?

A. amazon elasticcompute cloud

B. amazon simplequeue service

C. amazon relationaldatabase service

D. amazon simplestorage system

ANSWER: C. amazon relationaldatabase service

24. . Which of the following allows you to create instances of the MySQL databaseto support your Web sites?

A. amazon elasticcompute cloud

B. amazon simplequeue service

C. amazon relationaldatabase service

D. amazon simplestorage system

ANSWER: C. amazon relationaldatabase service

25. Point out the correct statement.

A. amazon elastic cloud is a system for creating virtualdisks(volume)

B. simpledb interoperates with both amazon ec2 andamazon s3

C. ec3 is an analytics as a service provider

D. none of the mentioned

ANSWER: B. simpledb interoperates with both amazon ec2 andamazon s3

26. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?

A. amazon elastic compute cloud

B. amazon associates web services

C. alexa web information service

D. all of the mentioned

ANSWER: B. amazon associates web services

27. Which of the following is a billing and account management service?

A. amazon elasticmapreduce

B. amazon mechanicalturk

C. amazon devpay

D. multi-factorauthentication

ANSWER: C. amazon devpay

28. Which of the following is not the feature of Network management systems?

A. accounting

B. security

C. performance

D. none of thementioned

ANSWER: D. none of thementioned

29. Which of the following service provider provides the least amount of built insecurity?

A. saas

B. paas

C. iaas

D. all of the mentioned

ANSWER: C. iaas

30. Point out the correct statement.

A. different types of cloud computing service models provide different levels of security services

B. adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required

C. data should be transferred and stored in an encrypted format for security purpose

D. all of the mentioned

ANSWER: D. all of the mentioned

31. Which of the following services that need to be negotiated in Service LevelAgreements?

A. logging

B. auditing

C. regulatorycompliance

D. all of the mentioned

ANSWER: D. all of the mentioned

32. The following flowchart is intended to evaluate                      in any cloud.

A. risk

B. errors

C. inconsistencies

D. none of the mentioned

ANSWER: A. risk

33. Point out the wrong statement.

A. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage

B. any distributed application has a much greater attack surface than an application that is closely held on alocal area network

C. cloud computing doesn’t have vulnerabilities associated with internet applications

D. all of the mentioned

ANSWER: C. cloud computing doesn’t have vulnerabilities associated with internet applications

34. Which of the following area of cloud computing is uniquely troublesome?

A. auditing

B. data integrity

C. e-discovery for legal compliance

D. all of the mentioned

ANSWER: D. All of the mentioned

35. Which of the following is the operational domain of CSA(Cloud SecurityAlliance)?

A. scalability

B. portability and interoperability

C. flexibility

D. none of the mentioned

ANSWER: B. portability and interoperability

36. Which of the following is considered an essential element in cloud computingby CSA?

A. multi-tenancy

B. identity and access management

C. virtualization

D. all of the mentioned

ANSWER: A. multi-tenancy

37. Which of the following is used for Web performance management and loadtesting?

A. vmware hyperic

B. webmetrics

C. univa ud

D. tapinsystems

ANSWER: B. webmetrics

38. Which of the following service provider provides the highest level of service?

A. saas

B. paas

C. iaas

D. all of the mentioned

ANSWER: A. saas

39. Point out the correct statement.

A. paas supplies the infrastructure

B. iaas adds application development frameworks, transactions, and control structures

C. saas is an operating environment with applications, management, and the user interface

D. all of the mentioned

ANSWER: C. saas is an operating environment with applications, management, and the user interface

40. Which of the following functional cloud computing hardware/software stackis the Cloud Reference Model?

A. cas

B. csa

C. sac

D. all of the mentioned

ANSWER: A. cas

41. For the                    model, the security boundary may be defined for thevendor to include the software framework and middleware layer.

A. saas

B. paas

C. iaas

D. all of the mentioned

ANSWER: B. paas

42. Which of the following model allows vendor to provide security as part of theService Level Agreement?

A. saas

B. paas

C. iaas

D. all of the mentioned

ANSWER: A. saas

43. Which of the following cloud does not require mapping?

A. public

B. private

C. hybrid

D. none of the mentioned

ANSWER: A. public

44. Which of the following service model is owned in terms of infrastructure byboth vendor and customer?

A. public

B. private

C. hybrid

D. none of the mentioned

ANSWER: C. hybrid

45. Which of the following model type is not trusted in terms of security?

A. public

B. private

C. hybrid

D. none of the mentioned

ANSWER: A. public

46. Which of the following has infrastructure security managed and owned bythe vendor?

A. hybrid

B. private/community

C. public

D. none of the mentioned

ANSWER: B. private/community

47. Point out the wrong statement.

A. each different type of cloud service delivery model creates a security boundary

B. any security mechanism below the security boundary must be built into the system

C. any security mechanism above the security boundary must be maintained by the customer

D. all of the mentioned

ANSWER: D. all of the mentioned

48.                        is an application for collecting messages sent in RSS and Atomformat from information providers.

A. google reader

B. yahoo mail

C. emailrackspace

D. all of the mentioned

ANSWER: A. google reader

49. Which of the following application is a newsreader?

A. google reader

B. bloglines

C. newsgator online

D. all of the mentioned

ANSWER: D. all of the mentioned

50. Which of the following was developed an alternative to XML syndication byIETF?

A. atom publishingprotocol

B. atom subscribing protocol

C. atom subscribe protocol

D. none of the mentioned

ANSWER: A. atom publishing protocol