CS8791 Cloud Computing

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

CS8791 Cloud Computing www.studymaterialz.

in
CSE - Regulations 2017

shift in the way in which systems are


deployed
CS8791 Cloud c) Cloud computing makes the long-held
dream of utility computing possible with a
Computing pay-as-you-go, infinitely scalable, universally
available system
d) All of the mentioned
CSE - Seventh Answer: b
Semester Explanation: Cloud Computing is
distinguished by the notion that resources are
virtual and limitless and that details of the
Regulations 2017 physical systems on which software runs are
abstracted from the user.

3. ________ as a utility is a dream that dates


from the beginning of the computing industry
itself.
UNIT I INTRODUCTION a) Model
b) Computing
c) Software
TOPIC 1.1 INTRODUCTION TO d) All of the mentioned
CLOUD COMPUTING
Answer: b
Explanation: Cloud computing takes the
TOPIC 1.2 DEFINITION OF technology, services, and applications that are
CLOUD similar to those on the Internet and turns them
into a self-service utility.
1. _________ computing refers to 4. Which of the following is essential concept
applications and services that run on a related to Cloud?
distributed network using virtualized a) Reliability
resources. b) Productivity
a) Distributed c) Abstraction
b) Cloud d) All of the mentioned
c) Soft
d) Parallel Answer: c
Explanation: Cloud computing abstracts the
Answer: b details of system implementation from users
Explanation: Cloud Computing applications and developers.
are accessed by common Internet protocols
and networking standards. 5. Point out the wrong statement.
a) All applications benefit from deployment
2. Point out the wrong statement. in the cloud
a) The massive scale of cloud computing b) With cloud computing, you can start very
systems was enabled by the popularization of small and become big very fast
the Internet c) Cloud computing is revolutionary, even if
b) Soft computing represents a real paradigm

Downloaded From: https://cse-r17.blogspot.com 1


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

the technology it is built on is evolutionary systems, the intranet too becomes identified
d) None of the mentioned as a cloud.

Answer: a 9. Cloud computing is an abstraction based on


Explanation: Issues with latency, transaction the notion of pooling physical resources and
control, and in particular security and presenting them as a ________ resource.
regulatory compliance are of particular a) real
concern. b) virtual
c) cloud
6. Which of the following cloud concept is d) none of the mentioned
related to pooling and sharing of resources?
a) Polymorphism Answer: b
b) Abstraction Explanation: Cloud Computing is a new
c) Virtualization model for provisioning resources, for staging
d) None of the mentioned applications, and for platform-independent
user access to services.
Answer: c
Explanation: Applications run on physical 10. Which of the following is Cloud Platform
systems that aren’t specified, data is stored in by Amazon?
locations that are unknown, administration of a) Azure
systems is outsourced to others, and access by b) AWS
users is ubiquitous. c) Cloudera
d) All of the mentioned
7. ________ has many of the characteristics
of what is now being called cloud computing. Answer: b
a) Internet Explanation: One of the most successful
b) Softwares cloud-based businesses is Amazon Web
c) Web Service Services, which is an Infrastructure as a
d) All of the mentioned Service offering that lets you rent virtual
computers on Amazon’s own infrastructure.
Answer: a
Explanation: The Internet offers abstraction,
runs using the same set of protocols and TOPIC 1.3 EVOLUTION OF
standards, and uses the same applications and CLOUD COMPUTING
operating systems.
1. ________________ is a paradigm of
8. Which of the following can be identified as distributed computing to provide the
cloud? customers on-demand, utility based
a) Web Applications computing service.
b) Intranet a) Remote Sensing
c) Hadoop b) Remote Invocation
d) All of the mentioned c) Cloud Computing
d) Private Computing
Answer: c
Explanation: When an intranet becomes Answer: c
large enough that a diagram no longer wishes Explanation: Cloud computing is a paradigm
to differentiate between individual physical of distributed computing to provide the
customers with on-demand, utility based

Downloaded From: https://cse-r17.blogspot.com 2


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

computing services. Cloud users can provide Answer: c


more reliable, available and updated services Explanation: There is no protected cloud.
to their clients in turn. There are three types of cloud-private, public
and hybrid.
2. Cloud providers provide cloud services to
the cloud users. 6. In this type of cloud, an organization rents
a) True cloud services from cloud providers on-
b) False demand basis.
a) Private
Answer: a b) Public
Explanation: The statement is true. There are c) Protected
three types of users often called as cloud d) Hybrid
stakeholders.
Answer: b
3. Which of the following is not a cloud Explanation: This happens in public cloud.
stakeholder? Services are provided to the users using
a) Cloud providers utility computing model.
b) Clients
c) End users 7. In this type of cloud, the cloud is composed
d) Cloud users of multiple internal or external cloud.
a) Private
Answer: b b) Public
Explanation: There are three types of c) Protected
stakeholders cloud providers, cloud users and d) Hybrid
the end users.
Answer: d
4. These cloud services are of the form of Explanation: The hybrid cloud is composed
utility computing i.e. the _________ uses of multiple internal or external clouds. This is
these services pay-as-you-go model. the scenario when an organization moves to
a) Cloud providers public cloud computing domain from its
b) Clients internal private cloud.
c) End users
d) Cloud users 8. _____________ enables the migration of
the virtual image from one physical machine
Answer: d to another.
Explanation: The cloud users use these a) visualization
services pay-as-you-go model. The cloud b) virtualization
users develop their product using these c) migration
services and deliver the product to the end d) virtual transfer
users.
Answer: b
5. Which of the following is not a type of Explanation: Virtualization enables the
cloud? migration of the virtual image from one
a) Private physical machine to another. This feature is
b) Public useful for cloud as by data locality lots of
c) Protected optimization is possible.
d) Hybrid

Downloaded From: https://cse-r17.blogspot.com 3


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

9. Most of the cloud architectures are built on Answer: a


this type of architecture. Explanation: None.
a) skeleton
b) grid 3. Network operating system runs on
c) linear ___________
d) template a) server
b) every system in the network
Answer: b c) both server and every system in the
Explanation: Most of the cloud architectures network
are built on Grid architecture. Grid is a type d) none of the mentioned
of distributed computing architecture where
organizations owning data centers collaborate Answer: a
with each other to have common benefits. Explanation: None.

10. Saas stands for? 4. Which technique is based on compile-time


a) Software as a service program transformation for accessing remote
b) System Software and services data in a distributed-memory parallel system?
c) Software as a system a) cache coherence scheme
d) System as a service b) computation migration
c) remote procedure call
Answer: a d) message passing
Explanation: SAAS is Software as a service.
It delivers a single application through the Answer: b
web browser to thousands of customers using Explanation: None.
a multitenant architecture.
5. Logical extension of computation
migration is ___________
TOPIC 1.4 UNDERLYING a) process migration
PRINCIPLES OF PARALLEL b) system migration
AND DISTRIBUTED c) thread migration
COMPUTING d) data migration

Answer: a
1. In distributed system, each processor has Explanation: None.
its own ___________
a) local memory 6. Processes on the remote systems are
b) clock identified by ___________
c) both local memory and clock a) host ID
d) none of the mentioned b) host name and identifier
c) identifier
Answer: c d) process ID
Explanation: None.
Answer: b
2. If one site fails in distributed system then Explanation: None.
___________
a) the remaining sites can continue operating 7. Which routing technique is used in a
b) all the sites will stop working distributed system?
c) directly connected sites will stop working a) fixed routing
d) none of the mentioned b) virtual routing

Downloaded From: https://cse-r17.blogspot.com 4


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

c) dynamic routing Answer: d


d) all of the mentioned Explanation: Cloud computing has shifted
the economics of software delivery in a
Answer: d manner similar to the way that music
Explanation: None. downloads have shifted the delivery of
commercial music.
8. In distributed systems, link and site failure
is detected by ___________ 2. Point out the correct statement.
a) polling a) Google’s cloud includes perhaps some 10
b) handshaking data centers worldwide
c) token passing b) Flipkart.com’s infrastructure was built to
d) none of the mentioned support elastic demand so the system could
accommodate peak traffic
Answer: b c) Data centers have been sited to optimize
Explanation: None. the overall system latency
d) All of the mentioned
9. The capability of a system to adapt the
increased service load is called ___________ Answer: c
a) scalability Explanation: Datacenter can Keep land costs
b) tolerance modest and occupation unobtrusive.
c) capacity
d) none of the mentioned 3. Which of the following benefit is related to
creates resources that are pooled together in a
Answer: a system that supports multi-tenant usage?
Explanation: None. a) On-demand self-service
b) Broad network access
10. Internet provides _______ for remote c) Resource pooling
login. d) All of the mentioned
a) telnet
b) http Answer: a
c) ftp Explanation: A cloud service provider
d) rpc creates resources that are pooled together in a
system that supports multi-tenant usage.
Answer: a
Explanation: None. 4. The _____ is something that you can
obtain under contract from your vendor.
TOPIC 1.5 CLOUD a) PoS
b) QoS
CHARACTERISTICS c) SoS
d) All of the mentioned
1. Which of the following was one of the top
5 cloud applications in 2010? Answer: b
a) Cloud backup Explanation: Depending upon the type of
b) Web applications service being offered, you may find that you
c) Business applications do not require hardware or software licenses
d) All of the mentioned to implement your service.

Downloaded From: https://cse-r17.blogspot.com 5


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

5. Point out the wrong statement. Answer: a


a) Internet consumes roughly 1 percent of the Explanation: When your data travels over
world’s total power and rests on systems that are no longer under
b) The cost advantages of cloud computing your control, you have increased risk due to
have enabled new software vendors to create the interception and malfeasance of others.
productivity applications
c) A client can provision computer resources 9. You can’t count on a cloud provider
without the need for interaction with cloud maintaining your _____ in the face of
service provider personnel government actions.
d) None of the mentioned a) scalability
b) reliability
Answer: a c) privacy
Explanation: Data centers have been sited to d) none of the mentioned
have access to low cost power.
Answer: c
6. All cloud computing applications suffer Explanation: Cloud computing industry
from the inherent _______ that is intrinsic in continues to address security concerns.
their WAN connectivity.
a) propagation 10. Which of the following architectural
b) latency standards is working with cloud computing
c) noise industry?
d) all of the mentioned a) Service-oriented architecture
b) Standardized Web services
Answer: b c) Web-application frameworks
Explanation: While cloud computing d) All of the mentioned
applications excel at large-scale processing
tasks, if your application needs large amounts Answer: a
of data transfer, cloud computing may not be Explanation: These standards help to enable
the best model for you. different business models that cloud
computing vendors can support, most notably
7. Cloud computing is a _______ system and Software as a Service (SaaS), Web 2.0
it is necessarily unidirectional in nature. applications, and utility computing.
a) stateless
b) stateful
c) reliable
TOPIC 1.6 ELASTICITY IN
d) all of the mentioned CLOUD

Answer: a 1. Which of the following correctly describes


Explanation: Cloud computing is a stateless components roughly in their order of
system, as is the Internet in general. importance from top to down?
a)
8. Which of the following is the most
important area of concern in cloud
computing?
a) Security
b) Storage
c) Scalability
d) All of the mentioned

Downloaded From: https://cse-r17.blogspot.com 6


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

private clouds connected through virtual


private networks
b) Amazon Web Services is based on SOA
standards
c) Starting in 2012, Amazon.com made its

M
Web service platform available to developers
on a usage-basis model

O
d) All of the mentioned

Answer: c

C
Explanation: Through hardware
virtualization on Xen hypervisors,

T.
b) Amazon.com has made it possible to create
private virtual servers that you can run
worldwide.

O
3. Which of the following is the central
application in the AWS portfolio?

SP
a) Amazon Elastic Compute Cloud
b) Amazon Simple Queue Service
c) Amazon Simple Notification Service
d) Amazon Simple Storage System
G
Answer: a
Explanation: Amazon Elastic Compute
LO

Cloud enables the creation, use, and


c)
management of virtual private servers
running the Linux or Windows operating
system over a Xen hypervisor.
.B

4. Which of the following is a message queue


or transaction system for distributed Internet-
based applications?
17

a) Amazon Elastic Compute Cloud


b) Amazon Simple Queue Service
c) Amazon Simple Notification Service
d) Amazon Simple Storage System
-R

Answer: b
d) None of the mentioned Explanation: In a loosely coupled SOA
SE

system, a transaction manager is required to


Answer: a ensure that messages are not lost when a
Explanation: Amazon Elastic Compute component isn’t available.
Cloud is the central application in the AWS
portfolio. 5. Point out the correct statement.
C

a) SQL Server is having enormous impact on


2. Point out the wrong statement. cloud computing
a) Virtual private servers can provision virtual b) Amazon.com’s services represent the

Downloaded From: https://cse-r17.blogspot.com 7


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

largest pure Infrastructure as a Service Answer: c


(IAAS) Explanation: SNS provides a method for
c) EC2 is a Platform as a Service (PaaS) triggering actions, allowing clients or
market applications to subscribe to information (like
d) None of the mentioned RSS), or polling for new or changed
information or perform updates.
Answer: b
Explanation: EC2 is estimated to run on over 9. Which of the following metrics are used to
40,000+ servers worldwide divided into six support Elastic Load Balancing?
availability zones. a) CloudWatch
b) Amazon Elastic Block Store
6. Which of the following is a system for c) AWS Import/Export
creating block level storage devices that can d) All of the mentioned
be used for Amazon Machine Instances in
EC2? Answer: a
a) CloudWatch Explanation: Amazon Machine Instances
b) Amazon Elastic Block Store (AMIs) in EC2 can be load balanced using
c) AWS Import/Export the Elastic Load Balancing.
d) All of the mentioned
10. Which of the following is an online
Answer: b backup and storage system?
Explanation: The Load Balancing feature a) Amazon Elastic Compute Cloud
can detect when an instance is failing and b) Amazon Simple Queue Service
reroute traffic to a healthy instance, even an c) Amazon Simple Notification Service
instance in other AWS zones. d) Amazon Simple Storage System

7. Which of the following feature is used for Answer: d


scaling of EC2 sites? Explanation: A high speed data transfer
a) Auto Replica feature called AWS Import/Export can
b) Auto Scaling transfer data to and from AWS using
c) Auto Ruling Amazon’s own internal network to portable
d) All of the mentioned storage devices.

Answer: b
Explanation: Autoscaling is part of Amazon TOPIC 1.7 ON-DEMAND
Cloudwatch and available at no additional PROVISIONING
charge.
1. Which of the following cloud storage is
8. Which of the following is a Web service mainly meant for developers and to support
that can publish messages from an application applications built using Web services?
and deliver them to other applications or to a) Managed
subscribers? b) Unmanaged
a) Amazon Elastic Compute Cloud c) Disk
b) Amazon Simple Queue Service d) All of the mentioned
c) Amazon Simple Notification Service
d) Amazon Simple Storage System Answer: a
Explanation: Managed cloud storage is
provisioned and provided as a raw disk.

Downloaded From: https://cse-r17.blogspot.com 8


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

2. Point out the correct statement. Answer: b


a) Cloud storage may be broadly categorized Explanation: Unmanaged storage is
into four major classes of storage relatively cheap to use.
b) In unmanaged storage, the storage service
provider makes storage capacity available to 6. Which of the following factors led to the
users demise of many of the early SSPs and to
c) In managed storage, the storage service many hosted file services?
provider makes storage capacity available to a) The Dot.com bust in 2000
users b) The inability of file-hosting companies to
d) All of the mentioned successfully monetize online storage
c) The continued commoditization of large
Answer: b disk drives
Explanation: Unmanaged storage defines the d) All of the mentioned
nature of the storage, how it may be used, and
by what applications. Answer: d
Explanation: SSP stands for Storage Service
3. Which of the following is the form of Provider.
unmanaged cloud storage?
a) XDrive 7. Which of the following is the simplest
b) OmniDrive unmanaged cloud storage device?
c) iDrive a) file transfer utility
d) All of the mentioned b) antivirus utility
c) online image utility
Answer: d d) none of the mentioned
Explanation: It is unmanaged storage in the
sense that the storage is preconfigured for Answer: a
you, you can’t format as you like. Explanation: File transfer services may be
shared by other users you allow, and the files
4. Which of the following is an example of an that are uploaded may be discoverable for
unmanaged storage utility set up to do some services.
automated backups?
a) XDrive 8. The service FreeDrive is storage that
b) OmniDrive allows ________ users to view the content of
c) FreeDrive others.
d) All of the mentioned a) Facebook
b) Twitter
Answer: d c) Whatsapp
Explanation: FreeDrive provides web-based d) None of the mentioned
applications that allow internet users to store,
retrieve, and share data on the internet. Answer: a
Explanation: FreeDrive is a personal storage
5. Point out the wrong statement. and file sharing service designed for users of
a) Unmanaged storage is reliable social networks, such as Facebook, MySpace
b) Managed storage is relatively cheap to use and Bebo.
c) Most of the user-based applications that
work with cloud storage are of unmanaged 9. Which of the following file transfer utility
type creates a shared folder metaphor using a Web
d) None of the mentioned service?

Downloaded From: https://cse-r17.blogspot.com 9


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

a) Dropbox 2. Point out the correct statement.


b) Skype a) Service Oriented Architecture (SOA)
c) Drive describes a standard method for requesting
d) All of the mentioned services from distributed components and
managing the results
Answer: a b) SOA provides the translation and
Explanation: Dropbox is a service that keeps management layer in an architecture that
your files safe, synced, and easy to share. removes the barrier for a client obtaining
desired services
10. Which of the following offers Storage c) With SOA, clients and components can be
size of 10GB free t0 100 GB paid? written in different languages and can use
a) Adrive multiple messaging protocols
b) 4shared d) All of the mentioned
c) Badongo
d) All of the mentioned Answer: d
Explanation: You don’t need SOA if you are
Answer: b creating a monolithic cloud application that
Explanation: As unmanaged storage performs a specific function such as backup,
offerings progressed in sophistication, they e-mail, Web page access, or instant
began to offer value-added software services messaging.
such as folder synchronization and backup.
3. Which of the following is a repeatable task
within a business process?
a) service
b) bus
UNIT II CLOUD c) methods
ENABLING d) all of the mentioned

TECHNOLOGIES Answer: a
Explanation: A business task is a
composition of services.
TOPIC 2.1 SERVICE ORIENTED
ARCHITECTURE 4. Which of the following module of SOA is
shown in the following figure?
1. Which of the following describes a
message-passing taxonomy for a component-
based architecture that provides services to
clients upon demand? a) Description
a) SOA b) Messaging
b) EBS c) Business Process
c) GEC d) QOS
d) All of the mentioned
Answer: d
Answer: a Explanation: QoS is established, and the
Explanation: Clients access a component that service is instantiated.
complies with SOA by passing a message
5. Point out the wrong statement.
containing metadata to be acted upon in a
a) SOA provides the standards that transport
standard format.

Downloaded From: https://cse-r17.blogspot.com 10


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

the messages and makes the infrastructure to a) XML


support it possible b) WS-BPEL
b) SOA provides access to reusable Web c) JSON
services over an SMTP network d) None of the mentioned
c) SOA offers access to ready-made, modular,
highly optimized, and widely shareable Answer: b
components that can minimize developer and Explanation: Business process is a collection
infrastructure costs of activity graphs.
d) None of the mentioned
9. Which of the following is used as
Answer: b middleware layer in the following figure?
Explanation: Service Oriented Architecture
has been part of a collaborative effort on the
part of both large and small vendors to come
up with a common solution to architecting
complex business software processes
efficiently.

6. Which of the following is used to define


the service component that performs the
a) XML
service?
b) ESB
a) WSDL
c) UDDI
b) SCDL
d) None of the mentioned
c) XML
d) None of the mentioned Answer: b
Explanation: An ESB may be part of a
Answer: b
network operating system or may be
Explanation: SCDL stands for Service
implemented using a set of middleware
Component Definition Language.
products.
7. Which of the following is commonly used
10. Which of the following figure is
to describe the service interface, how to bind
associated with Description Module in SOA
information, and the nature of the
stack?
component’s service or endpoint?
a)
a) WSDL
b) SCDL
c) XML
d) None of the mentioned
b)
Answer: a
Explanation: The most commonly used
message-passing format is an Extensible c)
Markup Language (XML) document using
the Simple Object Access Protocol (SOAP).

8. Which of the following provides d) None of the mentioned


commands for defining logic using
conditional statements?

Downloaded From: https://cse-r17.blogspot.com 11


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: d 4. Annotation added as an input parameter to


Explanation: WSDL is a language for the handler method.
describing web services and how to access a) @PathVariable
them. b) @Path
c) @PathLocale

M
d) None of the mentioned
TOPIC 2.2 REST AND SYSTEMS
OF SYSTEMS Answer: a

O
Explanation: The @PathVariable annotation
1. To publish a REST service with Spring. is added as an input parameter to the handler

C
a) publishing an application’s data as a REST method, per Spring’s MVC conventions, in
service order for it to be used inside the handler

T.
b) accessing data from third-party REST method body.
services
c) none of the mentioned 5. Notation for defining REST endpoints.
a) { }

O
d) all of the mentioned
b) *
Answer: d c) All of the mentioned

SP
Explanation: One involves publishing an d) None of the mentioned
application’s data as a REST service, the
other one involves accessing data from third- Answer: c
party REST services to be used in an Explanation: In addition to supporting the {
G
application. } notation, it’s also possible to use a wildcard
* notation for defining REST endpoints.
2. Publishing an application’s data as a REST
LO

service requires. 6. General-purpose class that allows a


a) @RequestMapping response to be rendered using a marshaller.
b) @PathVariable a) MarshallingView
c) All of the mentioned b) Marshalling
.B

d) None of the mentioned c) View


d) All of the mentioned
Answer: c
Explanation: Publishing an application’s data Answer: a
17

as a REST service revolves around the use of Explanation: The membertemplate view is
the Spring MVC annotations defined as a MarshallingView type, which is a
@RequestMapping and @PathVariable. general-purpose class that allows a response
to be rendered using a marshaller.
-R

3. Spring supports a series of mechanisms to


generate a REST service payload. 7. Marshalling is the process of transforming
a) True an in-memory representation of an object into
a data format.a
SE

b) False
a) True
Answer: a b) False
Explanation: This recipe will explore the
simplest mechanism, which involves the use Answer: a
C

of Spring’s MarshallingView class. Explanation: Therefore, for this particular


case, a marshaller is charged with

Downloaded From: https://cse-r17.blogspot.com 12


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

transforming a Member object into an XML (i.e., object’s) fields.


data format. a) @XmlRootElement
b) @XmlRoot
8. The marshaller used by MarshallingView c) @NotNull
belongs to one of a series of XML d) None of the mentioned

M
marshallers.
a) Jaxb2Marshaller Answer: a
b) XmlBeansMarshaller Explanation: This annotation allows the

O
c) CastorMarshalle Jaxb2Marshaller marshaller to detect a class’s
d) All of the mentioned (i.e., object’s) fields and transform them into

C
XML data.
Answer: d

T.
Explanation: The marshaller used by 12. Accessing a third-party REST service
MarshallingView belongs to one of a series of inside a Spring application.
XML marshallers provided by Spring— a) RestTemplate Class
Jaxb2Marshaller. Other marshallers provided b) ViewResolver

O
by Spring include CastorMarshaller, c) InternalViewResolver
JibxMarshaller, XmlBeansMarshaller, and d) View

SP
XStreamMarshaller.
Answer: a
9. To configure Jaxb2Marshaller marshaller Explanation: Accessing a third-party REST
we require. service inside a Spring application revolves
G
a) ClassesToBeBound around the use of the Spring RestTemplate
b) ContextPath class.
c) All of the mentioned
LO

d) None of the mentioned 13. REST service end point comprises an


address.
Answer: c a) starts with http:// and ends with ?
Explanation: The Jaxb2Marshaller b) starts with http:// and ends with &
.B

marshaller requires to be configured with c) no certain URL is specified


either a property named classesToBeBound or d) depends upon the platform used
contextPath.
Answer: a
17

10. In the case of classesToBeBound, the Explanation: The structure of the REST
classes assigned to this property, indicate the service end point comprises an address,
class (i.e., object) structure that is to be which starts with http:// and ends with ?, as
transformed into XML. well as a series of parameters that start with ?
-R

a) True and are delimited by &, each represented by a


b) False key and value divided by =.

Answer: a 14. XML tag which represents information


SE

Explanation: The Jaxb2Marshaller related to a REST service request.


marshaller requires to be configured with a) Result
either a property named classesToBeBound or b) Title
contextPath. c) None of the mentioned
C

d) All of the mentioned


11. Annotation which allows the
Jaxb2Marshaller marshaller to detect a class’s

Downloaded From: https://cse-r17.blogspot.com 13


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: d service whose service contract is generated


Explanation: The actual meaning of the automatically. In contract-first, you design the
payload is highly dependent on a REST service contract in terms of XML and then
service. In this case, the XML tags (e.g., write code to fulfill it.
Result, Title ) are definitions set forth by
Yahoo, while the character data enclosed in 3. In contrast, the contract-first approach
each XML tag represents information related encourages you to think of the service
to a REST service request. contract first in terms of :-
a) XML
15. RestTemplate class method which b) XML Schema(.xsd)
performs an HTTP HEAD operation. c) WSDL
a) headForHeaders(String, Object…) d) All of the mentioned
b) getForObject(String, Class, Object…)
c) postForLocation(String, Object, Object…) Answer: d
d) postForObject(String, Object, Class, Explanation: In contrast, the contract-first
Object…) approach encourages you to think of the
service contract first, in terms of XML, using
Answer: a XML schema (.xsd) and WSDL.
Explanation: headforHeaders() is a
RestTemplate class method based on HTTP 4. In some cases, it’s also hard to map an
protocol request methods. object to XML (e.g., an object graph with
cyclic references) because there’s actually an
impedance mismatch between an object
TOPIC 2.3 WEB SERVICES model and an XML model.
a) True
1. A web service contract is described using :- b) False
a) Web Services Description Language
b) Web Services Description Answer: a
c) All of the mentioned Explanation: Just like that between an object
d) None of the mentioned model and a relational model.

Answer: a 5. Service exporters that can export a bean as


Explanation: In contract-last, you expose an a remote service based on the :-
existing service interface as a web service a) RMI
whose service contract is generated b) Hessian
automatically. c) Burlap
d) All of the mentioned
2. There are two approaches to developing a
web service, depending on whether you Answer: d
define the contract first or last. Explanation: Spring comes with several
a) True service exporters that can export a bean as a
b) False remote service based on the RMI, Hessian,
Burlap, or HTTP Invoker remoting
Answer: a technologies.
Explanation: A web service contract is
described using Web Services Description 6. Spring comes with a service exporter that
Language (WSDL). In contract-last, you can export a bean as a SOAP web service.
expose an existing service interface as a web

Downloaded From: https://cse-r17.blogspot.com 14


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

a) True 10. If you are using the JAX-RS Reference


b) False Implementation, this intermediary step will
involve a tool called wsgen.
Answer: b a) True
Explanation: Spring doesn’t come with a b) False
service exporter that can export a bean as a
SOAP web service. We will use Apache CXF, Answer: a
which is the de facto successor to XFire. Explanation: It will generate the
configuration (a file called sun-jaxws.xml)
7. The standard for deploying web services on and wrapper beans required to expose your
the Java EE platform as of Java EE 1.4:- service.
a) JAX-RPC
b) JAX 11. Spring provides a factory that can export
c) RPC beans annotated with:-
d) None of the mentioned a) javax.jws.WebService
b) javax.jws.WebServiceProvider
Answer: a c) all of the mentioned
Explanation: The standard for deploying web d) none of the mentioned
services on the Java EE platform as of Java
EE 1.4 was called JAX-RPC. It supported Answer: c
SOAP 1.0 and 1.1, but didn’t support Explanation: Spring provides a factory that
message-oriented web services. can export beans annotated with
javax.jws.WebService or
8. To send objects across the wire, beans need javax.jws.WebServiceProvider inside the
to be encoded using the Java Architecture for Spring context and then publishes the services
XML Binding (JAXB). using the JAX-WS runtime.
a) True
b) False 12. Exposing a stand-alone SOAP endpoint
using the:-
Answer: a a) SimpleJaxWsServiceExporter
Explanation: JAXB supports many class b) JAX-WS
types out of the box with no special support. c) All of the mentioned
d) None of the mentioned
9. If you are deploying into a Java EE 5 (or
better) container, you may simply create a Answer: c
bean that is annotated with:- Explanation: Exposing a stand-alone SOAP
a) javax.jws.WebService endpoint using the
b) javax.jws.WebServiceProvider SimpleJaxWsServiceExporter or the support
c) all of the mentioned for JAX-WS in a Java EE container in
d) none of the mentioned conjunction with Spring is simple, but these
solutions ignore the largest cross-section of
Answer: c developers—people developing on Tomcat.
Explanation: If you are deploying into a Java
EE 5 (or better) container, you may simply 13. Tomcat doesn’t support JAX-WS by
create a bean that is annotated with itself.
javax.jws.WebService or a) True
javax.jws.WebServiceProvider and deploy b) False
that into a container in your web application.

Downloaded From: https://cse-r17.blogspot.com 15


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: a through the client class(aliased as google-


Explanation: Tomcat doesn’t support JAX- cloud-pubsub-publisherclient).
WS by itself, so we need to help it by
embedding a JAX-WS runtime. There are 2. client() class provides ________ to create
many choices, and you’re free to take your topics.
pick. Two popular choices are Axis2 and a) Software
CXF, both of which are Apache projects. b) Classes
c) Methods
14. CXF represents the consolidation of the d) Batch
Celtix and XFire projects, which each had
useful SOAP support. Answer: c
a) True Explanation: client() class provides the
b) False method to create topics. publish() method
publishes messages to pub/sub. Publishing
Answer: a message is handled through the client class.
Explanation: For our example, we’ll embed
CXF since it’s robust, fairly well tested, and 3. ________ method publishes messages to
provides support for other important pub/sub.
standards like JAX-RS, the API for REST-ful a) Client()
endpoints. b) Publish()
c) Server()
15. Factory to use our Spring bean as the d) Batch()
implementation:-
a) jaxws:end Answer: b
b) jaxws:endpoint Explanation: While client() provides method
c) all of the mentioned to create topics, publish() method publishes
d) none of the mentioned messages to pub/sub.

Answer: b 4. How many arguments are accepted by


Explanation: We tell the jaxws:endpoint publish()?
factory to use our Spring bean as the a) 5 arguments
implementation. We tell it at what address to b) 3 arguments
publish the service using the address element. c) 1 argument
d) 2 arguments
TOPIC 2.4 PUBLISHSUBSCRIBE Answer: d
MODEL Explanation: This method accepts two
positional arguments: the topic to publish to,
1. Publishing messages is handled through and the body of the message.
________ Class.
a) Client() 5. Does publish() method accepts arbitrary
b) Server() arguments.
c) Publish() a) True
d) Batch() b) False

Answer: a Answer: a
Explanation: Publishing message is handled Explanation: Publish() method also accepts

Downloaded From: https://cse-r17.blogspot.com 16


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

arbitrary keyword arguments, which are called as str, and in python 2 it is called as
passed along as attributes of the message. unicode.

6. The topic in the publish method is in which 10. When you publish a message ________ is
form? automatically created?
a) Binomial form a) Client
b) Canonical form b) Server
c) Nominal form c) Batch
d) Message form d) Server

Answer: b Answer: c
Explanation: The topic is passed along as a Explanation: Whenever we publish a
string; all topics have the canonical form of message, a batch is automatically created.
projects/{project_name}/topic/{topic_name}. This way, if you publish a large volume of
messages, it reduces the number of requests
7. The message in pub/sub is an opaque blob made to the server.
of ________
a) Bits 11. When the batch is created, it begins a
b) Bytes countdown that publishes the batch once
c) Word sufficient time has elapsed.
d) Nibble a) True
b) False
Answer: b
Explanation: The message in pub/sub is an Answer: a
opaque blob of bytes, and as such, you must Explanation: When the batch is created, it
send a bytes object in python 3. begins a countdown that publishes the batch
once sufficient time has elapsed.
8. ________ error will show if we try to send
text string instead of bytes. 12. What is the time elapsed after a batch is
a) TypeError created?
b) Error a) 0.5 seconds
c) Linker error b) 0.05 seconds
d) Compiler error c) 1.5 seconds
d) 1 second
Answer: a
Explanation: If we send a text string the Answer: b
method will raise TypeError. TypeError will Explanation: When the batch is created, it
show if we try to send text string instead of begins a countdown that publishes the batch
bytes. once sufficient time has elapsed by default it
is 0.05 seconds.
9. What do we call string in python 2?
a) Str 13. Every call to publish() will return a class
b) Unicode that conforms to the __________ interface.
c) Strs a) Batch
d) Unicades b) Client
c) Server
Answer: b d) Future
Explanation: In python 2 the text string is

Downloaded From: https://cse-r17.blogspot.com 17


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: d
Explanation: Every call to publish() will
return a class that conforms to the future
interface. You can use this to ensure that the
publish.

TOPIC 2.5 BASICS OF


VIRTUALIZATION d) All of the mentioned

Answer: a
TOPIC 2.6 TYPES OF Explanation: You can define the features in
VIRTUALIZATION software and hardware that enables flexibility
as conforming to one or more of the mobility
patterns.
TOPIC 2.7 IMPLEMENTATION
LEVELS OF VIRTUALIZATION 2. Point out the wrong statement.
a) Abstraction enables the key benefit of
cloud computing: shared, ubiquitous access
TOPIC 2.8 VIRTUALIZATION b) Virtualization assigns a logical name for a
STRUCTURES physical resource and then provides a pointer
to that physical resource when a request is
made
1. Which of the following correctly represents c) All cloud computing applications combine
different types of mobile patterns? their resources into pools that can be assigned
a) on demand to users
d) All of the mentioned

Answer: c
Explanation: Several important cloud
computing approaches use a strictly
hardware-based approach to abstraction.

3. Which of the following type of


b) virtualization is also characteristic of cloud
computing?
a) Storage
b) Application
c) CPU
d) All of the mentioned

Answer: d
Explanation: To enable these characteristics,
c) resources must be highly configurable and
flexible.

4. The technology used to distribute service


requests to resources is referred to as

Downloaded From: https://cse-r17.blogspot.com 18


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

_____________ necessary redundancy to make an intrinsically


a) load performing unreliable system reliable through managed
b) load scheduling redirection.
c) load balancing
d) all of the mentioned 8. Which of the following is a more
sophisticated load balancer?
Answer: c a) workload managers
Explanation: Load balancing is an b) workspace managers
optimization technique. c) rackserve managers
d) all of the mentioned
5. Point out the correct statement.
a) A client can request access to a cloud Answer: a
service from any location Explanation: They determine the current
b) A cloud has multiple application instances utilization of the resources in their pool.
and directs requests to an instance based on
conditions 9. A ______ is a combination load balancer
c) Computers can be partitioned into a set of and application server that is a server placed
virtual machines with each machine being between a firewall or router.
assigned a workload a) ABC
d) All of the mentioned b) ACD
c) ADC
Answer: d d) All of the mentioned
Explanation: Alternatively, systems can be
virtualized through load-balancing Answer: c
technologies. Explanation: An Application Delivery
Controller is assigned a virtual IP address
6. Which of the following software can be (VIP) that maps to a pool of servers based on
used to implement load balancing? application specific criteria.
a) Apache mod_balancer
b) Apache mod_proxy_balancer 10. Which of the following should be
c) F6’s BigIP replaced with the question mark in the
d) All of the mentioned following figure?

Answer: b
Explanation: Load balancing can be used to
increase utilization and throughput, lower
latency, reduce response time, and avoid
system overload.

7. Which of the following network resources


can be load balanced? a) Abstraction
a) Connections through intelligent switches b) Virtualization
b) DNS c) Mobility Pattern
c) Storage resources d) All of the mentioned
d) All of the mentioned
Answer: b
Answer: d Explanation: Virtualization is a key enabler
Explanation: Load balancing provides the

Downloaded From: https://cse-r17.blogspot.com 19


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

of the first four of five key attributes of cloud b) The devices connected using I/O mapping
computing. have a bigger buffer space
c) The devices have to deal with fewer
address lines
TOPIC 2.9 TOOLS AND d) No advantage as such
MECHANISMS
VIRTUALIZATION OF CPU, Answer: c
MEMORY AND I/O DEVICES Explanation: Since the I/O mapped devices
have a separate address space the address
lines are limited by the amount of the space
1. In memory-mapped I/O ____________ allocated.
a) The I/O devices and the memory share the
same address space 5. The system is notified of a read or write
b) The I/O devices have a separate address operation by ___________
space a) Appending an extra bit of the address
c) The memory and I/O devices have an b) Enabling the read or write bits of the
associated address space devices
d) A part of the memory is specifically set c) Raising an appropriate interrupt signal
aside for the I/O operation d) Sending a special signal along the BUS
Answer: a Answer: d
Explanation: Its the different modes of Explanation: It is necessary for the processor
accessing the i/o devices. to send a signal intimating the request as
either read or write.
2. The usual BUS structure used to connect
the I/O devices is ___________ 6. To overcome the lag in the operating
a) Star BUS structure speeds of the I/O device and the processor we
b) Multiple BUS structure use ___________
c) Single BUS structure a) BUffer spaces
d) Node to Node BUS structure b) Status flags
c) Interrupt signals
Answer: c d) Exceptions
Explanation: BUS is a collection of address,
control and data lines used to connect the Answer: b
various devices of the computer. Explanation: The processor operating is
much faster than that of the I/O devices, so by
3. In intel’s IA-32 architecture there is a using the status flags the processor need not
separate 16 bit address space for the I/O wait till the I/O operation is done. It can
devices. continue with its work until the status flag is
a) False set.
b) True
7. The method of accessing the I/O devices
Answer: b by repeatedly checking the status flags is
Explanation: This type of access is called as ___________
I/O mapped devices. a) Program-controlled I/O
b) Memory-mapped I/O
4. The advantage of I/O mapped devices to
c) I/O mapped
memory mapped is ___________
d) None of the mentioned
a) The former offers faster transfer of data

Downloaded From: https://cse-r17.blogspot.com 20


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: a
TOPIC 2.10 VIRTUALIZATION
Explanation: In this method, the processor
constantly checks the status flags, and when it SUPPORT AND DISASTER
finds that the flag is set it performs the RECOVERY
appropriate operation.

M
This set of SAN multiple choice questions
8. The method of synchronising the processor and answers focuses on Backup and
with the I/O device in which the device sends

O
Recovery.
a signal when it is ready is?
a) Exceptions 1. The purpose of backup is:

C
b) Signal handling a) To restore a computer to an operational
c) Interrupts state following a disaster

T.
d) DMA b) To restore small numbers of files after they
have been accidentally deleted
Answer: c c) To restore one among many version of the
Explanation: This is a method of accessing

O
same file for multiple backup environment
the I/O devices which gives the complete d) All of the mentioned
power to the devices, enabling them to

SP
intimate the processor when they’re ready for Answer: d
transfer.
2. Backup of the source data can be created
9. The method which offers higher speeds of a) On the same device
G
I/O transfers is ___________ b) On another device
a) Interrupts c) At some other location
b) Memory mapping d) All of the mentioned
LO

c) Program-controlled I/O
d) DMA Answer: d
Answer: d 3. Which of the following backup technique
.B

Explanation: In DMA the I/O devices are is most space efficient?


directly allowed to interact with the memory a) Full backup
without the intervention of the processor and b) Incremental backup
the transfers take place in the form of blocks c) Differential backup
17

increasing the speed of operation. d) All of the mentioned


10. The process wherein the processor Answer: b
constantly checks the status flags is called as
-R

___________ 4. Which of the following statements are


a) Polling true?
b) Inspection a) Data can be recovered fastest in online
SE

c) Reviewing backup
d) Echoing b) Tape library is an example of nearline
storage
Answer: a c) Data recovery can take hours for offline
Explanation: None. backup
C

d) All of the mentioned

Answer: d

Downloaded From: https://cse-r17.blogspot.com 21


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

5. Which of the following qualifies as best 10. Which of the following is Backup
DR (Disaster Recovery) site? software?
a) DR site in the same campus a) Amanda
b) DR site in the same city b) Bacula
c) DR site in the same country c) IBM Tivoli Storage Manager
d) DR site in a different country d) All of the mentioned

Answer: d Answer: d

6. Which of the following techniques can be


used for optimizing backed up data space?
a) Encryption and Deduplication
b) Compression and Deduplication UNIT III CLOUD
c) Authentication and Deduplication
d) Deduplication only ARCHITECTURE
SERVICES AND
Answer: b
STORAGE
7. To decide on a backup strategy for your
organization, which of the following should
TOPIC 3.1 LAYERED CLOUD
you consider?
a) RPO (Recovery Point Objective) ARCHITECTURE DESIGN
b) RTO (Recovery Time Objective)
c) Both RPO & RTO 1. Which of the following is incorrect?
d) None of the mentioned a) A Layered-style program is divided into an
array of modules or layers
Answer: c b) Each layer provides services to the layer
“below” and makes use of services provided
8. Which of the following can be used for by the layer “above”
reducing recovery time? c) All of the mentioned
a) Automatic failover d) None of the mentioned
b) By taking backup on a faster device
c) Taking multiple backups – one in same Answer: b
location, another at different location Explanation: Each layer provides services to
d) All of the mentioned the layer “above” and makes use of services
provided by the layer “below”.
Answer: d
2. Which of the following is correct?
9. Which of the following is false? a) The dynamic structure of the Layered style
a) The more important the data, the greater is to partition software units into modular
the need for backing it up layers
b) A backup is as useful as its associated b) The static structure of the Layered style is
restore strategy nothing more than a constraint on interactions
c) Storing the backup copy near to its original between layers
site is best strategy c) All of the mentioned
d) Automated backup and scheduling is d) None of the mentioned
preferred over manual operations

Answer: c

Downloaded From: https://cse-r17.blogspot.com 22


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: d c) All of the mentioned


Explanation: The static structure of the d) None of the mentioned
Layered style is to partition software units
into modular layers whereas The dynamic Answer: d
structure of the Layered style is nothing more Explanation: Each layer is allowed to depend
than a constraint on interactions between on the layer below it being present and
layers. correct. A layer may call other layers above
and below it, as long as it does not use them.
3. What is Relaxed Layered Style?
a) Each layer can be constrained to use only 6. What is Onion diagram illustrates?
the layer directly below it a) It illustrates the connection between the
b) Sometimes this constraint is relaxed layers in communications protocols, such as
slightly to allow each layer to use all the the International Standards Organization
layers below it Open Systems Interconnection (ISO OSI)
c) All of the mentioned model,or the layers in user interface and
d) None of the mentioned windowing systems, such as the X Window
System
Answer: b b) It often illustrates operating system layers,
Explanation: Each layer can be constrained with the kernel at the core
to use only the layer directly below it—this is c) All of the mentioned
a Strict Layered style whereas Sometimes this d) None of the mentioned
constraint is relaxed slightly to allow each
layer to use all the layers below it—this is a Answer: d
Relaxed Layered style. Explanation: Onion diagram illustrates
operating system layers, with the kernel at the
4. Which of the following is correct? core.
a) Module A uses Module B if a correct
version of B must be present for A to execute 7. In particular, layers have which of the
correctly following characteristics?
b) Module A calls (or invokes ) module B if a) Layers are by definition highly cohesive,
B triggers execution of A thus satisfying the Principle of Cohesion
c) All of the mentioned b) Layers doesn’t support information hiding
d) None of the mentioned c) Layers are constrained to use only above
layers
Answer: a d) All of the mentioned
Explanation: Module A uses Module B if a
correct version of B must be present for A to Answer: a
execute correctly and Module A calls (or Explanation: Layers are by definition highly
invokes ) module B if A triggers execution of cohesive, thus satisfying the Principle of
B. Cohesion. Layers support information hiding
Layers are constrained to use only lower
5. Which of the following is true with respect layers.
to layered architecture?
a) Each layer is allowed to depend on the 8. Which of the following is incorrect?
layer above it being present and correct a) Layered architectures are highly
b) A layer may call other layers above and changeable, so this pattern can be used when
below it, as long as it uses them changeability is an important quality attribute
b) Layered-style programs are easy to modify

Downloaded From: https://cse-r17.blogspot.com 23


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

because changes can be made to a layer 1. Which of the following is one of the unique
independently of the rest of the program attributes of Cloud Computing?
c) All of the mentioned a) utility type of delivery
d) None of the mentioned b) elasticity
c) low barrier to entry
Answer: d d) all of the mentioned
Explanation: All of the mentioned are
correct. Answer: d
Explanation: These attributes change how
9. What are the drawbacks for Layers? applications are created, priced, and
a) It is often necessary to pass data through delivered.
many layers, which can slow performance
significantly 2. Point out the correct statement.
b) Layers support information hiding a) Service Level Agreements (SLAs) is small
c) Multi-layered programs can be hard to aspect of cloud computing
debug because operations tend to be b) Cloud computing does not have impact on
implemented through a series of calls across software licensing
layers c) Cloud computing presents new
d) None of the mentioned opportunities to users and developers
d) All of the mentioned
Answer: c
Explanation: Layers support information Answer: c
hiding is an advantage and not a drawback. Explanation: Because it is based on the
paradigm of a shared multi-tenant utility.
10. Which of the following is correct?
a) Layers are not strongly coupled to the 3. Applications that work with cloud
layers above them computing that have low margins and usually
b) Each layer is strongly coupled only to the low risk are _____________
layer immediately below it a) high touch
c) Overall Layered-style architectures are b) low touch
loosely coupled c) moderate touch
d) All of the mentioned d) all of the mentioned

Answer: d Answer: b
Explanation: Layers are not strongly coupled Explanation: The “high touch” applications
to the layers above them. If a program uses that come with high margins require
theStrict Layered style, then each layer is committed resources and pose more of a risk.
strongly coupled only to the layer
immediately below it. As a result, overall 4. A service that concentrates on hardware
Layered-style architectures are loosely follows the _________ as a Service model.
coupled. a) IaaS
b) CaaS
c) PaaS
TOPIC 3.2 NIST CLOUD d) All of the mentioned
COMPUTING REFERENCE
ARCHITECTURE Answer: a
Explanation: Amazon web service follows
PaaS model.

Downloaded From: https://cse-r17.blogspot.com 24


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

5. Point out the wrong statement. Answer: a


a) A cloud is defined as the combination of Explanation: This eliminates waste and has
the infrastructure of a datacenter with the the added benefit of shifting risk from the
ability to provision hardware and software client.
b) High touch applications are best done on-
premises 9. _______ feature allows you to optimize
c) The Google App Engine follows IaaS your system and capture all possible
d) None of the mentioned transactions.
a) scalability
Answer: c b) reliability
Explanation: The Google App Engine c) elasticity
follows PaaS. d) none of the mentioned

6. When you add a software stack, such as an Answer: c


operating system and applications to the Explanation: You have the ability to right-
service, the model shifts to _____ model. size resources as required.
a) SaaS
b) PaaS 10. _______ enables batch processing, which
c) IaaS greatly speeds up high-processing
d) All of the mentioned applications.
a) Scalability
Answer: a b) Reliability
Explanation: Microsoft’s Windows Azure c) Elasticity
Platform is best described as currently using d) Utility
SaaS model.
Answer: a
7. Which of the following is the most refined Explanation: This feature obviates the need
and restrictive service model? for planning and provisioning.
a) IaaS
b) CaaS
c) PaaS
TOPIC 3.3 PUBLIC, PRIVATE
d) All of the mentioned AND HYBRID CLOUDS

Answer: c 1. A _______ service provider gets the same


Explanation: When the service requires the benefits from a composable system that a user
client to use a complete does.
hardware/software/application stack, it is a) CaaS
using the most refined and restrictive service b) AaaS
model. c) PaaS
d) All of the mentioned
8. _______ is a pay-as-you-go model matches
resources to need on an ongoing basis. Answer: c
a) Utility Explanation: If you are a PaaS or SaaS
b) Elasticity service provider and your task is to create the
c) Low barrier to entry platform or service presented to the
d) All of the mentioned developer, reseller, or user, the notion of
working with a composable system is still a
very powerful one.

Downloaded From: https://cse-r17.blogspot.com 25


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

2. Point out the correct statement. c) A composable component must be stateless


a) Cloud architecture can couple software d) None of the mentioned
running on virtualized hardware in multiple
locations to provide an on-demand service Answer: a
b) Cloud computing relies on a set of Explanation: While resources in a cloud can
protocols needed to manage interprocess be real physical resources, more often they
communications are virtualized resources because virtualized
c) Platforms are used to create more complex resources are easier to modify and optimize.
software
d) All of the mentioned 6. A service provider reselling a _______
may have the option to offer one module to
Answer: d customize the information.
Explanation: The most commonly used a) CaaS
services uses a set of discovery and b) AaaS
description protocols based on WSDL. c) PaaS
d) SaaS
3. Which of the following is the property of
the composable component? Answer: d
a) stateful Explanation: Modifications are generally
b) stateless severely limited.
c) symmetric
d) all of the mentioned 7. Which of the following is the highest
degree of integration in cloud computing?
Answer: b a) CaaS
Explanation: A transaction is executed b) AaaS
without regard to other transactions or c) PaaS
requests. d) SaaS

4. From the standpoint of a ________ it Answer: d


makes no sense to offer non-standard Explanation: An SaaS vendor such as
machine instances to customers. Quicken.com or Salesforce.com is delivering
a) CaaS an application as a service to a customer.
b) AaaS
c) PaaS 8. Which of the architectural layer is used as a
d) IaaS front end in cloud computing?
a) client
Answer: d b) cloud
Explanation: Because those customers are c) soft
almost certainly deploying applications built d) all of the mentioned
on standard operating systems such as Linux,
Windows, Solaris, or some other well-known Answer: a
operating system. Explanation: Cloud computing may be
differentiated from older models by
5. Point out the wrong statement. describing an encapsulated information
a) A cloud cannot be created within an technology service that is often controlled
organization’s own infrastructure or through an Application Programming
outsourced to another datacenter Interface (API).
b) A composable component must be modular

Downloaded From: https://cse-r17.blogspot.com 26


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

9. Which of the following benefit is provided cannot attach to the appropriate service
by the PaaS service provider? d) All of the mentioned
a) A larger pool of qualified developers
b) More reliable operation Answer: a
c) A logical design methodology Explanation: The software that runs in the
d) All of the mentioned virtual machines is what defines the utility of
the cloud computing system.
Answer: d
Explanation: The essence of a service 3. Which of the following component is
oriented design is that services are called hypervisor?
constructed from a set of modules using a) VGM
standard communications and service b) VMc
interfaces. c) VMM
d) All of the mentioned
10. Communication between services is done
widely using _______ protocol. Answer: c
a) REST Explanation: VMM component is also called
b) SOAP hypervisor.
c) RESTful
d) None of the mentioned 4. Applications such as a Web server or
database server that can run on a virtual
Answer: b machine image are referred to as
Explanation: There are alternative sets of ______________
standards as well. a) virtual server
b) virtual appliances
c) machine imaging
TOPIC 3.4 IAAS, PAAS, SAAS d) all of the mentioned

1. Which of the following provider rely on Answer: b


the virtual machine technology to deliver Explanation: The name virtual appliance is a
servers? little misleading because it conjures up the
a) CaaS image of a machine that serves a narrow
b) AaaS purpose.
c) PaaS
d) IaaS 5. Point out the wrong statement.
a) Platforms represent nearly the full cloud
Answer: d software stack
Explanation: Most large Infrastructure as a b) A platform in the cloud is a software layer
Service (IaaS) providers rely on virtual that is used to create higher levels of service
machine technology that can run applications. c) Platforms often come replete with tools
and utilities to aid in application design and
2. Point out the correct statement. deployment
a) Virtual machines are containers that are d) None of the mentioned
assigned specific resources
b) Applications need not be mindful of how Answer: d
they use cloud resources Explanation: Most platforms begin by
c) When a developer creates an application establishing a developer community to
that uses a cloud service, the developer support the work done in the environment.

Downloaded From: https://cse-r17.blogspot.com 27


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

6. _________ allows different operating Answer: b


systems to run in their own memory space. Explanation: Jcinacio has Ubuntu
a) VGM appliances.
b) VMc
c) VMM 10. __________ is a CPU emulator and
d) All of the mentioned virtual machine monitor.
a) Imaging
Answer: c b) Parallels
Explanation: VMM manages I/O for the c) QEMU
virtual machines. d) None of the mentioned

7. Amazon Machine Images are virtual Answer: c


appliances that have been packaged to run on Explanation: Parallels hosts a variety of
the grid of ____ nodes. appliances that includes Linux distros, server
a) Ben software, and other products.
b) Xen
c) Ken
d) Zen
TOPIC 3.5 ARCHITECTURAL
DESIGN CHALLENGES OF
Answer: b CLOUD STORAGE
Explanation: You run across virtual
appliances in IaaS systems such as Amazon’s 1. Which of the following correctly represents
Elastic Compute Cloud. different types of mobile patterns?
a)
8. Which of the following offers virtual
appliances, including ones based on
Windows, all of which run on VMware
Player?
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
b)
Answer: a
Explanation: Virtual appliances have begun
to affect the PC industry in much the same
way that application stores have affected the
cell phone industry.

9. ________ offers various Linux


distributions upon which you can build a
virtual machine. c)
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned

Downloaded From: https://cse-r17.blogspot.com 28


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

_____________
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned

Answer: c
Explanation: Load balancing is an
d) All of the mentioned optimization technique.
Answer: a 5. Point out the correct statement.
Explanation: You can define the features in a) A client can request access to a cloud
software and hardware that enables flexibility service from any location
as conforming to one or more of the mobility b) A cloud has multiple application instances
patterns. and directs requests to an instance based on
conditions
2. Point out the wrong statement. c) Computers can be partitioned into a set of
a) Abstraction enables the key benefit of virtual machines with each machine being
cloud computing: shared, ubiquitous access assigned a workload
b) Virtualization assigns a logical name for a d) All of the mentioned
physical resource and then provides a pointer
to that physical resource when a request is Answer: d
made Explanation: Alternatively, systems can be
c) All cloud computing applications combine virtualized through load-balancing
their resources into pools that can be assigned technologies.
on demand to users
d) All of the mentioned 6. Which of the following software can be
used to implement load balancing?
Answer: c a) Apache mod_balancer
Explanation: Several important cloud b) Apache mod_proxy_balancer
computing approaches use a strictly c) F6’s BigIP
hardware-based approach to abstraction. d) All of the mentioned
3. Which of the following type of Answer: b
virtualization is also characteristic of cloud Explanation: Load balancing can be used to
computing? increase utilization and throughput, lower
a) Storage latency, reduce response time, and avoid
b) Application system overload.
c) CPU
d) All of the mentioned 7. Which of the following network resources
can be load balanced?
Answer: d a) Connections through intelligent switches
Explanation: To enable these characteristics, b) DNS
resources must be highly configurable and c) Storage resources
flexible. d) All of the mentioned
4. The technology used to distribute service Answer: d
requests to resources is referred to as Explanation: Load balancing provides the

Downloaded From: https://cse-r17.blogspot.com 29


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

necessary redundancy to make an intrinsically of the first four of five key attributes of cloud
unreliable system reliable through managed computing.
redirection.

8. Which of the following is a more TOPIC 3.6 STORAGE-AS-A-


sophisticated load balancer? SERVICE
a) workload managers
b) workspace managers
c) rackserve managers TOPIC 3.7 CLOUD STORAGE
d) all of the mentioned PROVIDERS, ADVANTAGES OF
CLOUD STORAGE
Answer: a
Explanation: They determine the current
utilization of the resources in their pool. 1. Which of the following is storage data
interchange interface for stored data objects?
9. A ______ is a combination load balancer a) OCC
and application server that is a server placed b) OCCI
between a firewall or router. c) OCMI
a) ABC d) All of the mentioned
b) ACD
Answer: b
c) ADC
Explanation: OCCI stands for Open Cloud
d) All of the mentioned
Computing Interface.
Answer: c
2. Point out the correct statement.
Explanation: An Application Delivery
a) To determine whether your application will
Controller is assigned a virtual IP address
port successfully, you should perform a
(VIP) that maps to a pool of servers based on
functionality mapping exercise
application specific criteria.
b) Cloud computing supports some
10. Which of the following should be application features better than others
replaced with the question mark in the c) Cloud bursting is an overflow solution that
following figure? clones the application to the cloud and directs
traffic to the cloud during times of high traffic
d) All of the mentioned

Answer: d
Explanation: Mapping process involves
determining the critical application features
and then matching them to the cloud
provider’s offering to see if those features can
be supported.
a) Abstraction
b) Virtualization 3. ________ data represents more than 50
c) Mobility Pattern percent of the data created every day.
d) All of the mentioned a) Shadow
b) Light
Answer: b
c) Dark
Explanation: Virtualization is a key enabler
d) All of the mentioned

Downloaded From: https://cse-r17.blogspot.com 30


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: a c) Analytics
Explanation: Lots of shadow data does get d) None of the mentioned
retained, having never been touched by a
human being. Answer: a
Explanation: Most users interact with cloud
4. Cloud storage data usage in the year 2020 storage using backup, synchronization,
is estimated to be _____________ percent archiving, staging, caching, or some other
resident by IDC. sort of software.
a) 10
b) 15 8. How many categories of storage devices
c) 20 broadly exist in cloud?
d) None of the mentioned a) 1
b) 2
Answer: d c) 3
Explanation: There will be a steady growth d) None of the mentioned
of cloud storage at the expense of online
storage over the next decade. Answer: b
Explanation: Storage devices may be broadly
5. Point out the wrong statement. categorized as either block storage devices or
a) Some APIs are both exposed as SOAP and file storage devices.
REST
b) The role of a cloud vendor specific API 9. Which of the following storage devices
has impact on porting an application exposes its storage to clients as Raw storage
c) There are mainly three types of cloud that can be partitioned to create volumes?
storage a) block
d) None of the mentioned b) file
c) disk
Answer: c d) all of the mentioned
Explanation: Cloud storage can be either
unmanaged or managed. Answer: a
Explanation: It is up to the operating system
6. Which of the following system does not to create and manage the file system.
provision storage to most users?
a) PaaS 10. Which of the following impose additional
b) IaaS overhead on clients and offer faster transfer?
c) CaaS a) Block storage
d) SaaS b) File Storage
c) File Server
Answer: b d) All of the mentioned
Explanation: Cloud storage is storage
accessed by a Web service API. Answer: a
Explanation: File-oriented storage devices
7. The addition of a software package on top are generally slower, but require less
of a cloud storage volume makes most cloud overhead from attached clients.
storage offerings conform to a ________ as a
Service model.
a) Software
TOPIC 3.8 AMAZON S3
b) Platform

Downloaded From: https://cse-r17.blogspot.com 31


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

1. Which of the following should be used c) Amazon Cloudfront


considering factors shown in the figure? d) Amazon Associates Web Services

Answer: c
Explanation: Cloudfront is similar to systems
such as Akamai.com, but is proprietary to
Amazon.com and is set up to work with
Amazon Simple Storage
System (Amazon S3).

4. Which of the following allows you to


create instances of the MySQL database to
a) SimpleDB support your Web sites?
b) RDS a) Amazon Elastic Compute Cloud
c) Amazon EC2 b) Amazon Simple Queue Service
d) All of the mentioned c) Amazon Relational Database Service
d) Amazon Simple Storage System
Answer: b
Explanation: Use RDS when you have an Answer: c
existing MySQL database that could be Explanation: RDS provides features such as
ported and you want to minimize the amount automated software patching, database
of infrastructure and administrative backups, and automated database scaling via
management required. an API call.

2. Point out the wrong statement. 5. Point out the correct statement.
a) Amazon Machine Instances are sized at a) Amazon Elastic Cloud is a system for
various levels and rented on a creating virtual disks(volume)
computing/hour basis b) SimpleDB interoperates with both Amazon
b) The metrics obtained by CloudWatch may EC2 and Amazon S3
be used to enable a feature called Auto c) EC3 is an Analytics as a Service provider
Scaling d) None of the mentioned
c) A number of tools are used to support EC2
services Answer: b
d) None of the mentioned Explanation: Amazon SimpleDB stores data
in “buckets” and without requiring the
Answer: d creation of a database schema.
Explanation: Through hardware
virtualization on Xen hypervisors, 6. Which of the following is a structured data
Amazon.com has made it possible to create store that supports indexing and data queries
private virtual servers that you can run to both EC2 and S3?
worldwide. a) CloudWatch
b) Amazon SimpleDB
3. Which of the following is an edge-storage c) Amazon Cloudfront
or content-delivery system that caches data in d) All of the mentioned
different physical locations?
a) Amazon Relational Database Service Answer: b
b) Amazon SimpleDB Explanation: SimpleDB isn’t a full database
implementation.

Downloaded From: https://cse-r17.blogspot.com 32


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

7. Which of the following is the machinery c) Amazon DevPay


for interacting with Amazon’s vast product d) Multi-Factor Authentication
data and eCommerce catalog function?
a) Amazon Elastic Compute Cloud Answer: a
b) Amazon Associates Web Services Explanation: Amazon Elastic MapReduce is
c) Alexa Web Information Service an interactive data analysis tool for
d) All of the mentioned performing indexing.

Answer: b
Explanation: This service, which was called
Amazon E-Commerce Service (ECS), is the
means for vendors to add their products to the UNIT IV RESOURCE
Amazon.com site
and take orders and payments.
MANAGEMENT AND
SECURITY IN CLOUD
8. Which of the following is a billing and
account management service?
a) Amazon Elastic MapReduce TOPIC 4.1 INTER CLOUD
b) Amazon Mechanical Turk RESOURCE MANAGEMENT
c) Amazon DevPay
d) Multi-Factor Authentication 1. The properties necessary to guarantee a
reliable transaction in databases and other
Answer: c applications is referred to as _____________
Explanation: DevPay provides a developer a) BASE
API that eliminates the need for application b) ACID
developers to build order pipelines. c) ATOM
d) All of the mentioned
9. Which of the following is a means for
accessing human researchers or consultants to Answer: b
help solve problems on a contractual or Explanation: In computer science, ACID
temporary basis? (Atomicity, Consistency, Isolation,
a) Amazon Elastic MapReduce Durability) is a set of properties that
b) Amazon Mechanical Turk guarantee that database transactions are
c) Amazon DevPay
processed reliably.
d) Multi-Factor Authentication
2. Point out the wrong statement.
Answer: b a) In theory, any application can run either
Explanation: Problems solved by this human completely or partially in the cloud
workforce have included object identification, b) The location of an application or service
video or audio recording, data duplication, plays a fundamental role in how the
and data research. application must be written
c) An application or process that runs on a
10. Which of the following is built on top of a
desktop or server is executed coherently, as a
Hadoop framework using the Elastic
unit, under the control of an integrated
Compute Cloud?
program
a) Amazon Elastic MapReduce
d) None of the mentioned
b) Amazon Mechanical Turk

Downloaded From: https://cse-r17.blogspot.com 33


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: d 6. Which of the following component is


Explanation: An action triggers a program required for both online and local data access
call, code executes, and a result is returned in hybrid application?
and may be acted upon. a) local
b) cloud
3. Which of the following is property of c) both local and cloud
ACID principle? d) none of the mentioned
a) Atomicity
b) Consistency Answer: c
c) Isolation Explanation: If the application needed to
d) All of the mentioned access data only when the client was online,
then access to cloud-based storage would be
Answer: d the only data store your application would
Explanation: The ACID principle is used required.
today by any application that is reading and
writing to a stored data set. 7. Which of the following factors might offset
the cost of offline access in hybrid
4. Which of the following ACID property applications?
states that the system must go from one a) scalability
known state to another and that the system b) costs
integrity must be maintained? c) ubiquitous access
a) Atomicity d) all of the mentioned
b) Consistency
c) Isolation Answer: d
d) Durability Explanation: These factors make the cloud
more attractive.
Answer: b
Explanation: The ACID rules were 8. An application that needed _______
developed by Jim Gray to apply to database storage alone might not benefit from a cloud
technology in the late 1970s. deployment at all.
a) online
5. Point out the wrong statement. b) offline
a) Taken as a unit, “Request => Process => c) virtual
Response” is not an atomic transaction d) all of the mentioned
b) A coherent transaction either succeeds and
is enacted, or fails and is rolled back Answer: b
c) When rollback is not possible due to Explanation: You could safely conclude that
optimistic transaction commitment in a an application that gets the most value from a
multiuser application, durability requires cloud deployment is one that uses online
correcting the condition storage without the need for offline storage.
d) None of the mentioned
9. The __________ property states that the
Answer: a system must have a mechanism to recover
Explanation: Taken as a unit, “Request => from committed transactions should that be
Process => Response” is an atomic necessary.
transaction. a) Atomicity
b) Consistency

Downloaded From: https://cse-r17.blogspot.com 34


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

c) Isolation 2. Point out the correct statement.


d) Durability a) Eucalyptus and Rackspace both use
Amazon EC2 and S3 services
Answer: d b) The RightScale user interface provides
Explanation: The isolation property states real-time measurements of individual server
that the system cannot have other transactions instances
operate on data that is currently being c) RightScale server templates and the
processed by a transaction. Rightscript technology are highly
configurable and can be run under batch
10. Which of the following property defines a control
transaction as something that cannot be d) All of the mentioned
subdivided and must be completed or
abandoned as a unit? Answer: d
a) Atomicity Explanation: Eucalyptus is open source and
b) Consistency portable.
c) Isolation
d) Durability 3. Which of the following is an industry
organization that develops industry system
Answer: a management standards for platform
Explanation: The isolation property states interoperability?
that the system cannot have other transactions a) DMTF
operate on data that is currently being b) DMS
processed by a transaction. c) EBS
d) All of the mentioned
TOPIC 4.2 RESOURCE Answer: a
PROVISIONING AND Explanation: DMTF stands for Distributed
RESOURCE PROVISIONING Management Task Force.
METHODS
4. Which of the following is used to extend
CIM to virtual computer system
1. Which of the following is a core management?
management feature offered by most cloud a) OVF
management service products? b) VMAN
a) Support of different cloud types c) OCSI
b) Creation and provisioning of different d) None of the mentioned
types of cloud resources, such as machine
instances, storage, or staged applications Answer: b
c) Performance reporting including Explanation: VMAN has resulted in the
availability and uptime, response time, creation of the Open Virtualization Format
resource quota usage, and other (OVF), which describes a standard method
characteristics for creating, packaging, and provisioning
d) All of the mentioned virtual appliances.
Answer: d 5. Point out the wrong statement.
Explanation: Automated deployment on IaaS a) Cloudkick’s Insight module is powerful
systems represents one class of cloud and particularly easy to use
management services. b) Both Cloudkick and RightScale are known

Downloaded From: https://cse-r17.blogspot.com 35


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

to be easy to use with Window virtual servers


and less so with Linux instances
c) All of the service models support
monitoring solutions
d) All of the mentioned

Answer: b
Explanation: Cloudkick and RightScale are
known to be easy to use with Linux virtual
servers and less so with Windows instances.
d) None of the mentioned
6. Which of the following initiative tries to
provide a way of measuring cloud computing Answer: b
services along dimension like cost? Explanation: Taken together, these products
a) CCE form the basis for CA’s Cloud Connected
b) OCCI Management Suite.
c) SMI
8. Which of the following is open and both
d) All of the mentioned
hypervisor and processor-architecture-
Answer: c agnostic?
Explanation: SMI stands for Service a) Dell Scalent
Measurement Index. b) CloudKick
c) Elastra
7. Which of the following figure correctly d) All of the mentioned
describes products by CA technologies?
a) Answer: a
Explanation: OVF is essentially a container
and a file format.

9. Which of the following is a workflow


control and policy based automation service
by CA?
a) CA Cloud Optimize
b) CA Cloud Orchestrate
c) CA Cloud Insight
d) CA Cloud Compose
b)
Answer: b
Explanation: CA Cloud Insight is a cloud
metrics measurement service.

10. Which of the following monitors the


performance of the major cloud-based
services in real time in Cloud Commons?
a) CloudWatch
b) CloudSensor
c) CloudMetrics
c) d) All of the mentioned

Downloaded From: https://cse-r17.blogspot.com 36


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: b c) Regulatory compliance


Explanation: The Cloud Commons is a new d) All of the mentioned
online community founded by CA to promote
information exchange on cloud services and Answer: d
the SMI standard. Explanation: Logging, auditing, and
regulatory compliance are all features that
require planning in cloud computing systems.
TOPIC 4.3 GLOBAL EXCHANGE
OF CLOUD RESOURCES AND 4. The following flowchart is intended to
SECURITY OVERVIEW evaluate __________ in any cloud.

1. Which of the following service provider


provides the least amount of built in security?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer: c
Explanation: You get the least amount of
built in security with an Infrastructure as a
Service provider, and the most with a
Software as a Service provider.

2. Point out the correct statement.


a) Different types of cloud computing service
models provide different levels of security a) risk
services b) errors
b) Adapting your on-premises systems to a c) inconsistencies
cloud model requires that you determine what d) none of the mentioned
security mechanisms are required and
mapping those to controls that exist in your Answer: a
chosen cloud service provider Explanation: Your risks in any cloud
c) Data should be transferred and stored in an deployment are dependent upon the particular
encrypted format for security purpose cloud service model chosen and the type of
d) All of the mentioned cloud on which you deploy your applications.
Answer: d 5. Point out the wrong statement.
Explanation: When you identify missing a) You can use proxy and brokerage services
security elements in the cloud, you can use to separate clients from direct access to
mapping to work to close the gap. shared cloud storage
b) Any distributed application has a much
3. Which of the following services that need greater attack surface than an application that
to be negotiated in Service Level is closely held on a Local Area Network
Agreements? c) Cloud computing doesn’t have
a) Logging vulnerabilities associated with Internet
b) Auditing

Downloaded From: https://cse-r17.blogspot.com 37


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

applications b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: c
Explanation: Additional vulnerabilities arise Answer: b
from pooled, virtualized, and outsourced Explanation: CA Cloud Insight is a cloud
resources. metrics measurement service.

6. Which of the following area of cloud 10. Which of the following is application and
computing is uniquely troublesome? infrastructure management software for
a) Auditing hybrid multi-clouds?
b) Data integrity a) VMware Hyperic
c) e-Discovery for legal compliance b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: d
Explanation: Storing data in the cloud is of Answer: c
particular concern. Explanation: Tapinsystems is provisioning
and management service.
7. Which of the following is the operational
domain of CSA?
a) Scalability TOPIC 4.4 CLOUD SECURITY
b) Portability and interoperability CHALLENGES
c) Flexibility
d) None of the mentioned 1. Which of the following is a compliance
standard?
Answer: b a) PCI-DSS
Explanation: CSA is an industry working b) HIPPA
group that studies security issues in cloud c) GLBA
computing and offers recommendations to its d) All of the mentioned
members.
Answer: d
8. Which of the following is considered an Explanation: A compliance standard can be
essential element in cloud computing by any government regulatory framework.
CSA?
a) Multi-tenancy 2. Point out the correct statement.
b) Identity and access management a) The cloud service model you choose does
c) Virtualization not determine the variety of security features,
d) All of the mentioned compliance auditing, and other requirements
b) To determine the particular security
Answer: a mechanisms you need, you must perform a
Explanation: Multi-tenancy adds a number mapping of the particular cloud service model
of additional security concerns to cloud to the particular application you are deploying
computing that need to be accounted for. c) A security control model includes the
security that you normally use for your
9. Which of the following is used for Web applications only
performance management and load testing? d) All of the mentioned
a) VMware Hyperic

Downloaded From: https://cse-r17.blogspot.com 38


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: b 6. Which of the following are a common


Explanation: These mechanisms must be means for losing encrypted data?
supported by the various controls that are a) lose the keys
provided by your service provider, your b) lose the encryption standard
organization, or a third party. c) lose the account
d) all of the mentioned
3. Which of the following is a key mechanism
for protecting data? Answer: a
a) Access control Explanation: Keys should have a defined life
b) Auditing cycle.
c) Authentication
d) All of the mentioned 7. Which of the following is the standard for
interoperable cloud-based key management?
Answer: d a) KMIP
Explanation: Whatever service model you b) PMIK
choose should have mechanisms operating in c) AIMK
all above mentioned areas that meet your d) None of the mentioned
security requirements.
Answer: a
4. How many security accounts per client is Explanation: KMIP stands for Key
provided by Microsoft? Management Interoperability Protocol.
a) 1
b) 3 8. Which of the following was one of the
c) 5 weaker aspects of early cloud computing
d) 7 service offerings?
a) Logging
Answer: c b) Integrity checking
Explanation: On Amazon Web Service, you c) Consistency checking
can create multiple keys and rotate those keys d) None of the mentioned
during different sessions.
Answer: a
5. Point out the wrong statement. Explanation: Cloud service providers often
a) Securing data sent to, received from, and have proprietary log formats.
stored in the cloud is the single largest
security concern 9. Which of the following is one of the most
b) The problem with the data you store in the actively developing and important areas of
cloud is that it can be located anywhere in the cloud computing technology?
cloud service provider’s system a) Logging
c) One and only approach to isolating storage b) Auditing
in the cloud from direct client access is to c) Regulatory compliance
create layered access to the data d) None of the mentioned
d) All of the mentioned
Answer: c
Answer: c Explanation: For any company with clients
Explanation: The location of the proxy and in multiple countries, the burden of regulatory
the broker is not important. compliance is onerous.

Downloaded From: https://cse-r17.blogspot.com 39


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

10. Amazon Web Services supports ________ c) Adoption drivers


Type II Audits. d) None of the mentioned
a) SAS70
b) SAS20 Answer: b
c) SAS702 Explanation: With the exception of the user
d) None of the mentioned interaction with the software, all other aspects
of the service are abstracted away.
Answer: a
Explanation: Becoming a cloud service 4. Which of the following SaaS platform is
provider requires a large investment. with an exposed API?
a) salesforce.com
b) amazon.com
TOPIC 4.5 SOFTWARE-AS-A- c) flipkart.com
SERVICE d) all of the mentioned

1. Which of the following is the most Answer: a


complete cloud computing service model? Explanation: SaaS does not necessarily mean
a) PaaS that the software is static or monolithic.
b) IaaS
c) CaaS 5. Point out the wrong statement.
d) SaaS a) SaaS applications come in all shapes and
sizes
Answer: d b) Every computer user is familiar with SaaS
Explanation: The most complete cloud systems
computing service model is one in which the c) SaaS software is not customizable
computing hardware and software, as well as d) None of the mentioned
the solution itself, are provided by a vendor
as a complete service offering. Answer: d
Explanation: Every computer user is familiar
2. Point out the correct statement. with SaaS systems, which are either
a) Platforms can be based on specific types of replacements or substitutes for locally
development languages, application installed software.
frameworks, or other constructs
b) SaaS is the cloud-based equivalent of 6. Which of the following is a SaaS
shrink-wrapped software characteristic?
c) Software as a Service (SaaS) may be a) The typical license is subscription-based or
succinctly described as software that is usage-based and is billed on a recurring basis
deployed on a hosted service b) The software is available over the Internet
d) All of the mentioned globally through a browser on demand
c) The software and the service are monitored
Answer: d and maintained by the vendor
Explanation: SaaS can be accessed globally d) All of the mentioned
over the Internet, most often in a browser.
Answer: d
3. Which of the following aspect of the Explanation: There may be executable
service is abstracted away? client-side code, but the user isn’t responsible
a) Data escrow for maintaining that code or its interaction
b) User Interaction with the service.

Downloaded From: https://cse-r17.blogspot.com 40


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

7. _________ applications have a much lower can display a Web page that shows data and
barrier to entry than their locally installed supports features from two or more sources.
competitors.
a) IaaS Answers.
b) CaaS
c) PaaS TOPIC 4.6 SECURITY
d) None of the mentioned
GOVERNANCE IN CLOUD
Answer: d
Explanation: Such applications feature 1. Which of the following service provider
automated upgrades, updates, and patch provides the highest level of service?
management and much faster rollout of a) SaaS
changes. b) PaaS
c) IaaS
8. SaaS supports multiple users and provides d) All of the mentioned
a shared data model through _________
model. Answer: a
a) single-tenancy Explanation: As you move upward in the
b) multi-tenancy stack, each service model inherits the
c) multiple-instance capabilities of the model beneath it, as well as
d) all of the mentioned all the inherent security concerns and risk
factors.
Answer: b
Explanation: The alternative of software 2. Point out the correct statement.
virtualization of individual instances also a) PaaS supplies the infrastructure
exists, but is less common. b) IaaS adds application development
frameworks, transactions, and control
9. Open source software used in a SaaS is structures
called _______ SaaS. c) SaaS is an operating environment with
a) closed applications, management, and the user
b) free interface
c) open d) All of the mentioned
d) all of the mentioned
Answer: c
Answer: c Explanation: IaaS has the least levels of
Explanation: A considerable amount of SaaS integrated functionality and the lowest levels
software is based on open source software. of integrated security, and SaaS has the most.
10. The componentized nature of SaaS 3. Which of the following functional cloud
solutions enables many solutions to support a computing hardware/software stack is the
feature called _____________ Cloud Reference Model?
a) workspace a) CAS
b) workloads b) CSA
c) mashups c) SAC
d) all of the mentioned d) All of the mentioned
Answer: c Answer: b
Explanation: A mashup is an application that Explanation: Cloud Security Alliance (CSA)

Downloaded From: https://cse-r17.blogspot.com 41


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

is a not-for-profit organization with a mission 7. Which of the following cloud does not
to “promote the use of best practices for require mapping?
providing security assurance within Cloud. a) Public
b) Private
4. For the _________ model, the security c) Hybrid
boundary may be defined for the vendor to d) None of the mentioned
include the software framework and
middleware layer. Answer: a
a) SaaS Explanation: Private cloud may be internal
b) PaaS or external to an organization.
c) IaaS
d) All of the mentioned 8. Which of the following service model is
owned in terms of infrastructure by both
Answer: b vendor and customer?
Explanation: In the PaaS model, the a) Public
customer would be responsible for the b) Private
security of the application and UI at the top of c) Hybrid
the stack. d) None of the mentioned

5. Point out the wrong statement. Answer: c


a) Each different type of cloud service Explanation: Infrastructure location is both
delivery model creates a security boundary on- and off-premises.
b) Any security mechanism below the
security boundary must be built into the 9. Which of the following model type is not
system trusted in terms of security?
c) Any security mechanism above the security a) Public
boundary must be maintained by the customer b) Private
d) All of the mentioned c) Hybrid
d) None of the mentioned
Answer: d
Explanation: As you move up the stack, it Answer: a
becomes more important to make sure that Explanation: It is owned by a vendor.
the type and level of security is part of your
Service Level Agreement. 10. Which of the following has infrastructure
security managed and owned by the vendor?
6. Which of the following model allows a) Hybrid
vendor to provide security as part of the b) Private/Community
Service Level Agreement? c) Public
a) SaaS d) None of the mentioned
b) PaaS
c) IaaS Answer: b
d) All of the mentioned Explanation: Cloud computing has a
tendency to blur the location of the defined
Answer: a security perimeter in such a way that the
Explanation: Compliance, governance, and previous notions of network firewalls and
liability levels are stipulated under the edge defenses often no longer apply.
contract for the entire stack.

Downloaded From: https://cse-r17.blogspot.com 42


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

TOPIC 4.7 VIRTUAL MACHINE networks?


a) StorageGRID
SECURITY & SECURITY b) DataGRID
STANDARDS c) DiskGRID
d) All of the mentioned
1. Which of the following feature make
cloud-based storage systems highly reliable? Answer: a
a) Redundant networks Explanation: StorageGRID can enforce
b) Redundant name servers policies and create a tiered storage system.
c) Replication
5. Point out the wrong statement.
d) All of the mentioned
a) AWS S3 essentially lets you create your
Answer: d own cloud storage
Explanation: Failover can involve a system b) AWS created “Availability Zones” within
simply changing the pointers to the stored regions, which are sets of systems that are
object’s location. isolated from one another
c) Amazon Web Services (AWS) adds
2. Point out the correct statement. redundancy to its IaaS systems by allowing
a) With Atmos, you can create your own EC2 virtual machine instances
cloud storage system or leverage a public d) None of the mentioned
cloud service with Atmos online
b) IBM is a major player in cloud computing Answer: d
particularly for businesses Explanation: In theory, instances in different
c) In managed storage, the storage service availability zones shouldn’t fail at the same
provider makes storage capacity available to time.
users
6. A ________ is a logical unit that serves as
d) All of the mentioned
the target for storage operations, such as the
Answer: a SCSI protocol READs and WRITEs.
Explanation: User pays for the storage using a) GETs
a pay-as-you-go model in managed cloud b) PUN
storage. c) LUN
d) All of the mentioned
3. Redundancy has to be implemented at the
_________ architectural level for effective Answer: c
results in cloud computing. Explanation: In traditional pooled storage
a) lower deployments, storage partitions can be
b) higher assigned and provide a device label called a
c) middle Logical Unit Number.
d) all of the mentioned
7. Which of the following use LUNs to define
Answer: b a storage volume that appears to a connected
Explanation: ADrive provides online cloud computer as a device?
storage and backup solutions for personal, a) SAN
business and enterprise-level data. b) iSCSI
c) Fibre Channel
4. Which of the following can manage data d) All of the mentioned
from CIFS and NFS file systems over HTTP

Downloaded From: https://cse-r17.blogspot.com 43


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Answer: d
Explanation: Unused LUNs are the
ADVANCEMENTS
equivalent of a raw disk from which one or
more volumes may be created. TOPIC 5.1 HADOOP
8. Which of the following protocol is used for
discovering and retrieving objects from a 1. IBM and ________ have announced a
cloud? major initiative to use Hadoop to support
a) OCCI university courses in distributed computer
b) SMTP programming.
c) HTTP a) Google Latitude
d) All of the mentioned b) Android (operating system)
c) Google Variations
Answer: a d) Google
Explanation: Making cloud storage data
discoverable on a TCP/IP network using Answer: d
HTTP or some other protocol requires that Explanation: Google and IBM Announce
objects be assigned a unique identifier. University Initiative to Address Internet-
Scale.
9. Which of the following disk operation is
performed When a tenant is granted access to 2. Point out the correct statement.
a virtual storage container? a) Hadoop is an ideal environment for
a) CRUD extracting and transforming small volumes of
b) File system modifications data
c) Partitioning b) Hadoop stores data in HDFS and supports
d) All of the mentioned data compression/decompression
c) The Giraph framework is less useful than a
Answer: d MapReduce job to solve graph and machine
Explanation: Data stored in a virtual storage learning
container may be stored in chunks or buckets. d) None of the mentioned

10. Which of the following standard connect Answer: b


distributed hosts or tenants to their Explanation: Data compression can be
provisioned storage in the cloud? achieved using compression algorithms like
a) CDMI bzip2, gzip, LZO, etc. Different algorithms
b) OCMI can be used in different scenarios based on
c) COA their capabilities.
d) All of the mentioned
3. What license is Hadoop distributed under?
Answer: a a) Apache License 2.0
Explanation: CDMI stands for Cloud Data b) Mozilla Public License
Management Interface. c) Shareware
d) Commercial

Answer: a
Explanation: Hadoop is Open Source,
UNIT V CLOUD released under Apache 2 license.

TECHNOLOGIES AND

Downloaded From: https://cse-r17.blogspot.com 44


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

4. Sun also has the Hadoop Live CD Answer: c


________ project, which allows running a Explanation: Hadoop has support for cross-
fully functional Hadoop cluster using a live platform operating system.
CD.
a) OpenOffice.org 8. Hadoop achieves reliability by replicating
b) OpenSolaris the data across multiple hosts and hence does
c) GNU not require ________ storage on hosts.
d) Linux a) RAID
b) Standard RAID levels
Answer: b c) ZFS
Explanation: The OpenSolaris Hadoop d) Operating system
LiveCD project built a bootable CD-ROM
image. Answer: a
Explanation: With the default replication
5. Which of the following genres does value, 3, data is stored on three nodes: two on
Hadoop produce? the same rack, and one on a different rack.
a) Distributed file system
b) JAX-RS 9. Above the file systems comes the
c) Java Message Service ________ engine, which consists of one Job
d) Relational Database Management System Tracker, to which client applications submit
MapReduce jobs.
Answer: a a) MapReduce
Explanation: The Hadoop Distributed File b) Google
System (HDFS) is designed to store very c) Functional programming
large data sets reliably, and to stream those d) Facebook
data sets at high bandwidth to the user.
Answer: a
6. What was Hadoop written in? Explanation: MapReduce engine uses to
a) Java (software platform) distribute work around a cluster.
b) Perl
c) Java (programming language) 10. The Hadoop list includes the HBase
d) Lua (programming language) database, the Apache Mahout ________
system, and matrix operations.
Answer: c a) Machine learning
Explanation: The Hadoop framework itself is b) Pattern recognition
mostly written in the Java programming c) Statistical classification
language, with some native code in C and d) Artificial intelligence
command-line utilities written as shell-
scripts. Answer: a
Explanation: The Apache Mahout project’s
7. Which of the following platforms does goal is to build a scalable machine learning
Hadoop run on? tool.
a) Bare metal
b) Debian
c) Cross-platform
TOPIC 5.2 MAPREDUCE
d) Unix-like
1. The Mapper implementation processes one
line at a time via _________ method.

Downloaded From: https://cse-r17.blogspot.com 45


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

a) map by specifying a Comparator via


b) reduce JobConf.setOutputKeyComparatorClass(Class)
c) mapper
d) reducer 5. Point out the wrong statement.
a) The Mapper outputs are sorted and then
Answer: a partitioned per Reducer
Explanation: The Mapper outputs are sorted b) The total number of partitions is the same
and then partitioned per Reducer. as the number of reduce tasks for the job
c) The intermediate, sorted outputs are always
2. Point out the correct statement. stored in a simple (key-len, key, value-len,
a) Mapper maps input key/value pairs to a set value) format
of intermediate key/value pairs d) None of the mentioned
b) Applications typically implement the
Mapper and Reducer interfaces to provide the Answer: d
map and reduce methods Explanation: All intermediate values
c) Mapper and Reducer interfaces form the associated with a given output key are
core of the job subsequently grouped by the framework, and
d) None of the mentioned passed to the Reducer(s) to determine the
final output.
Answer: d
Explanation: The transformed intermediate 6. Applications can use the ____________ to
records do not need to be of the same type as report progress and set application-level
the input records. status messages.
a) Partitioner
3. The Hadoop MapReduce framework b) OutputSplit
spawns one map task for each __________ c) Reporter
generated by the InputFormat for the job. d) All of the mentioned
a) OutputSplit
b) InputSplit Answer: c
c) InputSplitStream Explanation: Reporter is also used to update
d) All of the mentioned Counters, or just indicate that they are alive.

Answer: b 7. The right level of parallelism for maps


Explanation: Mapper implementations are seems to be around _________ maps per-
passed the JobConf for the job via the node.
JobConfigurable.configure(JobConf) method a) 1-10
and override it to initialize themselves. b) 10-100
c) 100-150
4. Users can control which keys (and hence d) 150-200
records) go to which Reducer by
implementing a custom? Answer: b
a) Partitioner Explanation: Task setup takes a while, so it
b) OutputSplit is best if the maps take at least a minute to
c) Reporter execute.
d) All of the mentioned
8. The number of reduces for the job is set by
Answer: a the user via _________
Explanation: Users can control the grouping a) JobConf.setNumTasks(int)

Downloaded From: https://cse-r17.blogspot.com 46


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

b) JobConf.setNumReduceTasks(int)
c) JobConf.setNumMapTasks(int)
d) All of the mentioned

Answer: b
Explanation: Reducer has 3 primary phases:
shuffle, sort and reduce.

9. The framework groups Reducer inputs by


key in _________ stage.
a) sort
b) shuffle
c) reduce
d) none of the mentioned a) Type 1
b) Type 2
Answer: a
c) Type 3
Explanation: The shuffle and sort phases
d) All of the mentioned
occur simultaneously; while map-outputs are
being fetched they are merged. Answer: a
Explanation: A hypervisor running on bare
10. The output of the reduce task is typically
metal is a Type 1 VM or native VM.
written to the FileSystem via _____________
a) OutputCollector.collect 2. Point out the wrong statement.
b) OutputCollector.get a) Load balancing virtualizes systems and
c) OutputCollector.receive resources by mapping a logical address to a
d) OutputCollector.put physical address
b) Multiple instances of various Google
Answer: a
applications are running on different hosts
Explanation: The output of the Reducer is
c) Google uses hardware virtualization
not sorted.
d) All of the mentioned

TOPIC 5.3 VIRTUAL BOX Answer: c


Explanation: Google performs server load
balancing to distribute the processing load
1. Which type of Hypervisor is shown in the
and to get high utilization rates.
following figure?
3. Which of the following is another name for
the system virtual machine?
a) hardware virtual machine
b) software virtual machine
c) real machine
d) none of the mentioned

Answer: a
Explanation: Some virtual machines are
designed to run only a single application or
process and are referred to as process virtual
machines.

Downloaded From: https://cse-r17.blogspot.com 47


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

4. Which of the following provide system c) KVM


resource access to virtual machines? d) LynxSecure
a) VMM
b) VMC Answer: d
c) VNM Explanation: Type 1 VMs have no host
d) All of the mentioned operating system because they are installed
on a bare system.
Answer: a
Explanation: VMM is another name for 8. Which of the following is Type 2 VM?
Hypervisor. a) VirtualLogix VLX
b) VMware ESX
5. Point out the correct statement. c) Xen
a) A virtual machine is a computer that is d) LynxSecure
walled off from the physical computer that
the virtual machine Answer: c
is running on Explanation: Xen is used by Amazon Web
b) Virtual machines provide the capability of Services to provide Amazon Machine
running multiple machine instances, each Instances (AMIs).
with their own operating system
c) The downside of virtual machine 9. Which of the following will be the host
technologies is that having resources operating system for Windows Server?
indirectly addressed means there is some a) VirtualLogix VLX
level of overhead b) Microsoft Hyper-V
d) All of the mentioned c) Xen
d) All of the mentioned
Answer: d
Explanation: This makes virtual machine Answer: b
technology very useful for running old Explanation: Type 2 virtual machines are
versions of operating systems, testing installed over a host operating system.
applications in what amounts to a sandbox.
10. Which of the following should be placed
6. An operating system running on a Type in second lowermost layer for the following
______ VM is full virtualization. figure?
a) 1
b) 2
c) 3
d) All of the mentioned

Answer: a
Explanation: Because it is a complete
simulation of the hardware that it is running
on.

7. Which of the following is Type 1


Hypervisor?
a) Wind River Simics
b) Virtual Server 2005 R2

Downloaded From: https://cse-r17.blogspot.com 48


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

2. Point out the correct statement.


a) With PaaS, the goal is to create hosted
scalable applications that are used in a
Software as a Service model
b) Applications built using PaaS tools need to
be standards-based
c) In Wolf, the data and transaction
management conforms to the business rules
you create
d) All of the mentioned

Answer: d
Explanation: Wolf lets you work with Adobe
Flash or Flex or with Microsoft Silverlight.

3. Which of the following figure correctly


describe major features provided by Google
a) Host Operating System App Engine?
b) Software a)
c) VM
d) None of the mentioned

Answer: a
Explanation: Examples of Type 2 Virtual
Machine Monitors are Containers, KVM,
Microsoft Hyper V and Parallels Desktop for
Mac.

TOPIC 5.4 | 5.5 GOOGLE APP


b)
ENGINE, PROGRAMMING
ENVIRONMENT FOR GOOGLE
APP ENGINE

1. Which of the following algorithm is used


by Google to determine the importance of a
particular page?
a) SVD
b) PageRank
c) FastMap
d) All of the mentioned c)

Answer: b
Explanation: Content on pages is scanned up
to a certain number of words and placed into
an index.

Downloaded From: https://cse-r17.blogspot.com 49


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

6. Which of the following protocol lets a Web


site list in an XML file information?
a) Sitemaps
b) Mashups
c) Hashups
d) All of the mentioned

Answer: a
Explanation: Sitemaps can be useful in
allowing content that isn’t browsable to be
d) All of the mentioned crawled.

Answer: d 7. Which of the following is not provided by


Explanation: For an application to run on “Deep Web”?
GAE, it must comply with Google’s platform a) Database generated Web pages
standards, which narrows the range of b) Private or limited access Web pages
applications that can be run and severely c) Pages without links
limits those applications’ portability. d) All of the mentioned

4. Based on PageRank algorithm, Google Answer: d


returns __________ for a query that is parsed Explanation: Online content that isn’t
for its keywords. indexed by search engines belongs to what
a) SEP has come to be called the “Deep Web”.
b) SAP
c) SERP 8. Dynamic content presented in Google
d) Business Objects Build _______ crawling isn’t normally indexed.
a) AJAX
Answer: c b) Java
Explanation: SERP stands for Search Engine c) Javascript
Results Page. d) All of the mentioned

5. Point out the wrong statement. Answer: a


a) Wolf Frameworks uses a C# engine and Explanation: Google now has a procedure
supports both Microsoft SQL Server and that helps the Google engine crawl this
MySQL database information.
b) Applications built in Wolf are 50-percent
browser-based and support mashable and 9. Which of the following google product
multisource overlaid content sends you periodic email alerts based on your
c) Google applications are cloud-based search term?
applications a) Alerts
d) None of the mentioned b) Blogger
c) Calendar
Answer: b d) All of the mentioned
Explanation: Wolf has architected its
platform so applications can be built without Answer: a
the need to write technical code. Explanation: By creating a Google Alert,
you can get email notifications any time

Downloaded From: https://cse-r17.blogspot.com 50


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

Google finds new results on a topic that a) SIP


interests you. b) SIMPLE
c) XMPP
10. Which of the following is a payment d) IMPS
processing system by Google?
a) Paytm Answer: b
b) Checkout Explanation: They allow their users to
c) Code connect with the other services’ public users
d) All of the mentioned for a fee.

Answer: b 4. Which of the following protocol is not an


Explanation: Google Checkout was an online Internet Engineering Task Force standard?
payment processing service provided by a) SIP
Google aimed at simplifying the process of b) SIMPLE
paying for online purchases. c) XMPP
d) IMPS
TOPIC 5.6 OPEN STACK Answer: d
Explanation: IMPS is an IM communications
1. How many types of protocols are important standard.
for instant messaging?
a) 2 5. Point out the wrong statement.
b) 3 a) All IM clients use peer-to-peer messaging
c) 4 b) IM software aimed at businesses such as
d) All of the mentioned XMPP, Lotus Sametime, and Microsoft
Office Communicator use a client/server
Answer: b architecture
Explanation: In an effort to create an c) Instant messaging is as popular in business
interoperability standard between different as it is in personal communications
IM clients, several instant messaging d) None of the mentioned
protocols have been created.
Answer: d
2. Point out the correct statement. Explanation: Some IM clients use peer-to-
a) Every third-party IM clients aim to allow peer messaging.
their users to connect to the different major
IM services 6. Which of the following IM client allow
b) SIP stands for Secure Initiation Protocol their users to connect to the different major
c) XMPP stands for Extensible Messaging IM services?
and Presence Protocol a) Pidgin
d) All of the mentioned b) Miranda IM
c) Trillian
Answer: c d) All of the mentioned
Explanation: SIP stands for Session
Initiation Protocol. Answer: d
Explanation: Trillian runs on Windows,
3. Which of the following protocol is adopted Macintosh, IOS (iPhone OS), Android,
for interoperability by top three IM service Blackberry, and inside browsers.
providers?

Downloaded From: https://cse-r17.blogspot.com 51


CS8791 Cloud Computing www.studymaterialz.in
CSE - Regulations 2017

7. Which of the following is also referred to b) Scala


as Short Message Service? c) Java
a) Mini-blogs d) All of the mentioned
b) Micro-blogs
c) Nano-blogs Answer: b
d) None of the mentioned Explanation: The Twitter Web client was
built using Ruby on Rails and deployed on
Answer: b the Ruby Enterprise Edition, with the
Explanation: When a service collects your message queue server written in Scala.
messages in a conversation, it is called a
micro-blog. 10. Which of the following version of office
suite is shown in the figure?
8. Which of the following is a good example
of an SMS service organized into a social
network and blog?
a) Twitter
b) Facebook
c) Instagram
d) None of the mentioned

Answer: a a) Offline
Explanation: It is sometimes referred to as b) Online
the SMS of the Internet or as a form of c) Online and Offline
Internet Relay Chat (IRC). d) None of the mentioned

9. Which of the following language is used to Answer: b


build a message server queue in twitter? Explanation: Glide Digital OS4 is a complete
a) Ruby suite with office software, e-mail, and other
tools that replicate an online desktop.

Downloaded From: https://cse-r17.blogspot.com 52

You might also like