1.
Cloud model relies on
A. communication
api
B. middleware
C. web documents
D. embedded
device
A.communication api
2.
What widely used service is built on cloud-computing technology?
A. twitter
B. skype
C. gmail
D. all of the
above
D.all of the above
3.
HTTP is a protocol
A. stateful
B. unidirectional
C. bidirectional
D. full dulpex
B.unidirectional
4.
websocket is a Protocol
A. stateful
B. bidirectional
C. connection
oriented
D. all of the
above
D.all of the above
5.
Websocket protocol uses which communication model
A. publish-subscribe
B. request
response
C. push-pull
D. exclusive pair
A.publish-subscribe
6.
Which of these techniques is vital for creating cloud-computing centers
A. virtualization
B. transubstantiation
C. cannibalization
D. insubordination
A.virtualization
7.
An internal cloud is…
A. an overhanging
threat
B. a career risk
for a cio
C. a cloud that
sits behind a corporate
D. the group of
knowledge workers who use a social network for water- cooler gossip
D.the group of
knowledge workers who use a social network for water- cooler gossip
8.
Which of these is not an antecedent of the cloud?
A. software as a
service
B. utility
computing
C. grid computing
D. desktop
computing
D.desktop computing
9.
Which of the following subject area deals with pay-as-you-go usage model?
A. accountingmanagement
B. compliance
C. data privacy
D. all of the
mentioned
A.accountingmanagement
10.
Point out the correct statement
A. except for
tightly managed saas cloud providers
B. cloud
computing vendors run very reliable networks
C. the low
barrier to entry cannot be accompanied by a low barrier toprovisioning
D. all of the
mentioned
B.cloud computing
vendors run very reliable networks
11.
captive
requires that the cloud accommodate multiple complianceregimes.
A. licensed
B. policy-based
C. variable
D. all of the
mentioned
B.policy-based
12.
Security methods such as private encryption, VLANs and firewalls comesunder
subject area.
A. accountingmanagement
B. compliance
C. data privacy
D. all of the
mentioned
C.data privacy
13.
Which of the following captive area deals with monitoring?
A. licensed
B. variable but
undercontrol
C. law
D. all of the
mentioned
B.variable but
undercontrol
14.
Network bottlenecks occur when
data
sets must be transferred
A. large
B. small
C. big
D. all of the
mentioned
A.large
15.
Amazon AWS Consists of following services
A. iaas
B. paas
C. saas
D. all of above
D.all of above
16.
RDS is a type of database
A. sql
B. nonsql
C. simple storage
D. all of above
A.sql
17.
Dynamodb is type of storage
A. nonsql
B. sql
C. simple storage
D. all of above
A.nonsql
18.
Cloud
are
standardized in order to appeal to the majority of itsaudience.
A. svas
B. slas
C. sals
D. none of
thementioned
B.slas
19.
The reputation for cloud computing services for the quality of those services
isshared by
A. replicas
B. shards
C. tenants
D. all of the
mentioned
C.tenants
20.
is
a function of the particular enterprise and application in an on-premises
deployment.
A. vendor lock
B. vendor lock-in
C. vendor
lock-ins
D. none of
thementioned
B.vendor lock-in
21.
computing
refers to applications and services that run on a distributed network using
virtualized resources.
A. distributed
B. cloud
C. soft
D. parallel
B.cloud
22.
.
as
a utility is a dream that dates from the beginning of thecomputing industry
itself
A. model
B. computing
C. software
D. all of the
mentioned
B.computing
23.
Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on
A. iaas
B. paas
C. saas
D. all of the
mentioned
A.iaas
24.
Which of the following is essential concept related to Cloud?
A. reliability
B. productivity
C. abstraction
D. all of the
mentioned
C.abstraction
25.
Point out the wrong statement
A. applications
benefit from deployment in the cloud
B. start very
small and become big very fast
C. technology it
is built on is evolutionary
D. none of the
mentioned
C.technology it is
built on is evolutionary
26. Which of
the cloud concept is related to pooling and sharing of resources
A. polymorphism
B. abstraction
C. virtualization
D. none of
thementioned
C.virtualization
27.
has
many of the characteristics of what is now being called cloudcomputing
A. internet
B. softwares
C. web service
D. all of the
mentioned
A.internet
28. Which of
the following can be identified as cloud
A. web
applications
B. intranet
C. hadoop
D. all of the
mentioned
C.hadoop
29. Which of
the following is the deployment model?
A. public
B. private
C. hybrid
D. all of the
mentioned
D.all of the mentioned
30. Which of
the following is best known service model?
A. saas
B. iaas
C. paas
D. all of the
mentioned
D.all of the mentioned
31. Which of
the following is the highest degree of integration in cloudcomputing?
A. saas
B. iaas
C. paas
D. all of the
mentioned
A.saas
32. Which of
the architectural layer is used as a front end in cloud computing?
A. client
B. cloud
C. soft
D. all of the
mentioned
A.client
33. Which of
the following benefit is provided by the PaaS service provider
A. a larger pool
of qualified developers
B. more reliable
operation
C. a logical
design methodology
D. all of the
mentioned
D.all of the mentioned
34.
Communication between services is done widely using
protocol
A. rest
B. soap
C. restful
D. none of
thementioned
C.restful
35. Which of
the following provider rely on the virtual machine technology to deliver
servers?
A. caas
B. aaas
C. paas
D. iaas
D.iaas
36. Which of
the following component is called hypervisor?
A. vgm
B. vmc
C. vmm
D. all of the
mentioned
C.vmm
37.
Applications such as a Web server or database server that can run on a virtual
machine image are referred to as
A. virtual server
B. virtual
appliances
C. machine
imaging
D. all of the
mentioned
B.virtual appliances
38. Amazon
Machine Images are virtual appliances that have been packaged to run on the
grid of nodes.
A. ben
B. xen
C. ken
D. zen
B.xen
39.
is
a CPU emulator and virtual machine monitor
A. imaging
B. parallels
C. qemu
D. none of the
mentioned
C.qemu
40. The source of HDFS
architecture in Hadoop originated as
A. google distributed
filesystem
B. yahoo distributed
filesystem
C. facebook distributed
filesystem
D. amazon s3 storage
A.google distributed filesystem
41. What is HDFS?
A. storage layer
B. batch
processingengine
C. resourcemanagement
layer
D. all of the above
A.storage layer
42. Which among the
following command is used to copy a directory from onenode to another in HDFS?
A. rcp
B. distcp
C. dcp
D. drcp
B.distcp
43. Which utility is
used for checking the health of an HDFS file system?
A. fsck
B. fchk
C. fsch
D. fcks
A.fsck
44. Which among the
following is the correct statement
A. datanode manage file
systemnamespace
B. namenode stores
metadata
C. namenode stores
actual data
D. all of the above
B.namenode stores metadata
45. What is default
replication factor?
A. 1
B. 2
C. 3
D. 5
C.3
46. The namenode knows
that the data node is active using a mechanism knownas
A. active pulse
B. data pulse
C. heartbeats
D. h-signal
C.heartbeats
47. What is the default
size of HDFS Data Block?
A. 16mb
B. 32mb
C. 64mb
D. 128mb
D.128mb
48. What is HDFS Block
in Hadoop?
A. it is the
logicalrepresentation of data
B. it is the
physicalrepresentation of data
C. both the above
D. none of the above
B.it is the physicalrepresentation of data
49. Which of the
following is the correct statement?
A. datanode is the
slave/worker node and holds the user data in the form ofdata blocks
B. each incoming file is
broken into 32 mb by defaul
C. namenode stores user
data in the form of data blocks
D. none of the above
A.datanode is the slave/worker node and
holds the user data in the form ofdata blocks
50. The need for data
replication can arise in various scenarios like
A. replication factor
ischanged
B. datanode goes down
C. data blocks
getcorrupted
D. all of the above
D.all of the above
A. cannot be
stored in hdfs
B. occupies the
full block\s size.
C. can span over
multiple blocks
D. occupies only
the size it needs and not thefull block
D.occupies only the
size it needs and not thefull block
52.
Which among the following are the duties of the NameNodes
A. manage file
system namespace
B. it is
responsible for storing actual data
C. perform
read-write operation as per request for theclients
D. none of the
above
A.manage file system
namespace
53.
If the IP address or hostname of a data node changes
A. the namenode
updates the mapping between file name and block name
B. the data in
that data node is lost forever
C. the namenode
need not update mapping between file name and block name
D. there namenode
has to be restarted
C.the namenode need
not update mapping between file name and block name
54.
For the frequently accessed HDFS files the blocks are cached in
A. the memory of
thedata node
B. in the memory
of thenamenode
C. both the above
D. none of the
above
A.the memory of
thedata node
55.
Which scenario demands highest bandwidth for data transfer between nodes
A. different
nodes on the same rack
B. nodes on
differentracks in the same data center.
C. nodes in
different data centers
D. data on the
same node
C.nodes in different
data centers
56.
When a client contacts the namenode for accessing a file, the namenode responds
with
A. size of the
file requested
B. block id and
hostname of all the data nodes containing that block
C. block id of
the file requested
D. all of the
above
B.block id and
hostname of all the data nodes containing that block
57.
In HDFS the files cannot be
A. read
B. deleted
C. executed
D. archived
C.executed
58.
Which among the following is the duties of the Data Nodes
A. manage file
system namespace
B. stores
meta-data
C. regulates
client’s access to files
D. perform
read-write operation as per request for theclients
D.perform read-write
operation as per request for theclients
59.
NameNode and DataNode do communicate using
A. active pulse
B. heartbeats
C. h-signal
D. data pulse
B.heartbeats
60.
Amazon EC2 provides virtual computing environments, known as :
A. chunks
B. instances
C. messages
D. none of
thementioned
B.instances
61.
Data stored in
domains
doesn’t require maintenance of a schema.
A. simpledb
B. sql server
C. oracle
D. rds
A.simpledb
62.
Which of the following is a system for creating block level storage devices
thatcan be used for Amazon Machine Instances in EC2 ?
A. cloudwatch
B. amazon elastic
blockstore
C. aws
import/export
D. all of the
mentioned
B.amazon elastic
blockstore
63.
Which of the following type of virtualization is also characteristic of
cloudcomputing
A. storage
B. application
C. cpu
D. all of the
mentioned
D.all of the mentioned
64.
Which of the following is most important feature of cloud storage listed below?
A. logon
authentication
B. bare file
C. multiplatformsupport
D. adequate
bandwidth
A.logon authentication
65. Which of the following is open cloud storage management
standard by SNIA ?
A. cdmi
B. occi
C. cea
D. adequate
bandwidth
A.cdmi
66. Which of the following system does not provision storage
to most users ?
A. paas
B. iaas
C. caas
D. saas
B.iaas
67. Which of the following service is provided by Google for
online storage ?
A. drive
B. skydrive
C. dropbox
D. all
of the mentioned
A.drive
68. Which of the following backup create a cloned copy of
your current data ordrive ?
A. continuous
dataprotection
B. open
file backup
C. reverse
delta backup
D. none
of thementioned
A.continuous
dataprotection
69. Which of the following storage devices exposes its
storage to clients as Rawstorage that can be partitioned to create volumes ?
A. block
B. file
C. disk
D. all
of the mentioned
A.block
70. Which of the following should be used considering factors
shown in the figure?
A. simpledb
B. rds
C. amazon
ec2
D. all
of the mentioned
B.rds
71. Point out the wrong statement.
A. the
metrics obtained by cloudwatch may be used to enable a feature called auto
scaling
B. a
number of tools are used to support ec2 services
C. amazon
machine instances are sized at various levels and rented on a computing/hour
basis
D. none
of the mentioned
D.none
of the mentioned
72. Which of the following is an edge-storage or
content-delivery system thatcaches data in different physical locations?
A. amazon
relationaldatabase service
B. amazon
simpledb
C. amazon
cloudfront
D. amazon
associatesweb services
C.amazon
cloudfront
73. Which of the following allows you to create instances of
the MySQL databaseto support your Web sites?
A. amazon
elasticcompute cloud
B. amazon
simplequeue service
C. amazon
relationaldatabase service
D. amazon
simplestorage system
C.amazon
relationaldatabase service
74. . Which of the following allows you to create instances
of the MySQL databaseto support your Web sites?
A. amazon
elasticcompute cloud
B. amazon
simplequeue service
C. amazon
relationaldatabase service
D. amazon
simplestorage system
C.amazon
relationaldatabase service
75. Point out the correct statement.
A. amazon
elastic cloud is a system for creating virtualdisks(volume)
B. simpledb
interoperates with both amazon ec2 andamazon s3
C. ec3
is an analytics as a service provider
D. none
of the mentioned
B.simpledb
interoperates with both amazon ec2 andamazon s3
76.
Which of the following is the machinery for interacting with Amazon’s vast
product data and eCommerce catalog function?
A. amazon elastic
compute cloud
B. amazon
associates web services
C. alexa web
information service
D. all of the
mentioned
B.amazon associates
web services
77.
Which of the following is a billing and account management service?
A. amazon
elasticmapreduce
B. amazon
mechanicalturk
C. amazon devpay
D. multi-factorauthentication
C.amazon devpay
78.
Which of the following is not the feature of Network management systems?
A. accounting
B. security
C. performance
D. none of
thementioned
D.none of thementioned
79.
Which of the following service provider provides the least amount of built
insecurity?
A. saas
B. paas
C. iaas
D. all of the
mentioned
C.iaas
80.
Point out the correct statement.
A. different
types of cloud computing service models provide different levels of security
services
B. adapting your
on- premises systems to a cloud model requires that you determine what security
mechanisms are required
C. data should be
transferred and stored in an encrypted format for security purpose
D. all of the
mentioned
D.all of the mentioned
81.
Which of the following services that need to be negotiated in Service
LevelAgreements?
A. logging
B. auditing
C. regulatorycompliance
D. all of the
mentioned
D.all of the mentioned
82.
The following flowchart is intended to evaluate
in
any cloud.
A. risk
B. errors
C. inconsistencies
D. none of the
mentioned
A.risk
83.
Point out the wrong statement.
A. you can use
proxy and brokerage services to separate clients from direct access to shared
cloud storage
B. any
distributed application has a much greater attack surface than an application
that is closely held on alocal area network
C. cloud
computing doesn’t have vulnerabilities associated with internet applications
D. all of the
mentioned
C.cloud computing
doesn’t have vulnerabilities associated with internet applications
84.
Which of the following area of cloud computing is uniquely troublesome?
A. auditing
B. data integrity
C. e-discovery
for legalcompliance
D. all of the
mentioned
D.all of the mentioned
85.
Which of the following is the operational domain of CSA(Cloud
SecurityAlliance)?
A. scalability
B. portability
andinteroperability
C. flexibility
D. none of
thementioned
B.portability
andinteroperability
A. 1
B. 2
C. 3
D. 4
B.2
102.
Which of the following technology is used for syndicated content?
A. ajax
B. rss
C. javascript
D. all of the
mentioned
B.rss
103. The full form of AJAX is
A. asynchronousjavascript
and xml
B. another
java andxml library
C. abstract
json andxml
D. none
of thementioned
A.asynchronousjavascript
and xml
104. The advantages of Ajax is
A. bandwidth
utilization
B. more
interactive
C. speeder
retrieval ofdata
D. all
of these
D.all
of these
105. which of the following are the controls of Ajax?
A. scriptmanager
B. scriptmanagerproxy
C. updateprogress
D. all
of the mentioned
D.all
of the mentioned
106. Which of the following type of virtualization is also
characteristic of cloudcomputing?
A. storage
B. application
C. cpu
D. all
of the mentioned
D.all
of the mentioned
107. Virtualization assigns a logical name for a physical
resource and then provides a pointer tothat physical resource when a request is
made
A. true
B. false
A.true
108. Virtual Machines (VMs) are offered in cloud by
A. saas
B. paas
C. iaas
D. none
of these
C.iaas
109. The technology used to distribute service requests to
resources is referred toas
A. load
performing
B. load
scheduling
C. load
balancing
D. all
of the mentioned
C.load
balancing
110.
computing
refers to applications and services that run on a distributed networkusing
virtualized resources.
A. distributed
B. cloud
C. soft
D. parallel
B.cloud
111. Cloud computing is an abstraction based on the notion of
pooling physical resources andpresenting them as a
resource.
A. real
B. virtual
C. cloud
D. none
of the mentioned
B.virtual
112. Amazon’s Elastic Compute Cloud (EC2) is a well known .
A. virtual
machine
B. cloud
storage
C. paas
D. soa
A.virtual
machine
113.
virtualization
abstracts networking hardware and software into avirtual network that can be
managed.
A. storage
B. network
C. software
D. none
of thementioned
B.network
114.
is
used by Amazon Web Services to store copies of a virtualmachine.
A. ami
B. emi
C. imi
D. application
services
A.ami
115. In para-virtualization, VMs run on hypervisor that
interacts with thehardware.
A. true
B. false
B.false
116. Which of the following provide system resource access to
virtual machines ?
A. vmm
B. vmc
C. vnm
D. all
of the mentioned
A.vmm
117. An operating system running on a Type
VM is a full virtualization.
A. 1
B. 2
C. 3
D. all
of the mentioned
A.1
118. Point out the wrong statement.
A. in
gmail, you can construct searches with multiple operators using the advanced
search feature
B. rss
and atom are prototypes of a class of xml specifications called synchronized
markup languages
C. a
typical rss document or feed contains text and metadata that can be used to indicate
publication dates
D. none
of the mentioned
B.rss
and atom are prototypes of a class of xml specifications called synchronized
markup languages
119. Which of the following file format is used by RSS
module?
A. xml
B. smil
C. json
D. all
of the mentioned
A.xml
120. What makes Ajax unique?
A. it
works as a stand- alone web-development tool
B. it
works the same with all webbrowsers
C. it
uses c++ as its programminglanguage
D. it
makes data requestsasynchronously
D.it
makes data requestsasynchronously
121. JavaScript is also called server-side JavaScript.
A. microsoft
B. navigator
C. livewire
D. none
C.livewire
122. Which of the following visualization is most commonly
achieved through a mapping mechanism where a logical storage address is
translated into aphysical storage address?
A. storage
B. network
C. software
D. none
of the mentioned
A.storage
123. Point out the wrong statement.
A. a
virtual network can create virtual network interfaces
B. instantiating
a virtual machine is a very slow process
C. you
can make machine images of systems in the configuration that you want to deploy
or take snapshots of working virtualmachines
D. all
of the mentioned
B.instantiating
a virtual machine is a very slow process
124. AMI(Amazon Machine Image) imaging service is provided by
Amazon for
A. private
use
B. public
use
C. pay-per-use
D. all
of the mentioned
D.all
of the mentioned
125. Which of the following runs on Xen Hypervisor?
A. azure
B. aws
ec2
C. aws
ec3
D. all
of the mentioned
B.aws
ec2
Post a Comment
Punjab Public Service Commission PPSC Past Papers MCQs Solved (All Departments) held in 2023, 2022, 2021, 2020, 2019, 2018 [Complete Edition] Avaialbe at: https://www.jobspastpapers.com/
MCQwizProblems on Trains