Professional Documents
Culture Documents
CS8791 Cloud Computing
CS8791 Cloud Computing
CS8791 Cloud Computing
in
CSE - Regulations 2017
the technology it is built on is evolutionary systems, the intranet too becomes identified
d) None of the mentioned as a cloud.
Answer: a
1. In distributed system, each processor has Explanation: None.
its own ___________
a) local memory 6. Processes on the remote systems are
b) clock identified by ___________
c) both local memory and clock a) host ID
d) none of the mentioned b) host name and identifier
c) identifier
Answer: c d) process ID
Explanation: None.
Answer: b
2. If one site fails in distributed system then Explanation: None.
___________
a) the remaining sites can continue operating 7. Which routing technique is used in a
b) all the sites will stop working distributed system?
c) directly connected sites will stop working a) fixed routing
d) none of the mentioned b) virtual routing
M
Web service platform available to developers
on a usage-basis model
O
d) All of the mentioned
Answer: c
C
Explanation: Through hardware
virtualization on Xen hypervisors,
T.
b) Amazon.com has made it possible to create
private virtual servers that you can run
worldwide.
O
3. Which of the following is the central
application in the AWS portfolio?
SP
a) Amazon Elastic Compute Cloud
b) Amazon Simple Queue Service
c) Amazon Simple Notification Service
d) Amazon Simple Storage System
G
Answer: a
Explanation: Amazon Elastic Compute
LO
Answer: b
d) None of the mentioned Explanation: In a loosely coupled SOA
SE
Answer: b
Explanation: Autoscaling is part of Amazon TOPIC 1.7 ON-DEMAND
Cloudwatch and available at no additional PROVISIONING
charge.
1. Which of the following cloud storage is
8. Which of the following is a Web service mainly meant for developers and to support
that can publish messages from an application applications built using Web services?
and deliver them to other applications or to a) Managed
subscribers? b) Unmanaged
a) Amazon Elastic Compute Cloud c) Disk
b) Amazon Simple Queue Service d) All of the mentioned
c) Amazon Simple Notification Service
d) Amazon Simple Storage System Answer: a
Explanation: Managed cloud storage is
provisioned and provided as a raw disk.
TECHNOLOGIES Answer: a
Explanation: A business task is a
composition of services.
TOPIC 2.1 SERVICE ORIENTED
ARCHITECTURE 4. Which of the following module of SOA is
shown in the following figure?
1. Which of the following describes a
message-passing taxonomy for a component-
based architecture that provides services to
clients upon demand? a) Description
a) SOA b) Messaging
b) EBS c) Business Process
c) GEC d) QOS
d) All of the mentioned
Answer: d
Answer: a Explanation: QoS is established, and the
Explanation: Clients access a component that service is instantiated.
complies with SOA by passing a message
5. Point out the wrong statement.
containing metadata to be acted upon in a
a) SOA provides the standards that transport
standard format.
M
d) None of the mentioned
TOPIC 2.2 REST AND SYSTEMS
OF SYSTEMS Answer: a
O
Explanation: The @PathVariable annotation
1. To publish a REST service with Spring. is added as an input parameter to the handler
C
a) publishing an application’s data as a REST method, per Spring’s MVC conventions, in
service order for it to be used inside the handler
T.
b) accessing data from third-party REST method body.
services
c) none of the mentioned 5. Notation for defining REST endpoints.
a) { }
O
d) all of the mentioned
b) *
Answer: d c) All of the mentioned
SP
Explanation: One involves publishing an d) None of the mentioned
application’s data as a REST service, the
other one involves accessing data from third- Answer: c
party REST services to be used in an Explanation: In addition to supporting the {
G
application. } notation, it’s also possible to use a wildcard
* notation for defining REST endpoints.
2. Publishing an application’s data as a REST
LO
as a REST service revolves around the use of Explanation: The membertemplate view is
the Spring MVC annotations defined as a MarshallingView type, which is a
@RequestMapping and @PathVariable. general-purpose class that allows a response
to be rendered using a marshaller.
-R
b) False
a) True
Answer: a b) False
Explanation: This recipe will explore the
simplest mechanism, which involves the use Answer: a
C
M
marshallers.
a) Jaxb2Marshaller Answer: a
b) XmlBeansMarshaller Explanation: This annotation allows the
O
c) CastorMarshalle Jaxb2Marshaller marshaller to detect a class’s
d) All of the mentioned (i.e., object’s) fields and transform them into
C
XML data.
Answer: d
T.
Explanation: The marshaller used by 12. Accessing a third-party REST service
MarshallingView belongs to one of a series of inside a Spring application.
XML marshallers provided by Spring— a) RestTemplate Class
Jaxb2Marshaller. Other marshallers provided b) ViewResolver
O
by Spring include CastorMarshaller, c) InternalViewResolver
JibxMarshaller, XmlBeansMarshaller, and d) View
SP
XStreamMarshaller.
Answer: a
9. To configure Jaxb2Marshaller marshaller Explanation: Accessing a third-party REST
we require. service inside a Spring application revolves
G
a) ClassesToBeBound around the use of the Spring RestTemplate
b) ContextPath class.
c) All of the mentioned
LO
10. In the case of classesToBeBound, the Explanation: The structure of the REST
classes assigned to this property, indicate the service end point comprises an address,
class (i.e., object) structure that is to be which starts with http:// and ends with ?, as
transformed into XML. well as a series of parameters that start with ?
-R
Answer: a Answer: a
Explanation: Publishing message is handled Explanation: Publish() method also accepts
arbitrary keyword arguments, which are called as str, and in python 2 it is called as
passed along as attributes of the message. unicode.
6. The topic in the publish method is in which 10. When you publish a message ________ is
form? automatically created?
a) Binomial form a) Client
b) Canonical form b) Server
c) Nominal form c) Batch
d) Message form d) Server
Answer: b Answer: c
Explanation: The topic is passed along as a Explanation: Whenever we publish a
string; all topics have the canonical form of message, a batch is automatically created.
projects/{project_name}/topic/{topic_name}. This way, if you publish a large volume of
messages, it reduces the number of requests
7. The message in pub/sub is an opaque blob made to the server.
of ________
a) Bits 11. When the batch is created, it begins a
b) Bytes countdown that publishes the batch once
c) Word sufficient time has elapsed.
d) Nibble a) True
b) False
Answer: b
Explanation: The message in pub/sub is an Answer: a
opaque blob of bytes, and as such, you must Explanation: When the batch is created, it
send a bytes object in python 3. begins a countdown that publishes the batch
once sufficient time has elapsed.
8. ________ error will show if we try to send
text string instead of bytes. 12. What is the time elapsed after a batch is
a) TypeError created?
b) Error a) 0.5 seconds
c) Linker error b) 0.05 seconds
d) Compiler error c) 1.5 seconds
d) 1 second
Answer: a
Explanation: If we send a text string the Answer: b
method will raise TypeError. TypeError will Explanation: When the batch is created, it
show if we try to send text string instead of begins a countdown that publishes the batch
bytes. once sufficient time has elapsed by default it
is 0.05 seconds.
9. What do we call string in python 2?
a) Str 13. Every call to publish() will return a class
b) Unicode that conforms to the __________ interface.
c) Strs a) Batch
d) Unicades b) Client
c) Server
Answer: b d) Future
Explanation: In python 2 the text string is
Answer: d
Explanation: Every call to publish() will
return a class that conforms to the future
interface. You can use this to ensure that the
publish.
Answer: a
TOPIC 2.6 TYPES OF Explanation: You can define the features in
VIRTUALIZATION software and hardware that enables flexibility
as conforming to one or more of the mobility
patterns.
TOPIC 2.7 IMPLEMENTATION
LEVELS OF VIRTUALIZATION 2. Point out the wrong statement.
a) Abstraction enables the key benefit of
cloud computing: shared, ubiquitous access
TOPIC 2.8 VIRTUALIZATION b) Virtualization assigns a logical name for a
STRUCTURES physical resource and then provides a pointer
to that physical resource when a request is
made
1. Which of the following correctly represents c) All cloud computing applications combine
different types of mobile patterns? their resources into pools that can be assigned
a) on demand to users
d) All of the mentioned
Answer: c
Explanation: Several important cloud
computing approaches use a strictly
hardware-based approach to abstraction.
Answer: d
Explanation: To enable these characteristics,
c) resources must be highly configurable and
flexible.
Answer: b
Explanation: Load balancing can be used to
increase utilization and throughput, lower
latency, reduce response time, and avoid
system overload.
of the first four of five key attributes of cloud b) The devices connected using I/O mapping
computing. have a bigger buffer space
c) The devices have to deal with fewer
address lines
TOPIC 2.9 TOOLS AND d) No advantage as such
MECHANISMS
VIRTUALIZATION OF CPU, Answer: c
MEMORY AND I/O DEVICES Explanation: Since the I/O mapped devices
have a separate address space the address
lines are limited by the amount of the space
1. In memory-mapped I/O ____________ allocated.
a) The I/O devices and the memory share the
same address space 5. The system is notified of a read or write
b) The I/O devices have a separate address operation by ___________
space a) Appending an extra bit of the address
c) The memory and I/O devices have an b) Enabling the read or write bits of the
associated address space devices
d) A part of the memory is specifically set c) Raising an appropriate interrupt signal
aside for the I/O operation d) Sending a special signal along the BUS
Answer: a Answer: d
Explanation: Its the different modes of Explanation: It is necessary for the processor
accessing the i/o devices. to send a signal intimating the request as
either read or write.
2. The usual BUS structure used to connect
the I/O devices is ___________ 6. To overcome the lag in the operating
a) Star BUS structure speeds of the I/O device and the processor we
b) Multiple BUS structure use ___________
c) Single BUS structure a) BUffer spaces
d) Node to Node BUS structure b) Status flags
c) Interrupt signals
Answer: c d) Exceptions
Explanation: BUS is a collection of address,
control and data lines used to connect the Answer: b
various devices of the computer. Explanation: The processor operating is
much faster than that of the I/O devices, so by
3. In intel’s IA-32 architecture there is a using the status flags the processor need not
separate 16 bit address space for the I/O wait till the I/O operation is done. It can
devices. continue with its work until the status flag is
a) False set.
b) True
7. The method of accessing the I/O devices
Answer: b by repeatedly checking the status flags is
Explanation: This type of access is called as ___________
I/O mapped devices. a) Program-controlled I/O
b) Memory-mapped I/O
4. The advantage of I/O mapped devices to
c) I/O mapped
memory mapped is ___________
d) None of the mentioned
a) The former offers faster transfer of data
Answer: a
TOPIC 2.10 VIRTUALIZATION
Explanation: In this method, the processor
constantly checks the status flags, and when it SUPPORT AND DISASTER
finds that the flag is set it performs the RECOVERY
appropriate operation.
M
This set of SAN multiple choice questions
8. The method of synchronising the processor and answers focuses on Backup and
with the I/O device in which the device sends
O
Recovery.
a signal when it is ready is?
a) Exceptions 1. The purpose of backup is:
C
b) Signal handling a) To restore a computer to an operational
c) Interrupts state following a disaster
T.
d) DMA b) To restore small numbers of files after they
have been accidentally deleted
Answer: c c) To restore one among many version of the
Explanation: This is a method of accessing
O
same file for multiple backup environment
the I/O devices which gives the complete d) All of the mentioned
power to the devices, enabling them to
SP
intimate the processor when they’re ready for Answer: d
transfer.
2. Backup of the source data can be created
9. The method which offers higher speeds of a) On the same device
G
I/O transfers is ___________ b) On another device
a) Interrupts c) At some other location
b) Memory mapping d) All of the mentioned
LO
c) Program-controlled I/O
d) DMA Answer: d
Answer: d 3. Which of the following backup technique
.B
c) Reviewing backup
d) Echoing b) Tape library is an example of nearline
storage
Answer: a c) Data recovery can take hours for offline
Explanation: None. backup
C
Answer: d
5. Which of the following qualifies as best 10. Which of the following is Backup
DR (Disaster Recovery) site? software?
a) DR site in the same campus a) Amanda
b) DR site in the same city b) Bacula
c) DR site in the same country c) IBM Tivoli Storage Manager
d) DR site in a different country d) All of the mentioned
Answer: d Answer: d
Answer: c
because changes can be made to a layer 1. Which of the following is one of the unique
independently of the rest of the program attributes of Cloud Computing?
c) All of the mentioned a) utility type of delivery
d) None of the mentioned b) elasticity
c) low barrier to entry
Answer: d d) all of the mentioned
Explanation: All of the mentioned are
correct. Answer: d
Explanation: These attributes change how
9. What are the drawbacks for Layers? applications are created, priced, and
a) It is often necessary to pass data through delivered.
many layers, which can slow performance
significantly 2. Point out the correct statement.
b) Layers support information hiding a) Service Level Agreements (SLAs) is small
c) Multi-layered programs can be hard to aspect of cloud computing
debug because operations tend to be b) Cloud computing does not have impact on
implemented through a series of calls across software licensing
layers c) Cloud computing presents new
d) None of the mentioned opportunities to users and developers
d) All of the mentioned
Answer: c
Explanation: Layers support information Answer: c
hiding is an advantage and not a drawback. Explanation: Because it is based on the
paradigm of a shared multi-tenant utility.
10. Which of the following is correct?
a) Layers are not strongly coupled to the 3. Applications that work with cloud
layers above them computing that have low margins and usually
b) Each layer is strongly coupled only to the low risk are _____________
layer immediately below it a) high touch
c) Overall Layered-style architectures are b) low touch
loosely coupled c) moderate touch
d) All of the mentioned d) all of the mentioned
Answer: d Answer: b
Explanation: Layers are not strongly coupled Explanation: The “high touch” applications
to the layers above them. If a program uses that come with high margins require
theStrict Layered style, then each layer is committed resources and pose more of a risk.
strongly coupled only to the layer
immediately below it. As a result, overall 4. A service that concentrates on hardware
Layered-style architectures are loosely follows the _________ as a Service model.
coupled. a) IaaS
b) CaaS
c) PaaS
TOPIC 3.2 NIST CLOUD d) All of the mentioned
COMPUTING REFERENCE
ARCHITECTURE Answer: a
Explanation: Amazon web service follows
PaaS model.
9. Which of the following benefit is provided cannot attach to the appropriate service
by the PaaS service provider? d) All of the mentioned
a) A larger pool of qualified developers
b) More reliable operation Answer: a
c) A logical design methodology Explanation: The software that runs in the
d) All of the mentioned virtual machines is what defines the utility of
the cloud computing system.
Answer: d
Explanation: The essence of a service 3. Which of the following component is
oriented design is that services are called hypervisor?
constructed from a set of modules using a) VGM
standard communications and service b) VMc
interfaces. c) VMM
d) All of the mentioned
10. Communication between services is done
widely using _______ protocol. Answer: c
a) REST Explanation: VMM component is also called
b) SOAP hypervisor.
c) RESTful
d) None of the mentioned 4. Applications such as a Web server or
database server that can run on a virtual
Answer: b machine image are referred to as
Explanation: There are alternative sets of ______________
standards as well. a) virtual server
b) virtual appliances
c) machine imaging
TOPIC 3.4 IAAS, PAAS, SAAS d) all of the mentioned
_____________
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
Answer: c
Explanation: Load balancing is an
d) All of the mentioned optimization technique.
Answer: a 5. Point out the correct statement.
Explanation: You can define the features in a) A client can request access to a cloud
software and hardware that enables flexibility service from any location
as conforming to one or more of the mobility b) A cloud has multiple application instances
patterns. and directs requests to an instance based on
conditions
2. Point out the wrong statement. c) Computers can be partitioned into a set of
a) Abstraction enables the key benefit of virtual machines with each machine being
cloud computing: shared, ubiquitous access assigned a workload
b) Virtualization assigns a logical name for a d) All of the mentioned
physical resource and then provides a pointer
to that physical resource when a request is Answer: d
made Explanation: Alternatively, systems can be
c) All cloud computing applications combine virtualized through load-balancing
their resources into pools that can be assigned technologies.
on demand to users
d) All of the mentioned 6. Which of the following software can be
used to implement load balancing?
Answer: c a) Apache mod_balancer
Explanation: Several important cloud b) Apache mod_proxy_balancer
computing approaches use a strictly c) F6’s BigIP
hardware-based approach to abstraction. d) All of the mentioned
3. Which of the following type of Answer: b
virtualization is also characteristic of cloud Explanation: Load balancing can be used to
computing? increase utilization and throughput, lower
a) Storage latency, reduce response time, and avoid
b) Application system overload.
c) CPU
d) All of the mentioned 7. Which of the following network resources
can be load balanced?
Answer: d a) Connections through intelligent switches
Explanation: To enable these characteristics, b) DNS
resources must be highly configurable and c) Storage resources
flexible. d) All of the mentioned
4. The technology used to distribute service Answer: d
requests to resources is referred to as Explanation: Load balancing provides the
necessary redundancy to make an intrinsically of the first four of five key attributes of cloud
unreliable system reliable through managed computing.
redirection.
Answer: d
Explanation: Mapping process involves
determining the critical application features
and then matching them to the cloud
provider’s offering to see if those features can
be supported.
a) Abstraction
b) Virtualization 3. ________ data represents more than 50
c) Mobility Pattern percent of the data created every day.
d) All of the mentioned a) Shadow
b) Light
Answer: b
c) Dark
Explanation: Virtualization is a key enabler
d) All of the mentioned
Answer: a c) Analytics
Explanation: Lots of shadow data does get d) None of the mentioned
retained, having never been touched by a
human being. Answer: a
Explanation: Most users interact with cloud
4. Cloud storage data usage in the year 2020 storage using backup, synchronization,
is estimated to be _____________ percent archiving, staging, caching, or some other
resident by IDC. sort of software.
a) 10
b) 15 8. How many categories of storage devices
c) 20 broadly exist in cloud?
d) None of the mentioned a) 1
b) 2
Answer: d c) 3
Explanation: There will be a steady growth d) None of the mentioned
of cloud storage at the expense of online
storage over the next decade. Answer: b
Explanation: Storage devices may be broadly
5. Point out the wrong statement. categorized as either block storage devices or
a) Some APIs are both exposed as SOAP and file storage devices.
REST
b) The role of a cloud vendor specific API 9. Which of the following storage devices
has impact on porting an application exposes its storage to clients as Raw storage
c) There are mainly three types of cloud that can be partitioned to create volumes?
storage a) block
d) None of the mentioned b) file
c) disk
Answer: c d) all of the mentioned
Explanation: Cloud storage can be either
unmanaged or managed. Answer: a
Explanation: It is up to the operating system
6. Which of the following system does not to create and manage the file system.
provision storage to most users?
a) PaaS 10. Which of the following impose additional
b) IaaS overhead on clients and offer faster transfer?
c) CaaS a) Block storage
d) SaaS b) File Storage
c) File Server
Answer: b d) All of the mentioned
Explanation: Cloud storage is storage
accessed by a Web service API. Answer: a
Explanation: File-oriented storage devices
7. The addition of a software package on top are generally slower, but require less
of a cloud storage volume makes most cloud overhead from attached clients.
storage offerings conform to a ________ as a
Service model.
a) Software
TOPIC 3.8 AMAZON S3
b) Platform
Answer: c
Explanation: Cloudfront is similar to systems
such as Akamai.com, but is proprietary to
Amazon.com and is set up to work with
Amazon Simple Storage
System (Amazon S3).
2. Point out the wrong statement. 5. Point out the correct statement.
a) Amazon Machine Instances are sized at a) Amazon Elastic Cloud is a system for
various levels and rented on a creating virtual disks(volume)
computing/hour basis b) SimpleDB interoperates with both Amazon
b) The metrics obtained by CloudWatch may EC2 and Amazon S3
be used to enable a feature called Auto c) EC3 is an Analytics as a Service provider
Scaling d) None of the mentioned
c) A number of tools are used to support EC2
services Answer: b
d) None of the mentioned Explanation: Amazon SimpleDB stores data
in “buckets” and without requiring the
Answer: d creation of a database schema.
Explanation: Through hardware
virtualization on Xen hypervisors, 6. Which of the following is a structured data
Amazon.com has made it possible to create store that supports indexing and data queries
private virtual servers that you can run to both EC2 and S3?
worldwide. a) CloudWatch
b) Amazon SimpleDB
3. Which of the following is an edge-storage c) Amazon Cloudfront
or content-delivery system that caches data in d) All of the mentioned
different physical locations?
a) Amazon Relational Database Service Answer: b
b) Amazon SimpleDB Explanation: SimpleDB isn’t a full database
implementation.
Answer: b
Explanation: This service, which was called
Amazon E-Commerce Service (ECS), is the
means for vendors to add their products to the UNIT IV RESOURCE
Amazon.com site
and take orders and payments.
MANAGEMENT AND
SECURITY IN CLOUD
8. Which of the following is a billing and
account management service?
a) Amazon Elastic MapReduce TOPIC 4.1 INTER CLOUD
b) Amazon Mechanical Turk RESOURCE MANAGEMENT
c) Amazon DevPay
d) Multi-Factor Authentication 1. The properties necessary to guarantee a
reliable transaction in databases and other
Answer: c applications is referred to as _____________
Explanation: DevPay provides a developer a) BASE
API that eliminates the need for application b) ACID
developers to build order pipelines. c) ATOM
d) All of the mentioned
9. Which of the following is a means for
accessing human researchers or consultants to Answer: b
help solve problems on a contractual or Explanation: In computer science, ACID
temporary basis? (Atomicity, Consistency, Isolation,
a) Amazon Elastic MapReduce Durability) is a set of properties that
b) Amazon Mechanical Turk guarantee that database transactions are
c) Amazon DevPay
processed reliably.
d) Multi-Factor Authentication
2. Point out the wrong statement.
Answer: b a) In theory, any application can run either
Explanation: Problems solved by this human completely or partially in the cloud
workforce have included object identification, b) The location of an application or service
video or audio recording, data duplication, plays a fundamental role in how the
and data research. application must be written
c) An application or process that runs on a
10. Which of the following is built on top of a
desktop or server is executed coherently, as a
Hadoop framework using the Elastic
unit, under the control of an integrated
Compute Cloud?
program
a) Amazon Elastic MapReduce
d) None of the mentioned
b) Amazon Mechanical Turk
Answer: b
Explanation: Cloudkick and RightScale are
known to be easy to use with Linux virtual
servers and less so with Windows instances.
d) None of the mentioned
6. Which of the following initiative tries to
provide a way of measuring cloud computing Answer: b
services along dimension like cost? Explanation: Taken together, these products
a) CCE form the basis for CA’s Cloud Connected
b) OCCI Management Suite.
c) SMI
8. Which of the following is open and both
d) All of the mentioned
hypervisor and processor-architecture-
Answer: c agnostic?
Explanation: SMI stands for Service a) Dell Scalent
Measurement Index. b) CloudKick
c) Elastra
7. Which of the following figure correctly d) All of the mentioned
describes products by CA technologies?
a) Answer: a
Explanation: OVF is essentially a container
and a file format.
Answer: c
Explanation: You get the least amount of
built in security with an Infrastructure as a
Service provider, and the most with a
Software as a Service provider.
applications b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: c
Explanation: Additional vulnerabilities arise Answer: b
from pooled, virtualized, and outsourced Explanation: CA Cloud Insight is a cloud
resources. metrics measurement service.
6. Which of the following area of cloud 10. Which of the following is application and
computing is uniquely troublesome? infrastructure management software for
a) Auditing hybrid multi-clouds?
b) Data integrity a) VMware Hyperic
c) e-Discovery for legal compliance b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: d
Explanation: Storing data in the cloud is of Answer: c
particular concern. Explanation: Tapinsystems is provisioning
and management service.
7. Which of the following is the operational
domain of CSA?
a) Scalability TOPIC 4.4 CLOUD SECURITY
b) Portability and interoperability CHALLENGES
c) Flexibility
d) None of the mentioned 1. Which of the following is a compliance
standard?
Answer: b a) PCI-DSS
Explanation: CSA is an industry working b) HIPPA
group that studies security issues in cloud c) GLBA
computing and offers recommendations to its d) All of the mentioned
members.
Answer: d
8. Which of the following is considered an Explanation: A compliance standard can be
essential element in cloud computing by any government regulatory framework.
CSA?
a) Multi-tenancy 2. Point out the correct statement.
b) Identity and access management a) The cloud service model you choose does
c) Virtualization not determine the variety of security features,
d) All of the mentioned compliance auditing, and other requirements
b) To determine the particular security
Answer: a mechanisms you need, you must perform a
Explanation: Multi-tenancy adds a number mapping of the particular cloud service model
of additional security concerns to cloud to the particular application you are deploying
computing that need to be accounted for. c) A security control model includes the
security that you normally use for your
9. Which of the following is used for Web applications only
performance management and load testing? d) All of the mentioned
a) VMware Hyperic
7. _________ applications have a much lower can display a Web page that shows data and
barrier to entry than their locally installed supports features from two or more sources.
competitors.
a) IaaS Answers.
b) CaaS
c) PaaS TOPIC 4.6 SECURITY
d) None of the mentioned
GOVERNANCE IN CLOUD
Answer: d
Explanation: Such applications feature 1. Which of the following service provider
automated upgrades, updates, and patch provides the highest level of service?
management and much faster rollout of a) SaaS
changes. b) PaaS
c) IaaS
8. SaaS supports multiple users and provides d) All of the mentioned
a shared data model through _________
model. Answer: a
a) single-tenancy Explanation: As you move upward in the
b) multi-tenancy stack, each service model inherits the
c) multiple-instance capabilities of the model beneath it, as well as
d) all of the mentioned all the inherent security concerns and risk
factors.
Answer: b
Explanation: The alternative of software 2. Point out the correct statement.
virtualization of individual instances also a) PaaS supplies the infrastructure
exists, but is less common. b) IaaS adds application development
frameworks, transactions, and control
9. Open source software used in a SaaS is structures
called _______ SaaS. c) SaaS is an operating environment with
a) closed applications, management, and the user
b) free interface
c) open d) All of the mentioned
d) all of the mentioned
Answer: c
Answer: c Explanation: IaaS has the least levels of
Explanation: A considerable amount of SaaS integrated functionality and the lowest levels
software is based on open source software. of integrated security, and SaaS has the most.
10. The componentized nature of SaaS 3. Which of the following functional cloud
solutions enables many solutions to support a computing hardware/software stack is the
feature called _____________ Cloud Reference Model?
a) workspace a) CAS
b) workloads b) CSA
c) mashups c) SAC
d) all of the mentioned d) All of the mentioned
Answer: c Answer: b
Explanation: A mashup is an application that Explanation: Cloud Security Alliance (CSA)
is a not-for-profit organization with a mission 7. Which of the following cloud does not
to “promote the use of best practices for require mapping?
providing security assurance within Cloud. a) Public
b) Private
4. For the _________ model, the security c) Hybrid
boundary may be defined for the vendor to d) None of the mentioned
include the software framework and
middleware layer. Answer: a
a) SaaS Explanation: Private cloud may be internal
b) PaaS or external to an organization.
c) IaaS
d) All of the mentioned 8. Which of the following service model is
owned in terms of infrastructure by both
Answer: b vendor and customer?
Explanation: In the PaaS model, the a) Public
customer would be responsible for the b) Private
security of the application and UI at the top of c) Hybrid
the stack. d) None of the mentioned
Answer: d
Explanation: Unused LUNs are the
ADVANCEMENTS
equivalent of a raw disk from which one or
more volumes may be created. TOPIC 5.1 HADOOP
8. Which of the following protocol is used for
discovering and retrieving objects from a 1. IBM and ________ have announced a
cloud? major initiative to use Hadoop to support
a) OCCI university courses in distributed computer
b) SMTP programming.
c) HTTP a) Google Latitude
d) All of the mentioned b) Android (operating system)
c) Google Variations
Answer: a d) Google
Explanation: Making cloud storage data
discoverable on a TCP/IP network using Answer: d
HTTP or some other protocol requires that Explanation: Google and IBM Announce
objects be assigned a unique identifier. University Initiative to Address Internet-
Scale.
9. Which of the following disk operation is
performed When a tenant is granted access to 2. Point out the correct statement.
a virtual storage container? a) Hadoop is an ideal environment for
a) CRUD extracting and transforming small volumes of
b) File system modifications data
c) Partitioning b) Hadoop stores data in HDFS and supports
d) All of the mentioned data compression/decompression
c) The Giraph framework is less useful than a
Answer: d MapReduce job to solve graph and machine
Explanation: Data stored in a virtual storage learning
container may be stored in chunks or buckets. d) None of the mentioned
Answer: a
Explanation: Hadoop is Open Source,
UNIT V CLOUD released under Apache 2 license.
TECHNOLOGIES AND
b) JobConf.setNumReduceTasks(int)
c) JobConf.setNumMapTasks(int)
d) All of the mentioned
Answer: b
Explanation: Reducer has 3 primary phases:
shuffle, sort and reduce.
Answer: a
Explanation: Some virtual machines are
designed to run only a single application or
process and are referred to as process virtual
machines.
Answer: a
Explanation: Because it is a complete
simulation of the hardware that it is running
on.
Answer: d
Explanation: Wolf lets you work with Adobe
Flash or Flex or with Microsoft Silverlight.
Answer: a
Explanation: Examples of Type 2 Virtual
Machine Monitors are Containers, KVM,
Microsoft Hyper V and Parallels Desktop for
Mac.
Answer: b
Explanation: Content on pages is scanned up
to a certain number of words and placed into
an index.
Answer: a
Explanation: Sitemaps can be useful in
allowing content that isn’t browsable to be
d) All of the mentioned crawled.
Answer: a a) Offline
Explanation: It is sometimes referred to as b) Online
the SMS of the Internet or as a form of c) Online and Offline
Internet Relay Chat (IRC). d) None of the mentioned