Download as pdf or txt
Download as pdf or txt
You are on page 1of 301

Seat No -

Total number of questions : 60


12254_CLOUD COMPUTING
Time : 1hr
Max Marks : 50
N.B
1) All questions are Multiple Choice Questions having single correct option.
2) Attempt any 50 questions out of 60.
3) Use of calculator is allowed.
4) Each question carries 1 Mark.
5) Specially abled students are allowed 20 minutes extra for examination.
6) Do not use pencils to darken answer.
7) Use only black/blue ball point pen to darken the appropriate circle.
8) No change will be allowed once the answer is marked on OMR Sheet.
9) Rough work shall not be done on OMR sheet or on question paper.
10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. Which of the following is not a type of cloud?


A : Private
B : Public
C : Protected
D : Hybrid
Q.no 2. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Page 1 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 3. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 4. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 5. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 6. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 7. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Page 2 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 8. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 9. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 10. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 11. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 12. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
Page 3 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Availability
Q.no 13. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 14. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 15. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 16. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 17. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
Page 4 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : iWeb Publish
D : MobileMe Gallery
Q.no 18. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 19. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 20. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 21. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 22. PaaS stands for?
A : Product as a service
B : Platform application and services
Page 5 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Platform as a system
D : Platform as a service
Q.no 23. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 24. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 25. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 26. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 27. Fundamental Architecture of Docker is :
A : Standlone Systems
Page 6 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 28. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 29. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 30. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 31. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Page 7 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 32. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 33. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 34. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 35. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 36. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
Page 8 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 37. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 38. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 39. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 40. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 41. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
Page 9 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 42. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 43. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 44. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 45. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Page 10 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 46. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 47. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 48. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 49. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 50. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
Page 11 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 51. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 52. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 53. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 54. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 55. Which port does Docker registry use?
Page 12 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 56. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 57. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 58. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 59. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Page 13 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 60. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring

Answer for Question No 1. is c


Answer for Question No 2. is a
Answer for Question No 3. is c
Answer for Question No 4. is c
Answer for Question No 5. is d
Answer for Question No 6. is a
Answer for Question No 7. is b
Answer for Question No 8. is c
Answer for Question No 9. is c
Answer for Question No 10. is a
Answer for Question No 11. is b
Answer for Question No 12. is a
Answer for Question No 13. is b
Answer for Question No 14. is b
Answer for Question No 15. is d
Answer for Question No 16. is c
Page 1 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is d
Answer for Question No 18. is b
Answer for Question No 19. is b
Answer for Question No 20. is a
Answer for Question No 21. is b
Answer for Question No 22. is a
Answer for Question No 23. is a
Answer for Question No 24. is c
Answer for Question No 25. is c
Answer for Question No 26. is a
Answer for Question No 27. is d
Answer for Question No 28. is c
Answer for Question No 29. is a
Answer for Question No 30. is d
Answer for Question No 31. is d
Answer for Question No 32. is d
Page 2 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is b
Answer for Question No 34. is b
Answer for Question No 35. is d
Answer for Question No 36. is a
Answer for Question No 37. is a
Answer for Question No 38. is c
Answer for Question No 39. is b
Answer for Question No 40. is b
Answer for Question No 41. is c
Answer for Question No 42. is b
Answer for Question No 43. is d
Answer for Question No 44. is b
Answer for Question No 45. is c
Answer for Question No 46. is b
Answer for Question No 47. is d
Answer for Question No 48. is a
Page 3 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is b
Answer for Question No 50. is b
Answer for Question No 51. is c
Answer for Question No 52. is c
Answer for Question No 53. is b
Answer for Question No 54. is b
Answer for Question No 55. is b
Answer for Question No 56. is d
Answer for Question No 57. is a
Answer for Question No 58. is a
Answer for Question No 59. is b
Answer for Question No 60. is c
Q.no 1. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 2. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 3. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 4. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
Page 14 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Isolation
Q.no 5. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 6. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 7. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 8. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 9. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
Page 15 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : IaaS
D : Other service
Q.no 10. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 11. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 12. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 13. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 14. SaaS stands for?
A : Software as a service
Page 16 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : System Software and services
C : Software as a system
D : System as a service
Q.no 15. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 16. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 17. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 18. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 19. OVF Stands for
Page 17 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 20. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 21. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 22. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 23. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Page 18 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 24. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 25. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 26. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 27. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 28. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
Page 19 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Risk Control
Q.no 29. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 30. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 31. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 32. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 33. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
Page 20 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Consistency
D : Braod Newtork Coverage
Q.no 34. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 35. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 36. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 37. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 38. Using Ajax web applications can retrieve data from server ____
A : Synchronously
Page 21 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 39. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 40. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 41. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 42. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 43. Which of the following is not a cloud stakeholder?
Page 22 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 44. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 45. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 46. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 47. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 48. What is the example of P2P networks?
Page 23 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 49. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 50. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 51. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 52. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
Page 24 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Apache Load Balancer
Q.no 53. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 54. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 55. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 56. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 57. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
Page 25 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : IEEE
Q.no 58. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 59. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 60. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Answer for Question No 1. is b
Answer for Question No 2. is d
Answer for Question No 3. is b
Answer for Question No 4. is b
Page 4 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is d
Answer for Question No 6. is c
Answer for Question No 7. is d
Answer for Question No 8. is a
Answer for Question No 9. is c
Answer for Question No 10. is b
Answer for Question No 11. is d
Answer for Question No 12. is c
Answer for Question No 13. is d
Answer for Question No 14. is a
Answer for Question No 15. is d
Answer for Question No 16. is b
Answer for Question No 17. is a
Answer for Question No 18. is c
Answer for Question No 19. is a
Answer for Question No 20. is a
Page 5 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is c
Answer for Question No 22. is b
Answer for Question No 23. is c
Answer for Question No 24. is b
Answer for Question No 25. is c
Answer for Question No 26. is c
Answer for Question No 27. is d
Answer for Question No 28. is c
Answer for Question No 29. is c
Answer for Question No 30. is c
Answer for Question No 31. is d
Answer for Question No 32. is c
Answer for Question No 33. is b
Answer for Question No 34. is a
Answer for Question No 35. is b
Answer for Question No 36. is d
Page 6 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is a
Answer for Question No 38. is b
Answer for Question No 39. is a
Answer for Question No 40. is c
Answer for Question No 41. is d
Answer for Question No 42. is c
Answer for Question No 43. is b
Answer for Question No 44. is d
Answer for Question No 45. is b
Answer for Question No 46. is d
Answer for Question No 47. is d
Answer for Question No 48. is a
Answer for Question No 49. is b
Answer for Question No 50. is b
Answer for Question No 51. is b
Answer for Question No 52. is b
Page 7 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is c
Answer for Question No 54. is b
Answer for Question No 55. is c
Answer for Question No 56. is d
Answer for Question No 57. is a
Answer for Question No 58. is a
Answer for Question No 59. is b
Answer for Question No 60. is b
Q.no 1. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 2. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
Page 26 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : It's a totally private repository
Q.no 3. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 4. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 5. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 6. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 7. Which of the following is not a type of cloud?
A : Private
Page 27 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Public
C : Protected
D : Hybrid
Q.no 8. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 9. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 10. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 11. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 12. JSON stands for
A : Java Script Object Notation
Page 28 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 13. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 14. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 15. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 16. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Page 29 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 17. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 18. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 19. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 20. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 21. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
Page 30 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : System as a service
Q.no 22. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 23. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 24. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 25. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 26. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
Page 31 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Protected
D : Hybrid
Q.no 27. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 28. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 29. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 30. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Page 32 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 31. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 32. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 33. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 34. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 35. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
Page 33 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : SaaS
Q.no 36. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 37. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 38. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 39. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 40. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
Page 34 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Home-based Cloud Computing
Q.no 41. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 42. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 43. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 44. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 45. What is the compound metric for cloud platform performace?
Page 35 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 46. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 47. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 48. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 49. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Page 36 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 50. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 51. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 52. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 53. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 54. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
Page 37 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 55. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 56. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 57. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 58. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 59. Which of the following is the operational domain of CSA?
A : Reliability
Page 38 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 60. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring

Answer for Question No 1. is d


Answer for Question No 2. is d
Answer for Question No 3. is a
Answer for Question No 4. is b
Answer for Question No 5. is b
Answer for Question No 6. is a
Answer for Question No 7. is c
Answer for Question No 8. is b
Page 8 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is c
Answer for Question No 10. is d
Answer for Question No 11. is b
Answer for Question No 12. is a
Answer for Question No 13. is b
Answer for Question No 14. is b
Answer for Question No 15. is c
Answer for Question No 16. is d
Answer for Question No 17. is c
Answer for Question No 18. is d
Answer for Question No 19. is a
Answer for Question No 20. is b
Answer for Question No 21. is a
Answer for Question No 22. is a
Answer for Question No 23. is b
Answer for Question No 24. is d
Page 9 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is a
Answer for Question No 26. is b
Answer for Question No 27. is a
Answer for Question No 28. is a
Answer for Question No 29. is b
Answer for Question No 30. is d
Answer for Question No 31. is c
Answer for Question No 32. is b
Answer for Question No 33. is b
Answer for Question No 34. is a
Answer for Question No 35. is c
Answer for Question No 36. is d
Answer for Question No 37. is c
Answer for Question No 38. is d
Answer for Question No 39. is d
Answer for Question No 40. is b
Page 10 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is c
Answer for Question No 42. is c
Answer for Question No 43. is d
Answer for Question No 44. is a
Answer for Question No 45. is b
Answer for Question No 46. is d
Answer for Question No 47. is c
Answer for Question No 48. is b
Answer for Question No 49. is a
Answer for Question No 50. is c
Answer for Question No 51. is a
Answer for Question No 52. is b
Answer for Question No 53. is c
Answer for Question No 54. is d
Answer for Question No 55. is b
Answer for Question No 56. is a
Page 11 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is b
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is c
Q.no 1. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 2. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 3. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 4. Google _______ is a collection of applications and utilities under
development and testing.
Page 39 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Code
B : Labs
C : Hash
D : Platform
Q.no 5. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 6. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 7. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 8. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Page 40 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 9. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 10. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 11. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 12. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 13. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
Page 41 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : IaaS
D : Other service
Q.no 14. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 15. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 16. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 17. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 18. Which of the following standard Azure doesn't use?
A : REST
B : XML
Page 42 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : HTML
D : SQL
Q.no 19. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 20. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 21. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 22. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 23. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
Page 43 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Public
C : Protected
D : Hybrid
Q.no 24. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 25. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 26. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 27. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 28. The hashing mechanism is used when the following form of data protection
is required.
Page 44 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 29. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 30. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 31. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 32. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
Page 45 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : All Google products are freely accessible
Q.no 33. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 34. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 35. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 36. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 37. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
Page 46 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 38. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 39. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 40. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 41. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Page 47 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 42. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 43. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 44. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 45. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 46. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
Page 48 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hashing
Q.no 47. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 48. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 49. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 50. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 51. Which port does Docker registry use?
A : Port 3000
Page 49 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 52. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 53. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 54. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 55. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 56. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
Page 50 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : POP
C : IMAP
D : Both 1 and 2
Q.no 57. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 58. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 59. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 60. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer

Answer for Question No 1. is c


Answer for Question No 2. is c
Answer for Question No 3. is a
Answer for Question No 4. is b
Answer for Question No 5. is a
Answer for Question No 6. is d
Answer for Question No 7. is c
Answer for Question No 8. is c
Answer for Question No 9. is d
Answer for Question No 10. is a
Answer for Question No 11. is c
Answer for Question No 12. is b
Page 12 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is c
Answer for Question No 14. is d
Answer for Question No 15. is a
Answer for Question No 16. is d
Answer for Question No 17. is c
Answer for Question No 18. is d
Answer for Question No 19. is b
Answer for Question No 20. is b
Answer for Question No 21. is b
Answer for Question No 22. is a
Answer for Question No 23. is d
Answer for Question No 24. is a
Answer for Question No 25. is d
Answer for Question No 26. is a
Answer for Question No 27. is a
Answer for Question No 28. is a
Page 13 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is d
Answer for Question No 30. is b
Answer for Question No 31. is b
Answer for Question No 32. is b
Answer for Question No 33. is d
Answer for Question No 34. is b
Answer for Question No 35. is d
Answer for Question No 36. is a
Answer for Question No 37. is c
Answer for Question No 38. is b
Answer for Question No 39. is c
Answer for Question No 40. is d
Answer for Question No 41. is a
Answer for Question No 42. is c
Answer for Question No 43. is b
Answer for Question No 44. is d
Page 14 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is b
Answer for Question No 46. is c
Answer for Question No 47. is b
Answer for Question No 48. is d
Answer for Question No 49. is d
Answer for Question No 50. is c
Answer for Question No 51. is b
Answer for Question No 52. is a
Answer for Question No 53. is d
Answer for Question No 54. is c
Answer for Question No 55. is a
Answer for Question No 56. is b
Answer for Question No 57. is c
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is b
Q.no 1. Which organization supports the development of standards for the cloud
computing?
Page 51 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 2. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 3. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 4. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 5. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 6. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
Page 52 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 7. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 8. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 9. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 10. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Page 53 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 11. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 12. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 13. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 14. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 15. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
Page 54 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 16. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 17. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 18. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 19. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 20. Name the infrastructure which enables cloud computing using mobile
devices
Page 55 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 21. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 22. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 23. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 24. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 25. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
Page 56 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 26. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 27. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 28. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 29. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 30. Which of the following is an official commitment that prevails between a
service provider and a client
Page 57 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 31. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 32. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 33. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 34. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
Page 58 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Home-based Cloud Computing
Q.no 35. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 36. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 37. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 38. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 39. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
Page 59 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Facebook
Q.no 40. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 41. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 42. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 43. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 44. What is the operating state of a cloudlet?
A : Only soft state
Page 60 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 45. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 46. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 47. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 48. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 49. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
Page 61 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 50. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 51. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 52. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 53. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Page 62 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 54. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 55. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 56. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 57. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 58. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
Page 63 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 59. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 60. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose

Page 15 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is c
Answer for Question No 2. is c
Answer for Question No 3. is c
Answer for Question No 4. is a
Answer for Question No 5. is c
Answer for Question No 6. is b
Answer for Question No 7. is a
Answer for Question No 8. is d
Answer for Question No 9. is a
Answer for Question No 10. is b
Answer for Question No 11. is b
Answer for Question No 12. is b
Answer for Question No 13. is b
Answer for Question No 14. is b
Answer for Question No 15. is a
Answer for Question No 16. is d
Page 16 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is c
Answer for Question No 18. is c
Answer for Question No 19. is a
Answer for Question No 20. is b
Answer for Question No 21. is d
Answer for Question No 22. is c
Answer for Question No 23. is d
Answer for Question No 24. is b
Answer for Question No 25. is b
Answer for Question No 26. is b
Answer for Question No 27. is d
Answer for Question No 28. is c
Answer for Question No 29. is d
Answer for Question No 30. is c
Answer for Question No 31. is c
Answer for Question No 32. is a
Page 17 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is a
Answer for Question No 34. is b
Answer for Question No 35. is a
Answer for Question No 36. is c
Answer for Question No 37. is d
Answer for Question No 38. is d
Answer for Question No 39. is a
Answer for Question No 40. is c
Answer for Question No 41. is b
Answer for Question No 42. is b
Answer for Question No 43. is c
Answer for Question No 44. is a
Answer for Question No 45. is a
Answer for Question No 46. is b
Answer for Question No 47. is b
Answer for Question No 48. is d
Page 18 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is d
Answer for Question No 50. is b
Answer for Question No 51. is c
Answer for Question No 52. is a
Answer for Question No 53. is b
Answer for Question No 54. is a
Answer for Question No 55. is c
Answer for Question No 56. is d
Answer for Question No 57. is a
Answer for Question No 58. is d
Answer for Question No 59. is b
Answer for Question No 60. is b
Q.no 1. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 2. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 3. Name the cloud developed by SGI
A : Nebula
B : Andromeda
Page 64 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Cyclone
D : STANDARDS
Q.no 4. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 5. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 6. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 7. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 8. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
Page 65 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : System as a service
Q.no 9. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 10. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 11. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 12. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 13. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
Page 66 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : OCC
D : Stateless
Q.no 14. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 15. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 16. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 17. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 18. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
Page 67 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Public
C : Protected
D : Hybrid
Q.no 19. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 20. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 21. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 22. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 23. Point out the incorrect statement:
A : All delivery models provide similar security services
Page 68 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 24. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 25. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 26. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 27. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Page 69 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 28. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 29. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 30. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 31. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 32. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
Page 70 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 33. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 34. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 35. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 36. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 37. IPV6 has addrees space of of
A : 64 bit
Page 71 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 38. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 39. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 40. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 41. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Page 72 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 42. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 43. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 44. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 45. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 46. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
Page 73 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 47. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 48. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 49. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 50. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Page 74 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 51. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 52. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 53. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 54. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 55. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
Page 75 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Both 1 and 2
Q.no 56. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 57. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 58. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 59. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 60. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
Page 76 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : ISO
D : Both 1 and 2

Answer for Question No 1. is d


Answer for Question No 2. is c
Answer for Question No 3. is c
Answer for Question No 4. is a
Page 19 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is a
Answer for Question No 6. is d
Answer for Question No 7. is c
Answer for Question No 8. is a
Answer for Question No 9. is d
Answer for Question No 10. is c
Answer for Question No 11. is a
Answer for Question No 12. is a
Answer for Question No 13. is c
Answer for Question No 14. is b
Answer for Question No 15. is d
Answer for Question No 16. is c
Answer for Question No 17. is b
Answer for Question No 18. is d
Answer for Question No 19. is c
Answer for Question No 20. is b
Page 20 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is c
Answer for Question No 22. is a
Answer for Question No 23. is a
Answer for Question No 24. is b
Answer for Question No 25. is d
Answer for Question No 26. is c
Answer for Question No 27. is b
Answer for Question No 28. is d
Answer for Question No 29. is d
Answer for Question No 30. is b
Answer for Question No 31. is c
Answer for Question No 32. is d
Answer for Question No 33. is b
Answer for Question No 34. is b
Answer for Question No 35. is c
Answer for Question No 36. is a
Page 21 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is b
Answer for Question No 38. is d
Answer for Question No 39. is c
Answer for Question No 40. is d
Answer for Question No 41. is c
Answer for Question No 42. is b
Answer for Question No 43. is a
Answer for Question No 44. is b
Answer for Question No 45. is c
Answer for Question No 46. is b
Answer for Question No 47. is c
Answer for Question No 48. is c
Answer for Question No 49. is a
Answer for Question No 50. is a
Answer for Question No 51. is b
Answer for Question No 52. is c
Page 22 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is c
Answer for Question No 54. is c
Answer for Question No 55. is b
Answer for Question No 56. is b
Answer for Question No 57. is a
Answer for Question No 58. is b
Answer for Question No 59. is b
Answer for Question No 60. is a
Q.no 1. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 2. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 3. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 4. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 5. Which of the following is a cloud OS?
A : Nebula
Page 77 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Antrix
C : ALICE
D : Super
Q.no 6. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 7. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 8. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 9. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 10. PaaS stands for?
Page 78 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 11. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 12. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 13. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 14. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Page 79 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 15. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 16. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 17. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 18. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 19. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Page 80 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 20. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 21. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 22. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 23. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 24. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
Page 81 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hybrid
Q.no 25. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 26. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 27. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 28. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 29. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
Page 82 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Both 1 and 2
Q.no 30. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 31. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 32. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 33. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 34. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
Page 83 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : QoS
D : COC
Q.no 35. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 36. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 37. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 38. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 39. IBM Ensembles offer a virtualized cloud server for
Page 84 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 40. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 41. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 42. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 43. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 44. Point out the correct statement.
Page 85 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 45. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 46. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 47. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 48. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Page 86 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 49. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 50. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 51. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 52. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 53. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Page 87 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 54. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 55. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 56. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 57. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 58. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
Page 88 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : SOAP
D : REST
Q.no 59. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 60. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Answer for Question No 1. is c
Answer for Question No 2. is d
Answer for Question No 3. is a
Answer for Question No 4. is b
Answer for Question No 5. is d
Answer for Question No 6. is b
Answer for Question No 7. is b
Answer for Question No 8. is b
Page 23 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is b
Answer for Question No 10. is a
Answer for Question No 11. is c
Answer for Question No 12. is d
Answer for Question No 13. is b
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is b
Answer for Question No 17. is b
Answer for Question No 18. is b
Answer for Question No 19. is d
Answer for Question No 20. is d
Answer for Question No 21. is c
Answer for Question No 22. is c
Answer for Question No 23. is d
Answer for Question No 24. is d
Page 24 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is a
Answer for Question No 26. is b
Answer for Question No 27. is b
Answer for Question No 28. is a
Answer for Question No 29. is d
Answer for Question No 30. is b
Answer for Question No 31. is d
Answer for Question No 32. is c
Answer for Question No 33. is c
Answer for Question No 34. is b
Answer for Question No 35. is c
Answer for Question No 36. is a
Answer for Question No 37. is d
Answer for Question No 38. is a
Answer for Question No 39. is c
Answer for Question No 40. is d
Page 25 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is d
Answer for Question No 42. is b
Answer for Question No 43. is b
Answer for Question No 44. is b
Answer for Question No 45. is d
Answer for Question No 46. is a
Answer for Question No 47. is b
Answer for Question No 48. is d
Answer for Question No 49. is c
Answer for Question No 50. is a
Answer for Question No 51. is a
Answer for Question No 52. is d
Answer for Question No 53. is a
Answer for Question No 54. is c
Answer for Question No 55. is b
Answer for Question No 56. is b
Page 26 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is b
Answer for Question No 58. is c
Answer for Question No 59. is d
Answer for Question No 60. is b
Q.no 1. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 2. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 3. Point out the incorrect statement:
A : All delivery models provide similar security services
Page 89 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 4. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 5. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 6. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 7. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
Page 90 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Risk Assessment
Q.no 8. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 9. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 10. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 11. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 12. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
Page 91 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : MobileMe Gallery
Q.no 13. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 14. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 15. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 16. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 17. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
Page 92 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 18. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 19. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 20. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 21. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 22. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
Page 93 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : PaaS
C : IaaS
D : Other service
Q.no 23. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 24. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 25. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 26. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 27. Which among the following is a valid Cloud Issue :
Page 94 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 28. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 29. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 30. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 31. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Page 95 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 32. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 33. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 34. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 35. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 36. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
Page 96 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 37. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 38. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 39. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 40. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
Page 97 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 41. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 42. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 43. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 44. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Page 98 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 45. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 46. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 47. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 48. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 49. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Page 99 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 50. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 51. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 52. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 53. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 54. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Page 100 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 55. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 56. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 57. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 58. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 59. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
Page 101 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Longetivity
Q.no 60. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP

Answer for Question No 1. is d


Answer for Question No 2. is c
Answer for Question No 3. is a
Answer for Question No 4. is b
Answer for Question No 5. is b
Answer for Question No 6. is a
Answer for Question No 7. is c
Answer for Question No 8. is a
Answer for Question No 9. is a
Answer for Question No 10. is a
Answer for Question No 11. is c
Answer for Question No 12. is d
Page 27 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is c
Answer for Question No 14. is c
Answer for Question No 15. is a
Answer for Question No 16. is d
Answer for Question No 17. is c
Answer for Question No 18. is c
Answer for Question No 19. is a
Answer for Question No 20. is b
Answer for Question No 21. is b
Answer for Question No 22. is c
Answer for Question No 23. is d
Answer for Question No 24. is b
Answer for Question No 25. is a
Answer for Question No 26. is b
Answer for Question No 27. is b
Answer for Question No 28. is d
Page 28 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is c
Answer for Question No 30. is b
Answer for Question No 31. is a
Answer for Question No 32. is b
Answer for Question No 33. is c
Answer for Question No 34. is c
Answer for Question No 35. is a
Answer for Question No 36. is b
Answer for Question No 37. is d
Answer for Question No 38. is c
Answer for Question No 39. is c
Answer for Question No 40. is d
Answer for Question No 41. is d
Answer for Question No 42. is d
Answer for Question No 43. is a
Answer for Question No 44. is b
Page 29 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is c
Answer for Question No 46. is d
Answer for Question No 47. is a
Answer for Question No 48. is b
Answer for Question No 49. is d
Answer for Question No 50. is b
Answer for Question No 51. is c
Answer for Question No 52. is a
Answer for Question No 53. is a
Answer for Question No 54. is b
Answer for Question No 55. is b
Answer for Question No 56. is b
Answer for Question No 57. is c
Answer for Question No 58. is c
Answer for Question No 59. is b
Answer for Question No 60. is c
Q.no 1. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 2. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 3. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 4. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
Page 102 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Design Cloud
D : Alphacloud
Q.no 5. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 6. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 7. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 8. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 9. XML standard is used for
A : Web development
Page 103 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 10. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 11. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 12. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 13. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 14. Name the infrastructure which enables cloud computing using mobile
devices
Page 104 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 15. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 16. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 17. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 18. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Page 105 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 19. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 20. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 21. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 22. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 23. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
Page 106 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hybrid
Q.no 24. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 25. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 26. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 27. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 28. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
Page 107 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Facebook
Q.no 29. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 30. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 31. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 32. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 33. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
Page 108 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 34. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 35. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 36. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 37. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Page 109 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 38. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 39. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 40. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 41. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 42. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
Page 110 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : 1 or 2
Q.no 43. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 44. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 45. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 46. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 47. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
Page 111 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 48. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 49. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 50. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 51. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 52. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
Page 112 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : APP
C : SOAP
D : REST
Q.no 53. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 54. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 55. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 56. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Page 113 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 57. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 58. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 59. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 60. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility

Page 30 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is c
Answer for Question No 2. is b
Answer for Question No 3. is b
Answer for Question No 4. is d
Answer for Question No 5. is a
Answer for Question No 6. is c
Answer for Question No 7. is d
Answer for Question No 8. is c
Answer for Question No 9. is b
Answer for Question No 10. is b
Answer for Question No 11. is b
Answer for Question No 12. is c
Answer for Question No 13. is a
Answer for Question No 14. is b
Answer for Question No 15. is d
Answer for Question No 16. is d
Page 31 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is a
Answer for Question No 18. is d
Answer for Question No 19. is b
Answer for Question No 20. is b
Answer for Question No 21. is d
Answer for Question No 22. is c
Answer for Question No 23. is c
Answer for Question No 24. is d
Answer for Question No 25. is c
Answer for Question No 26. is d
Answer for Question No 27. is d
Answer for Question No 28. is a
Answer for Question No 29. is a
Answer for Question No 30. is d
Answer for Question No 31. is b
Answer for Question No 32. is d
Page 32 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is b
Answer for Question No 34. is c
Answer for Question No 35. is c
Answer for Question No 36. is b
Answer for Question No 37. is d
Answer for Question No 38. is a
Answer for Question No 39. is c
Answer for Question No 40. is b
Answer for Question No 41. is c
Answer for Question No 42. is b
Answer for Question No 43. is b
Answer for Question No 44. is c
Answer for Question No 45. is a
Answer for Question No 46. is b
Answer for Question No 47. is c
Answer for Question No 48. is b
Page 33 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is a
Answer for Question No 50. is c
Answer for Question No 51. is a
Answer for Question No 52. is c
Answer for Question No 53. is b
Answer for Question No 54. is d
Answer for Question No 55. is b
Answer for Question No 56. is b
Answer for Question No 57. is d
Answer for Question No 58. is a
Answer for Question No 59. is c
Answer for Question No 60. is c
Q.no 1. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
Page 114 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Platform
Q.no 2. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 3. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 4. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 5. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 6. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
Page 115 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Partner Quality
D : Solving Problems
Q.no 7. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 8. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 9. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 10. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 11. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
Page 116 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : It gives access to Docker images
D : It's a totally private repository
Q.no 12. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 13. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 14. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 15. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 16. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
Page 117 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 17. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 18. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 19. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 20. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 21. Which of the following architectural standards is working with cloud
computing industry?
Page 118 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 22. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 23. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 24. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 25. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 26. Point out the correct statement.
Page 119 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 27. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 28. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 29. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 30. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
Page 120 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Cloud TV
Q.no 31. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 32. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 33. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 34. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 35. Which of the following is used to transmit structured data over network?
A : XML
Page 121 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 36. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 37. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 38. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 39. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 40. Which of the following is not characteristic of Cloud?
Page 122 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 41. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 42. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 43. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 44. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
Page 123 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : A cloud has single application instance and directs requests to that specific instance
Q.no 45. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 46. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 47. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 48. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 49. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
Page 124 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Protected
D : Hybrid
Q.no 50. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 51. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 52. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 53. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 54. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
Page 125 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : OCC
C : ISO
D : Both 1 and 2
Q.no 55. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 56. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 57. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 58. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 59. Which of the following is the native clustering for Docker?
Page 126 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 60. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility

Answer for Question No 1. is b


Answer for Question No 2. is a
Answer for Question No 3. is a
Answer for Question No 4. is b
Page 34 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is d
Answer for Question No 6. is a
Answer for Question No 7. is d
Answer for Question No 8. is b
Answer for Question No 9. is c
Answer for Question No 10. is c
Answer for Question No 11. is d
Answer for Question No 12. is b
Answer for Question No 13. is a
Answer for Question No 14. is a
Answer for Question No 15. is b
Answer for Question No 16. is c
Answer for Question No 17. is c
Answer for Question No 18. is a
Answer for Question No 19. is c
Answer for Question No 20. is a
Page 35 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is a
Answer for Question No 22. is d
Answer for Question No 23. is c
Answer for Question No 24. is c
Answer for Question No 25. is d
Answer for Question No 26. is b
Answer for Question No 27. is b
Answer for Question No 28. is d
Answer for Question No 29. is a
Answer for Question No 30. is a
Answer for Question No 31. is d
Answer for Question No 32. is a
Answer for Question No 33. is c
Answer for Question No 34. is c
Answer for Question No 35. is d
Answer for Question No 36. is c
Page 36 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is d
Answer for Question No 38. is c
Answer for Question No 39. is b
Answer for Question No 40. is d
Answer for Question No 41. is b
Answer for Question No 42. is c
Answer for Question No 43. is b
Answer for Question No 44. is d
Answer for Question No 45. is c
Answer for Question No 46. is b
Answer for Question No 47. is b
Answer for Question No 48. is c
Answer for Question No 49. is b
Answer for Question No 50. is a
Answer for Question No 51. is a
Answer for Question No 52. is b
Page 37 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is c
Answer for Question No 54. is a
Answer for Question No 55. is b
Answer for Question No 56. is a
Answer for Question No 57. is b
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is c
Q.no 1. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 2. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 3. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Page 127 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 4. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 5. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 6. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 7. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 8. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
Page 128 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Non-repudiation
D : Repudiation
Q.no 9. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 10. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 11. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 12. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 13. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
Page 129 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 14. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 15. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 16. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 17. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 18. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
Page 130 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 19. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 20. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 21. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 22. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 23. SaaS stands for?
Page 131 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 24. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 25. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 26. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 27. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
Page 132 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Intelligent Paints
D : Cloud TV
Q.no 28. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 29. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 30. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 31. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Page 133 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 32. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 33. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 34. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 35. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 36. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Page 134 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 37. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 38. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 39. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 40. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 41. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
Page 135 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : End users
D : Cloud users
Q.no 42. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 43. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 44. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 45. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 46. What is the example of P2P networks?
A : Gmail
Page 136 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Azure
C : Amazon
D : Facebook
Q.no 47. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 48. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 49. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 50. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Page 137 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 51. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 52. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 53. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 54. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 55. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
Page 138 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 56. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 57. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 58. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 59. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 60. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
Page 139 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Docker Swarm
D : QoCP

Answer for Question No 1. is d


Answer for Question No 2. is b
Answer for Question No 3. is c
Answer for Question No 4. is a
Answer for Question No 5. is d
Answer for Question No 6. is a
Answer for Question No 7. is c
Answer for Question No 8. is b
Page 38 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is b
Answer for Question No 10. is d
Answer for Question No 11. is b
Answer for Question No 12. is b
Answer for Question No 13. is c
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is b
Answer for Question No 17. is a
Answer for Question No 18. is d
Answer for Question No 19. is b
Answer for Question No 20. is d
Answer for Question No 21. is d
Answer for Question No 22. is c
Answer for Question No 23. is a
Answer for Question No 24. is a
Page 39 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is d
Answer for Question No 26. is c
Answer for Question No 27. is a
Answer for Question No 28. is d
Answer for Question No 29. is d
Answer for Question No 30. is b
Answer for Question No 31. is b
Answer for Question No 32. is c
Answer for Question No 33. is d
Answer for Question No 34. is a
Answer for Question No 35. is d
Answer for Question No 36. is d
Answer for Question No 37. is a
Answer for Question No 38. is b
Answer for Question No 39. is b
Answer for Question No 40. is a
Page 40 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is b
Answer for Question No 42. is c
Answer for Question No 43. is b
Answer for Question No 44. is c
Answer for Question No 45. is d
Answer for Question No 46. is a
Answer for Question No 47. is a
Answer for Question No 48. is a
Answer for Question No 49. is c
Answer for Question No 50. is b
Answer for Question No 51. is b
Answer for Question No 52. is d
Answer for Question No 53. is b
Answer for Question No 54. is a
Answer for Question No 55. is d
Answer for Question No 56. is c
Page 41 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is c
Answer for Question No 58. is b
Answer for Question No 59. is a
Answer for Question No 60. is c
Q.no 1. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 2. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 3. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 4. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 5. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
Page 140 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 6. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 7. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 8. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 9. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 10. Name the cloud developed by SGI
Page 141 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 11. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 12. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 13. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 14. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Page 142 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 15. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 16. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 17. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 18. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 19. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
Page 143 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : SQL
Q.no 20. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 21. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 22. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 23. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 24. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
Page 144 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Decryption
D : Encryption
Q.no 25. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 26. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 27. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 28. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 29. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
Page 145 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 30. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 31. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 32. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 33. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Page 146 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 34. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 35. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 36. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 37. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 38. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Page 147 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 39. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 40. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 41. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 42. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 43. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
Page 148 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : CometCloud autonomic cloud engine
Q.no 44. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 45. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 46. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 47. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 48. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
Page 149 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 49. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 50. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 51. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 52. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 53. _____________ enables the migration of the virtual image from one
physical machine to another.
Page 150 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 54. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 55. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 56. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 57. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Page 151 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 58. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 59. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 60. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE

Answer for Question No 1. is a


Answer for Question No 2. is a
Answer for Question No 3. is c
Answer for Question No 4. is c
Answer for Question No 5. is d
Answer for Question No 6. is a
Answer for Question No 7. is c
Answer for Question No 8. is a
Answer for Question No 9. is d
Answer for Question No 10. is c
Answer for Question No 11. is a
Answer for Question No 12. is d
Page 42 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is a
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is b
Answer for Question No 17. is c
Answer for Question No 18. is c
Answer for Question No 19. is d
Answer for Question No 20. is b
Answer for Question No 21. is b
Answer for Question No 22. is b
Answer for Question No 23. is a
Answer for Question No 24. is d
Answer for Question No 25. is b
Answer for Question No 26. is c
Answer for Question No 27. is b
Answer for Question No 28. is d
Page 43 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is c
Answer for Question No 30. is d
Answer for Question No 31. is b
Answer for Question No 32. is b
Answer for Question No 33. is c
Answer for Question No 34. is c
Answer for Question No 35. is b
Answer for Question No 36. is d
Answer for Question No 37. is c
Answer for Question No 38. is a
Answer for Question No 39. is d
Answer for Question No 40. is b
Answer for Question No 41. is b
Answer for Question No 42. is c
Answer for Question No 43. is d
Answer for Question No 44. is d
Page 44 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is a
Answer for Question No 46. is c
Answer for Question No 47. is b
Answer for Question No 48. is d
Answer for Question No 49. is b
Answer for Question No 50. is d
Answer for Question No 51. is b
Answer for Question No 52. is b
Answer for Question No 53. is b
Answer for Question No 54. is c
Answer for Question No 55. is b
Answer for Question No 56. is a
Answer for Question No 57. is a
Answer for Question No 58. is c
Answer for Question No 59. is b
Answer for Question No 60. is a
Q.no 1. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 2. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
Page 152 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Program
Q.no 3. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 4. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 5. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 6. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 7. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
Page 153 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Availability
D : Isolation
Q.no 8. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 9. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 10. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 11. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 12. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
Page 154 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : XML
D : Ajax
Q.no 13. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 14. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 15. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 16. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 17. SMTP standard is used for
A : Web Development
Page 155 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 18. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 19. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 20. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 21. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 22. SaaS stands for?
Page 156 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 23. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 24. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 25. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 26. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Page 157 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 27. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 28. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 29. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 30. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 31. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
Page 158 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : End users
D : Cloud users
Q.no 32. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 33. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 34. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 35. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 36. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
Page 159 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 37. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 38. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 39. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 40. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
Page 160 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Cloud TV
Q.no 41. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 42. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 43. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 44. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 45. Which of the following is most refined and restrictive service model ?
A : IaaS
Page 161 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : CaaS
C : PaaS
D : SaaS
Q.no 46. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 47. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 48. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 49. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 50. Which of the following Integrates local computational environments and
public cloud services on-demand
Page 162 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 51. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 52. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 53. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 54. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 55. Which of the following is the native clustering for Docker?
Page 163 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 56. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 57. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 58. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 59. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
Page 164 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Flexibility
Q.no 60. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity

Page 45 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is a
Answer for Question No 2. is d
Answer for Question No 3. is d
Answer for Question No 4. is b
Answer for Question No 5. is b
Answer for Question No 6. is a
Answer for Question No 7. is b
Answer for Question No 8. is a
Answer for Question No 9. is d
Answer for Question No 10. is a
Answer for Question No 11. is c
Answer for Question No 12. is c
Answer for Question No 13. is b
Answer for Question No 14. is c
Answer for Question No 15. is d
Answer for Question No 16. is c
Page 46 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is b
Answer for Question No 18. is a
Answer for Question No 19. is d
Answer for Question No 20. is c
Answer for Question No 21. is a
Answer for Question No 22. is a
Answer for Question No 23. is d
Answer for Question No 24. is b
Answer for Question No 25. is c
Answer for Question No 26. is d
Answer for Question No 27. is b
Answer for Question No 28. is b
Answer for Question No 29. is b
Answer for Question No 30. is a
Answer for Question No 31. is d
Answer for Question No 32. is d
Page 47 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is c
Answer for Question No 34. is b
Answer for Question No 35. is b
Answer for Question No 36. is a
Answer for Question No 37. is c
Answer for Question No 38. is a
Answer for Question No 39. is c
Answer for Question No 40. is a
Answer for Question No 41. is a
Answer for Question No 42. is d
Answer for Question No 43. is c
Answer for Question No 44. is b
Answer for Question No 45. is c
Answer for Question No 46. is d
Answer for Question No 47. is a
Answer for Question No 48. is c
Page 48 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is c
Answer for Question No 50. is d
Answer for Question No 51. is a
Answer for Question No 52. is d
Answer for Question No 53. is c
Answer for Question No 54. is c
Answer for Question No 55. is c
Answer for Question No 56. is b
Answer for Question No 57. is d
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is b
Q.no 1. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 2. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 3. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 4. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
Page 165 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 5. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 6. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 7. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 8. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 9. Which of the following is not type of virtualization in cloud computing?
Page 166 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Storage
B : Application
C : CPU
D : Program
Q.no 10. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 11. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 12. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 13. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Page 167 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 14. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 15. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 16. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 17. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 18. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
Page 168 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Integrity
Q.no 19. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 20. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 21. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 22. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 23. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
Page 169 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : System as a service
Q.no 24. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 25. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 26. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 27. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 28. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
Page 170 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : S2
Q.no 29. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 30. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 31. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 32. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 33. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
Page 171 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 34. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 35. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 36. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 37. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 38. What is the compound metric for cloud platform performace?
Page 172 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 39. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 40. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 41. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 42. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 43. IPV6 has addrees space of of
Page 173 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 44. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 45. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 46. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 47. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Page 174 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 48. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 49. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 50. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 51. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 52. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Page 175 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 53. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 54. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 55. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 56. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 57. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
Page 176 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Service Technology
Q.no 58. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 59. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 60. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Answer for Question No 1. is d
Answer for Question No 2. is d
Answer for Question No 3. is a
Answer for Question No 4. is d
Page 49 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is c
Answer for Question No 6. is b
Answer for Question No 7. is b
Answer for Question No 8. is b
Answer for Question No 9. is d
Answer for Question No 10. is c
Answer for Question No 11. is b
Answer for Question No 12. is c
Answer for Question No 13. is c
Answer for Question No 14. is b
Answer for Question No 15. is a
Answer for Question No 16. is b
Answer for Question No 17. is d
Answer for Question No 18. is c
Answer for Question No 19. is a
Answer for Question No 20. is a
Page 50 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is b
Answer for Question No 22. is c
Answer for Question No 23. is a
Answer for Question No 24. is b
Answer for Question No 25. is b
Answer for Question No 26. is c
Answer for Question No 27. is a
Answer for Question No 28. is a
Answer for Question No 29. is b
Answer for Question No 30. is b
Answer for Question No 31. is c
Answer for Question No 32. is b
Answer for Question No 33. is a
Answer for Question No 34. is b
Answer for Question No 35. is c
Answer for Question No 36. is d
Page 51 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is b
Answer for Question No 38. is b
Answer for Question No 39. is b
Answer for Question No 40. is d
Answer for Question No 41. is b
Answer for Question No 42. is d
Answer for Question No 43. is b
Answer for Question No 44. is b
Answer for Question No 45. is d
Answer for Question No 46. is c
Answer for Question No 47. is d
Answer for Question No 48. is d
Answer for Question No 49. is c
Answer for Question No 50. is d
Answer for Question No 51. is b
Answer for Question No 52. is b
Page 52 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is a
Answer for Question No 54. is a
Answer for Question No 55. is c
Answer for Question No 56. is b
Answer for Question No 57. is a
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is b
Q.no 1. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 2. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
Page 177 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Super
Q.no 3. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 4. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 5. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 6. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 7. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
Page 178 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Remote Sensing
D : Private Computing
Q.no 8. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 9. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 10. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 11. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 12. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
Page 179 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 13. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 14. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 15. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 16. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 17. Which is not true about Docker Hub?
Page 180 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 18. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 19. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 20. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 21. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Page 181 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 22. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 23. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 24. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 25. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 26. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Page 182 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 27. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 28. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 29. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 30. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 31. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
Page 183 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 32. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 33. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 34. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 35. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 36. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
Page 184 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 37. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 38. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 39. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 40. IBM Ensembles offer a virtualized cloud server for
A : SaaS
Page 185 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : PasS
C : IaaS
D : AaaS
Q.no 41. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 42. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 43. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 44. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Page 186 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 45. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 46. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 47. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 48. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 49. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
Page 187 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : System-Level agreement
Q.no 50. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 51. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 52. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 53. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 54. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
Page 188 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 55. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 56. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 57. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 58. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 59. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
Page 189 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 60. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2

Answer for Question No 1. is c


Answer for Question No 2. is d
Answer for Question No 3. is c
Answer for Question No 4. is d
Answer for Question No 5. is a
Answer for Question No 6. is d
Answer for Question No 7. is b
Answer for Question No 8. is d
Page 53 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is b
Answer for Question No 10. is d
Answer for Question No 11. is c
Answer for Question No 12. is d
Answer for Question No 13. is a
Answer for Question No 14. is c
Answer for Question No 15. is a
Answer for Question No 16. is b
Answer for Question No 17. is d
Answer for Question No 18. is c
Answer for Question No 19. is c
Answer for Question No 20. is a
Answer for Question No 21. is a
Answer for Question No 22. is c
Answer for Question No 23. is c
Answer for Question No 24. is a
Page 54 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is a
Answer for Question No 26. is a
Answer for Question No 27. is c
Answer for Question No 28. is d
Answer for Question No 29. is d
Answer for Question No 30. is a
Answer for Question No 31. is a
Answer for Question No 32. is c
Answer for Question No 33. is a
Answer for Question No 34. is c
Answer for Question No 35. is d
Answer for Question No 36. is c
Answer for Question No 37. is c
Answer for Question No 38. is a
Answer for Question No 39. is b
Answer for Question No 40. is c
Page 55 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is d
Answer for Question No 42. is b
Answer for Question No 43. is c
Answer for Question No 44. is b
Answer for Question No 45. is a
Answer for Question No 46. is c
Answer for Question No 47. is a
Answer for Question No 48. is b
Answer for Question No 49. is c
Answer for Question No 50. is c
Answer for Question No 51. is d
Answer for Question No 52. is a
Answer for Question No 53. is b
Answer for Question No 54. is b
Answer for Question No 55. is c
Answer for Question No 56. is c
Page 56 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is c
Answer for Question No 58. is d
Answer for Question No 59. is c
Answer for Question No 60. is b
Q.no 1. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 2. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 3. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 4. When we use the same key for both encryption and decryption then it is
known as ?
Page 190 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 5. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 6. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 7. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 8. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Page 191 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 9. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 10. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 11. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 12. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 13. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
Page 192 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Alphacloud
Q.no 14. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 15. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 16. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 17. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 18. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
Page 193 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : SQL
Q.no 19. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 20. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 21. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 22. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 23. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
Page 194 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Consistency
C : Authenticity
D : Integrity
Q.no 24. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 25. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 26. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 27. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
Page 195 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : GAE
Q.no 28. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 29. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 30. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 31. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 32. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
Page 196 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hashing
Q.no 33. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 34. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 35. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 36. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 37. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
Page 197 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Simple Client-Server
Q.no 38. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 39. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 40. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 41. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 42. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
Page 198 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : QoS
D : COC
Q.no 43. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 44. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 45. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 46. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 47. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
Page 199 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 48. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 49. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 50. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 51. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Page 200 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 52. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 53. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 54. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 55. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 56. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
Page 201 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : template
Q.no 57. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 58. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 59. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 60. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service

Answer for Question No 1. is b


Answer for Question No 2. is b
Answer for Question No 3. is d
Answer for Question No 4. is b
Answer for Question No 5. is a
Answer for Question No 6. is d
Answer for Question No 7. is b
Answer for Question No 8. is c
Answer for Question No 9. is b
Answer for Question No 10. is b
Answer for Question No 11. is d
Answer for Question No 12. is a
Page 57 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is d
Answer for Question No 14. is c
Answer for Question No 15. is d
Answer for Question No 16. is a
Answer for Question No 17. is b
Answer for Question No 18. is d
Answer for Question No 19. is c
Answer for Question No 20. is c
Answer for Question No 21. is b
Answer for Question No 22. is b
Answer for Question No 23. is c
Answer for Question No 24. is b
Answer for Question No 25. is a
Answer for Question No 26. is c
Answer for Question No 27. is a
Answer for Question No 28. is b
Page 58 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is d
Answer for Question No 30. is d
Answer for Question No 31. is b
Answer for Question No 32. is c
Answer for Question No 33. is d
Answer for Question No 34. is b
Answer for Question No 35. is d
Answer for Question No 36. is d
Answer for Question No 37. is d
Answer for Question No 38. is a
Answer for Question No 39. is d
Answer for Question No 40. is b
Answer for Question No 41. is b
Answer for Question No 42. is b
Answer for Question No 43. is b
Answer for Question No 44. is b
Page 59 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is b
Answer for Question No 46. is d
Answer for Question No 47. is c
Answer for Question No 48. is a
Answer for Question No 49. is b
Answer for Question No 50. is a
Answer for Question No 51. is c
Answer for Question No 52. is a
Answer for Question No 53. is b
Answer for Question No 54. is b
Answer for Question No 55. is b
Answer for Question No 56. is b
Answer for Question No 57. is a
Answer for Question No 58. is a
Answer for Question No 59. is b
Answer for Question No 60. is d
Q.no 1. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
Page 202 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 2. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 3. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 4. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 5. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 6. Point out the correct statement:
Page 203 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 7. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 8. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 9. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 10. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 11. PaaS stands for?
Page 204 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 12. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 13. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 14. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 15. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 16. Which of the following service provider provides the least amount of builtin
security?
Page 205 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 17. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 18. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 19. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 20. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 21. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
Page 206 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 22. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 23. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 24. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 25. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Page 207 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 26. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 27. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 28. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 29. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 30. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
Page 208 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Intelligent Paints
D : Cloud TV
Q.no 31. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 32. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 33. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 34. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 35. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
Page 209 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 36. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 37. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 38. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 39. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Page 210 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 40. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 41. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 42. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 43. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 44. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
Page 211 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Workspace managers
D : Network server managers
Q.no 45. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 46. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 47. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 48. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 49. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
Page 212 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 50. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 51. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 52. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 53. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 54. What are the main characteristics of a mashup?
A : Agility and security
Page 213 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 55. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 56. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 57. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 58. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 59. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
Page 214 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : OCC
C : ISO
D : Both 1 and 2
Q.no 60. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity

Page 60 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is d
Answer for Question No 2. is d
Answer for Question No 3. is c
Answer for Question No 4. is b
Answer for Question No 5. is d
Answer for Question No 6. is c
Answer for Question No 7. is c
Answer for Question No 8. is b
Answer for Question No 9. is a
Answer for Question No 10. is a
Answer for Question No 11. is a
Answer for Question No 12. is b
Answer for Question No 13. is a
Answer for Question No 14. is c
Answer for Question No 15. is a
Answer for Question No 16. is c
Page 61 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is c
Answer for Question No 18. is d
Answer for Question No 19. is b
Answer for Question No 20. is d
Answer for Question No 21. is d
Answer for Question No 22. is a
Answer for Question No 23. is b
Answer for Question No 24. is a
Answer for Question No 25. is a
Answer for Question No 26. is d
Answer for Question No 27. is a
Answer for Question No 28. is c
Answer for Question No 29. is a
Answer for Question No 30. is a
Answer for Question No 31. is c
Answer for Question No 32. is a
Page 62 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is a
Answer for Question No 34. is b
Answer for Question No 35. is c
Answer for Question No 36. is c
Answer for Question No 37. is d
Answer for Question No 38. is b
Answer for Question No 39. is c
Answer for Question No 40. is c
Answer for Question No 41. is c
Answer for Question No 42. is c
Answer for Question No 43. is d
Answer for Question No 44. is b
Answer for Question No 45. is c
Answer for Question No 46. is b
Answer for Question No 47. is b
Answer for Question No 48. is d
Page 63 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is d
Answer for Question No 50. is d
Answer for Question No 51. is c
Answer for Question No 52. is b
Answer for Question No 53. is c
Answer for Question No 54. is d
Answer for Question No 55. is c
Answer for Question No 56. is b
Answer for Question No 57. is b
Answer for Question No 58. is c
Answer for Question No 59. is a
Answer for Question No 60. is b
Q.no 1. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 2. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 3. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 4. Which of the following standard Azure doesn't use?
Page 215 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : REST
B : XML
C : HTML
D : SQL
Q.no 5. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 6. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 7. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 8. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Page 216 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 9. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 10. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 11. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 12. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 13. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
Page 217 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Protected
D : Hybrid
Q.no 14. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 15. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 16. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 17. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 18. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
Page 218 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 19. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 20. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 21. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 22. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 23. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
Page 219 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : PaaS
C : IaaS
D : Other service
Q.no 24. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 25. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 26. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 27. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 28. What is the operating state of a cloudlet?
A : Only soft state
Page 220 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 29. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 30. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 31. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 32. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Page 221 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 33. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 34. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 35. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 36. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 37. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
Page 222 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : XMPP
Q.no 38. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 39. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 40. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 41. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 42. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
Page 223 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : QoS
D : COC
Q.no 43. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 44. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 45. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 46. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 47. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
Page 224 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 48. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 49. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 50. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 51. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
Page 225 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : QoCP
Q.no 52. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 53. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 54. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 55. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 56. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
Page 226 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : grid
C : linear
D : template
Q.no 57. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 58. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 59. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 60. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus

Answer for Question No 1. is c


Answer for Question No 2. is d
Answer for Question No 3. is a
Answer for Question No 4. is d
Page 64 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is d
Answer for Question No 6. is b
Answer for Question No 7. is c
Answer for Question No 8. is c
Answer for Question No 9. is d
Answer for Question No 10. is b
Answer for Question No 11. is b
Answer for Question No 12. is b
Answer for Question No 13. is d
Answer for Question No 14. is b
Answer for Question No 15. is d
Answer for Question No 16. is c
Answer for Question No 17. is b
Answer for Question No 18. is c
Answer for Question No 19. is b
Answer for Question No 20. is c
Page 65 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is c
Answer for Question No 22. is a
Answer for Question No 23. is c
Answer for Question No 24. is a
Answer for Question No 25. is a
Answer for Question No 26. is a
Answer for Question No 27. is a
Answer for Question No 28. is a
Answer for Question No 29. is a
Answer for Question No 30. is c
Answer for Question No 31. is b
Answer for Question No 32. is d
Answer for Question No 33. is b
Answer for Question No 34. is b
Answer for Question No 35. is b
Answer for Question No 36. is d
Page 66 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is d
Answer for Question No 38. is d
Answer for Question No 39. is b
Answer for Question No 40. is c
Answer for Question No 41. is b
Answer for Question No 42. is b
Answer for Question No 43. is a
Answer for Question No 44. is b
Answer for Question No 45. is d
Answer for Question No 46. is c
Answer for Question No 47. is d
Answer for Question No 48. is c
Answer for Question No 49. is a
Answer for Question No 50. is c
Answer for Question No 51. is c
Answer for Question No 52. is b
Page 67 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is a
Answer for Question No 54. is b
Answer for Question No 55. is a
Answer for Question No 56. is b
Answer for Question No 57. is d
Answer for Question No 58. is c
Answer for Question No 59. is b
Answer for Question No 60. is d
Q.no 1. OVF Stands for
Page 227 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 2. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 3. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 4. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 5. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 6. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
Page 228 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 7. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 8. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 9. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 10. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 11. PaaS stands for?
Page 229 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 12. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 13. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 14. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 15. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
Page 230 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 16. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 17. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 18. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 19. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 20. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
Page 231 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Virtualization &aggregation
Q.no 21. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 22. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 23. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 24. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 25. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
Page 232 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : SaaS
D : IaaS
Q.no 26. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 27. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 28. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 29. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 30. Which technology is used to distribute service requests to resources?
Page 233 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 31. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 32. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 33. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 34. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Page 234 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 35. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 36. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 37. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 38. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 39. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
Page 235 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : 256 bit
Q.no 40. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 41. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 42. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 43. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 44. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
Page 236 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 45. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 46. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 47. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 48. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Page 237 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 49. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 50. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 51. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 52. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 53. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
Page 238 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 54. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 55. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 56. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 57. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 58. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
Page 239 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Partner Quality
D : Longetivity
Q.no 59. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 60. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy

Answer for Question No 1. is a


Answer for Question No 2. is b
Answer for Question No 3. is b
Answer for Question No 4. is c
Answer for Question No 5. is d
Answer for Question No 6. is b
Answer for Question No 7. is d
Answer for Question No 8. is c
Page 68 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is c
Answer for Question No 10. is c
Answer for Question No 11. is a
Answer for Question No 12. is d
Answer for Question No 13. is a
Answer for Question No 14. is a
Answer for Question No 15. is a
Answer for Question No 16. is b
Answer for Question No 17. is b
Answer for Question No 18. is d
Answer for Question No 19. is c
Answer for Question No 20. is b
Answer for Question No 21. is c
Answer for Question No 22. is b
Answer for Question No 23. is b
Answer for Question No 24. is c
Page 69 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is c
Answer for Question No 26. is b
Answer for Question No 27. is c
Answer for Question No 28. is d
Answer for Question No 29. is c
Answer for Question No 30. is c
Answer for Question No 31. is d
Answer for Question No 32. is d
Answer for Question No 33. is c
Answer for Question No 34. is b
Answer for Question No 35. is d
Answer for Question No 36. is c
Answer for Question No 37. is b
Answer for Question No 38. is a
Answer for Question No 39. is b
Answer for Question No 40. is a
Page 70 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is d
Answer for Question No 42. is a
Answer for Question No 43. is b
Answer for Question No 44. is c
Answer for Question No 45. is a
Answer for Question No 46. is c
Answer for Question No 47. is a
Answer for Question No 48. is d
Answer for Question No 49. is a
Answer for Question No 50. is d
Answer for Question No 51. is a
Answer for Question No 52. is c
Answer for Question No 53. is b
Answer for Question No 54. is a
Answer for Question No 55. is c
Answer for Question No 56. is b
Page 71 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is c
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is b
Q.no 1. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 2. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 3. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
Page 240 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : XML
D : Ajax
Q.no 4. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 5. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 6. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 7. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 8. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
Page 241 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Over Virtualization Format
D : Over Virtualization File
Q.no 9. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 10. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 11. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 12. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 13. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
Page 242 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 14. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 15. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 16. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 17. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 18. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
Page 243 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 19. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 20. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 21. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 22. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Page 244 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 23. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 24. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 25. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 26. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 27. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
Page 245 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 28. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 29. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 30. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 31. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 32. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
Page 246 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 33. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 34. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 35. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 36. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 37. The hashing mechanism is used when the following form of data protection
is required.
Page 247 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 38. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 39. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 40. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 41. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 42. Which of the following is not Cloud Stakeholder?
Page 248 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 43. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 44. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 45. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 46. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Page 249 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 47. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 48. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 49. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 50. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 51. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
Page 250 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 52. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 53. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 54. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 55. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Page 251 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 56. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 57. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 58. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 59. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 60. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
Page 252 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Multitenancy

Answer for Question No 1. is d


Answer for Question No 2. is a
Answer for Question No 3. is c
Answer for Question No 4. is d
Answer for Question No 5. is d
Answer for Question No 6. is a
Answer for Question No 7. is b
Answer for Question No 8. is a
Answer for Question No 9. is c
Answer for Question No 10. is c
Answer for Question No 11. is b
Answer for Question No 12. is d
Page 72 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is c
Answer for Question No 14. is a
Answer for Question No 15. is a
Answer for Question No 16. is d
Answer for Question No 17. is b
Answer for Question No 18. is b
Answer for Question No 19. is b
Answer for Question No 20. is b
Answer for Question No 21. is d
Answer for Question No 22. is c
Answer for Question No 23. is a
Answer for Question No 24. is c
Answer for Question No 25. is b
Answer for Question No 26. is d
Answer for Question No 27. is c
Answer for Question No 28. is d
Page 73 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is b
Answer for Question No 30. is c
Answer for Question No 31. is c
Answer for Question No 32. is b
Answer for Question No 33. is d
Answer for Question No 34. is c
Answer for Question No 35. is c
Answer for Question No 36. is a
Answer for Question No 37. is a
Answer for Question No 38. is b
Answer for Question No 39. is d
Answer for Question No 40. is b
Answer for Question No 41. is d
Answer for Question No 42. is b
Answer for Question No 43. is b
Answer for Question No 44. is d
Page 74 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is d
Answer for Question No 46. is b
Answer for Question No 47. is c
Answer for Question No 48. is c
Answer for Question No 49. is b
Answer for Question No 50. is b
Answer for Question No 51. is a
Answer for Question No 52. is b
Answer for Question No 53. is d
Answer for Question No 54. is c
Answer for Question No 55. is d
Answer for Question No 56. is a
Answer for Question No 57. is b
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is b
Q.no 1. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 2. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 3. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 4. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 5. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
Page 253 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Decryption
D : Encryption
Q.no 6. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 7. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 8. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 9. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 10. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
Page 254 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 11. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 12. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 13. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 14. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 15. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
Page 255 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Labs
C : Hash
D : Platform
Q.no 16. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 17. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 18. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 19. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 20. XML standard is used for
Page 256 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 21. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 22. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 23. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 24. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Page 257 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 25. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 26. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 27. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 28. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 29. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
Page 258 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : End users
D : Cloud users
Q.no 30. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 31. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 32. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 33. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 34. Jungle Computing is a :
A : Mainframe Computing Paradigm
Page 259 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 35. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 36. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 37. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 38. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 39. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
Page 260 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 40. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 41. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 42. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 43. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
Page 261 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hybrid
Q.no 44. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 45. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 46. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 47. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 48. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
Page 262 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 49. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 50. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 51. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 52. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 53. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
Page 263 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 54. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 55. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 56. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 57. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 58. Which of the following has started Virtualization Management Initiative
(VMAN)?
Page 264 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 59. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 60. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy

Page 75 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is d
Answer for Question No 2. is c
Answer for Question No 3. is c
Answer for Question No 4. is a
Answer for Question No 5. is d
Answer for Question No 6. is c
Answer for Question No 7. is c
Answer for Question No 8. is c
Answer for Question No 9. is a
Answer for Question No 10. is b
Answer for Question No 11. is d
Answer for Question No 12. is a
Answer for Question No 13. is b
Answer for Question No 14. is b
Answer for Question No 15. is b
Answer for Question No 16. is d
Page 76 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is b
Answer for Question No 18. is c
Answer for Question No 19. is a
Answer for Question No 20. is b
Answer for Question No 21. is b
Answer for Question No 22. is b
Answer for Question No 23. is d
Answer for Question No 24. is b
Answer for Question No 25. is c
Answer for Question No 26. is c
Answer for Question No 27. is a
Answer for Question No 28. is b
Answer for Question No 29. is d
Answer for Question No 30. is a
Answer for Question No 31. is a
Answer for Question No 32. is a
Page 77 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is c
Answer for Question No 34. is c
Answer for Question No 35. is b
Answer for Question No 36. is a
Answer for Question No 37. is b
Answer for Question No 38. is b
Answer for Question No 39. is c
Answer for Question No 40. is d
Answer for Question No 41. is c
Answer for Question No 42. is d
Answer for Question No 43. is b
Answer for Question No 44. is d
Answer for Question No 45. is b
Answer for Question No 46. is d
Answer for Question No 47. is a
Answer for Question No 48. is d
Page 78 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is a
Answer for Question No 50. is c
Answer for Question No 51. is c
Answer for Question No 52. is c
Answer for Question No 53. is a
Answer for Question No 54. is c
Answer for Question No 55. is b
Answer for Question No 56. is b
Answer for Question No 57. is a
Answer for Question No 58. is a
Answer for Question No 59. is b
Answer for Question No 60. is b
Q.no 1. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 2. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Page 265 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 3. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 4. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 5. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 6. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 7. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
Page 266 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Because you'd like your application to remain in a public space
Q.no 8. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 9. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 10. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 11. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 12. SaaS stands for?
A : Software as a service
B : System Software and services
Page 267 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Software as a system
D : System as a service
Q.no 13. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 14. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 15. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 16. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 17. Name the cloud developed by SGI
Page 268 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 18. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 19. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 20. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 21. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Page 269 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 22. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 23. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 24. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 25. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 26. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
Page 270 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : A cloud has single application instance and directs requests to that specific instance
Q.no 27. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 28. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 29. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 30. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 31. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
Page 271 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 32. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 33. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 34. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 35. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Page 272 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 36. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 37. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 38. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 39. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 40. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
Page 273 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 41. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 42. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 43. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 44. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 45. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
Page 274 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 46. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 47. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 48. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 49. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 50. What is the operating state of a cloudlet?
Page 275 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 51. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 52. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 53. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 54. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Page 276 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 55. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 56. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 57. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 58. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 59. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
Page 277 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : ISO
D : Both 1 and 2
Q.no 60. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy

Answer for Question No 1. is d


Answer for Question No 2. is d
Answer for Question No 3. is c
Answer for Question No 4. is a
Page 79 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is d
Answer for Question No 6. is b
Answer for Question No 7. is c
Answer for Question No 8. is a
Answer for Question No 9. is c
Answer for Question No 10. is a
Answer for Question No 11. is c
Answer for Question No 12. is a
Answer for Question No 13. is a
Answer for Question No 14. is c
Answer for Question No 15. is a
Answer for Question No 16. is d
Answer for Question No 17. is c
Answer for Question No 18. is c
Answer for Question No 19. is c
Answer for Question No 20. is d
Page 80 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is b
Answer for Question No 22. is c
Answer for Question No 23. is d
Answer for Question No 24. is a
Answer for Question No 25. is b
Answer for Question No 26. is d
Answer for Question No 27. is a
Answer for Question No 28. is a
Answer for Question No 29. is d
Answer for Question No 30. is b
Answer for Question No 31. is b
Answer for Question No 32. is d
Answer for Question No 33. is a
Answer for Question No 34. is c
Answer for Question No 35. is b
Answer for Question No 36. is d
Page 81 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is c
Answer for Question No 38. is c
Answer for Question No 39. is c
Answer for Question No 40. is d
Answer for Question No 41. is b
Answer for Question No 42. is d
Answer for Question No 43. is b
Answer for Question No 44. is b
Answer for Question No 45. is a
Answer for Question No 46. is c
Answer for Question No 47. is c
Answer for Question No 48. is b
Answer for Question No 49. is b
Answer for Question No 50. is a
Answer for Question No 51. is c
Answer for Question No 52. is b
Page 82 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is a
Answer for Question No 54. is d
Answer for Question No 55. is d
Answer for Question No 56. is b
Answer for Question No 57. is c
Answer for Question No 58. is b
Answer for Question No 59. is a
Answer for Question No 60. is b
Q.no 1. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 2. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 3. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 4. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
Page 278 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : It gives access to Docker images
D : It's a totally private repository
Q.no 5. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 6. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 7. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 8. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 9. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
Page 279 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 10. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 11. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 12. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 13. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 14. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
Page 280 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 15. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 16. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 17. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 18. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Page 281 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 19. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 20. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 21. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 22. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 23. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
Page 282 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Isolation
Q.no 24. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 25. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 26. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 27. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 28. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
Page 283 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 29. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 30. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 31. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 32. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 33. Which of the following is most refined and restrictive service model ?
A : IaaS
Page 284 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : CaaS
C : PaaS
D : SaaS
Q.no 34. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 35. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 36. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 37. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Page 285 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 38. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 39. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 40. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 41. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 42. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Page 286 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 43. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 44. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 45. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 46. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 47. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
Page 287 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 48. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 49. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 50. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 51. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 52. Which of the following is the native clustering for Docker?
Page 288 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 53. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 54. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 55. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 56. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
Page 289 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Malicious Intermediary attack
Q.no 57. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 58. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 59. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 60. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity

Answer for Question No 1. is b


Answer for Question No 2. is d
Answer for Question No 3. is b
Answer for Question No 4. is d
Answer for Question No 5. is d
Answer for Question No 6. is b
Answer for Question No 7. is d
Answer for Question No 8. is c
Page 83 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is d
Answer for Question No 10. is b
Answer for Question No 11. is c
Answer for Question No 12. is b
Answer for Question No 13. is a
Answer for Question No 14. is b
Answer for Question No 15. is a
Answer for Question No 16. is b
Answer for Question No 17. is b
Answer for Question No 18. is c
Answer for Question No 19. is d
Answer for Question No 20. is c
Answer for Question No 21. is a
Answer for Question No 22. is d
Answer for Question No 23. is b
Answer for Question No 24. is c
Page 84 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is c
Answer for Question No 26. is c
Answer for Question No 27. is b
Answer for Question No 28. is d
Answer for Question No 29. is b
Answer for Question No 30. is b
Answer for Question No 31. is a
Answer for Question No 32. is d
Answer for Question No 33. is c
Answer for Question No 34. is c
Answer for Question No 35. is a
Answer for Question No 36. is c
Answer for Question No 37. is b
Answer for Question No 38. is b
Answer for Question No 39. is d
Answer for Question No 40. is c
Page 85 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is d
Answer for Question No 42. is a
Answer for Question No 43. is d
Answer for Question No 44. is a
Answer for Question No 45. is a
Answer for Question No 46. is a
Answer for Question No 47. is a
Answer for Question No 48. is d
Answer for Question No 49. is d
Answer for Question No 50. is c
Answer for Question No 51. is b
Answer for Question No 52. is c
Answer for Question No 53. is c
Answer for Question No 54. is a
Answer for Question No 55. is a
Answer for Question No 56. is b
Page 86 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is c
Answer for Question No 58. is c
Answer for Question No 59. is d
Answer for Question No 60. is b
Q.no 1. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
Page 290 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hybrid
Q.no 2. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 3. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 4. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 5. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 6. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
Page 291 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Partner Quality
D : Solving Problems
Q.no 7. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 8. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 9. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 10. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 11. Which is not true about Docker Hub?
A : The Hub is a network service
Page 292 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 12. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 13. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 14. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 15. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 16. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
Page 293 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 17. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 18. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 19. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 20. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 21. LAMP standard includes
Page 294 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 22. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 23. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 24. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 25. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 26. What is the operating state of a cloudlet?
Page 295 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 27. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 28. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 29. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 30. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Page 296 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 31. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 32. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 33. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 34. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 35. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
Page 297 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Malicious Service Agent
Q.no 36. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 37. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 38. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 39. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 40. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
Page 298 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : QoS
D : COC
Q.no 41. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 42. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 43. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 44. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Q.no 45. IPV6 has addrees space of of
A : 64 bit
Page 299 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 46. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 47. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 48. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 49. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Page 300 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 50. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 51. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 52. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 53. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 54. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
Page 301 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Quality-Of-Service
Q.no 55. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 56. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 57. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 58. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 59. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
Page 302 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Migration
D : Multitenancy
Q.no 60. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus

Answer for Question No 1. is c


Answer for Question No 2. is d
Answer for Question No 3. is d
Answer for Question No 4. is c
Answer for Question No 5. is a
Answer for Question No 6. is a
Answer for Question No 7. is c
Answer for Question No 8. is a
Answer for Question No 9. is d
Answer for Question No 10. is b
Answer for Question No 11. is d
Answer for Question No 12. is b
Page 87 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is b
Answer for Question No 14. is a
Answer for Question No 15. is c
Answer for Question No 16. is a
Answer for Question No 17. is c
Answer for Question No 18. is a
Answer for Question No 19. is d
Answer for Question No 20. is b
Answer for Question No 21. is a
Answer for Question No 22. is c
Answer for Question No 23. is d
Answer for Question No 24. is c
Answer for Question No 25. is d
Answer for Question No 26. is a
Answer for Question No 27. is c
Answer for Question No 28. is d
Page 88 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is b
Answer for Question No 30. is b
Answer for Question No 31. is c
Answer for Question No 32. is d
Answer for Question No 33. is b
Answer for Question No 34. is b
Answer for Question No 35. is d
Answer for Question No 36. is b
Answer for Question No 37. is b
Answer for Question No 38. is c
Answer for Question No 39. is d
Answer for Question No 40. is b
Answer for Question No 41. is c
Answer for Question No 42. is d
Answer for Question No 43. is c
Answer for Question No 44. is b
Page 89 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is b
Answer for Question No 46. is d
Answer for Question No 47. is c
Answer for Question No 48. is b
Answer for Question No 49. is a
Answer for Question No 50. is b
Answer for Question No 51. is a
Answer for Question No 52. is a
Answer for Question No 53. is c
Answer for Question No 54. is d
Answer for Question No 55. is b
Answer for Question No 56. is b
Answer for Question No 57. is b
Answer for Question No 58. is a
Answer for Question No 59. is b
Answer for Question No 60. is d
Q.no 1. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 2. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 3. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 4. Which of the following is not a type of cloud?
A : Private
Page 303 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Public
C : Protected
D : Hybrid
Q.no 5. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 6. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 7. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 8. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Page 304 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 9. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 10. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 11. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 12. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 13. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Page 305 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 14. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 15. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 16. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 17. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 18. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
Page 306 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Over Virtualization Format
D : Over Virtualization File
Q.no 19. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 20. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 21. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 22. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 23. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
Page 307 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Authenticity
D : Integrity
Q.no 24. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 25. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 26. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 27. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 28. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
Page 308 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 29. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 30. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 31. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 32. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Page 309 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 33. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 34. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 35. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 36. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 37. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
Page 310 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 38. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 39. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 40. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 41. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 42. Which of the following is most refined and restrictive service model ?
Page 311 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 43. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 44. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 45. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 46. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
Page 312 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hashing
Q.no 47. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 48. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 49. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 50. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 51. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
Page 313 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 52. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 53. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 54. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 55. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 56. Which of the following is the native clustering for Docker?
Page 314 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 57. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 58. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 59. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 60. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2

Page 90 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is b
Answer for Question No 2. is c
Answer for Question No 3. is c
Answer for Question No 4. is c
Answer for Question No 5. is b
Answer for Question No 6. is d
Answer for Question No 7. is b
Answer for Question No 8. is c
Answer for Question No 9. is d
Answer for Question No 10. is b
Answer for Question No 11. is a
Answer for Question No 12. is b
Answer for Question No 13. is d
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is d
Page 91 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is b
Answer for Question No 18. is a
Answer for Question No 19. is a
Answer for Question No 20. is a
Answer for Question No 21. is d
Answer for Question No 22. is c
Answer for Question No 23. is c
Answer for Question No 24. is a
Answer for Question No 25. is d
Answer for Question No 26. is d
Answer for Question No 27. is c
Answer for Question No 28. is c
Answer for Question No 29. is c
Answer for Question No 30. is d
Answer for Question No 31. is b
Answer for Question No 32. is a
Page 92 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is a
Answer for Question No 34. is b
Answer for Question No 35. is a
Answer for Question No 36. is a
Answer for Question No 37. is c
Answer for Question No 38. is d
Answer for Question No 39. is d
Answer for Question No 40. is a
Answer for Question No 41. is d
Answer for Question No 42. is c
Answer for Question No 43. is a
Answer for Question No 44. is d
Answer for Question No 45. is d
Answer for Question No 46. is c
Answer for Question No 47. is b
Answer for Question No 48. is a
Page 93 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is b
Answer for Question No 50. is d
Answer for Question No 51. is b
Answer for Question No 52. is a
Answer for Question No 53. is b
Answer for Question No 54. is c
Answer for Question No 55. is c
Answer for Question No 56. is c
Answer for Question No 57. is c
Answer for Question No 58. is b
Answer for Question No 59. is b
Answer for Question No 60. is b
Q.no 1. Which of the following service provider provides the least amount of builtin
security?
Page 315 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 2. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 3. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 4. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 5. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
Page 316 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 6. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 7. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 8. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 9. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 10. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
Page 317 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 11. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 12. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 13. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 14. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Page 318 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 15. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 16. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 17. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 18. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 19. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Page 319 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 20. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 21. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 22. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 23. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 24. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Page 320 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 25. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 26. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 27. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 28. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 29. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
Page 321 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : GAE
Q.no 30. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 31. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 32. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 33. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 34. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
Page 322 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Unreliable
Q.no 35. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 36. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 37. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 38. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 39. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
Page 323 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 40. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 41. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 42. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 43. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 44. Which of the following is an official commitment that prevails between a
service provider and a client
Page 324 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 45. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 46. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 47. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 48. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
Page 325 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : AaaS
Q.no 49. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 50. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 51. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 52. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 53. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
Page 326 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : grid
C : linear
D : template
Q.no 54. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 55. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 56. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 57. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
Page 327 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Malicious Intermediary attack
Q.no 58. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 59. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 60. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2

Answer for Question No 1. is c


Answer for Question No 2. is c
Answer for Question No 3. is a
Answer for Question No 4. is b
Page 94 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is a
Answer for Question No 6. is b
Answer for Question No 7. is b
Answer for Question No 8. is c
Answer for Question No 9. is a
Answer for Question No 10. is b
Answer for Question No 11. is b
Answer for Question No 12. is b
Answer for Question No 13. is c
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is d
Answer for Question No 17. is d
Answer for Question No 18. is d
Answer for Question No 19. is c
Answer for Question No 20. is a
Page 95 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is d
Answer for Question No 22. is c
Answer for Question No 23. is b
Answer for Question No 24. is d
Answer for Question No 25. is a
Answer for Question No 26. is b
Answer for Question No 27. is b
Answer for Question No 28. is b
Answer for Question No 29. is a
Answer for Question No 30. is b
Answer for Question No 31. is c
Answer for Question No 32. is b
Answer for Question No 33. is d
Answer for Question No 34. is b
Answer for Question No 35. is b
Answer for Question No 36. is c
Page 96 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is c
Answer for Question No 38. is c
Answer for Question No 39. is d
Answer for Question No 40. is d
Answer for Question No 41. is d
Answer for Question No 42. is d
Answer for Question No 43. is c
Answer for Question No 44. is c
Answer for Question No 45. is b
Answer for Question No 46. is b
Answer for Question No 47. is c
Answer for Question No 48. is c
Answer for Question No 49. is a
Answer for Question No 50. is d
Answer for Question No 51. is c
Answer for Question No 52. is a
Page 97 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is b
Answer for Question No 54. is b
Answer for Question No 55. is d
Answer for Question No 56. is a
Answer for Question No 57. is b
Answer for Question No 58. is a
Answer for Question No 59. is d
Answer for Question No 60. is b
Q.no 1. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 2. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
Page 328 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Partner Quality
D : Solving Problems
Q.no 3. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 4. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 5. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 6. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 7. JSON stands for
Page 329 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 8. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 9. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 10. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 11. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 12. Which is not true about Docker Hub?
A : The Hub is a network service
Page 330 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 13. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 14. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 15. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 16. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 17. When did the Clustered systems first appear in?
A : 1980
Page 331 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : 1990
C : 2000
D : 2010
Q.no 18. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 19. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 20. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 21. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 22. The process of converting Ciphertext data to Plaintext data is known as ?
Page 332 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Encryption
B : Decryption
C:
D:
Q.no 23. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 24. SMTP standard is used for
A : Web Development
B : Messaging
C : Run Websites and Servers
D : Security
Q.no 25. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 26. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
Page 333 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Public-Key Cryptography
Q.no 27. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 28. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 29. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 30. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 31. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
Page 334 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 32. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 33. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 34. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 35. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 36. Which of the following is most refined and restrictive service model ?
Page 335 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 37. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 38. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 39. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 40. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 41. Which of the following are cloud related working groups?
Page 336 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 42. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 43. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 44. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 45. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
Page 337 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : LAMP
Q.no 46. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 47. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
D : A cloud has single application instance and directs requests to that specific instance
Q.no 48. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 49. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 50. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
Page 338 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 51. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 52. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 53. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 54. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 55. Which of the following is the native clustering for Docker?
Page 339 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 56. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 57. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Q.no 58. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 59. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Page 340 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 60. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2

Answer for Question No 1. is c


Answer for Question No 2. is a
Answer for Question No 3. is c
Answer for Question No 4. is d
Answer for Question No 5. is b
Answer for Question No 6. is c
Answer for Question No 7. is a
Answer for Question No 8. is d
Page 98 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 9. is b
Answer for Question No 10. is a
Answer for Question No 11. is a
Answer for Question No 12. is d
Answer for Question No 13. is d
Answer for Question No 14. is c
Answer for Question No 15. is c
Answer for Question No 16. is c
Answer for Question No 17. is b
Answer for Question No 18. is c
Answer for Question No 19. is a
Answer for Question No 20. is b
Answer for Question No 21. is d
Answer for Question No 22. is b
Answer for Question No 23. is b
Answer for Question No 24. is b
Page 99 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 25. is b
Answer for Question No 26. is b
Answer for Question No 27. is d
Answer for Question No 28. is b
Answer for Question No 29. is d
Answer for Question No 30. is a
Answer for Question No 31. is a
Answer for Question No 32. is b
Answer for Question No 33. is a
Answer for Question No 34. is a
Answer for Question No 35. is b
Answer for Question No 36. is c
Answer for Question No 37. is b
Answer for Question No 38. is a
Answer for Question No 39. is a
Answer for Question No 40. is b
Page 100 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 41. is d
Answer for Question No 42. is c
Answer for Question No 43. is d
Answer for Question No 44. is c
Answer for Question No 45. is a
Answer for Question No 46. is b
Answer for Question No 47. is d
Answer for Question No 48. is c
Answer for Question No 49. is b
Answer for Question No 50. is c
Answer for Question No 51. is a
Answer for Question No 52. is b
Answer for Question No 53. is b
Answer for Question No 54. is c
Answer for Question No 55. is c
Answer for Question No 56. is c
Page 101 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 57. is c
Answer for Question No 58. is b
Answer for Question No 59. is c
Answer for Question No 60. is a
Q.no 1. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 2. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 3. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 4. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
Page 341 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Super
Q.no 5. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 6. The mechanism to convert Plaintext data into Ciphertext data is known as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 7. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 8. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 9. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
Page 342 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : MobileMe Gallery
Q.no 10. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 11. Which of the following standard Azure doesn't use?
A : REST
B : XML
C : HTML
D : SQL
Q.no 12. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 13. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 14. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
Page 343 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Hybrid
Q.no 15. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 16. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 17. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 18. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 19. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
Page 344 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 20. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 21. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 22. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 23. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 24. OVF Stands for
Page 345 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 25. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 26. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 27. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 28. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Page 346 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 29. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 30. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 31. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Q.no 32. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 33. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
Page 347 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Unavailable
D : Unreliable
Q.no 34. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 35. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 36. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 37. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 38. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
Page 348 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Digital Signatures
D : Public-Key Cryptography
Q.no 39. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 40. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 41. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
D : CometCloud autonomic cloud engine
Q.no 42. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 43. Fundamental Architecture of Docker is :
Page 349 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 44. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
C : Load balancing
D : Load sharing
Q.no 45. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 46. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 47. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Page 350 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 48. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 49. Which among the following is a valid Cloud Issue :
A : Persistent data storage
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 50. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 51. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 52. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
Page 351 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : POP
C : IMAP
D : Both 1 and 2
Q.no 53. What are the main characteristics of a mashup?
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 54. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
D : Quality-Of-Service
Q.no 55. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 56. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Page 352 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 57. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 58. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack
Q.no 59. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 60. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template

Answer for Question No 1. is c


Answer for Question No 2. is a
Answer for Question No 3. is d
Answer for Question No 4. is d
Answer for Question No 5. is a
Answer for Question No 6. is d
Answer for Question No 7. is b
Answer for Question No 8. is a
Answer for Question No 9. is d
Answer for Question No 10. is c
Answer for Question No 11. is d
Answer for Question No 12. is c
Page 102 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 13. is c
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is b
Answer for Question No 17. is c
Answer for Question No 18. is c
Answer for Question No 19. is d
Answer for Question No 20. is b
Answer for Question No 21. is b
Answer for Question No 22. is a
Answer for Question No 23. is a
Answer for Question No 24. is a
Answer for Question No 25. is a
Answer for Question No 26. is b
Answer for Question No 27. is d
Answer for Question No 28. is b
Page 103 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 29. is b
Answer for Question No 30. is d
Answer for Question No 31. is a
Answer for Question No 32. is b
Answer for Question No 33. is b
Answer for Question No 34. is d
Answer for Question No 35. is d
Answer for Question No 36. is c
Answer for Question No 37. is d
Answer for Question No 38. is b
Answer for Question No 39. is c
Answer for Question No 40. is c
Answer for Question No 41. is d
Answer for Question No 42. is c
Answer for Question No 43. is d
Answer for Question No 44. is c
Page 104 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 45. is c
Answer for Question No 46. is b
Answer for Question No 47. is c
Answer for Question No 48. is b
Answer for Question No 49. is b
Answer for Question No 50. is a
Answer for Question No 51. is b
Answer for Question No 52. is b
Answer for Question No 53. is d
Answer for Question No 54. is d
Answer for Question No 55. is a
Answer for Question No 56. is a
Answer for Question No 57. is b
Answer for Question No 58. is b
Answer for Question No 59. is a
Answer for Question No 60. is b
Q.no 1. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
Page 353 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Remote Sensing
D : Private Computing
Q.no 2. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 3. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Q.no 4. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Q.no 5. When did the Clustered systems first appear in?
A : 1980
B : 1990
C : 2000
D : 2010
Q.no 6. SMTP standard is used for
A : Web Development
B : Messaging
Page 354 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Run Websites and Servers
D : Security
Q.no 7. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 8. Which of the following is not type of virtualization in cloud computing?
A : Storage
B : Application
C : CPU
D : Program
Q.no 9. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 10. Which of the following architectural standards is working with cloud
computing industry?
A : Service-oriented architecture
B : Standardized Web services
C : Web-application frameworks
D : Web-based archietectrure
Q.no 11. Volume mapping maps the host server's directory into the Docker
container. The data will remain in a safe and accessible place if you do which of the
following?
Page 355 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : re-create the container
B : migrate the container
C : delete the container
D : backup the container
Q.no 12. The process of converting Ciphertext data to Plaintext data is known as ?
A : Encryption
B : Decryption
C:
D:
Q.no 13. Which of the following is a photo and video sharing service by MobileMe?
A : iDisk
B : Find My iPhone
C : iWeb Publish
D : MobileMe Gallery
Q.no 14. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 15. XML standard is used for
A : Web development
B : Send structured data over network
C : Messaging
D : Run Server
Q.no 16. Which of the following standard Azure doesn't use?
Page 356 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : REST
B : XML
C : HTML
D : SQL
Q.no 17. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 18. Which is not true about Docker Hub?
A : The Hub is a network service
B : Docker Hub is a network storage
C : It gives access to Docker images
D : It's a totally private repository
Q.no 19. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
D : IaaS
Q.no 20. Point out the incorrect statement:
A : All delivery models provide similar security services
B : Different types of cloud computing service models provide different levels of
security services
C : Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in your
chosen cloud service provider
Page 357 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Data should be transferred and stored in an encrypted format for security purpose
Q.no 21. OVF Stands for
A : Open Virtualization Format
B : Open Virualization File
C : Over Virtualization Format
D : Over Virtualization File
Q.no 22. SaaS stands for?
A : Software as a service
B : System Software and services
C : Software as a system
D : System as a service
Q.no 23. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 24. Which of the following mechanisms are contained by Cloud API for
accessing cloud services?
A : Abstraction
B : Authentication
C : Replication
D : Segmentation
Q.no 25. Point out the correct statement:
A : Google’s cloud includes perhaps some 10 datacenters worldwide
B : Flipkart.com’s infrastructure was built to support elastic demand so the system could
accommodate peak traffic
Page 358 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Datacenters have been sited to optimize the overall system latency
D : Datacenters don't optimize the system latency
Q.no 26. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 27. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 28. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
B : EC2
C : EC3
D : S2
Q.no 29. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Page 359 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 30. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 31. Which of the following is most refined and restrictive service model ?
A : IaaS
B : CaaS
C : PaaS
D : SaaS
Q.no 32. What is the operating state of a cloudlet?
A : Only soft state
B : Only hard state
C : Both hard and soft state
D : GAE
Q.no 33. Using Ajax web applications can retrieve data from server ____
A : Synchronously
B : Asynchronously
C : Both 1 and 2
D : 1 or 2
Q.no 34. Point out the incorrect statement:
A : A client can request access to a cloud service from any location
B : A cloud has multiple application instances and directs requests to an instance based
on conditions
C : Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
Page 360 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : A cloud has single application instance and directs requests to that specific instance
Q.no 35. Which of the following is used for the packaging and distribution of one or
more virtual appliances?
A : OVF
B : SMTP
C : Ajax
D : LAMP
Q.no 36. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 37. Which of the following are cloud related working groups?
A : Open Cloud Consortium
B : Distributed Management Task Force
C : Only 1
D : Both 1 and 2
Q.no 38. Which is the process of stripping unncessary software from a system to
limit potential vulnerabilities that can be exploited by attackers ?
A : Single-Sign On
B : Softening
C : Hardening
D : Hashing
Q.no 39. Which of the following is not a cloud stakeholder?
A : Cloud Providers
B : Clients
Page 361 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : End users
D : Cloud users
Q.no 40. What is the example of P2P networks?
A : Gmail
B : Azure
C : Amazon
D : Facebook
Q.no 41. A common approach for managing the issuance of asymmetric keys is
based on the :
A : Virtual Server Systems
B : Physical Server Systems
C : Private key Infrastructure
D : Public key Infrastructure
Q.no 42. Which of the following is a more sophisticated load balancer?
A : Rack server managers
B : Workload managers
C : Workspace managers
D : Network server managers
Q.no 43. Which type of computing provides the user to use all computing resources
available in this environment, which contains clusters, clouds, grids, desktop grids,
supercomputers, stand-alone machines and mobile devices.
A : Autonmic Computing
B : Home-based Cloud Computing
C : Jungle Computing
D : Mobile Computing
Q.no 44. Which of the following is not characteristic of Cloud?
A : On-Demand Uses
Page 362 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Elasticity
C : Ubiquitous Access
D : Distributed Measures
Q.no 45. Which of the following is not Cloud Stakeholder?
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 46. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 47. These cloud services are of the form of utility computing i.e. the _________
uses these services pay-as-you-go model.
A : Cloud Providers
B : Clients
C : End users
D : Cloud users
Q.no 48. Which of these occurs when access is granted to an attacker erroneously or
too broadly, resulting in the attacker getting access to IT resources that are
normally protected.
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Denial-of-Service Attack
D : Integrity Attack
Page 363 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 49. Which of the following is an official commitment that prevails between a
service provider and a client
A : Parameters Specificiation
B : QoS Agreement
C : Service-Level agreement
D : System-Level agreement
Q.no 50. IPV6 has addrees space of of
A : 64 bit
B : 128 bit
C : 512 bit
D : 256 bit
Q.no 51. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 52. Which of the following is the native clustering for Docker?
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP
Q.no 53. The Open Cloud Test Bed uses
A : Cisco C-Wave
B : The UIC Teraflow Network
C : Both 1 and 2
D : Only 1
Page 364 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 54. ____ is the protocol specification for exchanging structured information in
the implementaiton of Web services in Computer Network.
A : RSS
B : APP
C : SOAP
D : REST
Q.no 55. Which of the following is the operational domain of CSA?
A : Reliability
B : Scalability
C : Portability and interoperability
D : Flexibility
Q.no 56. Which of the following has started Virtualization Management Initiative
(VMAN)?
A : DMTF
B : OCC
C : ISO
D : Both 1 and 2
Q.no 57. Which of the following software can be used to implement load balancing?
A : Apache mod_balancer
B : Apache mod_proxy_balancer
C : F6’s BigIP
D : Apache Load Balancer
Q.no 58. Which of the following Cloud Issue addresses If you’re using a virtual
network between servers, does your virtualized NIC (Network Interface Card) even
support promiscuous mode to allow you to examine the data flows?
A : Partner Quality
B : Business Continuity
C : Regulatory Issues and Accountability
Page 365 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : Quality-Of-Service
Q.no 59. _____________ enables the migration of the virtual image from one
physical machine to another.
A : Visualization
B : Virtualization
C : Migration
D : Multitenancy
Q.no 60. Cloud provides multiple cloud consumers with access to IT resources that
share underlying hardware but are logically isolated from each other.Which among
the following is an inherent risk that cloud consumers could abuse this access to
attack the underlyi
A : Denial of Service attack
B : Virtualization attack
C : Traffic Eavesdropping attack
D : Malicious Intermediary attack

Page 105 of 113


https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 1. is b
Answer for Question No 2. is c
Answer for Question No 3. is c
Answer for Question No 4. is a
Answer for Question No 5. is b
Answer for Question No 6. is b
Answer for Question No 7. is b
Answer for Question No 8. is d
Answer for Question No 9. is c
Answer for Question No 10. is a
Answer for Question No 11. is b
Answer for Question No 12. is b
Answer for Question No 13. is d
Answer for Question No 14. is d
Answer for Question No 15. is b
Answer for Question No 16. is d
Page 106 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 17. is c
Answer for Question No 18. is d
Answer for Question No 19. is c
Answer for Question No 20. is a
Answer for Question No 21. is a
Answer for Question No 22. is a
Answer for Question No 23. is d
Answer for Question No 24. is b
Answer for Question No 25. is c
Answer for Question No 26. is c
Answer for Question No 27. is d
Answer for Question No 28. is a
Answer for Question No 29. is a
Answer for Question No 30. is a
Answer for Question No 31. is c
Answer for Question No 32. is a
Page 107 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 33. is b
Answer for Question No 34. is d
Answer for Question No 35. is a
Answer for Question No 36. is b
Answer for Question No 37. is d
Answer for Question No 38. is c
Answer for Question No 39. is b
Answer for Question No 40. is a
Answer for Question No 41. is d
Answer for Question No 42. is b
Answer for Question No 43. is c
Answer for Question No 44. is d
Answer for Question No 45. is b
Answer for Question No 46. is c
Answer for Question No 47. is d
Answer for Question No 48. is a
Page 108 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 49. is c
Answer for Question No 50. is b
Answer for Question No 51. is b
Answer for Question No 52. is c
Answer for Question No 53. is c
Answer for Question No 54. is c
Answer for Question No 55. is c
Answer for Question No 56. is a
Answer for Question No 57. is b
Answer for Question No 58. is d
Answer for Question No 59. is b
Answer for Question No 60. is b
Q.no 1. Which of the following Cloud Security Characteristic states that data not
having been altered by an unauthorized party ?
A : Integrity
B : Confidentiality
C : Authenticity
D : Availability
Q.no 2. Which of the following service provider provides the least amount of builtin
security?
A : SaaS
B : PaaS
C : IaaS
D : Other service
Q.no 3. Why do you need to write a Dockerfile?
A : Because you'd like your application to remain in a private space
Page 366 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : You want to access and use Docker Hub
C : You want to publish your application to Docker Hub
D : Because you'd like your application to remain in a public space
Q.no 4. LAMP standard includes
A : Linux, Apache, MySQL, PHP
B : Linux, Apache, MySQL
C : Linux, MySQL, PHP
D : Linux, Apache, PHP
Q.no 5. Which of the following Cloud Issue deals with the Life and Gaurantee of
existence for long term of Cloud Service ?
A : Longetivity
B : Quality-Of-Service
C : Partner Quality
D : Solving Problems
Q.no 6. When we use the same key for both encryption and decryption then it is
known as ?
A : Asymmetric Encryption
B : Symmetric Encryption
C : Non-repudiation
D : Repudiation
Q.no 7. Name the infrastructure which enables cloud computing using mobile
devices
A : Mashup
B : Cloudlet
C : EC2
D : Virtualization &aggregation
Q.no 8. Risk review and Risk Monitoring pertains to which of the following in the
context of Cloud Security ?
Page 367 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Risk Treatment
B : Risk Analysis
C : Risk Control
D : Risk Assessment
Q.no 9. A weakness that can be exploited either because it is protected by
insufficient security controls, or because existing security controls are overcome by
an attack is known as
A : Poor Virtualization
B : Vulnerability
C : Availability
D : Isolation
Q.no 10. In this type of cloud, the cloud is composed of multiple internal or external
cloud.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 11. Which of the following is used for sending structured data over network?
A : LAMP
B : LAPP
C : XML
D : Ajax
Q.no 12. The characteristic of something having been provided by an authorized
source in the context of security is known as ?
A : Avaialbility
B : Consistency
C : Authenticity
D : Integrity
Page 368 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 13. Which of the following is a cloud OS?
A : Nebula
B : Antrix
C : ALICE
D : Super
Q.no 14. Name the cloud developed by SGI
A : Nebula
B : Andromeda
C : Cyclone
D : STANDARDS
Q.no 15. ________________ is a paradigm of distributed computing to provide the
customers on-demand, utility based computing service.
A : Distributed System
B : Cloud Computing
C : Remote Sensing
D : Private Computing
Q.no 16. Which of the following is not cross-platform API based on generalizing the
major cloud vendors APIs?
A : Deltacloud
B : Simple Cloud API
C : Design Cloud
D : Alphacloud
Q.no 17. PaaS stands for?
A : Product as a service
B : Platform application and services
C : Platform as a system
D : Platform as a service
Page 369 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 18. JSON stands for
A : Java Script Object Notation
B : Java Source Object Notation
C : Java Script Object Name
D : Java Script Open Notation
Q.no 19. Which of the following is not a type of cloud?
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 20. To overload IT resources to the point where they cannot function properly
is which kind of attack ?
A : Virtualization Attack
B : Insufficient Authorization
C : Evasdropping Attack
D : Denial-of-service Attack
Q.no 21. Which of the following provides evidence that the message received is the
same as created by its rightful sender ?
A : Trusted Signature
B : Analog Signature
C : Digital Signature
D : Encryption
Q.no 22. When you add operating system and applications to the service, the model
called as ____________.
A : PaaS
B : CaaS
C : SaaS
Page 370 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : IaaS
Q.no 23. The mechanism to convert Plaintext data into Ciphertext data is known
as ?
A : Identity Management
B : Credential Management
C : Decryption
D : Encryption
Q.no 24. Which organization supports the development of standards for the cloud
computing?
A : IEEE
B : OMG
C : OCC
D : Stateless
Q.no 25. Google _______ is a collection of applications and utilities under
development and testing.
A : Code
B : Labs
C : Hash
D : Platform
Q.no 26. What is the compound metric for cloud platform performace?
A : QoC
B : QoCS
C : QoS
D : COC
Q.no 27. Which technology is used to distribute service requests to resources?
A : Load performing
B : Load scheduling
Page 371 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
C : Load balancing
D : Load sharing
Q.no 28. ____ is XML based protocol used for near-real-time, extensible instant
messaging and Presence information.
A : TCP
B : SIMPLE
C : HTTP
D : XMPP
Q.no 29. Point out the correct statement.
A : Yahoo search is the most popular search engine on the Web
B : Google Ad Planner is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
C : Google AdSense is a free media planning tool that can help you identify websites
your audience is likely to visit so you can make better-informed advertising decisions
D : All Google products are freely accessible
Q.no 30. The purpose of the Open Cloud Consortium is to
A : support development of standards for cloud computing
B : develop a framework for inteoperability among variuos cloud
C : Only 1
D : Both 1 and 2
Q.no 31. Fundamental Architecture of Docker is :
A : Standlone Systems
B : Mainframes Systems
C : Peer-to-Peer
D : Simple Client-Server
Q.no 32. Which among the following is a valid Cloud Issue :
A : Persistent data storage
Page 372 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Stability
C : Consistency
D : Braod Newtork Coverage
Q.no 33. A refrigerator would automatically create your grocery list and send the
list to the store so your essentials could be delivered - this example is representative
of which of the following ?
A : Future CometCloud
B : Future Mobile Cloud Computing
C : Future of Cloud-Based Smart Devices
D : Future Cloud TV
Q.no 34. Which of these entity is able to intercept and forward the network traffic
that flows within a cloud.
A : Dsigrunteled Attacker
B : Malicious Intermediary
C : Anonymous Attacker
D : Malicious Service Agent
Q.no 35. IBM Ensembles offer a virtualized cloud server for
A : SaaS
B : PasS
C : IaaS
D : AaaS
Q.no 36. Which of the following storage is presented to a user as if it is a ready-touse
disk drive?
A : Managed
B : Unmanaged
C : Unavailable
D : Unreliable
Page 373 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
Q.no 37. Which of the following mechanism addresses the challenge of propogating
the authentication and authorization information for a cloud service consumer
across multiple cloud services ?
A : Hashing
B : Singel-Sign On
C : Digital Signatures
D : Public-Key Cryptography
Q.no 38. Which among the following is a type of Computing which is a form of selfmanaging
systems
A : Jungle Computing
B : Autonomic Computing
C : Mobile Computing
D : Home-based Cloud Computing
Q.no 39. Which type of computing provides mobile users with data storage and
processing services in clouds, obviating the need to have a powerful device
configuration (e.g. CPU speed, memory capacity etc), as all resource-intensive
computing can be performed in th
A : Energy aware Cloud Computing
B : Mobile Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 40. Which of the following is used to transmit structured data over network?
A : XML
B : JSON
C : Only 1
D : Both 1 and 2
Q.no 41. Azure Storage plays the same role in Azure that ______ plays in Amazon
Web Services.
A : S3
Page 374 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : EC2
C : EC3
D : S2
Q.no 42. Which of the following occurs when data being transferred to or within a
cloud (usually from the cloud consumer to the cloud provider) is passively
intercepted by a malicious service agent for illegitimate information gathering
purposes
A : Insufficient Authorization Attack
B : Virtualization Attack
C : Traffic Eavesdropping
D : Denail-of-Service
Q.no 43. With what type of Cloud applications you will be able to track not only the
packages you ship, but also stolen cars, lost luggage, misplaced cell phones, missing
pets, and more.
A : Location-Aware Applications
B : Intelligent Fabrics
C : Intelligent Paints
D : Cloud TV
Q.no 44. Monitor body functions such as blood pressure, blood sugar levels, stress,
and more, and notify the person and adjust the environment to affect those
functions. Which Cloud Application does this example represents ?
A : Intelligent Fabrics
B : Cloud TV
C : Power-aware Cloud Application
D : Jungle Computing
Q.no 45. Which of the following Integrates local computational environments and
public cloud services on-demand
A : Docker
B : Mobile Cloud Computing
C : Cloud TV
Page 375 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
D : CometCloud autonomic cloud engine
Q.no 46. Threats, Risk identification and risk evaluation pertains to which of the
following in the context of Cloud Security ?
A : Risk Treatment
B : Risk Management
C : Risk Assessment
D : Risk Control
Q.no 47. The hashing mechanism is used when the following form of data protection
is required.
A : One-way, non-reversible
B : Two-way, non-reversible
C : One-way, reversible
D : two-way, reversible
Q.no 48. Jungle Computing is a :
A : Mainframe Computing Paradigm
B : Peer-to-Peer Computing Paradigm
C : Distributed Computing Paradigm
D : Standalone Computing Paradigm
Q.no 49. In this type of cloud, an organization rents cloud services from cloud
providers on-demand basis.
A : Private
B : Public
C : Protected
D : Hybrid
Q.no 50. When a teenager enters his or her room, for example, the music will play
louder, lights may dim, and the computer might initiate specific Skype connections.
If a parent enters the room, the volume will lower, lights will turn on, and the Skype
page might
A : Energy aware Cloud Computing
Page 376 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
B : Multimedia Cloud Computing
C : Home Based Cloud Computing
D : Cloud TV Computing
Q.no 51. Most of the cloud architectures are built on this type of architecture.
A : Skeleton
B : grid
C : linear
D : template
Q.no 52. Which Cloud issue deals with matter of accountability, auditing, and plans
of action.
A : Accessibility and Stability
B : Regulatory Issues and Accountability
C : Partner Quality
D : Longetivity
Q.no 53. The technology used to distribute service requests to resources is referred
to as _____________
A : Load Scheduling
B : Load Performing
C : Load Balancing
D : Load Measuring
Q.no 54. Cost, Reliability, Availability, aspect ratio, frame rate - these parameters
refers to what ?
A : Quality of Service
B : Stability
C : Maintanability
D : Service Integrity
Q.no 55. What are the main characteristics of a mashup?
Page 377 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Agility and security
B : Portability and ease of access
C : Accessibility and maintenability
D : Nimbus
Q.no 56. In which of the following clients must have continuous connection to host
to receive the messages?
A : SMTP
B : POP
C : IMAP
D : Both 1 and 2
Q.no 57. IBM Blue Cloud uses
A : Open standards
B : Proprietary standards
C : Industry standards
D : IEEE
Q.no 58. _________enable multiple users to access the same application logic
simultaneously.
A : Multitenant technology
B : Virtualization technology
C : Web technology
D : Service Technology
Q.no 59. Which port does Docker registry use?
A : Port 3000
B : Port 5000
C : Port 8000
D : Docker Compose
Q.no 60. Which of the following is the native clustering for Docker?
Page 378 of 379
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1979&code=1052... 29-
12-2020
A : Docker Hub
B : Docker Cloud
C : Docker Swarm
D : QoCP

Answer for Question No 1. is a


Answer for Question No 2. is c
Answer for Question No 3. is c
Answer for Question No 4. is a
Page 109 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 5. is a
Answer for Question No 6. is b
Answer for Question No 7. is b
Answer for Question No 8. is c
Answer for Question No 9. is b
Answer for Question No 10. is d
Answer for Question No 11. is c
Answer for Question No 12. is c
Answer for Question No 13. is d
Answer for Question No 14. is c
Answer for Question No 15. is b
Answer for Question No 16. is d
Answer for Question No 17. is a
Answer for Question No 18. is a
Answer for Question No 19. is c
Answer for Question No 20. is d
Page 110 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 21. is c
Answer for Question No 22. is c
Answer for Question No 23. is d
Answer for Question No 24. is c
Answer for Question No 25. is b
Answer for Question No 26. is b
Answer for Question No 27. is c
Answer for Question No 28. is d
Answer for Question No 29. is b
Answer for Question No 30. is d
Answer for Question No 31. is d
Answer for Question No 32. is b
Answer for Question No 33. is c
Answer for Question No 34. is d
Answer for Question No 35. is c
Answer for Question No 36. is b
Page 111 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 37. is b
Answer for Question No 38. is b
Answer for Question No 39. is b
Answer for Question No 40. is d
Answer for Question No 41. is a
Answer for Question No 42. is c
Answer for Question No 43. is a
Answer for Question No 44. is a
Answer for Question No 45. is d
Answer for Question No 46. is c
Answer for Question No 47. is a
Answer for Question No 48. is c
Answer for Question No 49. is b
Answer for Question No 50. is c
Answer for Question No 51. is b
Answer for Question No 52. is b
Page 112 of 113
https://sppu.wheebox.com/WAC-3/openanswers.obj 29-12-2020
Answer for Question No 53. is c
Answer for Question No 54. is a
Answer for Question No 55. is d
Answer for Question No 56. is b
Answer for Question No 57. is a
Answer for Question No 58. is a
Answer for Question No 59. is b
Answer for Question No 60. is c

You might also like