1. Cloud model relies on

A. communication api

B. middleware

C. web documents

D. embedded device

 

A.communication api

 

2. What widely used service is built on cloud-computing technology?

A. twitter

B. skype

C. gmail

D. all of the above

 

D.all of the above

 

3. HTTP is a protocol

A. stateful

B. unidirectional

C. bidirectional

D. full dulpex

 

B.unidirectional

 

4. websocket is a         Protocol

A. stateful

B. bidirectional

C. connection oriented

D. all of the above

 

D.all of the above

 

5. Websocket protocol uses which communication model

A. publish-subscribe

B. request response

C. push-pull

D. exclusive pair

 

A.publish-subscribe

 

6. Which of these techniques is vital for creating cloud-computing centers

A. virtualization

B. transubstantiation

C. cannibalization

D. insubordination

 

A.virtualization

 

7. An internal cloud is…

A. an overhanging threat

B. a career risk for a cio

C. a cloud that sits behind a corporate

D. the group of knowledge workers who use a social network for water- cooler gossip

 

D.the group of knowledge workers who use a social network for water- cooler gossip

8. Which of these is not an antecedent of the cloud?

A. software as a service

B. utility computing

C. grid computing

D. desktop computing

 

D.desktop computing

 

9. Which of the following subject area deals with pay-as-you-go usage model?

A. accountingmanagement

B. compliance

C. data privacy

D. all of the mentioned

 

A.accountingmanagement

 

10. Point out the correct statement

A. except for tightly managed saas cloud providers

B. cloud computing vendors run very reliable networks

C. the low barrier to entry cannot be accompanied by a low barrier toprovisioning

D. all of the mentioned

 

B.cloud computing vendors run very reliable networks

 

11.                  captive requires that the cloud accommodate multiple complianceregimes.

A. licensed

B. policy-based

C. variable

D. all of the mentioned

 

B.policy-based

 

12. Security methods such as private encryption, VLANs and firewalls comesunder subject area.

A. accountingmanagement

B. compliance

C. data privacy

D. all of the mentioned

 

C.data privacy

 

13. Which of the following captive area deals with monitoring?

A. licensed

B. variable but undercontrol

C. law

D. all of the mentioned

 

B.variable but undercontrol

 

14. Network bottlenecks occur when              data sets must be transferred

A. large

B. small

C. big

D. all of the mentioned

 

A.large

 

15. Amazon AWS Consists of following services

A. iaas

B. paas

C. saas

D. all of above

 

D.all of above

 

16. RDS is a type of database

A. sql

B. nonsql

C. simple storage

D. all of above

 

A.sql

 

17. Dynamodb is type of storage

A. nonsql

B. sql

C. simple storage

D. all of above

 

A.nonsql

 

18. Cloud                  are standardized in order to appeal to the majority of itsaudience.

A. svas

B. slas

C. sals

D. none of thementioned

 

B.slas

 

19. The reputation for cloud computing services for the quality of those services isshared by

A. replicas

B. shards

C. tenants

D. all of the mentioned

 

C.tenants

 

20.                        is a function of the particular enterprise and application in an on-premises deployment.

A. vendor lock

B. vendor lock-in

C. vendor lock-ins

D. none of thementioned

 

B.vendor lock-in

 

21.                    computing refers to applications and services that run on a distributed network using virtualized resources.

A. distributed

B. cloud

C. soft

D. parallel

 

B.cloud

 

22. .                  as a utility is a dream that dates from the beginning of thecomputing industry itself

A. model

B. computing

C. software

D. all of the mentioned

 

B.computing

 

23. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

A. iaas

B. paas

C. saas

D. all of the mentioned

 

A.iaas

 

24. Which of the following is essential concept related to Cloud?

A. reliability

B. productivity

C. abstraction

D. all of the mentioned

 

C.abstraction

 

25. Point out the wrong statement

A. applications benefit from deployment in the cloud

B. start very small and become big very fast

C. technology it is built on is evolutionary

D. none of the mentioned

 

C.technology it is built on is evolutionary

 

26. Which of the cloud concept is related to pooling and sharing of resources

A. polymorphism

B. abstraction

C. virtualization

D. none of thementioned

 

C.virtualization

 

27.                  has many of the characteristics of what is now being called cloudcomputing

A. internet

B. softwares

C. web service

D. all of the mentioned

 

A.internet

 

28. Which of the following can be identified as cloud

A. web applications

B. intranet

C. hadoop

D. all of the mentioned

 

C.hadoop

 

29. Which of the following is the deployment model?

A. public

B. private

C. hybrid

D. all of the mentioned

 

D.all of the mentioned

 

30. Which of the following is best known service model?

A. saas

B. iaas

C. paas

D. all of the mentioned

 

D.all of the mentioned

 

31. Which of the following is the highest degree of integration in cloudcomputing?

A. saas

B. iaas

C. paas

D. all of the mentioned

 

A.saas

 

32. Which of the architectural layer is used as a front end in cloud computing?

A. client

B. cloud

C. soft

D. all of the mentioned

 

A.client

 

33. Which of the following benefit is provided by the PaaS service provider

A. a larger pool of qualified developers

B. more reliable operation

C. a logical design methodology

D. all of the mentioned

 

D.all of the mentioned

 

34. Communication between services is done widely using                protocol

A. rest

B. soap

C. restful

D. none of thementioned

 

C.restful

 

35. Which of the following provider rely on the virtual machine technology to deliver servers?

A. caas

B. aaas

C. paas

D. iaas

 

D.iaas

36. Which of the following component is called hypervisor?

A. vgm

B. vmc

C. vmm

D. all of the mentioned

 

C.vmm

 

37. Applications such as a Web server or database server that can run on a virtual machine image are referred to as      

A. virtual server

B. virtual appliances

C. machine imaging

D. all of the mentioned

 

B.virtual appliances

 

38. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of          nodes.

A. ben

B. xen

C. ken

D. zen

 

B.xen

 

39.                      is a CPU emulator and virtual machine monitor

A. imaging

B. parallels

C. qemu

D. none of the mentioned

 

C.qemu

 

40. The source of HDFS architecture in Hadoop originated as

A. google distributed filesystem

B. yahoo distributed filesystem

C. facebook distributed filesystem

D. amazon s3 storage

 

A.google distributed filesystem

 

41. What is HDFS?

A. storage layer

B. batch processingengine

C. resourcemanagement layer

D. all of the above

 

A.storage layer

 

42. Which among the following command is used to copy a directory from onenode to another in HDFS?

A. rcp

B. distcp

C. dcp

D. drcp

 

B.distcp

 

43. Which utility is used for checking the health of an HDFS file system?

A. fsck

B. fchk

C. fsch

D. fcks

 

A.fsck

 

44. Which among the following is the correct statement

A. datanode manage file systemnamespace

B. namenode stores metadata

C. namenode stores actual data

D. all of the above

 

B.namenode stores metadata

45. What is default replication factor?

A. 1

B. 2

C. 3

D. 5

 

C.3

46. The namenode knows that the data node is active using a mechanism knownas

A. active pulse

B. data pulse

C. heartbeats

D. h-signal

 

C.heartbeats

 

47. What is the default size of HDFS Data Block?

A. 16mb

B. 32mb

C. 64mb

D. 128mb

 

D.128mb

 

48. What is HDFS Block in Hadoop?

A. it is the logicalrepresentation of data

B. it is the physicalrepresentation of data

C. both the above

D. none of the above

 

B.it is the physicalrepresentation of data

 

49. Which of the following is the correct statement?

A. datanode is the slave/worker node and holds the user data in the form ofdata blocks

B. each incoming file is broken into 32 mb by defaul

C. namenode stores user data in the form of data blocks

D. none of the above

 

A.datanode is the slave/worker node and holds the user data in the form ofdata blocks

 

50. The need for data replication can arise in various scenarios like

A. replication factor ischanged

B. datanode goes down

C. data blocks getcorrupted

D. all of the above

 

D.all of the above

 51. A file in HDFS that is smaller than a single block size

A. cannot be stored in hdfs

B. occupies the full block\s size.

C. can span over multiple blocks

D. occupies only the size it needs and not thefull block

 

D.occupies only the size it needs and not thefull block

 

52. Which among the following are the duties of the NameNodes

A. manage file system namespace

B. it is responsible for storing actual data

C. perform read-write operation as per request for theclients

D. none of the above

 

A.manage file system namespace

 

53. If the IP address or hostname of a data node changes

A. the namenode updates the mapping between file name and block name

B. the data in that data node is lost forever

C. the namenode need not update mapping between file name and block name

D. there namenode has to be restarted

 

C.the namenode need not update mapping between file name and block name

 

54. For the frequently accessed HDFS files the blocks are cached in

A. the memory of thedata node

B. in the memory of thenamenode

C. both the above

D. none of the above

 

A.the memory of thedata node

 

55. Which scenario demands highest bandwidth for data transfer between nodes

A. different nodes on the same rack

B. nodes on differentracks in the same data center.

C. nodes in different data centers

D. data on the same node

 

C.nodes in different data centers

 

56. When a client contacts the namenode for accessing a file, the namenode responds with

A. size of the file requested

B. block id and hostname of all the data nodes containing that block

C. block id of the file requested

D. all of the above

 

B.block id and hostname of all the data nodes containing that block

 

57. In HDFS the files cannot be

A. read

B. deleted

C. executed

D. archived

 

C.executed

 

58. Which among the following is the duties of the Data Nodes

A. manage file system namespace

B. stores meta-data

C. regulates client’s access to files

D. perform read-write operation as per request for theclients

 

D.perform read-write operation as per request for theclients

 

59. NameNode and DataNode do communicate using

A. active pulse

B. heartbeats

C. h-signal

D. data pulse

 

B.heartbeats

 

60. Amazon EC2 provides virtual computing environments, known as :

A. chunks

B. instances

C. messages

D. none of thementioned

 

B.instances

61. Data stored in                      domains doesn’t require maintenance of a schema.

A. simpledb

B. sql server

C. oracle

D. rds

 

A.simpledb

 

62. Which of the following is a system for creating block level storage devices thatcan be used for Amazon Machine Instances in EC2 ?

A. cloudwatch

B. amazon elastic blockstore

C. aws import/export

D. all of the mentioned

 

B.amazon elastic blockstore

 

63. Which of the following type of virtualization is also characteristic of cloudcomputing

A. storage

B. application

C. cpu

D. all of the mentioned

 

D.all of the mentioned

64. Which of the following is most important feature of cloud storage listed below?

A. logon authentication

B. bare file

C. multiplatformsupport

D. adequate bandwidth

 

A.logon authentication

 

65. Which of the following is open cloud storage management standard by SNIA ?

A. cdmi

B. occi

C. cea

D. adequate bandwidth

 

A.cdmi

 

66. Which of the following system does not provision storage to most users ?

A. paas

B. iaas

C. caas

D. saas

 

B.iaas

 

67. Which of the following service is provided by Google for online storage ?

A. drive

B. skydrive

C. dropbox

D. all of the mentioned

 

A.drive

 

68. Which of the following backup create a cloned copy of your current data ordrive ?

A. continuous dataprotection

B. open file backup

C. reverse delta backup

D. none of thementioned

 

A.continuous dataprotection

 

69. Which of the following storage devices exposes its storage to clients as Rawstorage that can be partitioned to create volumes ?

A. block

B. file

C. disk

D. all of the mentioned

 

A.block

 

70. Which of the following should be used considering factors shown in the figure?

A. simpledb

B. rds

C. amazon ec2

D. all of the mentioned

 

B.rds

 

71. Point out the wrong statement.

A. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

B. a number of tools are used to support ec2 services

C. amazon machine instances are sized at various levels and rented on a computing/hour basis

D. none of the mentioned

 

D.none of the mentioned

 

72. Which of the following is an edge-storage or content-delivery system thatcaches data in different physical locations?

A. amazon relationaldatabase service

B. amazon simpledb

C. amazon cloudfront

D. amazon associatesweb services

 

C.amazon cloudfront

 

73. Which of the following allows you to create instances of the MySQL databaseto support your Web sites?

A. amazon elasticcompute cloud

B. amazon simplequeue service

C. amazon relationaldatabase service

D. amazon simplestorage system

 

C.amazon relationaldatabase service

 

74. . Which of the following allows you to create instances of the MySQL databaseto support your Web sites?

A. amazon elasticcompute cloud

B. amazon simplequeue service

C. amazon relationaldatabase service

D. amazon simplestorage system

 

C.amazon relationaldatabase service

 

75. Point out the correct statement.

A. amazon elastic cloud is a system for creating virtualdisks(volume)

B. simpledb interoperates with both amazon ec2 andamazon s3

C. ec3 is an analytics as a service provider

D. none of the mentioned

 

B.simpledb interoperates with both amazon ec2 andamazon s3

 

76. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?

A. amazon elastic compute cloud

B. amazon associates web services

C. alexa web information service

D. all of the mentioned

 

B.amazon associates web services

77. Which of the following is a billing and account management service?

A. amazon elasticmapreduce

B. amazon mechanicalturk

C. amazon devpay

D. multi-factorauthentication

 

C.amazon devpay

78. Which of the following is not the feature of Network management systems?

A. accounting

B. security

C. performance

D. none of thementioned

 

D.none of thementioned

79. Which of the following service provider provides the least amount of built insecurity?

A. saas

B. paas

C. iaas

D. all of the mentioned

 

C.iaas

80. Point out the correct statement.

A. different types of cloud computing service models provide different levels of security services

B. adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required

C. data should be transferred and stored in an encrypted format for security purpose

D. all of the mentioned

 

D.all of the mentioned

81. Which of the following services that need to be negotiated in Service LevelAgreements?

A. logging

B. auditing

C. regulatorycompliance

D. all of the mentioned

 

D.all of the mentioned

82. The following flowchart is intended to evaluate                      in any cloud.

A. risk

B. errors

C. inconsistencies

D. none of the mentioned

 

A.risk

83. Point out the wrong statement.

A. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage

B. any distributed application has a much greater attack surface than an application that is closely held on alocal area network

C. cloud computing doesn’t have vulnerabilities associated with internet applications

D. all of the mentioned

 

C.cloud computing doesn’t have vulnerabilities associated with internet applications

84. Which of the following area of cloud computing is uniquely troublesome?

A. auditing

B. data integrity

C. e-discovery for legalcompliance

D. all of the mentioned

 

D.all of the mentioned

85. Which of the following is the operational domain of CSA(Cloud SecurityAlliance)?

A. scalability

B. portability andinteroperability

C. flexibility

D. none of thementioned

 

B.portability andinteroperability

 101. How many technologies are used for most of the syndicated content on theInternet?

A. 1

B. 2

C. 3

D. 4

 

B.2

102. Which of the following technology is used for syndicated content?

A. ajax

B. rss

C. javascript

D. all of the mentioned

 

B.rss

103. The full form of AJAX is

A. asynchronousjavascript and xml

B. another java andxml library

C. abstract json andxml

D. none of thementioned

 

A.asynchronousjavascript and xml

104. The advantages of Ajax is                                

A. bandwidth utilization

B. more interactive

C. speeder retrieval ofdata

D. all of these

 

D.all of these

105. which of the following are the controls of Ajax?

A. scriptmanager

B. scriptmanagerproxy

C. updateprogress

D. all of the mentioned

 

D.all of the mentioned

106. Which of the following type of virtualization is also characteristic of cloudcomputing?

A. storage

B. application

C. cpu

D. all of the mentioned

 

D.all of the mentioned

107. Virtualization assigns a logical name for a physical resource and then provides a pointer tothat physical resource when a request is made

A. true

B. false

 

A.true

108. Virtual Machines (VMs) are offered in cloud by

A. saas

B. paas

C. iaas

D. none of these

 

C.iaas

109. The technology used to distribute service requests to resources is referred toas

A. load performing

B. load scheduling

C. load balancing

D. all of the mentioned

 

C.load balancing

110.                    computing refers to applications and services that run on a distributed networkusing virtualized resources.

A. distributed

B. cloud

C. soft

D. parallel

 

B.cloud

111. Cloud computing is an abstraction based on the notion of pooling physical resources andpresenting them as a                  resource.

A. real

B. virtual

C. cloud

D. none of the mentioned

 

B.virtual

112. Amazon’s Elastic Compute Cloud (EC2) is a well known .

A. virtual machine

B. cloud storage

C. paas

D. soa

 

A.virtual machine

113.                  virtualization abstracts networking hardware and software into avirtual network that can be managed.

A. storage

B. network

C. software

D. none of thementioned

 

B.network

114.                    is used by Amazon Web Services to store copies of a virtualmachine.

A. ami

B. emi

C. imi

D. application services

 

A.ami

115. In para-virtualization, VMs run on hypervisor that interacts with thehardware.

A. true

B. false

 

B.false

116. Which of the following provide system resource access to virtual machines ?

A. vmm

B. vmc

C. vnm

D. all of the mentioned

 

A.vmm

117. An operating system running on a Type      VM is a full virtualization.

A. 1

B. 2

C. 3

D. all of the mentioned

 

A.1

118. Point out the wrong statement.

A. in gmail, you can construct searches with multiple operators using the advanced search feature

B. rss and atom are prototypes of a class of xml specifications called synchronized markup languages

C. a typical rss document or feed contains text and metadata that can be used to indicate publication dates

D. none of the mentioned

 

B.rss and atom are prototypes of a class of xml specifications called synchronized markup languages

119. Which of the following file format is used by RSS module?

A. xml

B. smil

C. json

D. all of the mentioned

 

A.xml

120. What makes Ajax unique?

A. it works as a stand- alone web-development tool

B. it works the same with all webbrowsers

C. it uses c++ as its programminglanguage

D. it makes data requestsasynchronously

 

D.it makes data requestsasynchronously

121. JavaScript is also called server-side JavaScript.

A. microsoft

B. navigator

C. livewire

D. none

 

C.livewire

122. Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into aphysical storage address?

A. storage

B. network

C. software

D. none of the mentioned

 

A.storage

123. Point out the wrong statement.

A. a virtual network can create virtual network interfaces

B. instantiating a virtual machine is a very slow process

C. you can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtualmachines

D. all of the mentioned

 

B.instantiating a virtual machine is a very slow process

124. AMI(Amazon Machine Image) imaging service is provided by Amazon for

A. private use

B. public use

C. pay-per-use

D. all of the mentioned

 

D.all of the mentioned

125. Which of the following runs on Xen Hypervisor?

A. azure

B. aws ec2

C. aws ec3

D. all of the mentioned

 

B.aws ec2

 

 

 

 

2