Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Chap 4 -EIS

Slno Question A B C D

Under emerging BYOD (Bring your


1 Own Device) Threats, risk refers to the Network Application Device Implementation
data lost from stolen or lost devices

Which instance of SaaS allows users


to explore functionality of WebServices
2 such as Google Maps, Payroll TaaS CaaS (d) APIaaS
processing and credir card processing
services etc.
Network of National National National
Institute of Institute of Institute of Institute of
3 NIST stands for
Standards and Standards and Science and Spain and
Technology Technology Technology Turkey
IaaS,DBaaS, IaaS,
4 Basic Service Models as per NIST are IaaS,DTaaS IaaS,SaaS
STaaS PaaS,SaaS
The _____ of the cloud computing
system comprises of the client's
5 Back End Frond End Either a or b Both a and b
devices and some applications are
needed for accessing the cloud
In Cloud Computing the _______ is a
cloud itseld which may encompass
6 Back End Front End Either a or b Both a and b
varipus computer machines data
storage system and servers.
Secured
Security as a
7 SECaaS stands for Services as a Either a or b Both a and b
Service
Service
________ is the foundation of cloud
8 SaaS IaaS NaaS CaaS
services
________ is a hardware level services
9 which offers memory storage and SaaS NaaS IaaS CaaS
Networks etc
VoIP, IM, Videoconferencing are
10 NaaS CaaS SaaS IaaS
offered as a part of which Services
Cloud Computing gives us the ability to
expand and reduce resouces according
Elasticity and Pay as per On Demand
11 to the specific requirement. Which of Resliency
Scalability Usage Service
the following features does the above
line signifies
We pay for cloud services only when
we use them, either for short term or Elasticity and Pay as per On Demand
12 Resliency
for a longer term Which of the following Scalability Usage Service
features does the above line signifies
we invoke cloud services only when we
Elasticity and Pay as per On Demand
13 need them, they are not permanent Resliency
Scalability Usage Service
parts of the IT infrastructure
Which cloud service offering can
completely isolate the failure of server Elasticity and Pay as per On Demand
14 Resliency
and storage resources from cloud Scalability Usage Service
users
Chap 4 -EIS
Slno Question A B C D
Which charateristics of public cloud
service providers that can host the Pay as per On Demand Elasticity and
15 Multi tenancy
cloud services for multiple users within Usage Service Scalability
the same infrastructure
Community
16 Provider Clouds are also called Private Cloud Public Cloud Hybrid Cloud
Cloud
Community
17 Internal Clouds are also called Private Cloud Public Cloud Hybrid Cloud
Cloud
Which model is suitable for
organizations that cannot afford a Community
18 Private Cloud Public Cloud Hybrid Cloud
private cloud and cannot rely on the Cloud
public cloud either.
_______ cloud is shared among two or
Community
19 more organization that have similar Private Cloud Public Cloud Hybrid Cloud
Cloud
cloud requirements
Ability of two or more applications that
are required to support a business
Resource None of the
20 need to work together by sharing data Data Sharing Interoperatbility
Provisioning Above
and other business-related resources in
cloud is called _________
______provides the users the ability to
develop and deploy an application on
21 DTaaS SECaaS PaaS SaaS
the development platform provided by
the service provider
Which Cloud Service offers directory
services, authentication services, risk
22 and event monitoring, single sign-on DTaaS SECaaS IDaaS PaaS
services, and identity and profile
management.
None of the
23 Examples of IaaS OpenStack Eucalyptus. Both a and b
Above
__________ refers refers to
technologies designed to provide a
Mobile None of the
24 layer of abstraction between computer Grid Computing Virtualization
Computing Above
hardware systems and the software
running on them.
Virtualizatioon is the process of
None of the
25 creating _______computing Resource Logical Arithmetic Reasonable
Above
from Physical Resource
The software that creates a virtual Virtual
None of the
26 machine on the host hardware is hypervisor Machine Both a and b
Above
called Manager.
______ normally exemplified and Application Weak BYOD
27 Device Risk Network Risk
hidden in 'Lack of Device Visibility' Risk Policy
____describes sites wherein the
computers will be generated raw data None of the
28 Web 3.0 Semantic Web Both a and b
on their own without direct user Above
interaction.
Chap 4 -EIS
Slno Question A B C D
_______ is a software system that
None of the
29 supports computer-to-computer Web 3.0 Web Services Both a and b
Above
interaction over the Internet
Google Windows Azure None of the
30 Examples of PaaS includes Both a and b
AppEngine Compute Above
Which of these is a software solution
Cloud Green
31 wich fulfills the need of supercomputer Grid Computing Virtualization
Computing Computing
in an orgaanization
Present E-commerce revolution, WWW
32 and emerging technologies have one Hard work Government User Internet
key common factor. Tick it.
Which is not a common services model Virtual Private Bandwidth on Mobile Virtual
33 VOIP
Network as a Service (NaaS)? Network ( VPN) Demand (BOD) Network (MVN)
Which type of risk a company is not
Application Implementation
34 vulnerable to when it adopts Bring Your Availability Risk Device Risk
Risk Risk
Own Device (BYOD)?
Mr. X features in an advertisement of
an Air conditioner of brand Z where he
emphasizes that this Air Conditioner Internet of T Artificial Bring Your Own
35 Cloud Computing
can be all controlled through a mobile. hings (IoT ) Intelligence Device (BYOD)
T his is perfect example of _________
technology.
36 Pick the odd one out. Amazon Alexa BossSpeakers Apple Siri Google Talk
Global System
Global Sim Global System None of the
37 GSM stands for for Mobile
Mobile For Mobile Above
Communication
What are the best practices of Green Conserve
38 Reduce Paper Recycle All of the Above
Computing Energy
The software which help their custoner
Artificial Cloud Mobile
39 and provide online help, falls under Data Mining
Intelligence Computing Computing
which of the following technology
Data and Customers may It is feasibke to
Information can Gettting more have to face continue within
be accessed with work done in restrictions on budgetary
Which of the following is not true about
40 minimal upfront less time with the availabilty allocations and
cloud computing
spending in a pay less resources of applications can be ahead of
as you go are possible OS and completion
approach infrastructure cycle times

You might also like