1100+ TOP Cloud Computing Objective Questions-Answers MCQs

CLOUD COMPUTING Multiple Choice Questions :-

1.  What is Cloud Computing replacing?
A.   Corporate data centers
B.   Expensive personal computer hardware
C.   Expensive software upgrades
D.   All of the above
Answer: D

2.  What is the number one concern about cloud computing?
A.   Too expensive
B.   Security concerns
C.   Too many platforms
D.   Accessability
Answer: B

3.  Which of these companies is not a leader in cloud computing?
A.   Google
B.   Amazon
C.   Blackboard
D.   Microsoft
Answer: C

4.  Google Docs is a type of cloud computing.
A.   True
B.   False
Answer: A

5.  Which one of these is not a cloud computing pricing model?
A.   Free
B.   Pay Per Use
C.   Subscription
D.   Ladder
E.   Perpetual License
Answer: D

6.  Which of these is not a major type of cloud computing usage?
A.   Hardware as a Service
B.   Platform as a Service
C.   Software as a Service
D.   Infrastructure as a Service
Answer: A

7.  An Internet connection is neccessary for cloud computing interaction.
A.   True
B.   False
Answer: A

8.  Which is not a major cloud computing platform?
A.   Google 101
B.   IBM Deep blue
C.   Microsoft Azure
D.   Amazon EC2
Answer: B

9.  “Cloud” in cloud computing represents what?
A.   Wireless
B.   Hard drives
C.   People
D.   Internet
Answer: D

10.  Which of these should a company consider before implementing cloud computing technology?
A.   Employee satisfaction
B.   Potential cost reduction
C.   Information sensitivity
D.   All of the above
Answer: D

CLOUD COMPUTING Objective Questions
CLOUD COMPUTING MCQs

11. What exactly is cloud computing?
A. A way to organize desktop computers
B. Lightweight software that takes up little space on a hard drive
C. Computing resources that can be accessed on demand, like electricity from a utility
D. The World Wide Web
Answer: C

12. What widely used service is built on cloud-computing technology?
A. Twitter B. Skype
C. GmailD. YouTube
E. All of the above
Answer: E

13. Which of these techniques is vital for creating cloud-computing centers?
A. Virtualization
B. Transubstantiation
C. Cannibalization
D. Insubordination
Answer: A

14. An internal cloud is…
A. An overhanging threat
B. A career risk for a CIO
C. A cloud that sits behind a corporate firewall
D. The group of knowledge workers who use a social network for water-cooler gossip
Answer: C

15. Match the provider with the cloud-based service.
A. Amazon1. Azure
B. IBM2. Elastic Compute Cloud
C. EMC3. Decho
D. Microsoft4. Cloudburst
Answer: A

16. Cloud computing embraces many concepts that were previously touted as the next big thing in information technology. Which of these is not an antecedent of the cloud?
A. Software as a service
B. Utility computing
C. Remote hosted services
D. Grid computing
E. Desktop computing
Answer: E

17. IBM, EMC and Boeing Co. were among the companies signing what document whose title is reminiscent of a famous political statement?
A. Declaration of Cloud Computing
B. The Rights of Cloud
C. Mein Cloud
D. Open Cloud Manifesto
Answer: D

18. The term “cloud computing” is a metaphor that originated in what?
A. Graphical depiction of computer architectures
B. Meteorological symbolism
C. Worries about an unclear future for computing architectures
D. The idea that computer users trust in magic
Answer: A

19. Link the cloud-based service on the left with the desktop or server application it is designed to displace on the right.
A. Google Docs1. Intel servers
B. Salesforce.com2. Microsoft Office
C. Mozy.com3. Oracle customer-rela-
tionship management
D. Amazon EC24. Backup disk
Answer: A

20. What August event was widely seen as an example of the risky nature of cloud computing?
A. Spread of Conficker virus
B. Gmail outage for more than an hour
C. Theft of identities over the Internet
D. Power outages in the Midwest
Answer: B

21. Which of the following is true of cloud computing?
A. It’s always going to be less expensive and more secure than local computing.
B. You can access your data from any computer in the world, as long as you have an Internet connection.
C. Only a few small companies are investing in the technology, making it a risky venture.
Answer: B

22. What is private cloud?
A. A standard cloud service offered via the Internet
B. A cloud architecture maintained within an enterprise data center.
C. A cloud service inaccessible to anyone but the cultural elite
Answer: B

23. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service (SAAS)
B. Platform as a Service (PAAS)
C. Infrastructure as a Service (IAAS)
Answer: C

24. Google Docs is a type of cloud computing.
A. True
B. False
Answer: A

25. What is Cloud Foundry?
A. A factory that produces cloud components
B. An industry wide PaaS initiative
C. VMware-led open source PaaS.
Answer: C

26 This is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet.
A. Platform as a Service (PaaS)
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS).
Answer: C

27. Which of the following statements about Google App Engine (GAE) is INCORRECT.
A. It’s a Platform as a Service (PaaS) model.
B. Automatic Scalability is built in with GAE. As a developer you don’t need to worry about application scalability
C. You can decide on how many physical servers required for hosting your application.
D. The applications deployed on GAE have the same security, privacy and data protection policies as that of Google’s applications. So, applications can take advantage of reliability, performance and security of Google’s infrastructure.
Answer: C

28. I’ve a website containing all static pages. Now I want to provide a simple Feedback form for end users. I don’t have software developers, and would like to spend minimum time and money. What should I do?
A. Hire software developers, and build dynamic page.
B. Use ZOHO creator to build the required form, and embed in html page.
C. Use Google App Engine (GAE) to build and deploy dynamic page.
Answer: B

29. What is the name of the organization helping to foster security standards for cloud computing?
A. Cloud Security Standards Working.
B. Cloud Security Alliance.
C. Cloud Security WatchDog.
D. Security in the Cloud Alliance.
Answer: B

30. “Cloud” in cloud computing represents what?
A. Wireless
B. Hard drives
C. People
D. Internet
Answer: D

31. What second programming language did Google add for App Engine development?
A. C++
B. Flash
C. Java
D. Visual Basic

Answer: C

32. What facet of cloud computing helps to guard against downtime and determines costs?
A. Service-level agreements
B. Application programming interfaces
C. Virtual private networks
D. Bandwidth fees

Answer: A

33. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service

Answer: A

34. Cloud Services have a________ relationship with their customers.
A. Many-to-many
B. One-to-many
C. One-to-one

Answer: B

35. What is the name of Rackspace’s cloud service?
A. Cloud On-Demand
B. Cloud Servers
C. EC2

Answer: B

36. What is the name of the organization helping to foster security standards for cloud computing?
A. Cloud Security Standards Working Group
B. Cloud Security Alliance
C. Cloud Security WatchDog
D. Security in the Cloud Alliance

Answer: B

37. Which of these companies specializes in cloud computing management tools and services?
A. RightScale
B. Google
C. Salesforce.com
D. Savis

Answer: A

38. What’s the most popular use case for public cloud computing today?
A. Test and development
B. Website hosting
C. Disaster recovery
D. Business analytics

Answer: A

39. Virtual Machine Ware (VMware) is an example of
A. Infrastructure Service
B. Platform Service
C. Software Service

Answer: A

30. Cloud Service consists of
A. Platform, Software, Infrastructure
B. Software, Hardware, Infrastructure
C. Platform, Hardware, Infrastructure

Answer: A

41. Google Apps Engine is a type of
A. SaaS
B. PaaS
C. IaaS
D. NA

Answer: D

42. Which vendor recently launched a cloud-based test and development service for enterprises?
A. HP
B. Cisco
C. IBM
D. Oracle

Answer: C

43. Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it:
A. Breaks compliance regulations
B. Adds latency
C. Raises security concerns
D. Makes data recovery harder

Answer: A

44. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service
B. Platform as a Service
C. Infrastructure as a Service

Answer: C

45. Cloud computing networks are designed to support only private or hybrid clouds.
A. True
B. False

Answer: B

46. A good cloud computing network can be adjusted to provide bandwidth on demand.
A. True
B. False

Answer: A

47. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True
B. False

Answer: B

48. The typical three-layer switching topology will not create latency within a cloud network.
A. True
B. False

Answer: B

49. The term ‘Cloud’ in cloud-computing refers to ______.
A. The Internet
B. Cumulus Clouds
C. A Computer
D. Thin Clients

Answer: A

50. In order to participate in cloud-computing, you must be using the following OS _______ .
A. Windows
B. Mac OS
C. Linux
D. All of the above

Answer: D

51. A file in HDFS that is smaller than a single block size
A. cannot be stored in hdfs

B. occupies the full block\s size.

C. can span over multiple blocks

D. occupies only the size it needs and not thefull block

Answer:
D. occupies only the size it needs and not thefull block

52. Which among the following are the duties of the NameNodes
A. manage file system namespace

B. it is responsible for storing actual data

C. perform read-write operation as per request for theclients

D. none of the above

Answer:
A. manage file system namespace

53. If the IP address or hostname of a data node changes
A. the namenode updates the mapping between file name and block name

B. the data in that data node is lost forever

C. the namenode need not update mapping between file name and block name

D. there namenode has to be restarted

Answer:
C. the namenode need not update mapping between file name and block name

54. For the frequently accessed HDFS files the blocks are cached in
A. the memory of thedata node

B. in the memory of thenamenode

C. both the above

D. none of the above

Answer:
A. the memory of thedata node

55. Which scenario demands highest bandwidth for data transfer between nodes
A. different nodes on the same rack

B. nodes on differentracks in the same data center.

C. nodes in different data centers

D. data on the same node

Answer:
C. nodes in different data centers

56. When a client contacts the namenode for accessing a file, the namenode responds with
A. size of the file requested

B. block id and hostname of all the data nodes containing that block

C. block id of the file requested

D. all of the above

Answer:
B. block id and hostname of all the data nodes containing that block

57. In HDFS the files cannot be
A. read

B. deleted

C. executed

D. archived

Answer:
C. executed

58. Which among the following is the duties of the Data Nodes
A. manage file system namespace

B. stores meta-data

C. regulates client’s access to files

D. perform read-write operation as per request for theclients

Answer:
D. perform read-write operation as per request for theclients

59. NameNode and DataNode do communicate using
A. active pulse

B. heartbeats

C. h-signal

D. data pulse

Answer:
B. heartbeats

60. Amazon EC2 provides virtual computing environments, known as :
A. chunks

B. instances

C. messages

D. none of thementioned

Answer:
B. instances

61. Data stored in domains doesn’t require maintenance of a schema.
A. simpledb

B. sql server

C. oracle

D. rds

Answer:
A. simpledb
62. Which of the following is a system for creating block level storage devices that
can be used for Amazon Machine Instances in EC2 ?
A. cloudwatch

B. amazon elastic blockstore

C. aws import/export

D. all of the mentioned

Answer:
B. amazon elastic blockstore
63. Which of the following type of virtualization is also characteristic of cloud
computing
A. storage

B. application

C. cpu

D. all of the mentioned

Answer:
D. all of the mentioned
64. Which of the following is most important feature of cloud storage listed below
?
A. logon authentication

B. bare file

C. multiplatformsupport

D. adequate bandwidth

Answer:
A. logon authentication
65. Which of the following is open cloud storage management standard by SNIA ?
A. cdmi

B. occi

C. cea

D. adequate bandwidth

Answer:
A. cdmi
66. Which of the following system does not provision storage to most users ?
A. paas

B. iaas

C. caas

D. saas

Answer:
B. iaas

67. Which of the following service is provided by Google for online storage ?
A. drive

B. skydrive

C. dropbox

D. all of the mentioned

Answer:
A. drive
68. Which of the following backup create a cloned copy of your current data or
drive ?
A. continuous dataprotection

B. open file backup

C. reverse delta backup

D. none of thementioned

Answer:
A. continuous dataprotection
69. Which of the following storage devices exposes its storage to clients as Raw
storage that can be partitioned to create volumes ?
A. block

B. file

C. disk

D. all of the mentioned

Answer:
A. block
70. Which of the following should be used considering factors shown in the figure?
A. simpledb

B. rds

C. amazon ec2

D. all of the mentioned

Answer:
B. rds
71. Point out the wrong statement.
A. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

B. a number of tools are used to support ec2 services

C. amazon machine instances are sized at various levels and rented on a computing/hour basis

D. none of the mentioned

Answer:
D. none of the mentioned
72. Which of the following is an edge-storage or content-delivery system that
caches data in different physical locations?
A. amazon relationaldatabase service

B. amazon simpledb

C. amazon cloudfront

D. amazon associatesweb services

Answer:
C. amazon cloudfront

73. Which of the following allows you to create instances of the MySQL database
to support your Web sites?
A. amazon elasticcompute cloud

B. amazon simplequeue service

C. amazon relationaldatabase service

D. amazon simplestorage system

Answer:
C. amazon relationaldatabase service
74. . Which of the following allows you to create instances of the MySQL database
to support your Web sites?
A. amazon elasticcompute cloud

B. amazon simplequeue service

C. amazon relationaldatabase service

D. amazon simplestorage system

Answer:
C. amazon relationaldatabase service
75. Point out the correct statement.
A. amazon elastic cloud is a system for creating virtualdisks(volume)

B. simpledb interoperates with both amazon ec2 andamazon s3

C. ec3 is an analytics as a service provider

D. none of the mentioned

Answer:
B. simpledb interoperates with both amazon ec2 andamazon s3

76. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
A. amazon elastic compute cloud

B. amazon associates web services

C. alexa web information service

D. all of the mentioned

Answer:
B. amazon associates web services
77. Which of the following is a billing and account management service?
A. amazon elasticmapreduce

B. amazon mechanicalturk

C. amazon devpay

D. multi-factorauthentication

Answer:
C. amazon devpay
78. Which of the following is not the feature of Network management systems?
A. accounting

B. security

C. performance

D. none of thementioned

Answer:
D. none of thementioned
79. Which of the following service provider provides the least amount of built in
security?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
C. iaas
80. Point out the correct statement.
A. different types of cloud computing service models provide different levels of security services

B. adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required

C. data should be transferred and stored in an encrypted format for security purpose

D. all of the mentioned

Answer:
D. all of the mentioned

81. Which of the following services that need to be negotiated in Service Level
Agreements?
A. logging

B. auditing

C. regulatorycompliance

D. all of the mentioned

Answer:
D. all of the mentioned
82. The following flowchart is intended to evaluate in any cloud.
A. risk

B. errors

C. inconsistencies

D. none of the mentioned

Answer:
A. risk
83. Point out the wrong statement.
A. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage

B. any distributed application has a much greater attack surface than an application that is closely held on alocal area network

C. cloud computing doesn’t have vulnerabilities associated with internet applications

D. all of the mentioned

Answer:
C. cloud computing doesn’t have vulnerabilities associated with internet applications
84. Which of the following area of cloud computing is uniquely troublesome?
A. auditing

B. data integrity

C. e-discovery for legalcompliance

D. all of the mentioned

Answer:
D. all of the mentioned
85. Which of the following is the operational domain of CSA(Cloud Security
Alliance)?
A. scalability

B. portability andinteroperability

C. flexibility

D. none of thementioned

Answer:
B. portability andinteroperability

86. Which of the following is considered an essential element in cloud computing
by CSA?
A. multi-tenancy

B. identity and accessmanagement

C. virtualization

D. all of the mentioned

Answer:
A. multi-tenancy
87. Which of the following is used for Web performance management and load
testing?
A. vmware hyperic

B. webmetrics

C. univa ud

D. tapinsystems

Answer:
B. webmetrics
88. Which of the following service provider provides the highest level of service?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas
89. Point out the correct statement.
A. paas supplies the infrastructure

B. iaas adds application development frameworks, transactions, and control structures

C. saas is an operating environment with applications, management, and the user interface

D. all of the mentioned

Answer:
C. saas is an operating environment with applications, management, and the user interface
90. Which of the following functional cloud computing hardware/software stack
is the Cloud Reference Model?
A. cas

B. csa

C. sac

D. all of the mentioned

Answer:
A. cas
91. For the model, the security boundary may be defined for the
vendor to include the software framework and middleware layer.
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
B. paas

92. Which of the following model allows vendor to provide security as part of the
Service Level Agreement?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas
93. Which of the following cloud does not require mapping?
A. public

B. private

C. hybrid

D. none of thementioned

Answer:
A. public
94. Which of the following service model is owned in terms of infrastructure by
both vendor and customer?
A. public

B. private

C. hybrid

D. none of thementioned

Answer:
C. hybrid
95. Which of the following model type is not trusted in terms of security?
A. public

B. private

C. hybrid

D. none of thementioned

Answer:
A. public
96. Which of the following has infrastructure security managed and owned by
the vendor?
A. hybrid

B. private/community

C. public

D. none of thementioned

Answer:
B. private/community
97. Point out the wrong statement.
A. each different type of cloud service delivery model creates a security boundary

B. any security mechanism below the security boundary must be built into the system

C. any security mechanism above the security boundary must be maintained by the customer

D. all of the mentioned

Answer:
D. all of the mentioned

98. is an application for collecting messages sent in RSS and Atom
format from information providers.
A. google reader

B. yahoo mail

C. emailrackspace

D. all of the mentioned

Answer:
A. google reader
99. Which of the following application is a newsreader?
A. google reader

B. bloglines

C. newsgator online

D. all of the mentioned

Answer:
D. all of the mentioned
100. Which of the following was developed an alternative to XML syndication by
IETF?
A. atom publishingprotocol

B. atom subscribingprotocol

C. atom subscribeprotocol

D. none of thementioned

Answer:
A. atom publishingprotocol

101. How many technologies are used for most of the syndicated content on the
Internet?
A. 1

B. 2

C. 3

D. 4

Answer:
B. 2
102. Which of the following technology is used for syndicated content?
A. ajax

B. rss

C. javascript

D. all of the mentioned

Answer:
B. rss
103. The full form of AJAX is
A. asynchronousjavascript and xml

B. another java andxml library

C. abstract json andxml

D. none of thementioned

Answer:
A. asynchronousjavascript and xml
104. The advantages of Ajax is
A. bandwidth utilization

B. more interactive

C. speeder retrieval ofdata

D. all of these

Answer:
D. all of these
105. which of the following are the controls of Ajax?
A. scriptmanager

B. scriptmanagerproxy

C. updateprogress

D. all of the mentioned

Answer:
D. all of the mentioned

106. Which of the following type of virtualization is also characteristic of cloud
computing?
A. storage

B. application

C. cpu

D. all of the mentioned

Answer:
D. all of the mentioned
107. Virtualization assigns a logical name for a physical resource and then provides a pointer to
that physical resource when a request is made
A. true

B. false

Answer:
A. true
108. Virtual Machines (VMs) are offered in cloud by
A. saas

B. paas

C. iaas

D. none of these

Answer:
C. iaas
109. The technology used to distribute service requests to resources is referred to
as
A. load performing

B. load scheduling

C. load balancing

D. all of the mentioned

Answer:
C. load balancing
110. computing refers to applications and services that run on a distributed network
using virtualized resources.
A. distributed

B. cloud

C. soft

D. parallel

Answer:
B. cloud

111. Cloud computing is an abstraction based on the notion of pooling physical resources and
presenting them as a resource.
A. real

B. virtual

C. cloud

D. none of the mentioned

Answer:
B. virtual
112. Amazon’s Elastic Compute Cloud (EC2) is a well known .
A. virtual machine

B. cloud storage

C. paas

D. soa

Answer:
A. virtual machine
113. virtualization abstracts networking hardware and software into a
virtual network that can be managed.
A. storage

B. network

C. software

D. none of thementioned

Answer:
B. network
114. is used by Amazon Web Services to store copies of a virtual
machine.
A. ami

B. emi

C. imi

D. application services

Answer:
A. ami
115. In para-virtualization, VMs run on hypervisor that interacts with the
hardware.
A. true

B. false

Answer:
B. false
116. Which of the following provide system resource access to virtual machines ?
A. vmm

B. vmc

C. vnm

D. all of the mentioned

Answer:
A. vmm

117. An operating system running on a Type VM is a full virtualization.
A. 1

B. 2

C. 3

D. all of the mentioned

Answer:
A. 1
118. Point out the wrong statement.
A. in gmail, you can construct searches with multiple operators using the advanced search feature

B. rss and atom are prototypes of a class of xml specifications called synchronized markup languages

C. a typical rss document or feed contains text and metadata that can be used to indicate publication dates

D. none of the mentioned

Answer:
B. rss and atom are prototypes of a class of xml specifications called synchronized markup languages
119. Which of the following file format is used by RSS module?
A. xml

B. smil

C. json

D. all of the mentioned

Answer:
A. xml
120. What makes Ajax unique?
A. it works as a stand- alone web-development tool

B. it works the same with all webbrowsers

C. it uses c++ as its programminglanguage

D. it makes data requestsasynchronously

Answer:
D. it makes data requestsasynchronously
121. JavaScript is also called server-side JavaScript.
A. microsoft

B. navigator

C. livewire

D. none

Answer:
C. livewire
122. Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a
physical storage address?
A. storage

B. network

C. software

D. none of the mentioned

Answer:
A. storage

123. Point out the wrong statement.
A. a virtual network can create virtual network interfaces

B. instantiating a virtual machine is a very slow process

C. you can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtualmachines

D. all of the mentioned

Answer:
B. instantiating a virtual machine is a very slow process
124. AMI(Amazon Machine Image) imaging service is provided by Amazon for
A. private use

B. public use

C. pay-per-use

D. all of the mentioned

Answer:
D. all of the mentioned
125. Which of the following runs on Xen Hypervisor?
A. azure

B. aws ec2

C. aws ec3

D. all of the mentioned

Answer:
B. aws ec2

126. Virtualization allows sharing the resources of hardware across multiple a environments.
A. true

B. false

Answer:
A. true
127. A virtual machine running on a server of a particular make cannot be relocated to b
the server of another make.
A. true

B. false

Answer:
B. false
128. Amazon Web Services (AWS) is an example of
A. software as a service(saas)

B. infrastructure as aservice (iaas)

C. platform as a service(paas)

D. none of thementioned

Answer:
B. infrastructure as aservice (iaas)
129. Which of the following is Type 1 Hypervisor ?
A. wind river simics

B. virtual server 2005r2

C. kvm

D. lynxsecure

Answer:
D. lynxsecure
130. Which of the following is Type 2 VM ?
A. virtuallogix vlx

B. vmware esx

C. xen

D. lynxsecure

Answer:
C. xen

131. In the virtual machine simulates hardware, so it can be independent
of the underlying system hardware.
A. paravirtualization

B. full virtualization

C. emulation

D. none of thementioned

Answer:
C. emulation
132. In a scheme, the VM is installed as a Type 1 Hypervisor directly
onto the hardware.
A. paravirtualization

B. full virtualization

C. emulation

D. none of thementioned

Answer:
B. full virtualization
133. Full virtualization Full virtualization
A. simulates hardware within software

B. has vms with the same os

C. clones images

D. alters the guest os

Answer:
A. simulates hardware within software
134. What are the goals of Hypervisor design?
A. scalability

B. reliability

C. isolation

D. all of the above

Answer:
D. all of the above
135. Bare metal hypervisor sits on top of
A. physical hardware

B. virtualized hardware

C. operating system

D. none of the above

Answer:
A. physical hardware

136. If virtualization occurs at application level, OS level and hardware level, then such service in cloud is
A. iaas

B. saas

C. paas

D. no such service

Answer:
B. saas
137. Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request
iii) VM in operation iv) VM Provision
A. ii, i, iii, iv

B. i, ii, iii & iv

C. ii, iii, iv & i

D. ii, iv, iii & i

Answer:
D. ii, iv, iii & i
138. where a VM can be moved from one physical
machine to another even as it continues to execute.
A. load balancing

B. migration

C. live migration

D. server consolidation

Answer:
C. live migration
139. Which type of Hypervisor is shown in the following figure ?
A. type 1

B. type 2

C. type 3

D. all of the mentioned

Answer:
A. type 1
140. Point out the wrong statement :
A. load balancing virtualizes systems and resources by mapping a logical address to a physicaladdress

B. multiple instances of various google applications are running on different hosts

C. google uses hardware virtualization

D. all of the mentioned

Answer:
C. google uses hardware virtualization
141. Which of the following should be placed in second lowermost layer for the following figure ?
A. host operating system

B. software

C. vm

D. none of the mentioned

Answer:
A. host operating system

142. Point out the wrong statement :
A. some hypervisors are installed over an operating system and are referred to as type 2 or hosted vm

B. all cpus support virtual machines

C. on a type 2 vm, a software interface is created that emulates the devices with which a system would normallyinteract

D. all of the mentioned

Answer:
B. all cpus support virtual machines
143. Which of the following type of virtualization is found in hypervisor such as
Microsoft’s Hyper-V ?
A. paravirtualization

B. full virtualization

C. emulation

D. none of thementioned

Answer:
A. paravirtualization
144. Point out the wrong statement :
A. full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm

B. guest operating systems in full virtualization systems are generally faster than other virtualization schemes

C. a process virtual machine instantiates when a command begins a process

D. all of the mentioned

Answer:
A. full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm
145. Which of the following operating system support operating system
virtualization ?
A. windows nt

B. sun solaris

C. windows xp

D. compliance

Answer:
B. sun solaris
146. Which of the following allows a virtual machine to run on two or more physical processors at the same time ?
A. virtual smp

B. distributed resource scheduler

C. vnetwork distributed switch

D. storage vmotion

Answer:
A. virtual smp
147. VMM is
A. a virtual machine

B. hardware

C. host os

D. a layer of software

Answer:
D. a layer of software

148. VMM facilitates sharing of
A. memory & i/o

B. cpu, memory & i/o

C. cpu & memory

D. i/o & cpu

Answer:
B. cpu, memory & i/o
149. The BEST way to define Virtualization in cloud computing is
A. virtualization enables simulating compute, network, and storage service platforms from the underlying virtual hardware

B. virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware

C. virtualization enables realization of compute, network, and storage service platforms from the underlying virtual hardware

D. virtualization enables emulating compute, network, and storage service platforms from the underlying virtual hardware

Answer:
B. virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware
150. Which one is NOT generally a change after Virtualization?
A. virtual machines can be provisioned to any system

B. hardware- independence of operating system and applications

C. can manage os and application as a single unit by encapsulating them into virtual machines.

D. software and hardware tightly coupled

Answer:
D. software and hardware tightly coupled

151. Which one of the statement is generally NOT correct for Microkernelized Hypervisor?
A. drivers run within guests

B. simple partitioning functionality

C. increase reliability and minimize lowest level of the tcb

D. contains its own drivers model

Answer:
D. contains its own drivers model
152. In multiple VM processing, CPU is alloted to the different processes in form of:
A. space slices by the os

B. different cpus are allocated to differentprocesses

C. time slices by the os

D. frequecy slices by the os

Answer:
A. space slices by the os
153. Appear IQ, Mendix, Amazon Web Services (AWS) Elastic Beanstalk, Google App Engine and Heroku, are some of the example of providing services for:
A. iaas

B. saas

C. paas

D. none

Answer:
C. paas
154. Which one of the cases not impacting major system availability
A. service performance degrade

B. service outage by unplanned downtime

C. live migration of vm for load balancing

D. service outage by planned downtime

Answer:
C. live migration of vm for load balancing
155. Which of the following is the central application in the AWS portfolio?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
A. amazon elastic compute cloud

156. Which of the following is a message queue or transaction system for distributed Internet-based applications?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
B. amazon simple queue service
157. Which of the following feature is used for scaling of EC2 sites?
A. auto replica

B. auto scaling

C. auto ruling

D. all of the mentioned

Answer:
B. auto scaling
158. Which of the following provides a bridge between a company’s existing network and the AWS cloud?
A. amazon virtual private cloud

B. aws premium support

C. amazon fulfillment web services

D. all of the mentioned

Answer:
A. amazon virtual private cloud
159. Point out the wrong statement.
A. between fba and fws, you can create a nearly virtual store on amazon.com

B. amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio

C. fps is exposed as an api that sorts transactions into packages called quick starts that makes it easy to implement

D. none of the mentioned

Answer:
B. amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio
160. Which of the following is Amazon’s technical support and consulting business?
A. amazon virtual private cloud

B. aws premium support

C. amazon fulfillment web services

D. all of the mentioned

Answer:
B. aws premium support

161. Which of the following is a method for bidding on unused EC2 capacity based
on the current spot price?
A. on-demand instance

B. reserved instances

C. spot instance

D. all of the mentioned

Answer:
C. spot instance
162. Point out the wrong statement.
A. the standard instances are not suitable for standard server applications

B. high memory instances are useful for large data throughput applications such as sql server databases and data caching and retrieval

C. fps is exposed as an api that sorts transactions into packages called quick starts that makes it easy to implement

D. none of the mentioned

Answer:
A. the standard instances are not suitable for standard server applications
163. Which of the following instance has an hourly rate with no long-term
commitment?
A. on-demand instance

B. reserved instances

C. spot instance

D. all of the mentioned

Answer:
A. on-demand instance
164. Which of the following tool is used for measuring I/O of your systems to
estimate these transaction costs?
A. ebs

B. iostat

C. esw

D. all of the mentioned

Answer:
B. iostat
165. Point out the wrong statement.
A. the cost of creating an ebs volume is lesser than creating a similarly sized s3bucket

B. an ebs volume can be used as an instance boot partition

C. ebs boot partitions can be stopped and started, and they offer fast ami boottimes

D. none of the mentioned

Answer:
A. the cost of creating an ebs volume is lesser than creating a similarly sized s3bucket
166. Which of the following is also referred to edge computing?
A. cloudwave

B. cloudfront

C. cloudspot

D. all of the mentioned

Answer:
B. cloudfront

167. Amazon EMR uses Hadoop processing combined with several
products.
A. aws

B. asq

C. amr

D. awes

Answer:
A. aws
168. What is a virtual server platform that allows users to create and run virtual
machines on Amazon’s server farm.
A. azure

B. ec2

C. ec5

D. none of thementioned

Answer:
B. ec2
169. is the central application in the AWS portfolio.
A. amazon simple queue service

B. amazon elastic compute cloud

C. amazon simple notification service

D. all of the above

Answer:
B. amazon elastic compute cloud
170. Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
B. amazon mechanical turk
171. Point out the wrong statement.
A. virtual private servers can provision virtual private clouds connected through virtual private networks

B. amazon web services is based on soa standards

C. starting in 2012, amazon.com made its web service platform available to developers on a usage-basis model

D. all of the mentioned

Answer:
C. starting in 2012, amazon.com made its web service platform available to developers on a usage-basis model
172. Point out the correct statement.
A. sql server is having enormous impact on cloud computing

B. amazon.com’s services represent the largest pure infrastructure as aservice (iaas)

C. ec2 is a platform as a service (paas) market

D. none of the mentioned

Answer:
B. amazon.com’s services represent the largest pure infrastructure as aservice (iaas)

173. Which of the following is a system for creating block level storage devices that
can be used for Amazon Machine Instances in EC2?
A. cloudwatch

B. amazon elastic blockstore

C. aws import/export

D. all of the mentioned

Answer:
B. amazon elastic blockstore
174. Which of the following allows merchants to fill orders through Amazon.com fulfillment service?
A. amazon elastic compute cloud

B. amazon fulfillment web services

C. amazon relational database service

D. amazon simple storage system

Answer:
B. amazon fulfillment web services
175. Point out the correct statement.
A. with ec2, you can launch and run server instances called amazon machine images (amis) running different operating systems such as red hat linux

B. a machine image is the software and operating system running on top of the instance

C. a machine image may be thought of as the contents of a boot drive

D. all of the mentioned

Answer:
D. all of the mentioned

176. Which of the following provides access for developers to charge Amazon’s
customers for their purchases?
A. fws

B. fas

C. fps

D. all of the mentioned

Answer:
C. fps
177. Which of the following uses an authentication device?
A. amazon elasticmapreduce

B. amazon mechanicalturk

C. amazon devpay

D. multi-factorauthentication

Answer:
D. multi-factorauthentication
178. Which of the following is a batch processing application?
A. ibm smash

B. ibm websphereapplication server

C. condor

D. windows mediaserver

Answer:
C. condor
179. Point out the correct statement.
A. security can be set through passwords, kerberos tickets, or certificates

B. secure access to your ec2 amis is controlled by passwords, kerberos, and 509 certificates

C. most of the system image templates that amazon aws offers are based on red hat linux

D. all of the mentioned

Answer:
D. all of the mentioned
180. How many EC2 service zones or regions exist?
A. 1

B. 2

C. 3

D. 4

Answer:
D. 4

181. Amazon cloud-based storage system allows you to store data objects
ranging in size from 1 byte up to 5GB.
A. s1

B. s2

C. s3

D. s4

Answer:
C. s3
182. CloudFront supports data by performing static data transfers and
streaming content from one CloudFront location to another.
A. table caching

B. geocaching

C. index caching

D. windows mediaserver

Answer:
B. geocaching
183. Point out the correct statement.
A. a volume is mounted on a particular instance and is available to allinstances

B. the advantages of an ebs boot partition are that you can have a volume up to 1tb

C. you cannot mount multiple volumes on a single instance

D. all of the mentioned

Answer:
B. the advantages of an ebs boot partition are that you can have a volume up to 1tb
184. Data stored in domains doesn’t require maintenance of a schema.
A. simpledb

B. sql server

C. oracle

D. rds

Answer:
A. simpledb
185. Amazon Web Services falls into which of the following cloud-computing
category?
A. platform as a service

B. software as a service

C. infrastructure as aservice

D. back-end as a service

Answer:
C. infrastructure as aservice

186. AWS reaches customers in countries.
A. 137

B. 182

C. 190

D. 86

Answer:
C. 190
187. Which of the following should be used considering factors shown in the
figure?
A. simpledb

B. rds

C. amazon ec2

D. all of the mentioned

Answer:
B. rds
188. Point out the wrong statement.
A. amazon machine instances are sized at various levels and rented on a computing/hour basis

B. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

C. a number of tools are used to support ec2 services

D. none of the mentioned

Answer:
D. none of the mentioned
189. Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
A. amazon elastic mapreduce
190. Which of the following correctly describes components roughly in their order of importance from top to down?
A. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elasticblock store

B. 1. amazon elastic block store2. amazon elastic compute cloud3. amazon simplestorage system

C. 1. amazon simple storage system2. amazon elastic block store3. amazon elasticcompute cloud

D. none of the mentioned

Answer:
A. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elasticblock store
191. Which of the following is a Web service that can publish messages from an application and deliver them to other applications or to subscribers?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
C. amazon simple notification service

192. Which of the following metrics are used to support Elastic Load Balancing?
A. cloudwatch

B. amazon elastic blockstore

C. aws import/export

D. all of the mentioned

Answer:
A. cloudwatch
193. Which of the following is an online backup and storage system?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
D. amazon simple storage system
194. is a virtual server platform that allows users to create and run
virtual machines on Amazon’s server farm.
A. ec2

B. azure

C. ec5

D. none of thementioned

Answer:
A. ec2
195. AMIs are operating systems running on the virtualization hypervisor.
A. yen

B. xen

C. ben

D. multi-factorauthentication

Answer:
B. xen
196. Which of the following instance class is best used for applications that are
processor or compute-intensive?
A. standard instances

B. high memoryinstances

C. high cpu instances

D. none of thementioned

Answer:
C. high cpu instances
197. Which of the following can be done with S3 buckets through the SOAP and REST APIs?
A. upload new objects to a bucket and download them

B. create, edit, or delete existing buckets

C. specify where a bucket should be stored

D. all of the mentioned

Answer:
D. all of the mentioned

198. Which of the following operation retrieves the newest version of the object?
A. put

B. get

C. post

D. copy

Answer:
B. get
199. Which of the following statement is wrong about Amazon S3?
A. amazon s3 is highly reliable

B. amazon s3 provides large quantities of reliable storage that is highly protected

C. amazon s3 is highly available

D. none of the mentioned

Answer:
C. amazon s3 is highly available
200. Which of the following is relational database service provided by Amazon?
A. simpledb

B. sql server

C. oracle

D. rds

Answer:
D. rds

201. Which of the following can be considered as a distributed caching system?
A. cnd

B. cdn

C. cwd

D. all of the mentioned

Answer:
B. cdn
202. Amazon Relational Database Service is a variant of the 5.1 database
system.
A. oracle

B. mysql

C. sql server

D. all of the mentioned

Answer:
B. mysql
203. What are the different types of instances?
A. general purpose

B. computer optimized

C. storage optimized

D. all of the above

Answer:
D. all of the above
204. The types of AMI provided by AWS are:
A. instance store backed

B. ebs backed

C. both a & b

D. none of the above

Answer:
C. both a & b
205. Storage classes available with Amazon s3 are –
A. amazon s3 standard

B. amazon s3 standard- infrequent access

C. amazon glacier

D. all of the above

Answer:
D. all of the above

206. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .
A. web sphere

B. tivoli

C. nebula

D. altix

Answer:
B. tivoli
207. Cloud system from SGI is functionally considered as an .
A. on-demand cloudcomputing service

B. on-demand cloudstorage service

C. on-demand cloudaccessing service

D. on-demand

Answer:
A. on-demand cloudcomputing service
208. Cyclone is available in two service models as follows:
A. paas and iaas

B. saas and paas

C. saas and iaas

D. all of the above

Answer:
C. saas and iaas
209. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
A. nebula cloud

B. cyclone cloud

C. force.com cloud

D. cern cloud

Answer:
A. nebula cloud
210. To establish scalability for the analysis of huge research data, CERN uses LSF
i.e. a grid and workload management solution of cloud computing platform
A. load setting facility

B. load sharing facility

C. load setting faculty

D. load assigning faculty

Answer:
B. load sharing facility

211. One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.
A. true

B. false

Answer:
A. true
212. A mashup cloud can be designed by utilizing the Scalability of AWS and
of GAE platforms
A. accessibility

B. mobility

C. agility

D. scalability

Answer:
C. agility
213. The Cloudlets have a ownership unlike that of Clouds.
A. centralized

B. decentralized

C. global

D. none of the above

Answer:
B. decentralized
214. The Data-Intensive Scalable Computing(DISC) utilizes a data-center
clusters to gather and maintain data.
A. htc

B. hpc

C. hcc

D. hac

Answer:
A. htc
215. Performance metrics for HPC/HTC systems include :
A. multitaskingscalability

B. security index

C. cost effectiveness

D. all of the above

Answer:
D. all of the above
216. [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which
of the following?
A. scalability

B. throughput

C. availability

D. effectiveness

Answer:
B. throughput

217. refers to an increase in the performance by the addition of more
resources along the service layers
A. horizontal scalability

B. vertical scalability

C. diagonal scalability

D. none of the above

Answer:
B. vertical scalability
218. The percentage of time the system is up and running smoothly is referred as
.
A. system up time

B. system scalability

C. system availability

D. system efficiency

Answer:
C. system availability
219. is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
A. gps

B. cloud

C. iot

D. rfid

Answer:
D. rfid
220. RFID stand for .
A. rangeable frequency identification

B. radio fragment identification

C. radio frequency identification

D. rangeable fragment identification

Answer:
C. radio frequency identification
221. The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer
A. i, ii, iv

B. i, iii, iv

C. ii, iii, iv

D. ii, iii, iv

Answer:
A. i, ii, iv
222. tags contain battery and transmit signals autonomously
A. acitve rfid

B. passive rfid

C. battery-assistedpassive rfid

D. battery-assisted rfid

Answer:
A. acitve rfid

223. tags needs an external source to wake up the battery.
A. acitve rfid

B. passive rfid

C. battery-assisted passive rfid

D. battery-assisted active rfid

Answer:
C. battery-assisted passive rfid
224. The three major components of RFID hardware based on functionality include
:
A. rfid reader

B. reader antenna

C. reader

D. all of the above

Answer:
D. all of the above
225. Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor
A. i, ii, iii

B. i, ii, iii, iv

C. ii, iii, iv

D. i, ii, iv

Answer:
A. i, ii, iii

226. Even with two-factor authentication, users may still be vulnerable
to attacks.
A. scripting

B. cross attack

C. man-in-the-middle

D. radiant

Answer:
C. man-in-the-middle
227. Process of identifying any individual
A. auditing

B. authorisation

C. authentication

D. accounting

Answer:
C. authentication
228. Process that prevents someone from denying that she accessed resource
A. accounting

B. non-repudiation

C. sniffing

D. authorisation

Answer:
B. non-repudiation
229. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
A. making infrastructure vulnerable to malware

B. potential for noncompliance

C. data loss

D. all of the above

Answer:
D. all of the above
230. Which of the following is not a correct way to secure communication layer
A. cloud initiated communication

B. tls/ssl

C. ips(intrusion prevention system)

D. firewalls

Answer:
A. cloud initiated communication

231. Which of the following is not the component of IoT Endpoint
A. sensor

B. gateway

C. communicationmodule

D. mcu

Answer:
B. gateway
232. Which of the following makes sure that data is not changed when it not
supposed to be?
A. integrity

B. availability

C. confidentiality

D. accounting

Answer:
A. integrity
233. Which of the following terms indicates that information is to be read only by
those people for whom it is intended?
A. availability

B. accounting

C. integrity

D. confidentiality

Answer:
D. confidentiality
234. What is the full form of SCADA?
A. supervisory control and document acquisition

B. supervisory control and data acquisition

C. supervisory column and data assessment

D. supervisory column and data assessment

Answer:
B. supervisory control and data acquisition
235. DCS is a
A. distributed controlsystem

B. data control system

C. data column system

D. distributed columnsystem

Answer:
A. distributed controlsystem

236. What is SCADA?
A. software

B. process

C. system

D. hardware

Answer:
B. process
237. The control in SCADA is
A. online control

B. direct control

C. supervisory control

D. automatic control

Answer:
C. supervisory control
238. When did the SCADA start?
A. 1980s

B. 1990s

C. 1970s

D. 1960s

Answer:
B. 1990s
239. Which of the following is not the component of a SCADA system?
A. database server

B. i/o system

C. plc controller

D. sparger controller

Answer:
D. sparger controller
240. Which of the following is the heart of a SCADA system?
A. plc

B. hmi

C. alarm task

D. i/o task

Answer:
D. i/o task
241. RFID stands for?
A. random frequencyidentification

B. radio frequencyidentification

C. random frequencyinformation

D. radio frequencyinformation

Answer:
B. radio frequencyidentification

242. Which of the following is not involved in working of IoT?
A. rfid

B. sensor

C. nano tech

D. server

Answer:
D. server
243. M2M is a term introduced by
A. iot service providers

B. fog computingservice providers

C. telecommunicationservice providers

D. none of these

Answer:
C. telecommunicationservice providers
244. Which of these statements regarding sensors is TRUE?
A. sensors are input devices.

B. sensors can be analog as well as digital

C. sensors respond to some external stimuli.

D. all of these

Answer:
D. all of these
245. Smart Dust can be used to measure the
A. temperature of theindustrial lathe machine

B. heat inside a computer’s cpu

C. chemical in the soil

D. strength of a solid material

Answer:
C. chemical in the soil
246. In threat modeling, what methodology used to perform risk analysis
A. dread

B. owasp

C. stride

D. dar

Answer:
A. dread
247. Out of the following which is not element of threat modelling
A. asset

B. vulnerability

C. threat

D. time

Answer:
D. time

248. Request field is present in which message format?
A. request message

B. response message

C. both request andresponse

D. neither request norresponse

Answer:
A. request message
249. CoAP is specialized for
A. internet applications

B. device applications

C. wireless applications

D. wired applications

Answer:
A. internet applications
250. Which layer is CoAP?
A. control layer

B. transport layer

C. service layer

D. application layer

Answer:
C. service layer

251. CoAP provides which of the following requirements?
A. multicast support and simplicity

B. low overhead and multicast support

C. simplicity and low overhead

D. multicast support,low over head, and simplicity

Answer:
D. multicast support,low over head, and simplicity
252. CoAP is a specialized protocol.
A. web transfer

B. power

C. application

D. resource

Answer:
A. web transfer
253. URI and content type support is which protocol feature?
A. http

B. udp

C. coap

D. spi

Answer:
C. coap
254. What is the full form of WLAN?
A. wide local areanetwork

B. wireless local areanetwork

C. wireless land accessnetwork

D. wireless local areanode

Answer:
B. wireless local areanetwork
255. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
A. ieee 802.16

B. ieee 802.3

C. ieee 802.11

D. ieee 802.15

Answer:
C. ieee 802.11

256. Which of the following is not a characteristic of a ZigBee network?
A. low powerconsumption

B. easy installation.

C. high data rates.

D. unlicensed radiobands.

Answer:
C. high data rates.
257. Which of the following IEEE standards provides the lowest level of the ZigBee
software stack?
A. ieee 802.11.

B. ieee 802.15.1.

C. ieee 802.15.3.

D. ieee 802.15.4.

Answer:
D. ieee 802.15.4.
258. Which of the following layers are defined by the ZigBee stack?
A. transport layer

B. physical layer.

C. application supportsub-layer.

D. medium access layer

Answer:
D. medium access layer
259. What is the typical range of transmission distance in a ZigBee network?
A. 5 m.

B. 50 m.

C. 500 m.

D. 5 km

Answer:
B. 50 m.
260. _ is an attack which forces an end user to execute unwanted actions on a
web application in which he/she is currently authenticated.
A. cross-site scoringscripting

B. cross-site requestforgery

C. two-factorauthentication

D. cross-site scripting

Answer:
D. cross-site scripting

261. Representational State Transfer (REST) is the standard interface between
A. two machines in alan

B. http client and user

C. http client andservers

D. none of the above

Answer:
C. http client andservers
262. Which of the following is not a messaging mode in CoAP?
A. confirmable

B. separate

C. direct

D. piggyback

Answer:
C. direct
263. Which of the following is the full form of XMPP?
A. extension messaging and presenceprotocol

B. extensible messaging and presenceprotocol

C. extension messaging and privacy protocol

D. extensible messaging and privacy protocol

Answer:
B. extensible messaging and presenceprotocol
264. In 6LoWPAN address, how many bits are globally unique?
A. 16 bits

B. 32 bits

C. 64 bits

D. 128 bits

Answer:
C. 64 bits
265. IEEE 802.15.4 uses which of the following for accessing the channel?
A. carrier sense multiple access (csma)

B. carrier sense multiple access with collision detection (csma-cd)

C. carrier sense multiple access with collision avoidance (csma-ca)

D. none of these

Answer:
C. carrier sense multiple access with collision avoidance (csma-ca)
266. Three parts of GPS include:
A. space segment

B. control segment

C. user segment

D. all of the above

Answer:
D. all of the above

267. In case of , the GPS works as a receiver, not a transmitter.
A. active tracking

B. passive tracking

C. assisted tracking

D. receiver tracking

Answer:
B. passive tracking
268. is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system
A. cloud-physical system

B. cyber-space system

C. cyber-physical system

D. none of the above

Answer:
C. cyber-physical system
269. The number of binding of a node to other actors of the graph in the graph
representation of a network is called as .
A. node degree

B. path length

C. social circle

D. bridge

Answer:
A. node degree
270. is the degree to which nodes have a common set of connections to
other nodes
A. structural hole

B. structuralequivalence

C. structural cohesion

D. none of the above

Answer:
C. structural cohesion
271. The degree to which actors are directly linked to one another through
cohesive bonds is called as .
A. closeness

B. cohesion

C. centralized

D. path length

Answer:
B. cohesion
272. The social circles are loosely coupled if there is stringency of direct contact.
A. less

B. more

C. equal

D. no

Answer:
A. less

273. The measures of centrality include:
A. betweenness

B. closeness

C. degree

D. all of the above

Answer:
D. all of the above
274. Arrange the stages in supply chain management:
i. Material and Equipment Supplies
ii. Delivery of Products
iii. After Sale Service and Returns
iv. Planning and Coordination
v. Manufacturing and Testing
A. iv, v, i, ii, iii

B. iv, i, v, iii, ii

C. iv, i, v, ii, iii

D. i, ii, iv, v, ii

Answer:
C. iv, i, v, ii, iii
275. Nodes in the network analysis graph represent the and the edges represent the relationships between nodes.
A. actors

B. nodes

C. users

D. both a and b

Answer:
D. both a and b

276. Which is the latest Operating System?
A. real-time os

B. desktop os

C. mainframe os

D. cloud os

Answer:
D. cloud os
277. JOES stands for
A. joint expensive operating system

B. just expensive operating system

C. just enough operating system

D. joined environmental operating system

Answer:
C. just enough operating system
278. Responsibility of OS developers to add new feature in existing OS are
A. more reliability

B. convenience and security

C. compatibility

D. all of the above

Answer:
D. all of the above
279. In future, companies wont worry about the capital for large data center because of
A. saas solution

B. paas solution

C. iaas solution

D. none of the above

Answer:
B. paas solution
280. is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability
A. cometcloud

B. asteroidcloud

C. starcloud

D. planetcloud

Answer:
A. cometcloud

281. CometCloud supports policy based autonomic and
A. cloudbursting

B. cloudbridging

C. none

D. both a and b

Answer:
D. both a and b
282. Which are the three conceptual layers in CometCloud?
A. development, application, physical

B. infrastructure, dynamic, static

C. transport, network, programming

D. programming, service, infrastructure

Answer:
D. programming, service, infrastructure
283. In Comet, a tuple is a simple string
A. java

B. python

C. xml

D. html

Answer:
C. xml
284. Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?
A. deadline-based

B. budget-based

C. quality-based

D. workload-based

Answer:
C. quality-based
285. The cloud media services are:
A. cloud gaming

B. experiencing multi-screens

C. image processing

D. all of the above

Answer:
D. all of the above

286. KPI stands for
A. key practices in industry

B. key performance index

C. key performance indicators

D. key parameters in information

Answer:
C. key performance indicators
287. SEEP is used in
A. energy optimization

B. multimedia

C. information leakage

D. cost reduction

Answer:
A. energy optimization
288. SEEP stands for
A. system end to end protocol

B. static environmental execution process

C. symbolic execution and energy profiles

D. state execution and energy profiles

Answer:
C. symbolic execution and energy profiles
289. Keywords in Docker are
A. develop, ship, run anywhere

B. create, export

C. transport, cloud

D. user, data, privacy

Answer:
A. develop, ship, run anywhere
290. Docker can simplify both, and
A. process, state

B. behavior, aspect

C. workflows, communication

D. all of the above

Answer:
C. workflows, communication
291. Basic approach of Docker as a company is:
A. “batteries included but removable”

B. “batteries included but non-removable”

C. “batteries but chargeable”

D. “battery less execution”

Answer:
A. “batteries included but removable”

292. Which containers are used by Docker severs?
A. windows

B. android

C. linux

D. mac

Answer:
C. linux
293. Two main components in Docker are:
A. master, slave

B. client, server

C. client, master

D. all of the above

Answer:
B. client, server
294. Docker is generally configured to use TCP port while executing unencrypted traffic
A. 3306

B. 53378

C. 2375

D. 2376

Answer:
C. 2375
295. Docker is generally configured to use TCP port while managing encrypted traffic.
A. 3306

B. 53378

C. 2375

D. 2376

Answer:
D. 2376
296. Containers require less disk space as compared to virtual machine
A. true

B. false

Answer:
A. true
297. There is no built-in framework in Docker for testing.
A. true

B. false

Answer:
A. true

298. Docker provides simple one-line deployment strategy.
A. true

B. false

Answer:
A. true
299. The examples of deployment tools are:
A. docker’s storm

B. new relic’s centurion

C. spotify’s helios

D. all of the above

Answer:
D. all of the above
300. CNS stands for
A. consumption near sweet-spot

B. continuous network system

C. compact neural system

D. compound near sweet-sp0t

Answer:
A. consumption near sweet-spot

301. systems used to track and identify the location of objects in real time
A. geolocation

B. geographical information system (gis)

C. wireless application protocol (wap)

D. real-time location system (rtls)

Answer:
D. real-time location system (rtls)
302. gateway to the Internet optimized for mobility
A. voice portal

B. wimax

C. mobile enterprise

D. mobile portal

Answer:
D. mobile portal
303. automatically identifying a Web user’s location
A. voice portal

B. geolocation

C. sensor network

D. wimax

Answer:
B. geolocation
304. Computing capabilities embedded into objects around us (mobile and stationary)
A. pervasive computing

B. ubiquitous computing (ubicom)

C. context-aware computing

D. geolocation

Answer:
B. ubiquitous computing (ubicom)
305. Computing capabilities embedded in the environment but typically not mobile
A. mobile portal

B. pervasive computing

C. context-aware computing

D. voice portal

Answer:
B. pervasive computing

306. Vehicle mount solutions
• Handheld solutions
• Hands-free and voice solutions
A. mobile enterprise

B. wireless wide area network (wwan)

C. typical mobile devices used in warehouses

D. interactive voice response (ivr)

Answer:
C. typical mobile devices used in warehouses
307. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
A. voice portal

B. mobile portal

C. geolocation

D. sensor network

Answer:
D. sensor network
308. short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers
A. network-based positioning

B. real-time location system (rtls)

C. radio frequency identification (rfid)

D. wireless wide area network (wwan)

Answer:
C. radio frequency identification (rfid)
309. a technology that offers Internet browsing from wireless devices
A. real-time location system (rtls)

B. wireless wide area network (wwan)

C. wireless local area network (wlan)

D. wireless application protocol (wap)

Answer:
D. wireless application protocol (wap)
310. delivery of m-commerce transactions to individuals in a specific location, at a specific time
A. location-based m- commerce (l-commerce)

B. context-aware computing

C. ubiquitous computing (ubicom)

D. network-based positioning

Answer:
A. location-based m- commerce (l-commerce)

311. Calculating the location of a mobile device from signals sent by the device to
base stations
A. personal areanetwork (pan)

B. terminal-basedpositioning

C. pervasive computing

D. network-basedpositioning

Answer:
B. terminal-basedpositioning
312. a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology
A. voice portal

B. mobile portal

C. wimax

D. geolocation

Answer:
C. wimax
313. a website with an audio interface that can be accessed through a telephone
call
A. wimax

B. geolocation

C. mobile portal

D. voice portal

Answer:
D. voice portal
314. a wireless version of the Ethernet networking standard
A. wireless wide area network (wwan)

B. wireless local area network (wlan)

C. personal area network (pan)

D. wireless application protocol (wap)

Answer:
B. wireless local area network (wlan)
315. computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information
A. personal area network (pan)

B. interactive voice response (ivr)

C. real-time location system (rtls)

D. geographical information system(gis)

Answer:
D. geographical information system(gis)
316. a voice system enables users to request/receive info, enter/change data through a telephone to a computerized system
A. pervasive computing

B. real-time location system (rtls)

C. personal area network (pan)

D. interactive voice response (ivr)

Answer:
D. interactive voice response (ivr)

317. a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network
A. personal area network (pan)

B. wireless application protocol (wap)

C. wireless wide area network (wwan)

D. wireless local area network (wlan)

Answer:
C. wireless wide area network (wwan)
318. a wireless telecommunications network for device-to-device connections within a very short range
A. wireless wide area network (wwan)

B. personal area network (pan)

C. wireless local area network (wlan)

D. sensor network

Answer:
B. personal area network (pan)
319. ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users’ attitudes)
A. mobile portal

B. context-aware computing

C. pervasive computing

D. network-based positioning

Answer:
B. context-aware computing
320. Which of the following is a specification for multicast discovery on a LAN?
A. ws-agent

B. ws-discovery

C. ws-soap

D. all of the mentioned

Answer:
B. ws-discovery
321. as a utility is a dream that dates from the beginning of the computing industry itself.
A. model

B. computing

C. software

D. all of the mentioned

Answer:
B. computing
322. Which of the following cloud concept is related to pooling and sharing of resources?
A. polymorphism

B. abstraction

C. virtualization

D. none of the mentioned

Answer:
C. virtualization

323. has many of the characteristics of what is now being called cloud computing.
A. internet

B. softwares

C. web service

D. all of the mentioned

Answer:
A. internet
324. Which of the following can be identified as cloud?
A. web applications

B. intranet

C. hadoop

D. all of the mentioned

Answer:
C. hadoop
325. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a resource.
A. real

B. virtual

C. cloud

D. none of the mentioned

Answer:
B. virtual

326. is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.
A. remote sensing

B. remote invocation

C. cloud computing

D. private computing

Answer:
C. cloud computing
327. Cloud providers provide cloud services to the cloud users.
A. true

B. false

Answer:
A. true
328. Which of the following is not a cloud stakeholder?
A. cloud providers

B. clients

C. end users

D. cloud users

Answer:
B. clients
329. These cloud services are of the form of utility computing i.e. the uses these services pay-as-you-go model.
A. cloud providers

B. clients

C. end users

D. cloud users

Answer:
D. cloud users
330. Which of the following is not a type of cloud?
A. private

B. public

C. protected

D. hybrid

Answer:
C. protected

331. In this type of cloud, an organization rents cloud services from cloud providers on- demand basis.
A. private

B. public

C. protected

D. hybrid

Answer:
B. public
332. In this type of cloud, the cloud is composed of multiple internal or external cloud.
A. private

B. public

C. protected

D. hybrid

Answer:
D. hybrid
333. enables the migration of the virtual image from one physical machine to another.
A. visualization

B. virtualization

C. migration

D. virtual transfer

Answer:
B. virtualization
334. Most of the cloud architectures are built on this type of architecture.
A. skeleton

B. grid

C. linear

D. template

Answer:
B. grid
335. Saas stands for?
A. software as a service

B. system software and services

C. software as a system

D. system as a service

Answer:
A. software as a service

336. In distributed system, each processor has its own
A. local memory

B. clock

C. both local memory and clock

D. none of the mentioned

Answer:
C. both local memory and clock
337. If one site fails in distributed system then
A. the remaining sites can continue operating

B. all the sites will stop working

C. directly connected sites will stop working

D. none of the mentioned

Answer:
A. the remaining sites can continue operating
338. Network operating system runs on
A. server

B. every system in the network

C. both server and every system in the network

D. none of the mentioned

Answer:
A. server
339. Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system?
A. cache coherence scheme

B. computation migration

C. remote procedure call

D. message passing

Answer:
B. computation migration
340. Logical extension of computation migration is
A. process migration

B. system migration

C. thread migration

D. data migration

Answer:
A. process migration
341. Processes on the remote systems are identified by
A. host id

B. host name and identifier

C. identifier

D. process id

Answer:
B. host name and identifier

342. In distributed systems, link and site failure is detected by
A. polling

B. handshaking

C. token passing

D. none of the mentioned

Answer:
B. handshaking
343. The capability of a system to adapt the increased service load is called
A. scalability

B. tolerance

C. capacity

D. none of the mentioned

Answer:
A. scalability
344. Internet provides for remote login.
A. telnet

B. http

C. ftp

D. rpc

Answer:
A. telnet
345. Which of the following was one of the top 5 cloud applications in 2010?
A. cloud backup

B. web applications

C. business applications

D. all of the mentioned

Answer:
D. all of the mentioned
346. Point out the correct statement.
A. google’s cloud includes perhaps some 10 data centers worldwide

B. flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic

C. data centers have been sited to optimize the overall system latency

D. all of the mentioned

Answer:
C. data centers have been sited to optimize the overall system latency
347. Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage?
A. on-demand self-service

B. broad network access

C. resource pooling

D. all of the mentioned

Answer:
A. on-demand self-service

348. The is something that you can obtain under contract from your vendor.
A. pos

B. qos

C. sos

D. all of the mentioned

Answer:
B. qos
349. Point out the wrong statement.
A. internet consumes roughly 1 percent of the world’s total power

B. the cost advantages of cloud computing have enabled new software vendors to create productivity applications

C. a client can provision computer resources without the need for interaction with cloud service provider personnel

D. none of the mentioned

Answer:
A. internet consumes roughly 1 percent of the world’s total power
350. All cloud computing applications suffer from the inherent that is intrinsic in their WAN connectivity.
A. propagation

B. latency

C. noise

D. all of the mentioned

Answer:
B. latency

351. Cloud computing is a system and it is necessarily unidirectional in nature.
A. stateless

B. stateful

C. reliable

D. all of the mentioned

Answer:
A. stateless
352. Which of the following is the most important area of concern in cloud computing?
A. security

B. storage

C. scalability

D. all of the mentioned

Answer:
A. security
353. You can’t count on a cloud provider maintaining your in the face of government actions.
A. scalability

B. reliability

C. privacy

D. none of the mentioned

Answer:
C. privacy
354. Which of the following architectural standards is working with cloud computing industry?
A. service-oriented architecture

B. standardized web services

C. web-application frameworks

D. all of the mentioned

Answer:
A. service-oriented architecture
355. Which of the following is a message queue or transaction system for distributed Internet- based applications?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
B. amazon simple queue service

356. Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2?
A. cloudwatch

B. amazon elastic block store

C. aws import/export

D. all of the mentioned

Answer:
B. amazon elastic block store
357. Which of the following metrics are used to support Elastic Load Balancing?
A. cloudwatch

B. amazon elastic block store

C. aws import/export

D. all of the mentioned

Answer:
A. cloudwatch
358. Which of the following cloud storage is mainly meant for developers and to support applications built using Web services?
A. managed

B. unmanaged

C. disk

D. all of the mentioned

Answer:
A. managed
359. Point out the correct statement.
A. cloud storage may be broadly categorized into four major classes of storage

B. in unmanaged storage, the storage service provider makes storage capacity available to users

C. in managed storage, the storage service provider makes storage capacity available to users

D. all of the mentioned

Answer:
B. in unmanaged storage, the storage service provider makes storage capacity available to users
360. Which of the following is the form of unmanaged cloud storage?
A. xdrive

B. omnidrive

C. idrive

D. all of the mentioned

Answer:
D. all of the mentioned

361. Which of the following is an example of an unmanaged storage utility set up to do automated backups?
A. xdrive

B. omnidrive

C. freedrive

D. all of the mentioned

Answer:
D. all of the mentioned
362. Point out the wrong statement.
A. unmanaged storage is reliable

B. managed storage is relatively cheap to use

C. most of the user-based applications that work with cloud storage are of unmanaged type

D. none of the mentioned

Answer:
B. managed storage is relatively cheap to use
363. Which of the following factors led to the demise of many of the early SSPs and to many hosted file services?
A. the dot.com bust in 2000

B. the inability of file-hosting companies to successfully monetize online storage

C. the continued commoditization of large disk drives

D. all of the mentioned

Answer:
D. all of the mentioned
364. Which of the following is the simplest unmanaged cloud storage device?
A. file transfer utility

B. antivirus utility

C. online image utility

D. none of the mentioned

Answer:
A. file transfer utility
365. The service FreeDrive is storage that allows users to view the content of others.
A. facebook

B. twitter

C. whatsapp

D. none of the mentioned

Answer:
A. facebook
366. Which of the following file transfer utility creates a shared folder metaphor using a Web service?
A. dropbox

B. skype

C. drive

D. all of the mentioned

Answer:
A. dropbox

367. Which of the following offers Storage size of 10GB free t0 100 GB paid?
A. adrive

B. 4shared

C. badongo

D. all of the mentioned

Answer:
B. 4shared
368. Point out the correct statement.
A. describes a standard method for requesting services from distributed components and managing the results

B. soa provides the translation and management layer in an architecture that removes the barrier for a client obtaining desired services

C. with soa, clients and components can be written in different languages and can use multiple messaging protocols

D. all of the mentioned

Answer:
D. all of the mentioned
369. Which of the following is a repeatable task within a business process?
A. service

B. bus

C. methods

D. all of the mentioned

Answer:
A. service
370. Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand?
A. soa

B. ebs

C. gec

D. all of the mentioned

Answer:
A. soa
371. Which of the following is used to define the service component that performs the service?
A. wsdl

B. scdl

C. xml

D. none of the mentioned

Answer:
B. scdl
372. Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint?
A. wsdl

B. scdl

C. xml

D. none of the mentioned

Answer:
A. wsdl

373. Which of the following provides commands for defining logic using conditional statements?
A. xml

B. ws-bpel

C. json

D. none of the mentioned

Answer:
B. ws-bpel
374. Which of the following is used as middleware layer in the following figure?
A. xml

B. esb

C. uddi

D. none of the mentioned

Answer:
B. esb
375. To publish a REST service with Spring.
A. publishing an application’s data as a rest service

B. accessing data from third-party rest services

C. none of the mentioned

D. all of the mentioned

Answer:
D. all of the mentioned

376. Publishing an application’s data as a REST service requires.
A. @requestmapping

B. @pathvariable

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
377. Spring supports a series of mechanisms to generate a REST service payload.
A. true

B. false

Answer:
A. true
378. Annotation added as an input parameter to the handler method.
A. @pathvariable

B. @path

C. @pathlocale

D. none of the mentioned

Answer:
A. @pathvariable
379. Notation for defining REST endpoints.
A. { }

B. *

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
380. General-purpose class that allows a response to be rendered using a marshaller.
A. marshallingview

B. marshalling

C. view

D. all of the mentioned

Answer:
A. marshallingview

381. Marshalling is the process of transforming an in-memory representation of an object into a data format.a
A. true

B. false

Answer:
A. true
382. The marshaller used by MarshallingView belongs to one of a series of XML marshallers.
A. jaxb2marshaller

B. xmlbeansmarshaller

C. castormarshalle

D. all of the mentioned

Answer:
D. all of the mentioned
383. To configure Jaxb2Marshaller marshaller we require.
A. classestobebound

B. contextpath

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
384. In the case of classesToBeBound, the classes assigned to this property, indicate the class (i.e., object) structure that is to be transformed into XML.
A. true

B. false

Answer:
A. true
385. Accessing a third-party REST service inside a Spring application.
A. resttemplate class

B. viewresolver

C. internalviewresolver

D. view

Answer:
A. resttemplate class

386. REST service end point comprises an address.
A. starts with http:// and ends with ?

B. starts with http:// and ends with &

C. no certain url is specified

D. depends upon the platform used

Answer:
A. starts with http:// and ends with ?
387. XML tag which represents information related to a REST service request.
A. result

B. title

C. none of the mentioned

D. all of the mentioned

Answer:
D. all of the mentioned
388. RestTemplate class method which performs an HTTP HEAD operation.
A. headforheaders(string, object…)

B. getforobject(string, class, object…)

C. postforlocation(string, object, object…)

D. postforobject(string, object, class, object…)

Answer:
A. headforheaders(string, object…)
389. A web service contract is described using :-
A. web services description language

B. web services description

C. all of the mentioned

D. none of the mentioned

Answer:
A. web services description language
390. There are two approaches to developing a web service, depending on whether you define the contract first or last.
A. true

B. false

Answer:
A. true
391. In contrast, the contract-first approach encourages you to think of the service contract first in terms of :-
A. xml

B. xml schema(.xsd)

C. wsdl

D. all of the mentioned

Answer:
D. all of the mentioned

392. In some cases, it’s also hard to map an object to XML (e.g., an object graph with cyclic references) because there’s actually an impedance mismatch between an object model and an XML model.
A. true

B. false

Answer:
A. true
393. Service exporters that can export a bean as a remote service based on the :-
A. rmi

B. hessian

C. burlap

D. all of the mentioned

Answer:
D. all of the mentioned
394. 3 WEB SERVICES
A. true

B. false

Answer:
B. false
395. The standard for deploying web services on the Java EE platform as of Java EE 1.4:-
A. jax-rpc

B. jax

C. rpc

D. none of the mentioned

Answer:
A. jax-rpc
396. To send objects across the wire, beans need to be encoded using the Java Architecture for XML Binding (JAXB).
A. true

B. false

Answer:
A. true
397. If you are deploying into a Java EE 5 (or better) container, you may simply create a bean that is annotated with:-
A. javax.jws.webservice

B. javax.jws.webserviceprovider

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned

398. If you are using the JAX-RS Reference Implementation, this intermediary step will involve a tool called wsgen.
A. true

B. false

Answer:
A. true
399. Spring provides a factory that can export beans annotated with:-
A. javax.jws.webservice

B. javax.jws.webserviceprovider

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
400. Exposing a stand-alone SOAP endpoint using the:-
A. simplejaxwsserviceexporter

B. jax-ws

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned

401. Tomcat doesn’t support JAX-WS by itself.
A. true

B. false

Answer:
A. true
402. CXF represents the consolidation of the Celtix and XFire projects, which each had useful SOAP support.
A. true

B. false

Answer:
A. true
403. Factory to use our Spring bean as the implementation:-
A. jaxws:end

B. jaxws:endpoint

C. all of the mentioned

D. none of the mentioned

Answer:
B. jaxws:endpoint
404. client() class provides to create topics.
A. software

B. classes

C. methods

D. batch

Answer:
C. methods
405. method publishes messages to pub/sub.
A. client()

B. publish()

C. server()

D. batch()

Answer:
B. publish()

406. How many arguments are accepted by publish()?
A. 5 arguments

B. 3 arguments

C. 1 argument

D. 2 arguments

Answer:
D. 2 arguments
407. Does publish() method accepts arbitrary arguments.
A. true

B. false

Answer:
A. true
408. The topic in the publish method is in which form?
A. binomial form

B. canonical form

C. nominal form

D. message form

Answer:
B. canonical form
409. The message in pub/sub is an opaque blob of
A. bits

B. bytes

C. word

D. nibble

Answer:
B. bytes
410. error will show if we try to send text string instead of bytes.
A. typeerror

B. error

C. linker error

D. compiler error

Answer:
A. typeerror

411. What do we call string in python 2?
A. str

B. unicode

C. strs

D. unicades

Answer:
B. unicode
412. When you publish a message is automatically created?
A. client

B. server

C. batch

D. server

Answer:
C. batch
413. When the batch is created, it begins a countdown that publishes the batch once sufficient time has elapsed.
A. true

B. false

Answer:
A. true
414. What is the time elapsed after a batch is created?
A. 0.5 seconds

B. 0.05 seconds

C. 1.5 seconds

D. 1 second

Answer:
B. 0.05 seconds
415. Every call to publish() will return a class that conforms to the interface.
A. batch

B. client

C. server

D. future

Answer:
D. future
416. Point out the wrong statement.
A. abstraction enables the key benefit of cloud computing: shared, ubiquitous access

B. virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made

C. all cloud computing applications combine their resources into pools that can be assigned on demand to users

D. all of the mentioned

Answer:
C. all cloud computing applications combine their resources into pools that can be assigned on demand to users

417. Which of the following type of virtualization is also characteristic of cloud computing?
A. storage

B. application

C. cpu

D. all of the mentioned

Answer:
D. all of the mentioned
418. The technology used to distribute service requests to resources is referred to as
A. load performing

B. load scheduling

C. load balancing

D. all of the mentioned

Answer:
C. load balancing
419. Point out the correct statement.
A. a client can request access to a cloud service from any location

B. a cloud has multiple application instances and directs requests to an instance based on conditions

C. computers can be partitioned into a set of virtual machines with each machine being assigned a workload

D. all of the mentioned

Answer:
D. all of the mentioned
420. Which of the following software can be used to implement load balancing?
A. apache mod_balancer

B. apache mod_proxy_balancer

C. f6’s bigip

D. all of the mentioned

Answer:
B. apache mod_proxy_balancer
421. Which of the following network resources can be load balanced?
A. connections through intelligent switches

B. dns

C. storage resources

D. all of the mentioned

Answer:
D. all of the mentioned
422. Which of the following is a more sophisticated load balancer?
A. workload managers

B. workspace managers

C. rackserve managers

D. all of the mentioned

Answer:
A. workload managers

423. A is a combination load balancer and application server that is a server placed between a firewall or router.
A. abc

B. acd

C. adc

D. all of the mentioned

Answer:
C. adc
424. Which of the following should be replaced with the question mark in the following figure?
A. abstraction

B. virtualization

C. mobility pattern

D. all of the mentioned

Answer:
B. virtualization
425. In memory-mapped I/O
A. the i/o devices and the memory share the same address space

B. the i/o devices have a separate address space

C. the memory and i/o devices have an associated address space

D. a part of the memory is specifically set aside for the i/o operation

Answer:
A. the i/o devices and the memory share the same address space

426. The usual BUS structure used to connect the I/O devices is
A. star bus structure

B. multiple bus structure

C. single bus structure

D. node to node bus structure

Answer:
C. single bus structure
427. In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices.
A. false

B. true

Answer:
B. true
428. The advantage of I/O mapped devices to memory mapped is
A. the former offers faster transfer of data

B. the devices connected using i/o mapping have a bigger buffer space

C. the devices have to deal with fewer address lines

D. no advantage as such

Answer:
C. the devices have to deal with fewer address lines
429. The system is notified of a read or write operation by
A. appending an extra bit of the address

B. enabling the read or write bits of the devices

C. raising an appropriate interrupt signal

D. sending a special signal along the bus

Answer:
D. sending a special signal along the bus
430. To overcome the lag in the operating speeds of the I/O device and the processor we use
A. buffer spaces

B. status flags

C. interrupt signals

D. exceptions

Answer:
B. status flags

431. The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is?
A. exceptions

B. signal handling

C. interrupts

D. dma

Answer:
C. interrupts
432. The method which offers higher speeds of I/O transfers is
A. interrupts

B. memory mapping

C. program-controlled i/o

D. dma

Answer:
D. dma
433. The process wherein the processor constantly checks the status flags is called as
A. polling

B. inspection

C. reviewing

D. echoing

Answer:
A. polling
434. Which of the following is incorrect?
A. a layered-style program is divided into an array of modules or layers

B. each layer provides services to the layer “below” and makes use of services provided by the layer “above”

C. all of the mentioned

D. none of the mentioned

Answer:
B. each layer provides services to the layer “below” and makes use of services provided by the layer “above”
435. What is Relaxed Layered Style?
A. each layer can be constrained to use only the layer directly below it

B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

C. all of the mentioned

D. none of the mentioned

Answer:
B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

436. Which of the following is correct?
A. module a uses module b if a correct version of b must be present for a to execute correctly

B. module a calls (or invokes ) module b if b triggers execution of a

C. all of the mentioned

D. none of the mentioned

Answer:
A. module a uses module b if a correct version of b must be present for a to execute correctly
437. Which of the following is true with respect to layered architecture?
A. each layer is allowed to depend on the layer above it being present and correct

B. a layer may call other layers above and below it, as long as it uses them

C. all of the mentioned

D. none of the mentioned

Answer:
D. none of the mentioned
438. What is Onion diagram illustrates?
A. it illustrates the connection between the layers in communications protocols, such as the international standards organization open systems interconnection (iso osi) model,or the layers in user interface and windowing systems, such as the x window system

B. it often illustrates operating system layers, with the kernel at the core

C. all of the mentioned

D. none of the mentioned

Answer:
D. none of the mentioned
439. In particular, layers have which of the following characteristics?
A. layers are by definition highly cohesive, thus satisfying the principle of cohesion

B. layers doesn’t support information hiding

C. layers are constrained to use only above layers

D. all of the mentioned

Answer:
A. layers are by definition highly cohesive, thus satisfying the principle of cohesion
440. What are the drawbacks for Layers?
A. it is often necessary to pass data through many layers, which can slow performance significantly

B. layers support information hiding

C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

D. none of the mentioned

Answer:
C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
441. Which of the following is correct?
A. layers are not strongly coupled to the layers above them

B. each layer is strongly coupled only to the layer immediately below it

C. overall layered-style architectures are loosely coupled

D. all of the mentioned

Answer:
D. all of the mentioned

442. Which of the following is one of the unique attributes of Cloud Computing?
A. utility type of delivery

B. elasticity

C. low barrier to entry

D. all of the mentioned

Answer:
D. all of the mentioned
443. Point out the correct statement.
A. service level agreements (slas) is small aspect of cloud computing

B. cloud computing does not have impact on software licensing

C. cloud computing presents new opportunities to users and developers

D. all of the mentioned

Answer:
C. cloud computing presents new opportunities to users and developers
444. Applications that work with cloud computing that have low margins and usually low risk are
A. high touch

B. low touch

C. moderate touch

D. all of the mentioned

Answer:
B. low touch
445. A service that concentrates on hardware follows the as a Service model.
A. iaas

B. caas

C. paas

D. all of the mentioned

Answer:
A. iaas
446. Point out the wrong statement.
A. a cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software

B. high touch applications are best done on- premises

C. the google app engine follows iaas

D. none of the mentioned

Answer:
C. the google app engine follows iaas
447. When you add a software stack, such as an operating system and applications to the service, the model shifts to model.
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas

448. Which of the following is the most refined and restrictive service model?
A. iaas

B. caas

C. paas

D. all of the mentioned

Answer:
C. paas
449. is a pay-as-you-go model matches resources to need on an ongoing basis.
A. utility

B. elasticity

C. low barrier to entry

D. all of the mentioned

Answer:
A. utility
450. feature allows you to optimize your system and capture all possible transactions.
A. scalability

B. reliability

C. elasticity

D. none of the mentioned

Answer:
C. elasticity

451. enables batch processing, which greatly speeds up high-processing applications.
A. scalability

B. reliability

C. elasticity

D. utility

Answer:
A. scalability
452. A service provider gets the same benefits from a composable system that a user does.
A. caas

B. aaas

C. paas

D. all of the mentioned

Answer:
C. paas
453. Point out the correct statement.
A. cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service

B. cloud computing relies on a set of protocols needed to manage interprocess communications

C. platforms are used to create more complex software

D. all of the mentioned

Answer:
D. all of the mentioned
454. Which of the following is the property of the composable component?
A. stateful

B. stateless

C. symmetric

D. all of the mentioned

Answer:
B. stateless
455. From the standpoint of a it makes no sense to offer non-standard machine instances to customers.
A. caas

B. aaas

C. paas

D. iaas

Answer:
D. iaas

456. Point out the wrong statement.
A. a cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

B. a composable component must be modular

C. a composable component must be stateless

D. none of the mentioned

Answer:
A. a cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter
457. A service provider reselling a may have the option to offer one module to customize the information.
A. caas

B. aaas

C. paas

D. saas

Answer:
D. saas
458. Which of the following is the highest degree of integration in cloud computing?
A. caas

B. aaas

C. paas

D. saas

Answer:
D. saas
459. Which of the following benefit is provided by the PaaS service provider?
A. a larger pool of qualified developers

B. more reliable operation

C. a logical design methodology

D. all of the mentioned

Answer:
D. all of the mentioned
460. Point out the wrong statement.
A. platforms represent nearly the full cloud software stack

B. a platform in the cloud is a software layer that is used to create higher levels of service

C. platforms often come replete with tools and utilities to aid in application design and deployment

D. none of the mentioned

Answer:
D. none of the mentioned

461. allows different operating systems to run in their own memory space.
A. vgm

B. vmc

C. vmm

D. all of the mentioned

Answer:
C. vmm
462. Which of the following offers virtual appliances, including ones based on Windows, all of which run on VMware Player?
A. bagvapp

B. jcinacio

C. helpdesklive

D. all of the mentioned

Answer:
A. bagvapp
463. offers various Linux distributions upon which you can build a virtual machine.
A. bagvapp

B. jcinacio

C. helpdesklive

D. all of the mentioned

Answer:
B. jcinacio
464. is a CPU emulator and virtual machine monitor.
A. imaging

B. parallels

C. qemu

D. none of the mentioned

Answer:
C. qemu
465. Which of the following is storage data interchange interface for stored data objects?
A. occ

B. occi

C. ocmi

D. all of the mentioned

Answer:
B. occi
466. Point out the correct statement.
A. to determine whether your application will port successfully, you should perform a functionality mapping exercise

B. cloud computing supports some application features better than others

C. cloud bursting is an overflow solution that clones the application to the cloud and directs traffic to the cloud during times of high traffic

D. all of the mentioned

Answer:
D. all of the mentioned

467. Cloud storage data usage in the year 2020 is estimated to be percent resident by IDC.
A. 10

B. 15

C. 20

D. none of the mentioned

Answer:
D. none of the mentioned
468. Point out the wrong statement.
A. some apis are both exposed as soap and rest

B. the role of a cloud vendor specific api has impact on porting an application

C. there are mainly three types of cloud storage

D. none of the mentioned

Answer:
C. there are mainly three types of cloud storage
469. Which of the following system does not provision storage to most users?
A. paas

B. iaas

C. caas

D. saas

Answer:
B. iaas
470. The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a as a Service model.
A. software

B. platform

C. analytics

D. none of the mentioned

Answer:
A. software
471. How many categories of storage devices broadly exist in cloud?
A. 1

B. 2

C. 3

D. none of the mentioned

Answer:
B. 2
472. Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes?
A. block

B. file

C. disk

D. all of the mentioned

Answer:
A. block

473. Which of the following impose additional overhead on clients and offer faster transfer?
A. block storage

B. file storage

C. file server

D. all of the mentioned

Answer:
A. block storage
474. Which of the following is an edge-storage or content-delivery system that caches data in different physical locations?
A. amazon relational database service

B. amazon simpledb

C. amazon cloudfront

D. amazon associates web services

Answer:
C. amazon cloudfront
475. Which of the following allows you to create instances of the MySQL database to support your Web sites?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon relational database service

D. amazon simple storage system

Answer:
C. amazon relational database service

476. Point out the correct statement.
A. amazon elastic cloud is a system for creating virtual disks(volume)

B. simpledb interoperates with both amazon ec2 and amazon s3

C. ec3 is an analytics as a service provider

D. none of the mentioned

Answer:
B. simpledb interoperates with both amazon ec2 and amazon s3
477. Which of the following is a billing and account management service?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
C. amazon devpay
478. The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as
A. base

B. acid

C. atom

D. all of the mentioned

Answer:
B. acid
479. Which of the following is property of ACID principle?
A. atomicity

B. consistency

C. isolation

D. all of the mentioned

Answer:
D. all of the mentioned
480. Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained?
A. atomicity

B. consistency

C. isolation

D. durability

Answer:
B. consistency

481. Which of the following component is required for both online and local data access in hybrid application?
A. local

B. cloud

C. both local and cloud

D. none of the mentioned

Answer:
C. both local and cloud
482. Which of the following factors might offset the cost of offline access in hybrid applications?
A. scalability

B. costs

C. ubiquitous access

D. all of the mentioned

Answer:
D. all of the mentioned
483. An application that needed storage alone might not benefit from a cloud deployment at all.
A. online

B. offline

C. virtual

D. all of the mentioned

Answer:
B. offline
484. The property states that the system must have a mechanism to recover from committed transactions should that be necessary.
A. atomicity

B. consistency

C. isolation

D. durability

Answer:
D. durability
485. Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?
A. atomicity

B. consistency

C. isolation

D. durability

Answer:
A. atomicity

486. Which of the following is a core management feature offered by most cloud management service products?
A. support of different cloud types

B. creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications

C. performance reporting including availability and uptime, response time, resource quota usage, and other characteristics

D. all of the mentioned

Answer:
D. all of the mentioned
487. Point out the correct statement.
A. eucalyptus and rackspace both use amazon ec2 and s3 services

B. the rightscale user interface provides real-time measurements of individual server instances

C. rightscale server templates and the rightscript technology are highly configurable and can be run under batch control

D. all of the mentioned

Answer:
D. all of the mentioned
488. Which of the following is an industry organization that develops industry system management standards for platform interoperability?
A. dmtf

B. dms

C. ebs

D. all of the mentioned

Answer:
A. dmtf
489. Which of the following is used to extend CIM to virtual computer system management?
A. ovf

B. vman

C. ocsi

D. none of the mentioned

Answer:
B. vman
490. Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
A. cce

B. occi

C. smi

D. all of the mentioned

Answer:
C. smi
491. Which of the following is open and both hypervisor and processor-architecture- agnostic?
A. dell scalent

B. cloudkick

C. elastra

D. all of the mentioned

Answer:
A. dell scalent

492. Which of the following is a workflow control and policy based automation service by CA?
A. ca cloud optimize

B. ca cloud orchestrate

C. ca cloud insight

D. ca cloud compose

Answer:
B. ca cloud orchestrate
493. Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
A. cloudwatch

B. cloudsensor

C. cloudmetrics

D. all of the mentioned

Answer:
B. cloudsensor
494. Which of the following service provider provides the least amount of built in security?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
C. iaas
495. Point out the correct statement.
A. different types of cloud computing service models provide different levels of security services

B. adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider

C. data should be transferred and stored in an encrypted format for security purpose

D. all of the mentioned

Answer:
D. all of the mentioned
496. Which of the following services that need to be negotiated in Service Level Agreements?
A. logging

B. auditing

C. regulatory compliance

D. all of the mentioned

Answer:
D. all of the mentioned
497. The following flowchart is intended to evaluate in any cloud.
A. risk

B. errors

C. inconsistencies

D. none of the mentioned

Answer:
A. risk

498. Which of the following area of cloud computing is uniquely troublesome?
A. auditing

B. data integrity

C. e-discovery for legal compliance

D. all of the mentioned

Answer:
D. all of the mentioned
499. Which of the following is the operational domain of CSA?
A. scalability

B. portability and interoperability

C. flexibility

D. none of the mentioned

Answer:
B. portability and interoperability
500. Which of the following is considered an essential element in cloud computing by CSA?
A. multi-tenancy

B. identity and access management

C. virtualization

D. all of the mentioned

Answer:
A. multi-tenancy

501. Which of the following is used for Web performance management and load testing?
A. vmware hyperic

B. webmetrics

C. univa ud

D. tapinsystems

Answer:
B. webmetrics
502. Which of the following is application and infrastructure management software for hybrid multi-clouds?
A. vmware hyperic

B. webmetrics

C. univa ud

D. tapinsystems

Answer:
C. univa ud
503. Which of the following is a compliance standard?
A. pci-dss

B. hippa

C. glba

D. all of the mentioned

Answer:
D. all of the mentioned
504. HTTP is a protocol
A. stateful

B. unidirectional

C. bidirectional

D. full dulpex

Answer:
B. unidirectional
505. websocket is a Protocol
A. stateful

B. bidirectional

C. connection oriented

D. all of the above

Answer:
D. all of the above

506. Which of the following subject area deals with pay-as-you-go usage model?
A. accounting management

B. compliance

C. data privacy

D. all of the mentioned

Answer:
A. accounting management
507. Point out the correct statement
A. except for tightly managed saas cloud providers

B. cloud computing vendors run very reliable networks

C. the low barrier to entry cannot be accompanied by a low barrier to provisioning

D. all of the mentioned

Answer:
B. cloud computing vendors run very reliable networks
508. captive requires that the cloud accommodate multiple compliance regimes.
A. licensed

B. policy-based

C. variable

D. all of the mentioned

Answer:
B. policy-based
509. Security methods such as private encryption, VLANs and firewalls comes under subject area.
A. accounting management

B. compliance

C. data privacy

D. all of the mentioned

Answer:
C. data privacy
510. Which of the following captive area deals with monitoring?
A. licensed

B. variable but under control

C. law

D. all of the mentioned

Answer:
B. variable but under control

511. Network bottlenecks occur when data sets must be transferred
A. large

B. small

C. big

D. all of the mentioned

Answer:
A. large
512. RDS is a type of database
A. sql

B. nonsql

C. simple storage

D. all of above

Answer:
A. sql
513. Dynamodb is type of storage
A. nonsql

B. sql

C. simple storage

D. all of above

Answer:
A. nonsql
514. Cloud are standardized in order to appeal to the majority of its audience.
A. svas

B. slas

C. sals

D. none of the mentioned

Answer:
B. slas
515. The reputation for cloud computing services for the quality of those services is shared by
A. replicas

B. shards

C. tenants

D. all of the mentioned

Answer:
C. tenants
516. is a function of the particular enterprise and application in an on- premises deployment.
A. vendor lock

B. vendor lock-in

C. vendor lock-ins

D. none of the mentioned

Answer:
B. vendor lock-in

517. computing refers to applications and services that run on a distributed network using virtualized resources.
A. distributed

B. cloud

C. soft

D. parallel

Answer:
B. cloud
518. . as a utility is a dream that dates from the beginning of the computing industry itself
A. model

B. computing

C. software

D. all of the mentioned

Answer:
B. computing
519. Which of the cloud concept is related to pooling and sharing of resources
A. polymorphism

B. abstraction

C. virtualization

D. none of the mentioned

Answer:
C. virtualization
520. has many of the characteristics of what is now being called cloud computing
A. internet

B. softwares

C. web service

D. all of the mentioned

Answer:
A. internet
521. Which of the following is the highest degree of integration in cloud computing?
A. saas

B. iaas

C. paas

D. all of the mentioned

Answer:
A. saas
522. Communication between services is done widely using protocol
A. rest

B. soap

C. restful

D. none of the mentioned

Answer:
C. restful

523. Applications such as a Web server or database server that can run on a virtual machine image are referred to as
A. virtual server

B. virtual appliances

C. machine imaging

D. all of the mentioned

Answer:
B. virtual appliances
524. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes.
A. ben

B. xen

C. ken

D. zen

Answer:
B. xen
525. is a CPU emulator and virtual machine monitor
A. imaging

B. parallels

C. qemu

D. none of the mentioned

Answer:
C. qemu

526. What is HDFS?
A. storage layer

B. batch processing engine

C. resource management layer

D. all of the above

Answer:
A. storage layer
527. Which among the following command is used to copy a directory from one node to another in HDFS?
A. rcp

B. distcp

C. dcp

D. drcp

Answer:
B. distcp
528. Which among the following is the correct statement
A. datanode manage file system namespace

B. namenode stores metadata

C. namenode stores actual data

D. all of the above

Answer:
B. namenode stores metadata
529. The namenode knows that the data node is active using a mechanism known as
A. active pulse

B. data pulse

C. heartbeats

D. h-signal

Answer:
C. heartbeats
530. What is HDFS Block in Hadoop?
A. it is the logical representation of data

B. it is the physical representation of data

C. both the above

D. none of the above

Answer:
B. it is the physical representation of data

531. Which of the following is the correct statement?
A. datanode is the slave/worker node and holds the user data in the form of data blocks

B. each incoming file is broken into 32 mb by defaul

C. namenode stores user data in the form of data blocks

D. none of the above

Answer:
A. datanode is the slave/worker node and holds the user data in the form of data blocks
532. The need for data replication can arise in various scenarios like
A. replication factor is changed

B. datanode goes down

C. data blocks get corrupted

D. all of the above

Answer:
D. all of the above
533. A file in HDFS that is smaller than a single block size
A. cannot be stored in hdfs

B. occupies the full block\s size.

C. can span over multiple blocks

D. occupies only the size it needs and not the full block

Answer:
D. occupies only the size it needs and not the full block
534. Which among the following are the duties of the NameNodes
A. manage file system namespace

B. it is responsible for storing actual data

C. perform read-write operation as per request for the clients

D. none of the above

Answer:
A. manage file system namespace
535. For the frequently accessed HDFS files the blocks are cached in
A. the memory of the data node

B. in the memory of the namenode

C. both the above

D. none of the above

Answer:
A. the memory of the data node

536. Which scenario demands highest bandwidth for data transfer between nodes
A. different nodes on the same rack

B. nodes on different racks in the same data center.

C. nodes in different data centers

D. data on the same node

Answer:
C. nodes in different data centers
537. Which among the following is the duties of the Data Nodes
A. manage file system namespace

B. stores meta-data

C. regulates client’s access to files

D. perform read-write operation as per request for the clients

Answer:
D. perform read-write operation as per request for the clients
538. Amazon EC2 provides virtual computing environments, known as :
A. chunks

B. instances

C. messages

D. none of the mentioned

Answer:
B. instances
539. Data stored in domains doesn’t require maintenance of a schema.
A. simpledb

B. sql server

C. oracle

D. rds

Answer:
A. simpledb
540. Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?
A. cloudwatch

B. amazon elastic block store

C. aws import/export

D. all of the mentioned

Answer:
B. amazon elastic block store
541. Which of the following type of virtualization is also characteristic of cloud computing
A. storage

B. application

C. cpu

D. all of the mentioned

Answer:
D. all of the mentioned

542. Which of the following is most important feature of cloud storage listed below
?
A. logon authentication

B. bare file

C. multiplatform support

D. adequate bandwidth

Answer:
A. logon authentication
543. Which of the following backup create a cloned copy of your current data or drive ?
A. continuous data protection

B. open file backup

C. reverse delta backup

D. none of the mentioned

Answer:
A. continuous data protection
544. Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes ?
A. block

B. file

C. disk

D. all of the mentioned

Answer:
A. block
545. . Which of the following allows you to create instances of the MySQL database to support your Web sites?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon relational database service

D. amazon simple storage system

Answer:
C. amazon relational database service
546. Which of the following is not the feature of Network management systems?
A. accounting

B. security

C. performance

D. none of the mentioned

Answer:
D. none of the mentioned
547. The following flowchart is intended to evaluate in any cloud.
A. risk

B. errors

C. inconsistencies

D. none of the mentioned

Answer:
A. risk

548. Point out the wrong statement.
A. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage

B. any distributed application has a much greater attack surface than an application that is closely held on a local area network

C. cloud computing doesn’t have vulnerabilities associated with internet applications

D. all of the mentioned

Answer:
C. cloud computing doesn’t have vulnerabilities associated with internet applications
549. Which of the following is the operational domain of CSA(Cloud Security Alliance)?
A. scalability

B. portability and interoperability

C. flexibility

D. none of the mentioned

Answer:
B. portability and interoperability
550. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
A. cas

B. csa

C. sac

D. all of the mentioned

Answer:
A. cas

551. For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
B. paas
552. Which of the following model allows vendor to provide security as part of the Service Level Agreement?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas
553. Which of the following cloud does not require mapping?
A. public

B. private

C. hybrid

D. none of the mentioned

Answer:
A. public
554. Which of the following service model is owned in terms of infrastructure by both vendor and customer?
A. public

B. private

C. hybrid

D. none of the mentioned

Answer:
C. hybrid
555. Which of the following model type is not trusted in terms of security?
A. public

B. private

C. hybrid

D. none of the mentioned

Answer:
A. public

556. Which of the following has infrastructure security managed and owned by the vendor?
A. hybrid

B. private/community

C. public

D. none of the mentioned

Answer:
B. private/community
557. Point out the wrong statement.
A. each different type of cloud service delivery model creates a security boundary

B. any security mechanism belowthe security boundary must be built into the system

C. any security mechanism above the security boundary must be maintained by the customer

D. all of the mentioned

Answer:
D. all of the mentioned
558. is an application for collecting messages sent in RSS and Atom format from information providers.
A. google reader

B. yahoo mail

C. emailrackspace

D. all of the mentioned

Answer:
A. google reader
559. Which of the following was developed an alternative to XML syndication by IETF?
A. atom publishing protocol

B. atom subscribing protocol

C. atom subscribe protocol

D. none of the mentioned

Answer:
A. atom publishing protocol
560. How many technologies are used for most of the syndicated content on the Internet?
A. 1

B. 2

C. 3

D. 4

Answer:
B. 2

561. The full form of AJAX is
A. asynchronous javascript and xml

B. another java and xml library

C. abstract json and xml

D. none of the mentioned

Answer:
A. asynchronous javascript and xml
562. The advantages of Ajax is
A. bandwidth utilization

B. more interactive

C. speeder retrieval of data

D. all of these

Answer:
D. all of these
563. The technology used to distribute service requests to resources is referred to as
A. load performing

B. load scheduling

C. load balancing

D. all of the mentioned

Answer:
C. load balancing
564. computing refers to applications and services that run on a distributed network
using virtualized resources.
A. distributed

B. cloud

C. soft

D. parallel

Answer:
B. cloud
565. Cloud computing is an abstraction based on the notion of pooling physical resources and
presenting them as a resource.
A. real

B. virtual

C. cloud

D. none of the mentioned

Answer:
B. virtual
566. Amazon’s Elastic Compute Cloud (EC2) is a well known .
A. virtual machine

B. cloud storage

C. paas

D. soa

Answer:
A. virtual machine

567. virtualization abstracts networking hardware and software into a virtual network that can be managed.
A. storage

B. network

C. software

D. none of the mentioned

Answer:
B. network
568. is used by Amazon Web Services to store copies of a virtual machine.
A. ami

B. emi

C. imi

D. application services

Answer:
A. ami
569. In para-virtualization, VMs run on hypervisor that interacts with the hardware.
A. true

B. false

Answer:
B. false
570. An operating system running on a Type VM is a full virtualization.
A. 1

B. 2

C. 3

D. all of the mentioned

Answer:
A. 1
571. What makes Ajax unique?
A. it works as a stand- alone web- development tool

B. it works the same with all web browsers

C. it uses c++ as its programming language

D. it makes data requests asynchronously

Answer:
D. it makes data requests asynchronously
572. JavaScript is also called server-side JavaScript.
A. microsoft

B. navigator

C. livewire

D. none

Answer:
C. livewire

573. Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address?
A. storage

B. network

C. software

D. none of the mentioned

Answer:
A. storage
574. Point out the wrong statement.
A. a virtual network can create virtual network interfaces

B. instantiating a virtual machine is a very slow process

C. you can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtual machines

D. all of the mentioned

Answer:
B. instantiating a virtual machine is a very slow process
575. AMI(Amazon Machine Image) imaging service is provided by Amazon for

A. private use

B. public use

C. pay-per-use

D. all of the mentioned

Answer:
D. all of the mentioned

576. Amazon Web Services (AWS) is an example of
A. software as a service (saas)

B. infrastructure as a service (iaas)

C. platform as a service (paas)

D. none of the mentioned

Answer:
B. infrastructure as a service (iaas)
577. Which of the following is Type 1 Hypervisor ?
A. wind river simics

B. virtual server 2005 r2

C. kvm

D. lynxsecure

Answer:
D. lynxsecure
578. In the virtual machine simulates hardware, so it can be independent of the underlying system hardware.
A. paravirtualization

B. full virtualization

C. emulation

D. none of the mentioned

Answer:
C. emulation
579. In a scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
A. paravirtualization

B. full virtualization

C. emulation

D. none of the mentioned

Answer:
B. full virtualization
580. Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request
iii) VM in operation iv) VM Provision
A. ii, i, iii, iv

B. i, ii, iii & iv

C. ii, iii, iv & i

D. ii, iv, iii & i

Answer:
D. ii, iv, iii & i

581. Which type of Hypervisor is shown in the following figure ?
A. type 1

B. type 2

C. type 3

D. all of the mentioned

Answer:
B. type 2
582. where a VM can be moved from one physical machine to another even as it continues to execute.
A. load balancing

B. migration

C. live migration

D. server consolidation

Answer:
C. live migration
583. Point out the wrong statement :
A. load balancing virtualizes systems and resources by mapping a logical address to a physical address

B. multiple instances of various google applications are running on different hosts

C. google uses hardware virtualization

D. all of the mentioned

Answer:
C. google uses hardware virtualization
584. Which of the following should be placed in second lowermost layer for the
following figure ?
A. host operating system

B. software

C. vm

D. none of the mentioned

Answer:
A. host operating system
585. Point out the wrong statement :
A. some hypervisors are installed over an operating system and are referred to as type 2 or hosted vm

B. all cpus support virtual machines

C. on a type 2 vm, a software interface is created that emulates the devices with which a system would normally interact

D. all of the mentioned

Answer:
B. all cpus support virtual machines

586. Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V ?
A. paravirtualization

B. full virtualization

C. emulation

D. none of the mentioned

Answer:
A. paravirtualization
587. Point out the wrong statement :
A. full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm

B. guest operating systems in full virtualization systems are generally faster than other virtualizationschemes

C. a process virtual machine instantiates when a command begins a process

D. all of the mentioned

Answer:
A. full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host vm
588. Which of the following operating system support operating system virtualization ?
A. windows nt

B. sun solaris

C. windows xp

D. compliance

Answer:
B. sun solaris
589. In multiple VM processing, CPU is alloted to the different processes in form of:
A. space slices by the os

B. different cpus are allocated to different processes

C. time slices by the os

D. frequecy slices by the os

Answer:
A. space slices by the os
590. Point out the wrong statement.
A. between fba and fws, you can create a nearly virtual storeon amazon.com

B. amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio

C. fps is exposed as an api that sorts transactions into packages called quick starts that makes it easy to implement

D. none of the mentioned

Answer:
B. amazon plans to extend the capabilities of vpc to integrate with other systems in the amazon cloud computing portfolio
591. Which of the following is a method for bidding on unused EC2 capacity based on the current spot price?
A. on-demand instance

B. reserved instances

C. spot instance

D. all of the mentioned

Answer:
C. spot instance

592. Which of the following instance has an hourly rate with no long-term commitment?
A. on-demand instance

B. reserved instances

C. spot instance

D. all of the mentioned

Answer:
A. on-demand instance
593. Which of the following tool is used for measuring I/O of your systems to estimate these transaction costs?
A. ebs

B. iostat

C. esw

D. all of the mentioned

Answer:
B. iostat
594. Point out the wrong statement.
A. the cost of creating an ebs volume is lesser than creating a similarly sized s3 bucket

B. an ebs volume can be used as an instance boot partition

C. ebs boot partitions can be stopped and started, and they offer fast ami boot times

D. none of the mentioned

Answer:
A. the cost of creating an ebs volume is lesser than creating a similarly sized s3 bucket
595. Amazon EMR uses Hadoop processing combined with several products.
A. aws

B. asq

C. amr

D. awes

Answer:
A. aws
596. What is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
A. azure

B. ec2

C. ec5

D. none of the mentioned

Answer:
B. ec2
597. is the central application in the AWS portfolio.
A. amazon simple queue service

B. amazon elastic compute cloud

C. amazon simple notification service

D. all of the above

Answer:
B. amazon elastic compute cloud

598. Point out the correct statement.
A. sql server is having enormous impact on cloud computing

B. amazon.com’s services represent the largest pure infrastructure as a service (iaas)

C. ec2 is a platform as a service (paas) market

D. none of the mentioned

Answer:
B. amazon.com’s services represent the largest pure infrastructure as a service (iaas)
599. Which of the following provides access for developers to charge Amazon’s customers for their purchases?
A. fws

B. fas

C. fps

D. all of the mentioned

Answer:
C. fps
600. Which of the following uses an authentication device?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
D. multi-factor authentication

601. Which of the following is a batch processing application?
A. ibm smash

B. ibm websphere application server

C. condor

D. windows media server

Answer:
C. condor
602. Amazon cloud-based storage system allows you to store data objects ranging in size from 1 byte up to 5GB.
A. s1

B. s2

C. s3

D. s4

Answer:
C. s3
603. CloudFront supports data by performing static data transfers and streaming content from one CloudFront location to another.
A. table caching

B. geocaching

C. index caching

D. windows media server

Answer:
B. geocaching
604. Point out the correct statement.
A. a volume is mounted on a particular instance and is available to all instances

B. the advantages of an ebs boot partitionare that you can have a volume up to 1tb

C. you cannot mount multiple volumes on a single instance

D. all of the mentioned

Answer:
B. the advantages of an ebs boot partitionare that you can have a volume up to 1tb
605. Data stored in domains doesn’t require maintenance of a schema.
A. simpledb

B. sql server

C. oracle

D. rds

Answer:
A. simpledb

606. Amazon Web Services falls into which of the following cloud-computing category?
A. platform as a service

B. software as a service

C. infrastructure as a service

D. back-end as a service

Answer:
C. infrastructure as a service
607. AWS reaches customers in _countries.
A. 137

B. 182

C. 190

D. 86

Answer:
C. 190
608. Which of the following correctly describes components roughly in their order of importance from top to down?
A. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elastic block store

B. 1. amazon elastic block store2. amazon elastic compute cloud3. amazon simple storage system

C. 1. amazon simple storage system2. amazon elastic block store3. amazon elastic compute cloud

D. none of the mentioned

Answer:
A. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elastic block store
609. is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
A. ec2

B. azure

C. ec5

D. none of the mentioned

Answer:
A. ec2
610. AMIs are operating systems running on the virtualization hypervisor.
A. yen

B. xen

C. ben

D. multi-factor authentication

Answer:
B. xen

611. Which of the following instance class is best used for applications that are processor or compute-intensive?
A. standard instances

B. high memory instances

C. high cpu instances

D. none of the mentioned

Answer:
C. high cpu instances
612. Amazon Relational Database Service is a variant of the 5.1 database system.
A. oracle

B. mysql

C. sql server

D. all of the mentioned

Answer:
B. mysql
613. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .
A. web sphere

B. tivoli

C. nebula

D. altix

Answer:
B. tivoli
614. Cloud system from SGI is functionally considered as an _.
A. on-demand cloud computing service

B. on-demand cloud storage service

C. on-demand cloud accessing service

D. on-demand

Answer:
A. on-demand cloud computing service
615. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
A. nebula cloud

B. cyclone cloud

C. force.com cloud

D. cern cloud

Answer:
A. nebula cloud
616. To establish scalability for the analysis of huge research data, CERN uses LSF
i.e. a grid and workload management solution of cloud computing platform
A. load setting facility

B. load sharing facility

C. load setting faculty

D. load assigning faculty

Answer:
B. load sharing facility

617. A mashup cloud can be designed by utilizing the Scalability of AWS and
of GAE platforms
A. accessibility

B. mobility

C. agility

D. scalability

Answer:
C. agility
618. The Cloudlets have a ownership unlike that of Clouds.
A. centralized

B. decentralized

C. global

D. none of the above

Answer:
B. decentralized
619. The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.
A. htc

B. hpc

C. hcc

D. hac

Answer:
A. htc
620. Performance metrics for HPC/HTC systems include :
A. multitasking scalability

B. security index

C. cost effectiveness

D. all of the above

Answer:
D. all of the above
621. [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equation calculates the value of which of the following?
A. scalability

B. throughput

C. availability

D. effectiveness

Answer:
B. throughput
622. refers to an increase in the performance by the addition of more resources along the service layers
A. horizontal scalability

B. vertical scalability

C. diagonal scalability

D. none of the above

Answer:
B. vertical scalability

623. is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
A. gps

B. cloud

C. iot

D. rfid

Answer:
D. rfid
624. RFID stand for .
A. rangeable frequency identification

B. radio fragment identification

C. radio frequency identification

D. rangeable fragment identification

Answer:
C. radio frequency identification
625. The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer
A. i, ii, iv

B. i, iii, iv

C. ii, iii, iv

D. ii, iii, iv

Answer:
A. i, ii, iv

626. tags needs an external source to wake up the battery.
A. acitve rfid

B. passive rfid

C. battery-assisted passive rfid

D. battery-assisted active rfid

Answer:
C. battery-assisted passive rfid
627. Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor
A. i, ii, iii

B. i, ii, iii, iv

C. ii, iii, iv

D. i, ii, iv

Answer:
A. i, ii, iii
628. Even with two-factor authentication, users may still be vulnerable to attacks.
A. scripting

B. cross attack

C. man-in-the-middle

D. radiant

Answer:
C. man-in-the-middle
629. Which of the following is not the component of IoT Endpoint
A. sensor

B. gateway

C. communication module

D. mcu

Answer:
B. gateway
630. Which of the following makes sure that data is not changed when it not supposed to be?
A. integrity

B. availability

C. confidentiality

D. accounting

Answer:
A. integrity

631. Which of the following terms indicates that information is to be read only by those people for whom it is intended?
A. availability

B. accounting

C. integrity

D. confidentiality

Answer:
D. confidentiality
632. DCS is a
A. distributed control system

B. data control system

C. data column system

D. distributed column system

Answer:
A. distributed control system
633. RFID stands for?
A. random frequency identification

B. radio frequency identification

C. random frequency information

D. radio frequency information

Answer:
B. radio frequency identification
634. M2M is a term introduced by
A. iot service providers

B. fog computing service providers

C. telecommunication service providers

D. none of these

Answer:
C. telecommunication service providers
635. Smart Dust can be used to measure the
A. temperature of the industrial lathe machine

B. heat inside a computer’s cpu

C. chemical in the soil

D. strength of a solid material

Answer:
C. chemical in the soil

636. Request field is present in which message format?
A. request message

B. response message

C. both request and response

D. neither request nor response

Answer:
A. request message
637. CoAP provides which of the following requirements?
A. multicast support and simplicity

B. low overhead and multicast support

C. simplicity and low overhead

D. multicast support, low over head, and simplicity

Answer:
D. multicast support, low over head, and simplicity
638. CoAP is a specialized protocol.
A. web transfer

B. power

C. application

D. resource

Answer:
A. web transfer
639. What is the full form of WLAN?
A. wide local area network

B. wireless local area network

C. wireless land access network

D. wireless local area node

Answer:
B. wireless local area network
640. Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?
A. ieee 802.16

B. ieee 802.3

C. ieee 802.11

D. ieee 802.15

Answer:
C. ieee 802.11
641. Which of the following is not a characteristic of a ZigBee network?
A. low power consumption

B. easy installation.

C. high data rates.

D. unlicensed radio bands.

Answer:
C. high data rates.

642. Which of the following IEEE standards provides the lowest level of the ZigBee software stack?
A. ieee 802.11.

B. ieee 802.15.1.

C. ieee 802.15.3.

D. ieee 802.15.4.

Answer:
D. ieee 802.15.4.
643. Which of the following layers are defined by the ZigBee stack?
A. transport layer

B. physical layer.

C. application support sub-layer.

D. medium access layer

Answer:
D. medium access layer
644. _ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
A. cross-site scoring scripting

B. cross-site request forgery

C. two-factor authentication

D. cross-site scripting

Answer:
D. cross-site scripting
645. Representational State Transfer (REST) is the standard interface between
A. two machines in a lan

B. http client and user

C. http client and servers

D. none of the above

Answer:
C. http client and servers
646. Which of the following is the full form of XMPP?
A. extension messaging and presence protocol

B. extensible messaging and presence protocol

C. extension messaging and privacy protocol

D. extensible messaging and privacy protocol

Answer:
B. extensible messaging and presence protocol
647. In case of , the GPS works as a receiver, not a transmitter.
A. active tracking

B. passive tracking

C. assisted tracking

D. receiver tracking

Answer:
B. passive tracking

648. is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system
A. cloud-physical system

B. cyber-space system

C. cyber-physical system

D. none of the above

Answer:
C. cyber-physical system
649. The number of binding of a node to other actors of the graph in the graph representation of a network is called as .
A. node degree

B. path length

C. social circle

D. bridge

Answer:
A. node degree
650. is the degree to which nodes have a common set of connections to other nodes
A. structural hole

B. structural equivalence

C. structural cohesion

D. none of the above

Answer:
C. structural cohesion

651. The degree to which actors are directly linked to one another through cohesive bonds is called as .
A. closeness

B. cohesion

C. centralized

D. path length

Answer:
B. cohesion
652. The social circles are loosely coupled if there is stringency of direct contact.
A. less

B. more

C. equal

D. no

Answer:
A. less
653. Nodes in the network analysis graph represent the and the edges represent the relationships between nodes.
A. actors

B. nodes

C. users

D. both a and b

Answer:
D. both a and b
654. JOES stands for
A. joint expensive operating system

B. just expensive operating system

C. just enough operating system

D. joined environmental operating system

Answer:
C. just enough operating system
655. In future, companies wont worry about the capital for large data center because of
A. saas solution

B. paas solution

C. iaas solution

D. none of the above

Answer:
B. paas solution

656. is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability
A. cometcloud

B. asteroidcloud

C. starcloud

D. planetcloud

Answer:
A. cometcloud
657. CometCloud supports policy based autonomic and
A. cloudbursting

B. cloudbridging

C. none

D. both a and b

Answer:
D. both a and b
658. In Comet, a tuple is a simple string
A. java

B. python

C. xml

D. html

Answer:
C. xml
659. The cloud media services are:
A. cloud gaming

B. experiencing multi- screens

C. image processing

D. all of the above

Answer:
D. all of the above
660. KPI stands for
A. key practices in industry

B. key performance index

C. key performance indicators

D. key parameters in information

Answer:
C. key performance indicators

661. SEEP is used in
A. energy optimization

B. multimedia

C. information leakage

D. cost reduction

Answer:
A. energy optimization
662. SEEP stands for
A. system end to end protocol

B. static environmental execution process

C. symbolic execution and energy profiles

D. state execution and energy profiles

Answer:
C. symbolic execution and energy profiles
663. Keywords in Docker are
A. develop, ship, run anywhere

B. create, export

C. transport, cloud

D. user, data, privacy

Answer:
A. develop, ship, run anywhere
664. Docker can simplify both, and
A. process, state

B. behavior, aspect

C. workflows, communication

D. all of the above

Answer:
C. workflows, communication
665. Docker is generally configured to use TCP port while executing unencrypted traffic
A. 3306

B. 53378

C. 2375

D. 2376

Answer:
C. 2375
666. Docker is generally configured to use TCP port while managing encrypted traffic.
A. 3306

B. 53378

C. 2375

D. 2376

Answer:
D. 2376

667. CNS stands for
A. consumption near sweet-spot

B. continuous network system

C. compact neural system

D. compound near sweet-sp0t

Answer:
A. consumption near sweet-spot
668. short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers
A. network-based positioning

B. real-time location system (rtls)

C. radio frequency identification (rfid)

D. wireless wide area network (wwan)

Answer:
C. radio frequency identification (rfid)
669. delivery of m-commerce transactions to individuals in a specific location, at a specific time
A. location-based m- commerce (l- commerce)

B. context-aware computing

C. ubiquitous computing (ubicom)

D. network-based positioning

Answer:
A. location-based m- commerce (l- commerce)
670. Calculating the location of a mobile device from signals sent by the device to base stations
A. personal area network (pan)

B. terminal-based positioning

C. pervasive computing

D. network-based positioning

Answer:
B. terminal-based positioning
671. a website with an audio interface that can be accessed through a telephone call
A. wimax

B. geolocation

C. mobile portal

D. voice portal

Answer:
D. voice portal
672. computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information
A. personal area network (pan)

B. interactive voice response (ivr)

C. real-time location system (rtls)

D. geographical information system (gis)

Answer:
D. geographical information system (gis)

673. application of mobile computing inside the enterprise (e.g., for improved communication among employees)
A. sensor network

B. mobile enterprise

C. voice portal

D. mobile portal

Answer:
B. mobile enterprise
674. computing refers to applications and services that run on a distributed network using virtualized resources.
A. distributed

B. cloud

C. soft

D. parallel

Answer:
B. cloud
675. as a utility is a dream that dates from the beginning of the computing industry itself.
A. model

B. computing

C. software

D. all of the mentioned

Answer:
B. computing

676. Which of the following is essential concept related to Cloud?
A. reliability

B. productivity

C. abstraction

D. all of the mentioned

Answer:
C. abstraction
677. Which of the following cloud concept is related to pooling and sharing of resources?
A. polymorphism

B. abstraction

C. virtualization

D. none of the mentioned

Answer:
C. virtualization
678. has many of the characteristics of what is now being called cloud computing.
A. internet

B. softwares

C. web service

D. all of the mentioned

Answer:
A. internet
679. Which of the following can be identified as cloud?
A. web applications

B. intranet

C. hadoop

D. all of the mentioned

Answer:
C. hadoop
680. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a resource.
A. real

B. virtual

C. cloud

D. none of the mentioned

Answer:
B. virtual

681. Which of the following is Cloud Platform by Amazon?
A. azure

B. aws

C. cloudera

D. all of the mentioned

Answer:
B. aws
682. is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.
A. remote sensing

B. remote invocation

C. cloud computing

D. private computing

Answer:
C. cloud computing
683. Which of the following is not a cloud stakeholder?
A. cloud providers

B. clients

C. end users

D. cloud users

Answer:
B. clients
684. These cloud services are of the form of utility computing i.e. the uses these services pay-as-you-go model.
A. cloud providers

B. clients

C. end users

D. cloud users

Answer:
D. cloud users
685. Which of the following is not a type of cloud?
A. private

B. public

C. protected

D. hybrid

Answer:
C. protected

686. In this type of cloud, an organization rents cloud services from cloud providers on- demand basis.
A. private

B. public

C. protected

D. hybrid

Answer:
B. public
687. In this type of cloud, the cloud is composed of multiple internal or external cloud.
A. private

B. public

C. protected

D. hybrid

Answer:
D. hybrid
688. enables the migration of the virtual image from one physical machine to another.
A. visualization

B. virtualization

C. migration

D. virtual transfer

Answer:
B. virtualization
689. Most of the cloud architectures are built on this type of architecture.
A. skeleton

B. grid

C. linear

D. template

Answer:
B. grid
690. Saas stands for?
A. software as a service

B. system software and services

C. software as a system

D. system as a service

Answer:
A. software as a service
691. In distributed system, each processor has its own
A. local memory

B. clock

C. both local memory and clock

D. none of the mentioned

Answer:
C. both local memory and clock

692. If one site fails in distributed system then
A. the remaining sites can continue operating

B. all the sites will stop working

C. directly connected sites will stop working

D. none of the mentioned

Answer:
A. the remaining sites can continue operating
693. Network operating system runs on
A. server

B. every system in the network

C. both server and every system in the network

D. none of the mentioned

Answer:
A. server
694. Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system?
A. cache coherence scheme

B. computation migration

C. remote procedure call

D. message passing

Answer:
B. computation migration
695. Logical extension of computation migration is
A. process migration

B. system migration

C. thread migration

D. data migration

Answer:
A. process migration
696. Processes on the remote systems are identified by
A. host id

B. host name and identifier

C. identifier

D. process id

Answer:
B. host name and identifier
697. In distributed systems, link and site failure is detected by
A. polling

B. handshaking

C. token passing

D. none of the mentioned

Answer:
B. handshaking

698. The capability of a system to adapt the increased service load is called
A. scalability

B. tolerance

C. capacity

D. none of the mentioned

Answer:
A. scalability
699. Internet provides for remote login.
A. telnet

B. http

C. ftp

D. rpc

Answer:
A. telnet
700. Which of the following was one of the top 5 cloud applications in 2010?
A. cloud backup

B. web applications

C. business applications

D. all of the mentioned

Answer:
D. all of the mentioned

701. Point out the correct statement.
A. google’s cloud includes perhaps some 10 data centers worldwide

B. flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic

C. data centers have been sited to optimize the overall system latency

D. all of the mentioned

Answer:
C. data centers have been sited to optimize the overall system latency
702. Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage?
A. on-demand self-service

B. broad network access

C. resource pooling

D. all of the mentioned

Answer:
A. on-demand self-service
703. The is something that you can obtain under contract from your vendor.
A. pos

B. qos

C. sos

D. all of the mentioned

Answer:
B. qos
704. Point out the wrong statement.
A. internet consumes roughly 1 percent of the world’s total power

B. the cost advantages of cloud computing have enabled new software vendors to create productivity applications

C. a client can provision computer resources without the need for interaction with cloud service provider personnel

D. none of the mentioned

Answer:
A. internet consumes roughly 1 percent of the world’s total power
705. All cloud computing applications suffer from the inherent that is intrinsic in their WAN connectivity.
A. propagation

B. latency

C. noise

D. all of the mentioned

Answer:
B. latency

706. Cloud computing is a system and it is necessarily unidirectional in nature.
A. stateless

B. stateful

C. reliable

D. all of the mentioned

Answer:
A. stateless
707. Which of the following is the most important area of concern in cloud computing?
A. security

B. storage

C. scalability

D. all of the mentioned

Answer:
A. security
708. You can’t count on a cloud provider maintaining your in the face of government actions.
A. scalability

B. reliability

C. privacy

D. none of the mentioned

Answer:
C. privacy
709. Which of the following architectural standards is working with cloud computing industry?
A. service-oriented architecture

B. standardized web services

C. web-application frameworks

D. all of the mentioned

Answer:
A. service-oriented architecture
710. Which of the following is the central application in the AWS portfolio?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
A. amazon elastic compute cloud

711. Which of the following is a message queue or transaction system for distributed Internet- based applications?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
B. amazon simple queue service
712. Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2?
A. cloudwatch

B. amazon elastic block store

C. aws import/export

D. all of the mentioned

Answer:
B. amazon elastic block store
713. Which of the following feature is used for scaling of EC2 sites?
A. auto replica

B. auto scaling

C. auto ruling

D. all of the mentioned

Answer:
B. auto scaling
714. Which of the following is a Web service that can publish messages from an application and deliver them to other applications or to subscribers?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
C. amazon simple notification service
715. Which of the following metrics are used to support Elastic Load Balancing?
A. cloudwatch

B. amazon elastic block store

C. aws import/export

D. all of the mentioned

Answer:
A. cloudwatch
716. Which of the following is an online backup and storage system?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon simple notification service

D. amazon simple storage system

Answer:
D. amazon simple storage system

717. Which of the following cloud storage is mainly meant for developers and to support applications built using Web services?
A. managed

B. unmanaged

C. disk

D. all of the mentioned

Answer:
A. managed
718. Point out the correct statement.
A. cloud storage may be broadly categorized into four major classes of storage

B. in unmanaged storage, the storage service provider makes storage capacity available to users

C. in managed storage, the storage service provider makes storage capacity available to users

D. all of the mentioned

Answer:
B. in unmanaged storage, the storage service provider makes storage capacity available to users
719. Which of the following is the form of unmanaged cloud storage?
A. xdrive

B. omnidrive

C. idrive

D. all of the mentioned

Answer:
D. all of the mentioned
720. Which of the following is an example of an unmanaged storage utility set up to do automated backups?
A. xdrive

B. omnidrive

C. freedrive

D. all of the mentioned

Answer:
D. all of the mentioned
721. Point out the wrong statement.
A. unmanaged storage is reliable

B. managed storage is relatively cheap to use

C. most of the user-based applications that work with cloud storage are of unmanaged type

D. none of the mentioned

Answer:
B. managed storage is relatively cheap to use
722. Which of the following factors led to the demise of many of the early SSPs and to many hosted file services?
A. the dot.com bust in 2000

B. the inability of file-hosting companies to successfully monetize online storage

C. the continued commoditization of large disk drives

D. all of the mentioned

Answer:
D. all of the mentioned

723. Which of the following is the simplest unmanaged cloud storage device?
A. file transfer utility

B. antivirus utility

C. online image utility

D. none of the mentioned

Answer:
A. file transfer utility
724. The service FreeDrive is storage that allows users to view the content of others.
A. facebook

B. twitter

C. whatsapp

D. none of the mentioned

Answer:
A. facebook
725. Which of the following file transfer utility creates a shared folder metaphor using a Web service?
A. dropbox

B. skype

C. drive

D. all of the mentioned

Answer:
A. dropbox

726. Which of the following offers Storage size of 10GB free t0 100 GB paid?
A. adrive

B. 4shared

C. badongo

D. all of the mentioned

Answer:
B. 4shared
727. Point out the correct statement.
A. service oriented architecture (soa) describes a standard method for requesting services from distributed components and managing the results

B. soa provides the translation and management layer in an architecture that removes the barrier for a client obtaining desired services

C. with soa, clients and components can be written in different languages and can use multiple messaging protocols

D. all of the mentioned

Answer:
D. all of the mentioned
728. Which of the following is a repeatable task within a business process?
A. service

B. bus

C. methods

D. all of the mentioned

Answer:
A. service
729. Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand?
A. soa

B. ebs

C. gec

D. all of the mentioned

Answer:
A. soa
730. Which of the following is used to define the service component that performs the service?
A. wsdl

B. scdl

C. xml

D. none of the mentioned

Answer:
B. scdl

731. Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint?
A. wsdl

B. scdl

C. xml

D. none of the mentioned

Answer:
A. wsdl
732. Which of the following provides commands for defining logic using conditional statements?
A. xml

B. ws-bpel

C. json

D. none of the mentioned

Answer:
B. ws-bpel
733. Which of the following is used as middleware layer in the following figure?
A. xml

B. esb

C. uddi

D. none of the mentioned

Answer:
B. esb
734. To publish a REST service with Spring.
A. publishing an application’s data as a rest service

B. accessing data from third-party rest services

C. none of the mentioned

D. all of the mentioned

Answer:
D. all of the mentioned
735. Publishing an application’s data as a REST service requires.
A. @requestmapping

B. @pathvariable

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned

736. Annotation added as an input parameter to the handler method.
A. @pathvariable

B. @path

C. @pathlocale

D. none of the mentioned

Answer:
A. @pathvariable
737. Notation for defining REST endpoints.
A. { }

B. *

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
738. General-purpose class that allows a response to be rendered using a marshaller.
A. marshallingview

B. marshalling

C. view

D. all of the mentioned

Answer:
A. marshallingview
739. The marshaller used by MarshallingView belongs to one of a series of XML marshallers.
A. jaxb2marshaller

B. xmlbeansmarshaller

C. castormarshalle

D. all of the mentioned

Answer:
D. all of the mentioned
740. To configure Jaxb2Marshaller marshaller we require.
A. classestobebound

B. contextpath

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
741. Annotation which allows the Jaxb2Marshaller marshaller to detect a class’s
(i.e., object’s) fields.
A. @xmlrootelement

B. @xmlroot

C. @notnull

D. none of the mentioned

Answer:
A. @xmlrootelement

742. Accessing a third-party REST service inside a Spring application.
A. resttemplate class

B. viewresolver

C. internalviewresolver

D. view

Answer:
A. resttemplate class
743. REST service end point comprises an address.
A. starts with http:// and ends with ?

B. starts with http:// and ends with &

C. no certain url is specified

D. depends upon the platform used

Answer:
A. starts with http:// and ends with ?
744. XML tag which represents information related to a REST service request.
A. result

B. title

C. none of the mentioned

D. all of the mentioned

Answer:
D. all of the mentioned
745. RestTemplate class method which performs an HTTP HEAD operation.
A. headforheaders(string, object…)

B. getforobject(string, class, object…)

C. postforlocation(string, object, object…)

D. postforobject(string, object, class, object…)

Answer:
A. headforheaders(string, object…)
746. A web service contract is described using :-
A. web services description language

B. web services description

C. all of the mentioned

D. none of the mentioned

Answer:
A. web services description language
747. In contrast, the contract-first approach encourages you to think of the service contract first in terms of :-
A. xml

B. xml schema(.xsd)

C. wsdl

D. all of the mentioned

Answer:
D. all of the mentioned

748. Service exporters that can export a bean as a remote service based on the :-
A. rmi

B. hessian

C. burlap

D. all of the mentioned

Answer:
D. all of the mentioned
749. The standard for deploying web services on the Java EE platform as of Java EE 1.4:-
A. jax-rpc

B. jax

C. rpc

D. none of the mentioned

Answer:
A. jax-rpc
750. If you are deploying into a Java EE 5 (or better) container, you may simply create a bean that is annotated with:-
A. javax.jws.webservice

B. javax.jws.webserviceprovider

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned

751. Spring provides a factory that can export beans annotated with:-
A. javax.jws.webservice

B. javax.jws.webserviceprovider

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
752. Exposing a stand-alone SOAP endpoint using the:-
A. simplejaxwsserviceexporter

B. jax-ws

C. all of the mentioned

D. none of the mentioned

Answer:
C. all of the mentioned
753. Factory to use our Spring bean as the implementation:-
A. jaxws:end

B. jaxws:endpoint

C. all of the mentioned

D. none of the mentioned

Answer:
B. jaxws:endpoint
754. Publishing messages is handled through
Class.
A. client()

B. server()

C. publish()

D. batch()

Answer:
A. client()
755. client() class provides to create topics.
A. software

B. classes

C. methods

D. batch

Answer:
C. methods

756. method publishes messages to pub/sub.
A. client()

B. publish()

C. server()

D. batch()

Answer:
B. publish()
757. How many arguments are accepted by publish()?
A. 5 arguments

B. 3 arguments

C. 1 argument

D. 2 arguments

Answer:
D. 2 arguments
758. The topic in the publish method is in which form?
A. binomial form

B. canonical form

C. nominal form

D. message form

Answer:
B. canonical form
759. The message in pub/sub is an opaque blob of
A. bits

B. bytes

C. word

D. nibble

Answer:
B. bytes
760. error will show if we try to send text string instead of bytes.
A. typeerror

B. error

C. linker error

D. compiler error

Answer:
A. typeerror

761. What do we call string in python 2?
A. str

B. unicode

C. strs

D. unicades

Answer:
B. unicode
762. When you publish a message is automatically created?
A. client

B. server

C. batch

D. server

Answer:
C. batch
763. What is the time elapsed after a batch is created?
A. 0.5 seconds

B. 0.05 seconds

C. 1.5 seconds

D. 1 second

Answer:
B. 0.05 seconds
764. Every call to publish() will return a class that conforms to the interface.
A. batch

B. client

C. server

D. future

Answer:
D. future
765. Point out the wrong statement.
A. abstraction enables the key benefit of cloud computing: shared, ubiquitous access

B. virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made

C. all cloud computing applications combine their resources into pools that can be assigned on demand to users

D. all of the mentioned

Answer:
C. all cloud computing applications combine their resources into pools that can be assigned on demand to users
766. Which of the following type of virtualization is also characteristic of cloud computing?
A. storage

B. application

C. cpu

D. all of the mentioned

Answer:
D. all of the mentioned

767. The technology used to distribute service requests to resources is referred to as
A. load performing

B. load scheduling

C. load balancing

D. all of the mentioned

Answer:
C. load balancing
768. Point out the correct statement.
A. a client can request access to a cloud service from any location

B. a cloud has multiple application instances and directs requests to an instance based on conditions

C. computers can be partitioned into a set of virtual machines with each machine being assigned a workload

D. all of the mentioned

Answer:
D. all of the mentioned
769. Which of the following software can be used to implement load balancing?
A. apache mod_balancer

B. apache mod_proxy_balancer

C. f6’s bigip

D. all of the mentioned

Answer:
B. apache mod_proxy_balancer
770. Which of the following network resources can be load balanced?
A. connections through intelligent switches

B. dns

C. storage resources

D. all of the mentioned

Answer:
D. all of the mentioned
771. Which of the following is a more sophisticated load balancer?
A. workload managers

B. workspace managers

C. rackserve managers

D. all of the mentioned

Answer:
A. workload managers
772. A is a combination load balancer and application server that is a server placed between a firewall or router.
A. abc

B. acd

C. adc

D. all of the mentioned

Answer:
C. adc

773. Which of the following should be replaced with the question mark in the following figure?
A. abstraction

B. virtualization

C. mobility pattern

D. all of the mentioned

Answer:
B. virtualization
774. In memory-mapped I/O
A. the i/o devices and the memory share the same address space

B. the i/o devices have a separate address space

C. the memory and i/o devices have an associated address space

D. a part of the memory is specifically set aside for the i/o operation

Answer:
A. the i/o devices and the memory share the same address space
775. The usual BUS structure used to connect the I/O devices is
A. star bus structure

B. multiple bus structure

C. single bus structure

D. node to node bus structure

Answer:
C. single bus structure

776. The advantage of I/O mapped devices to memory mapped is
A. the former offers faster transfer of data

B. the devices connected using i/o mapping have a bigger buffer space

C. the devices have to deal with fewer address lines

D. no advantage as such

Answer:
C. the devices have to deal with fewer address lines
777. The system is notified of a read or write operation by
A. appending an extra bit of the address

B. enabling the read or write bits of the devices

C. raising an appropriate interrupt signal

D. sending a special signal along the bus

Answer:
D. sending a special signal along the bus
778. To overcome the lag in the operating speeds of the I/O device and the processor we use
A. buffer spaces

B. status flags

C. interrupt signals

D. exceptions

Answer:
B. status flags
779. The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is?
A. exceptions

B. signal handling

C. interrupts

D. dma

Answer:
C. interrupts
780. The method which offers higher speeds of I/O transfers is
A. interrupts

B. memory mapping

C. program-controlled i/o

D. dma

Answer:
D. dma

781. The process wherein the processor constantly checks the status flags is called as
A. polling

B. inspection

C. reviewing

D. echoing

Answer:
A. polling
782. The purpose of backup is:
A. to restore a computer to an operational state following a disaster

B. to restore small numbers of files after they have been accidentally deleted

C. to restore one among many version of the same file for multiple backup environment

D. all of the mentioned

Answer:
D. all of the mentioned
783. Backup of the source data can be created
A. on the same device

B. on another device

C. at some other location

D. all of the mentioned

Answer:
D. all of the mentioned
784. Which of the following backup technique is most space efficient?
A. full backup

B. incremental backup

C. differential backup

D. all of the mentioned

Answer:
B. incremental backup
785. Which of the following statements are true?
A. data can be recovered fastest in online backup

B. tape library is an example of nearline storage

C. data recovery can take hours for offline backup

D. all of the mentioned

Answer:
D. all of the mentioned

786. Which of the following qualifies as best DR (Disaster Recovery) site?
A. dr site in the same campus

B. dr site in the same city

C. dr site in the same country

D. dr site in a different country

Answer:
D. dr site in a different country
787. Which of the following techniques can be used for optimizing backed up data space?
A. encryption and deduplication

B. compression and deduplication

C. authentication and deduplication

D. deduplication only

Answer:
B. compression and deduplication
788. To decide on a backup strategy for your organization, which of the following should you consider?
A. rpo (recovery point objective)

B. rto (recovery time objective)

C. both rpo & rto

D. none of the mentioned

Answer:
C. both rpo & rto
789. Which of the following can be used for reducing recovery time?
A. automatic failover

B. by taking backup on a faster device

C. taking multiple backups – one in same location, another at different location

D. all of the mentioned

Answer:
D. all of the mentioned
790. Which of the following is false?
A. the more important the data, the greater the need for backing it up

B. a backup is as useful as its associated restore strategy

C. storing the backup copy near to its original site is best strategy

D. automated backup and scheduling is preferred over manual operations

Answer:
C. storing the backup copy near to its original site is best strategy
791. Which of the following is Backup software?
A. amanda

B. bacula

C. ibm tivoli storage manager

D. all of the mentioned

Answer:
D. all of the mentioned

792. Which of the following is incorrect?
A. a layered-style program is divided into an array of modules or layers

B. each layer provides services to the layer “below” and makes use of services provided by the layer “above”

C. all of the mentioned

D. none of the mentioned

Answer:
B. each layer provides services to the layer “below” and makes use of services provided by the layer “above”
793. What is Relaxed Layered Style?
A. each layer can be constrained to use only the layer directly below it

B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it

C. all of the mentioned

D. none of the mentioned

Answer:
B. sometimes this constraint is relaxed slightly to allow each layer to use all the layers below it
794. Which of the following is correct?
A. module a uses module b if a correct version of b must be present for a to execute correctly

B. module a calls (or invokes ) module b if b triggers execution of a

C. all of the mentioned

D. none of the mentioned

Answer:
A. module a uses module b if a correct version of b must be present for a to execute correctly
795. Which of the following is true with respect to layered architecture?
A. each layer is allowed to depend on the layer above it being present and correct

B. a layer may call other layers above and below it, as long as it uses them

C. all of the mentioned

D. none of the mentioned

Answer:
D. none of the mentioned
796. What is Onion diagram illustrates?
A. it illustrates the connection between the layers in communications protocols, such as the international standards organization open systems interconnection (iso osi) model,or the layers in user interface and windowing systems, such as the x window system

B. it often illustrates operating system layers, with the kernel at the core

C. all of the mentioned

D. none of the mentioned

Answer:
D. none of the mentioned
797. In particular, layers have which of the following characteristics?
A. layers are by definition highly cohesive, thus satisfying the principle of cohesion

B. layers doesn’t support information hiding

C. layers are constrained to use only above layers

D. all of the mentioned

Answer:
A. layers are by definition highly cohesive, thus satisfying the principle of cohesion

798. What are the drawbacks for Layers?
A. it is often necessary to pass data through many layers, which can slow performance significantly

B. layers support information hiding

C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

D. none of the mentioned

Answer:
C. multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
799. Which of the following is correct?
A. layers are not strongly coupled to the layers above them

B. each layer is strongly coupled only to the layer immediately below it

C. overall layered-style architectures are loosely coupled

D. all of the mentioned

Answer:
D. all of the mentioned
800. Which of the following is one of the unique attributes of Cloud Computing?
A. utility type of delivery

B. elasticity

C. low barrier to entry

D. all of the mentioned

Answer:
D. all of the mentioned

801. Point out the correct statement.
A. service level agreements (slas) is small aspect of cloud computing

B. cloud computing does not have impact on software licensing

C. cloud computing presents new opportunities to users and developers

D. all of the mentioned

Answer:
C. cloud computing presents new opportunities to users and developers
802. Applications that work with cloud computing that have low margins and usually low risk are
A. high touch

B. low touch

C. moderate touch

D. all of the mentioned

Answer:
B. low touch
803. A service that concentrates on hardware follows the as a Service model.
A. iaas

B. caas

C. paas

D. all of the mentioned

Answer:
A. iaas
804. Point out the wrong statement.
A. a cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software

B. high touch applications are best done on- premises

C. the google app engine follows iaas

D. none of the mentioned

Answer:
C. the google app engine follows iaas
805. When you add a software stack, such as an operating system and applications to the service, the model shifts to model.
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas

806. Which of the following is the most refined and restrictive service model?
A. iaas

B. caas

C. paas

D. all of the mentioned

Answer:
C. paas
807. is a pay-as-you-go model matches resources to need on an ongoing basis.
A. utility

B. elasticity

C. low barrier to entry

D. all of the mentioned

Answer:
A. utility
808. feature allows you to optimize your system and capture all possible transactions.
A. scalability

B. reliability

C. elasticity

D. none of the mentioned

Answer:
C. elasticity
809. enables batch processing, which greatly speeds up high-processing applications.
A. scalability

B. reliability

C. elasticity

D. utility

Answer:
A. scalability
810. A service provider gets the same benefits from a composable system that a user does.
A. caas

B. aaas

C. paas

D. all of the mentioned

Answer:
C. paas

811. Point out the correct statement.
A. cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service

B. cloud computing relies on a set of protocols needed to manage interprocess communications

C. platforms are used to create more complex software

D. all of the mentioned

Answer:
D. all of the mentioned
812. Which of the following is the property of the composable component?
A. stateful

B. stateless

C. symmetric

D. all of the mentioned

Answer:
B. stateless
813. From the standpoint of a it makes no sense to offer non-standard machine instances to customers.
A. caas

B. aaas

C. paas

D. iaas

Answer:
D. iaas
814. Point out the wrong statement.
A. a cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter

B. a composable component must be modular

C. a composable component must be stateless

D. none of the mentioned

Answer:
A. a cloud cannot be created within an organization’s own infrastructure or outsourced to another datacenter
815. A service provider reselling a may have the option to offer one module to customize the information.
A. caas

B. aaas

C. paas

D. saas

Answer:
D. saas
816. Which of the following is the highest degree of integration in cloud computing?
A. caas

B. aaas

C. paas

D. saas

Answer:
D. saas

817. Which of the architectural layer is used as a front end in cloud computing?
A. client

B. cloud

C. soft

D. all of the mentioned

Answer:
A. client
818. Which of the following benefit is provided by the PaaS service provider?
A. a larger pool of qualified developers

B. more reliable operation

C. a logical design methodology

D. all of the mentioned

Answer:
D. all of the mentioned
819. Communication between services is done widely using protocol.
A. rest

B. soap

C. restful

D. none of the mentioned

Answer:
B. soap
820. Which of the following component is called hypervisor?
A. vgm

B. vmc

C. vmm

D. all of the mentioned

Answer:
C. vmm
821. Which of the following provider rely on the virtual machine technology to deliver servers?
A. caas

B. aaas

C. paas

D. iaas

Answer:
D. iaas
822. Point out the wrong statement.
A. platforms represent nearly the full cloud software stack

B. a platform in the cloud is a software layer that is used to create higher levels of service

C. platforms often come replete with tools and utilities to aid in application design and deployment

D. none of the mentioned

Answer:
D. none of the mentioned

823. allows different operating systems to run in their own memory space.
A. vgm

B. vmc

C. vmm

D. all of the mentioned

Answer:
C. vmm
824. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of nodes.
A. ben

B. xen

C. ken

D. zen

Answer:
B. xen
825. Which of the following offers virtual appliances, including ones based on Windows, all of which run on VMware Player?
A. bagvapp

B. jcinacio

C. helpdesklive

D. all of the mentioned

Answer:
A. bagvapp

826. offers various Linux distributions upon which you can build a virtual machine.
A. bagvapp

B. jcinacio

C. helpdesklive

D. all of the mentioned

Answer:
B. jcinacio
827. is a CPU emulator and virtual machine monitor.
A. imaging

B. parallels

C. qemu

D. none of the mentioned

Answer:
C. qemu
828. Which of the following is storage data interchange interface for stored data objects?
A. occ

B. occi

C. ocmi

D. all of the mentioned

Answer:
B. occi
829. Point out the correct statement.
A. to determine whether your application will port successfully, you should perform a functionality mapping exercise

B. cloud computing supports some application features better than others

C. cloud bursting is an overflow solution that clones the application to the cloud and directs traffic to the cloud during times of high traffic

D. all of the mentioned

Answer:
D. all of the mentioned
830. Cloud storage data usage in the year 2020 is estimated to be percent resident by IDC.
A. 10

B. 15

C. 20

D. none of the mentioned

Answer:
D. none of the mentioned

831. Point out the wrong statement.
A. some apis are both exposed as soap and rest

B. the role of a cloud vendor specific api has impact on porting an application

C. there are mainly three types of cloud storage

D. none of the mentioned

Answer:
C. there are mainly three types of cloud storage
832. Which of the following system does not provision storage to most users?
A. paas

B. iaas

C. caas

D. saas

Answer:
B. iaas
833. The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a as a Service model.
A. software

B. platform

C. analytics

D. none of the mentioned

Answer:
A. software
834. How many categories of storage devices broadly exist in cloud?
A. 1

B. 2

C. 3

D. none of the mentioned

Answer:
B. 2
835. Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes?
A. block

B. file

C. disk

D. all of the mentioned

Answer:
A. block

836. Which of the following impose additional overhead on clients and offer faster transfer?
A. block storage

B. file storage

C. file server

D. all of the mentioned

Answer:
A. block storage
837. Which of the following should be used considering factors shown in the figure?
A. simpledb

B. rds

C. amazon ec2

D. all of the mentioned

Answer:
B. rds
838. Point out the wrong statement.
A. amazon machine instances are sized at various levels and rented on a computing/hour basis

B. the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

C. a number of tools are used to support ec2 services

D. none of the mentioned

Answer:
D. none of the mentioned
839. Which of the following is an edge-storage or content-delivery system that caches data in different physical locations?
A. amazon relational database service

B. amazon simpledb

C. amazon cloudfront

D. amazon associates web services

Answer:
C. amazon cloudfront
840. Which of the following allows you to create instances of the MySQL database to support your Web sites?
A. amazon elastic compute cloud

B. amazon simple queue service

C. amazon relational database service

D. amazon simple storage system

Answer:
C. amazon relational database service
841. Point out the correct statement.
A. amazon elastic cloud is a system for creating virtual disks(volume)

B. simpledb interoperates with both amazon ec2 and amazon s3

C. ec3 is an analytics as a service provider

D. none of the mentioned

Answer:
B. simpledb interoperates with both amazon ec2 and amazon s3

842. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
A. amazon elastic compute cloud

B. amazon associates web services

C. alexa web information service

D. all of the mentioned

Answer:
B. amazon associates web services
843. Which of the following is a billing and account management service?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
C. amazon devpay
844. Which of the following is a means for accessing human researchers or consultants to help solve problems on a contractual or temporary basis?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
B. amazon mechanical turk
845. Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud?
A. amazon elastic mapreduce

B. amazon mechanical turk

C. amazon devpay

D. multi-factor authentication

Answer:
A. amazon elastic mapreduce
846. The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as
A. base

B. acid

C. atom

D. all of the mentioned

Answer:
B. acid
847. Which of the following is property of ACID principle?
A. atomicity

B. consistency

C. isolation

D. all of the mentioned

Answer:
D. all of the mentioned

848. Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained?
A. atomicity

B. consistency

C. isolation

D. durability

Answer:
B. consistency
849. Which of the following component is required for both online and local data access in hybrid application?
A. local

B. cloud

C. both local and cloud

D. none of the mentioned

Answer:
C. both local and cloud
850. Which of the following factors might offset the cost of offline access in hybrid applications?
A. scalability

B. costs

C. ubiquitous access

D. all of the mentioned

Answer:
D. all of the mentioned

851. An application that needed storage alone might not benefit from a cloud deployment at all.
A. online

B. offline

C. virtual

D. all of the mentioned

Answer:
B. offline
852. The property states that the system must have a mechanism to recover from committed transactions should that be necessary.
A. atomicity

B. consistency

C. isolation

D. durability

Answer:
D. durability
853. Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?
A. atomicity

B. consistency

C. isolation

D. durability

Answer:
A. atomicity
854. Which of the following is a core management feature offered by most cloud management service products?
A. support of different cloud types

B. creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications

C. performance reporting including availability and uptime, response time, resource quota usage, and other characteristics

D. all of the mentioned

Answer:
D. all of the mentioned
855. Point out the correct statement.
A. eucalyptus and rackspace both use amazon ec2 and s3 services

B. the rightscale user interface provides real-time measurements of individual server instances

C. rightscale server templates and the rightscript technology are highly configurable and can be run under batch control

D. all of the mentioned

Answer:
D. all of the mentioned

856. Which of the following is an industry organization that develops industry system management standards for platform interoperability?
A. dmtf

B. dms

C. ebs

D. all of the mentioned

Answer:
A. dmtf
857. Which of the following is used to extend CIM to virtual computer system management?
A. ovf

B. vman

C. ocsi

D. none of the mentioned

Answer:
B. vman
858. Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
A. cce

B. occi

C. smi

D. all of the mentioned

Answer:
C. smi
859. Which of the following is open and both hypervisor and processor-architecture- agnostic?
A. dell scalent

B. cloudkick

C. elastra

D. all of the mentioned

Answer:
A. dell scalent
860. Which of the following is a workflow control and policy based automation service by CA?
A. ca cloud optimize

B. ca cloud orchestrate

C. ca cloud insight

D. ca cloud compose

Answer:
B. ca cloud orchestrate

861. Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
A. cloudwatch

B. cloudsensor

C. cloudmetrics

D. all of the mentioned

Answer:
B. cloudsensor
862. Which of the following service provider provides the least amount of built in security?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
C. iaas
863. Point out the correct statement.
A. different types of cloud computing service models provide different levels of security services

B. adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider

C. data should be transferred and stored in an encrypted format for security purpose

D. all of the mentioned

Answer:
D. all of the mentioned
864. Which of the following services that need to be negotiated in Service Level Agreements?
A. logging

B. auditing

C. regulatory compliance

D. all of the mentioned

Answer:
D. all of the mentioned
865. The following flowchart is intended to evaluate in any cloud.
A. risk

B. errors

C. inconsistencies

D. none of the mentioned

Answer:
A. risk
866. Which of the following area of cloud computing is uniquely troublesome?
A. auditing

B. data integrity

C. e-discovery for legal compliance

D. all of the mentioned

Answer:
D. all of the mentioned

867. Which of the following is the operational domain of CSA?
A. scalability

B. portability and interoperability

C. flexibility

D. none of the mentioned

Answer:
B. portability and interoperability
868. Which of the following is considered an essential element in cloud computing by CSA?
A. multi-tenancy

B. identity and access management

C. virtualization

D. all of the mentioned

Answer:
A. multi-tenancy
869. Which of the following is used for Web performance management and load testing?
A. vmware hyperic

B. webmetrics

C. univa ud

D. tapinsystems

Answer:
B. webmetrics
870. Which of the following is application and infrastructure management software for hybrid multi-clouds?
A. vmware hyperic

B. webmetrics

C. univa ud

D. tapinsystems

Answer:
C. univa ud
871. Which of the following is a compliance standard?
A. pci-dss

B. hippa

C. glba

D. all of the mentioned

Answer:
D. all of the mentioned
872. Which of the following is a key mechanism for protecting data?
A. access control

B. auditing

C. authentication

D. all of the mentioned

Answer:
D. all of the mentioned

873. How many security accounts per client is provided by Microsoft?
A. 1

B. 3

C. 5

D. 7

Answer:
C. 5
874. Point out the wrong statement.
A. securing data sent to, received from, and stored in the cloud is the single largest security concern

B. the problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider’s system

C. one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

D. all of the mentioned

Answer:
C. one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
875. Which of the following are a common means for losing encrypted data?
A. lose the keys

B. lose the encryption standard

C. lose the account

D. all of the mentioned

Answer:
A. lose the keys

876. Which of the following is the standard for interoperable cloud-based key management?
A. kmip

B. pmik

C. aimk

D. none of the mentioned

Answer:
A. kmip
877. Which of the following was one of the weaker aspects of early cloud computing service offerings?
A. logging

B. integrity checking

C. consistency checking

D. none of the mentioned

Answer:
A. logging
878. Which of the following is one of the most actively developing and important areas of cloud computing technology?
A. logging

B. auditing

C. regulatory compliance

D. none of the mentioned

Answer:
C. regulatory compliance
879. Amazon Web Services supports
Type II Audits.
A. sas70

B. sas20

C. sas702

D. none of the mentioned

Answer:
A. sas70
880. Which of the following is the most complete cloud computing service model?
A. paas

B. iaas

C. caas

D. saas

Answer:
D. saas

881. Point out the correct statement.
A. platforms can be based on specific types of development languages, application frameworks, or other constructs

B. saas is the cloud-based equivalent of shrink-wrapped software

C. software as a service (saas) may be succinctly described as software that is deployed on a hosted service

D. all of the mentioned

Answer:
D. all of the mentioned
882. Which of the following aspect of the service is abstracted away?
A. data escrow

B. user interaction

C. adoption drivers

D. none of the mentioned

Answer:
B. user interaction
883. Which of the following SaaS platform is with an exposed API?
A. salesforce.com

B. amazon.com

C. flipkart.com

D. all of the mentioned

Answer:
A. salesforce.com
884. Point out the wrong statement.
A. saas applications come in all shapes and sizes

B. every computer user is familiar with saas systems

C. saas software is not customizable

D. none of the mentioned

Answer:
D. none of the mentioned
885. Which of the following is a SaaS characteristic?
A. the typical license is subscription-based or usage-based and is billed on a recurring basis

B. the software is available over the internet globally through a browser on demand

C. the software and the service are monitored and maintained by the vendor

D. all of the mentioned

Answer:
D. all of the mentioned

886. applications have a much lower barrier to entry than their locally installed competitors.
A. iaas

B. caas

C. paas

D. none of the mentioned

Answer:
D. none of the mentioned
887. SaaS supports multiple users and provides a shared data model through model.
A. single-tenancy

B. multi-tenancy

C. multiple-instance

D. all of the mentioned

Answer:
B. multi-tenancy
888. Open source software used in a SaaS is called SaaS.
A. closed

B. free

C. open

D. all of the mentioned

Answer:
C. open
889. The componentized nature of SaaS solutions enables many solutions to support a feature called
A. workspace

B. workloads

C. mashups

D. all of the mentioned

Answer:
C. mashups
890. Which of the following service provider provides the highest level of service?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas
891. Point out the correct statement.
A. paas supplies the infrastructure

B. iaas adds application development frameworks, transactions, and control structures

C. saas is an operating environment with applications, management, and the user interface

D. all of the mentioned

Answer:
C. saas is an operating environment with applications, management, and the user interface

892. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
A. cas

B. csa

C. sac

D. all of the mentioned

Answer:
B. csa
893. For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
B. paas
894. Point out the wrong statement.
A. each different type of cloud service delivery model creates a security boundary

B. any security mechanism below the security boundary must be built into the system

C. any security mechanism above the security boundary must be maintained by the customer

D. all of the mentioned

Answer:
D. all of the mentioned
895. Which of the following model allows vendor to provide security as part of the Service Level Agreement?
A. saas

B. paas

C. iaas

D. all of the mentioned

Answer:
A. saas
896. Which of the following cloud does not require mapping?
A. public

B. private

C. hybrid

D. none of the mentioned

Answer:
A. public
897. Which of the following service model is owned in terms of infrastructure by both vendor and customer?
A. public

B. private

C. hybrid

D. none of the mentioned

Answer:
C. hybrid

898. Which of the following model type is not trusted in terms of security?
A. public

B. private

C. hybrid

D. none of the mentioned

Answer:
A. public
899. Which of the following has infrastructure security managed and owned by the vendor?
A. hybrid

B. private/community

C. public

D. none of the mentioned

Answer:
B. private/community
900. Which of the following feature make cloud-based storage systems highly reliable?
A. redundant networks

B. redundant name servers

C. replication

D. all of the mentioned

Answer:
D. all of the mentioned

901. Point out the correct statement.
A. with atmos, you can create your own cloud storage system or leverage a public cloud service with atmos online

B. ibm is a major player in cloud computing particularly for businesses

C. in managed storage, the storage service provider makes storage capacity available to users

D. all of the mentioned

Answer:
A. with atmos, you can create your own cloud storage system or leverage a public cloud service with atmos online
902. Redundancy has to be implemented at the
architectural level for effective results in cloud computing.
A. lower

B. higher

C. middle

D. all of the mentioned

Answer:
B. higher
903. Which of the following can manage data from CIFS and NFS file systems over HTTP
networks?
A. storagegrid

B. datagrid

C. diskgrid

D. all of the mentioned

Answer:
A. storagegrid
904. Point out the wrong statement.
A. aws s3 essentially lets you create your own cloud storage

B. aws created “availability zones” within regions, which are sets of systems that are isolated from one another

C. amazon web services (aws) adds redundancy to its iaas systems by allowing ec2 virtual machine instances

D. none of the mentioned

Answer:
D. none of the mentioned
905. A is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs and WRITEs.
A. gets

B. pun

C. lun

D. all of the mentioned

Answer:
C. lun

906. Which of the following use LUNs to define a storage volume that appears to a connected computer as a device?
A. san

B. iscsi

C. fibre channel

D. all of the mentioned

Answer:
D. all of the mentioned
907. Which of the following protocol is used for discovering and retrieving objects from a cloud?
A. occi

B. smtp

C. http

D. all of the mentioned

Answer:
A. occi
908. Which of the following disk operation is performed When a tenant is granted access to a virtual storage container?
A. crud

B. file system modifications

C. partitioning

D. all of the mentioned

Answer:
D. all of the mentioned
909. Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud?
A. cdmi

B. ocmi

C. coa

D. all of the mentioned

Answer:
A. cdmi
910. IBM and have announced a major initiative to use Hadoop to support university courses in distributed computer programming.
A. google latitude

B. android (operating system)

C. google variations

D. google

Answer:
D. google

911. Point out the correct statement.
A. hadoop is an ideal environment for extracting and transforming small volumes of data

B. hadoop stores data in hdfs and supports data compression/decompression

C. the giraph framework is less useful than a mapreduce job to solve graph and machine learning

D. none of the mentioned

Answer:
B. hadoop stores data in hdfs and supports data compression/decompression
912. What license is Hadoop distributed under?
A. apache license 2.0

B. mozilla public license

C. shareware

D. commercial

Answer:
A. apache license 2.0
913. Sun also has the Hadoop Live CD
project, which allows running a fully functional Hadoop cluster using a live CD.
A. openoffice.org

B. opensolaris

C. gnu

D. linux

Answer:
B. opensolaris
914. Hadoop achieves reliability by replicating the data across multiple hosts and hence does not require storage on hosts.
A. raid

B. standard raid levels

C. zfs

D. operating system

Answer:
A. raid
915. What was Hadoop written in?
A. java (software platform)

B. perl

C. java (programming language)

D. lua (programming language)

Answer:
C. java (programming language)
916. The Hadoop list includes the HBase database, the Apache Mahout system, and matrix operations.
A. machine learning

B. pattern recognition

C. statistical classification

D. artificial intelligence

Answer:
A. machine learning

917. The Mapper implementation processes one line at a time via method.
TOPIC 5.2 MAPREDUCE
A. map

B. reduce

C. mapper

D. reducer

Answer:
A. map
918. Point out the correct statement.
A. mapper maps input key/value pairs to a set of intermediate key/value pairs

B. applications typically implement the mapper and reducer interfaces to provide the map and reduce methods

C. mapper and reducer interfaces form the core of the job

D. none of the mentioned

Answer:
D. none of the mentioned
919. The Hadoop MapReduce framework spawns one map task for each generated by the InputFormat for the job.
A. outputsplit

B. inputsplit

C. inputsplitstream

D. all of the mentioned

Answer:
B. inputsplit
920. Users can control which keys (and hence records) go to which Reducer by implementing a custom?
A. partitioner

B. outputsplit

C. reporter

D. all of the mentioned

Answer:
A. partitioner
921. Point out the wrong statement.
A. the mapper outputs are sorted and then partitioned per reducer

B. the total number of partitions is the same as the number of reduce tasks for the job

C. the intermediate, sorted outputs are always stored in a simple (key-len, key, value-len, value) format

D. none of the mentioned

Answer:
D. none of the mentioned
922. Applications can use the to report progress and set application-level status messages.
A. partitioner

B. outputsplit

C. reporter

D. all of the mentioned

Answer:
C. reporter

923. The right level of parallelism for maps seems to be around maps per- node.
A. 1-10

B. 10-100

C. 100-150

D. 150-200

Answer:
B. 10-100
924. The number of reduces for the job is set by the user via
A. jobconf.setnumtasks(int)

B. jobconf.setnumreducetasks(int)

C. jobconf.setnummaptasks(int)

D. all of the mentioned

Answer:
B. jobconf.setnumreducetasks(int)
925. The framework groups Reducer inputs by key in stage.
A. sort

B. shuffle

C. reduce

D. none of the mentioned

Answer:
A. sort

926. The output of the reduce task is typically written to the FileSystem via
A. outputcollector.collect

B. outputcollector.get

C. outputcollector.receive

D. outputcollector.put

Answer:
A. outputcollector.collect
927. Which type of Hypervisor is shown in the following figure?
A. type 1

B. type 2

C. type 3

D. all of the mentioned

Answer:
A. type 1
928. Point out the wrong statement.
A. load balancing virtualizes systems and resources by mapping a logical address to a physical address

B. multiple instances of various google applications are running on different hosts

C. google uses hardware virtualization

D. all of the mentioned

Answer:
C. google uses hardware virtualization
929. Which of the following is another name for the system virtual machine?
A. hardware virtual machine

B. software virtual machine

C. real machine

D. none of the mentioned

Answer:
A. hardware virtual machine
930. Which of the following provide system resource access to virtual machines?
A. vmm

B. vmc

C. vnm

D. all of the mentioned

Answer:
A. vmm

931. An operating system running on a Type
VM is full virtualization.
A. 1

B. 2

C. 3

D. all of the mentioned

Answer:
A. 1
932. Which of the following is Type 1 Hypervisor?
A. wind river simics

B. virtual server 2005 r2

C. kvm

D. lynxsecure

Answer:
D. lynxsecure
933. Which of the following is Type 2 VM?
A. virtuallogix vlx

B. vmware esx

C. xen

D. lynxsecure

Answer:
C. xen
934. Which of the following will be the host operating system for Windows Server?
A. virtuallogix vlx

B. microsoft hyper-v

C. xen

D. all of the mentioned

Answer:
B. microsoft hyper-v
935. Which of the following should be placed in second lowermost layer for the following figure?
A. host operating system

B. software

C. vm

D. none of the mentioned

Answer:
A. host operating system

936. Which of the following algorithm is used by Google to determine the importance of a particular page?
A. svd

B. pagerank

C. fastmap

D. all of the mentioned

Answer:
B. pagerank
937. Point out the correct statement.
A. with paas, the goal is to create hosted scalable applications that are used in a software as a service model

B. applications built using paas tools need to be standards-based

C. in wolf, the data and transaction management conforms to the business rules you create

D. all of the mentioned

Answer:
D. all of the mentioned
938. Based on PageRank algorithm, Google returns for a query that is parsed for its keywords.
A. sep

B. sap

C. serp

D. business objects build

Answer:
C. serp
939. Point out the wrong statement.
A. wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database

B. applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content

C. google applications are cloud-based applications

D. none of the mentioned

Answer:
B. applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
940. Which of the following protocol lets a Web site list in an XML file information?
A. sitemaps

B. mashups

C. hashups

D. all of the mentioned

Answer:
A. sitemaps
941. Which of the following is not provided by “Deep Web”?
A. database generated web pages

B. private or limited access web pages

C. pages without links

D. all of the mentioned

Answer:
D. all of the mentioned

942. Dynamic content presented in Google
crawling isn’t normally indexed.
A. ajax

B. java

C. javascript

D. all of the mentioned

Answer:
A. ajax
943. Which of the following google product sends you periodic email alerts based on your search term?
A. alerts

B. blogger

C. calendar

D. all of the mentioned

Answer:
A. alerts
944. Which of the following is a payment processing system by Google?
A. paytm

B. checkout

C. code

D. all of the mentioned

Answer:
B. checkout
945. How many types of protocols are important for instant messaging?
A. 2

B. 3

C. 4

D. all of the mentioned

Answer:
B. 3
946. Point out the correct statement.
A. every third-party im clients aim to allow their users to connect to the different major im services

B. sip stands for secure initiation protocol

C. xmpp stands for extensible messaging and presence protocol

D. all of the mentioned

Answer:
C. xmpp stands for extensible messaging and presence protocol
947. Which of the following protocol is adopted for interoperability by top three IM service providers?
A. sip

B. simple

C. xmpp

D. imps

Answer:
B. simple

948. Which of the following protocol is not an Internet Engineering Task Force standard?
A. sip

B. simple

C. xmpp

D. imps

Answer:
D. imps
949. Point out the wrong statement.
A. all im clients use peer-to-peer messaging

B. im software aimed at businesses such as xmpp, lotus sametime, and microsoft office communicator use a client/server architecture

C. instant messaging is as popular in business as it is in personal communications

D. none of the mentioned

Answer:
D. none of the mentioned
950. Which of the following IM client allow their users to connect to the different major IM services?
A. pidgin

B. miranda im

C. trillian

D. all of the mentioned

Answer:
D. all of the mentioned

951. Which of the following is also referred to as Short Message Service?
A. mini-blogs

B. micro-blogs

C. nano-blogs

D. none of the mentioned

Answer:
B. micro-blogs
952. Which of the following is a good example of an SMS service organized into a social network and blog?
A. twitter

B. facebook

C. instagram

D. none of the mentioned

Answer:
A. twitter
953. Which of the following language is used to build a message server queue in twitter?
A. ruby

B. scala

C. java

D. all of the mentioned

Answer:
B. scala
954. Which of the following version of office suite is shown in the figure?
A. offline

B. online

C. online and offline

D. none of the mentioned

Answer:
B. online
955. HTTP is a ______ protocol
A. stateful

B. unidirectional

C. bidirectional

D. full dulpex

Answer:
B. unidirectional

956. websocket is a____ Protocol
A. stateful

B. bidirectional

C. connection oriented

D. all of the above

Answer:
D. all of the above
957. Websocket protocol uses which communication model
A. Publish-Subscribe

B. Request Response

C. Push-Pull

D. Exclusive Pair

Answer:
A. Publish-Subscribe
958. An internal cloud is…
A. An overhanging threat

B. A career risk for a CIO

C. A cloud that sits behind a corporate

D. The group of knowledge workers who use a social network for water-cooler gossip

Answer:
D. The group of knowledge workers who use a social network for water-cooler gossip
959. Which of the following subject area deals with pay-as-you-go usage model?
A. Accounting Management

B. Compliance

C. Data Privacy

D. All of the mentioned

Answer:
A. Accounting Management
960. ________ captive requires that the cloud accommodate multiple compliance regimes.
A. Licensed

B. Policy-based

C. Variable

D. All of the mentioned

Answer:
B. Policy-based

961. Security methods such as private encryption, VLANs and firewalls comes under __________ subject area.
A. Accounting Management

B. Compliance

C. Data Privacy

D. All of the mentioned

Answer:
C. Data Privacy
962. Which of the following captive area deals with monitoring?
A. Licensed

B. Variable but under control

C. Law

D. All of the mentioned

Answer:
B. Variable but under control
963. Network bottlenecks occur when ______ data sets must be transferred
A. large

B. small

C. big

D. all of the mentioned

Answer:
A. large
964. RDS is a_____ type of database
A. SQL

B. NonSQL

C. Simple storage

D. all of above

Answer:
A. SQL
965. Dynamodb is ____ type of storage
A. NonSQL

B. SQL

C. Simple storage

D. all of above

Answer:
A. NonSQL
966. Cloud ________ are standardized in order to appeal to the majority of its audience.
A. SVAs

B. SLAs

C. SALs

D. None of the mentioned

Answer:
B. SLAs

967. The reputation for cloud computing services for the quality of those services is shared by _________
A. replicas

B. shards

C. tenants

D. all of the mentioned

Answer:
C. tenants
968. ___________ is a function of the particular enterprise and application in an on-premises deployment.
A. Vendor lock

B. Vendor lock-in

C. Vendor lock-ins

D. None of the mentioned

Answer:
B. Vendor lock-in
969. _________ computing refers to applications and services that run on a distributed network using virtualized resources.
A. Distributed

B. Cloud

C. Soft

D. Parallel

Answer:
B. Cloud
970. . ________ as a utility is a dream that dates from the beginning of the computing industry itself
A. Model

B. Computing

C. Software

D. All of the mentioned

Answer:
B. Computing
971. Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on
A. Iaas

B. Paas

C. Saas

D. All of the mentioned

Answer:
A. Iaas
972. ________ has many of the characteristics of what is now being called cloud computing
A. Internet

B. Softwares

C. Web Service

D. All of the mentioned

Answer:
A. Internet

973. Which of the following is Cloud Platform by Amazon?
A. Azure

B. AWS

C. Cloudera

D. All of the mentioned

Answer:
B. AWS
974. Which of the following is the deployment model?
A. public

B. private

C. hybrid

D. all of the mentioned

Answer:
D. all of the mentioned
975. Which of the following is best known service model?
A. SaaS

B. IaaS

C. PaaS

D. All of the mentioned

Answer:
D. All of the mentioned

976. Which of the architectural layer is used as a front end in cloud computing?
A. client

B. cloud

C. soft

D. all of the mentioned

Answer:
A. client
977. Which of the following benefit is provided by the PaaS service provider
A. A larger pool of qualified developers

B. More reliable operation

C. A logical design methodology

D. All of the mentioned

Answer:
D. All of the mentioned
978. Communication between services is done widely using _______ protocol
A. REST

B. SOAP

C. RESTful

D. None of the mentioned

Answer:
C. RESTful
979. Which of the following provider rely on the virtual machine technology to deliver servers?
A. CaaS

B. AaaS

C. PaaS

D. IaaS

Answer:
D. IaaS
980. Which of the following component is called hypervisor?
A. VGM

B. VMc

C. VMM

D. All of the mentioned

Answer:
C. VMM

981. Applications such as a Web server or database server that can run on a virtual machine image are referred to as __
A. virtual server

B. virtual appliances

C. machine imaging

D. all of the mentioned

Answer:
B. virtual appliances
982. Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.
A. Ben

B. Xen

C. Ken

D. Zen

Answer:
B. Xen
983. __________ is a CPU emulator and virtual machine monitor
A. Imaging

B. Parallels

C. QEMU

D. None of the mentioned

Answer:
C. QEMU
984. Which of the following provider rely on the virtual machine technology to deliver servers?
A. CaaS

B. AaaS

C. PaaS

D. IaaS

Answer:
D. IaaS
985. __________ is a CPU emulator and virtual machine monitor
A. Imaging

B. Parallels

C. QEMU

D. None of the mentioned

Answer:
C. QEMU

986. The source of HDFS architecture in Hadoop originated as
A. Google distributed filesystem

B. Yahoo distributed filesystem

C. Facebook distributed filesystem

D. Amazon S3 storage

Answer:
A. Google distributed filesystem
987. What is default replication factor?
A. 1

B. 2

C. 3

D. 5

Answer:
C. 3
988. What is HDFS Block in Hadoop?
A. It is the logical representation of data

B. It is the physical representation of data

C. Both the above

D. None of the above

Answer:
B. It is the physical representation of data
989. The need for data replication can arise in various scenarios like
A. DataNode is the slave/worker node and holds the user data in the form of Data Blocks

B. DataNode goes down

C. Data Blocks get corrupted

D. All of the above

Answer:
D. All of the above
990. If the IP address or hostname of a data node changes
A. The namenode updates the mapping between file name and block name

B. The data in that data node is lost forever

C. The namenode need not update mapping between file name and block name

D. There namenode has to be restarted

Answer:
C. The namenode need not update mapping between file name and block name
991. For the frequently accessed HDFS files the blocks are cached in
A. The memory of the data node

B. In the memory of the namenode

C. Both the above

D. None of the above

Answer:
A. The memory of the data node

992. In HDFS the files cannot be
A. Read

B. Deleted

C. Executed

D. Archived

Answer:
C. Executed
993. Which of the following is not the feature of Network management systems?
A. Accounting

B. Security

C. Performance

D. None of the mentioned

Answer:
D. None of the mentioned
994. Which of the following service provider provides the least amount of built in security?
A. SaaS

B. PaaS

C. IaaS

D. All of the mentioned

Answer:
C. IaaS
995. Point out the correct statement.
A. Different types of cloud computing service models provide different levels of security services

B. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required

C. Data should be transferred and stored in an encrypted format for security purpose

D. All of the mentioned

Answer:
D. All of the mentioned
996. Point out the wrong statement.
A. You can use proxy and brokerage services to separate clients from direct access to shared cloud storage

B. Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network

C. Cloud computing doesn’t have vulnerabilities associated with Internet applications

D. All of the mentioned

Answer:
C. Cloud computing doesn’t have vulnerabilities associated with Internet applications
997. Which of the following is the operational domain of CSA(Cloud Security Alliance)?
A. Scalability

B. Portability and interoperability

C. Flexibility

D. None of the mentioned

Answer:
B. Portability and interoperability

998. Which of the following is considered an essential element in cloud computing by CSA?
A. Multi-tenancy

B. Identity and access management

C. Virtualization

D. All of the mentioned

Answer:
A. Multi-tenancy
999. Which of the following is used for Web performance management and load testing?
A. VMware Hyperic

B. Webmetrics

C. Univa UD

D. Tapinsystems

Answer:
B. Webmetrics
1000. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
A. CAS

B. CSA

C. SAC

D. All of the mentioned

Answer:
A. CAS

1001. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
A. SaaS

B. PaaS

C. IaaS

D. All of the mentioned

Answer:
B. PaaS
1002. Which of the following cloud does not require mapping?
A. Public

B. Private

C. Hybrid

D. None of the mentioned

Answer:
A. Public
1003. Point out the wrong statement.
A. Each different type of cloud service delivery model creates a security boundary

B. Any security mechanism below the security boundary must be built into the system

C. Any security mechanism above the security boundary must be maintained by the customer

D. All of the mentioned

Answer:
D. All of the mentioned
1004. Amazon EC2 provides virtual computing environments, known as :
A. chunks

B. instances

C. messages

D. None of the mentioned

Answer:
B. instances
1005. Data stored in __________ domains doesn’t require maintenance of a schema.
A. SimpleDB

B. SQL Server

C. Oracle

D. RDS

Answer:
A. SimpleDB

1006. Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?
A. CloudWatch

B. Amazon Elastic Block Store

C. AWS Import/Export

D. All of the mentioned

Answer:
B. Amazon Elastic Block Store
1007. Which of the following is most important feature of cloud storage listed below ?
A. Logon authentication

B. Bare file

C. Multiplatform support

D. Adequate bandwidth

Answer:
A. Logon authentication
1008. Which of the following is open cloud storage management standard by SNIA ?
A. CDMI

B. OCCI

C. CEA

D. Adequate bandwidth

Answer:
A. CDMI
1009. Which of the following service is provided by Google for online storage ?
A. Drive

B. SkyDrive

C. Dropbox

D. All of the mentioned

Answer:
A. Drive
1010. Which of the following backup create a cloned copy of your current data or drive ?
A. Continuous Data Protection

B. Open file backup

C. Reverse Delta backup

D. None of the mentioned

Answer:
A. Continuous Data Protection

1011. Point out the correct statement.
A. Amazon Elastic Cloud is a system for creating virtual disks(volume)

B. SimpleDB interoperates with both Amazon EC2 and Amazon S3

C. EC3 is an Analytics as a Service provider

D. None of the mentioned

Answer:
B. SimpleDB interoperates with both Amazon EC2 and Amazon S3
1012. Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?
A. CloudWatch

B. Amazon SimpleDB

C. Amazon Cloudfront

D. All of the mentioned

Answer:
B. Amazon SimpleDB
1013. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
A. Amazon Elastic Compute Cloud

B. Amazon Associates Web Services

C. Alexa Web Information Service

D. All of the mentioned

Answer:
B. Amazon Associates Web Services
1014. Which of the following is a billing and account management service?
A. Amazon Elastic MapReduce

B. Amazon Mechanical Turk

C. Amazon DevPay

D. Multi-Factor Authentication

Answer:
C. Amazon DevPay
1015. ___________ is an application for collecting messages sent in RSS and Atom format from information providers.
A. Google Reader

B. Yahoo Mail

C. EmailRackspace

D. All of the mentioned

Answer:
A. Google Reader
1016. The advantages of Ajax is _______________
A. Bandwidth utilization

B. More interactive

C. Speeder retrieval of data

D. All of these

Answer:
D. All of these

1017. Virtual Machines (VMs) are offered in cloud by
A. SaaS

B. PaaS

C. IaaS

D. None of these

Answer:
C. IaaS
1018. The technology used to distribute service requests to resources is referred to as _____________
A. load performing

B. load scheduling

C. load balancing

D. all of the mentioned

Answer:
C. load balancing
1019. _________ computing refers to applications and services that run on a distributed network
using virtualized resources.
A. Distributed

B. Cloud

C. Soft

D. Parallel

Answer:
B. Cloud
1020. Cloud computing is an abstraction based on the notion of pooling physical resources and
presenting them as a ________ resource.
A. real

B. virtual

C. cloud

D. none of the mentioned

Answer:
B. virtual
1021. Amazon’s Elastic Compute Cloud (EC2) is a well known ______.
A. Virtual machine

B. Cloud Storage

C. PaaS

D. SoA

Answer:
A. Virtual machine
1022. ________ virtualization abstracts networking hardware and software into a virtual network that can be managed.
A. Storage

B. Network

C. Software

D. None of the mentioned

Answer:
B. Network

1023. _________ is used by Amazon Web Services to store copies of a virtual machine.
A. AMI

B. EMI

C. IMI

D. Application services

Answer:
A. AMI
1024. In para-virtualization, VMs run on hypervisor that interacts with the hardware.
A. true

B. False

Answer:
B. False
1025. An operating system running on a Type __ VM is a full virtualization.
A. 1

B. 2

C. 3

D. All of the mentioned

Answer:
A. 1

1026. _____________________where a VM can be moved from one physical machine to another even as it continues to execute.
A. Load Balancing

B. Migration

C. Live Migration

D. Server consolidation

Answer:
C. Live Migration
1027. Point out the wrong statement :
A. Load balancing virtualizes systems and resources by mapping a logical address to a physical address

B. Multiple instances of various Google applications are running on different hosts

C. Google uses hardware virtualization

D. All of the mentioned

Answer:
C. Google uses hardware virtualization
1028. Point out the wrong statement :
A. Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM

B. All CPUs support virtual machines

C. On a Type 2 VM, a software interface is created that emulates the devices with which a system would normally interact

D. All of the mentioned

Answer:
B. All CPUs support virtual machines
1029. Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V ?
A. paravirtualization

B. full virtualization

C. emulation

D. none of the mentioned

Answer:
A. paravirtualization
1030. Point out the wrong statement :
A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

B. Guest operating systems in full virtualization systems are generally faster than other virtualization schemes

C. A process virtual machine instantiates when a command begins a process

D. All of the mentioned

Answer:
A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

1031. _________ is a service that creates and manages virtual network interfaces.
A. VMware vStorage

B. VMware vNetwork

C. VMware vCompute

D. Application services

Answer:
B. VMware vNetwork
1032. The BEST way to define Virtualization in cloud computing is
A. Virtualization enables simulating compute, network, and storage service platforms from the underlying virtual hardware

B. Virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware

C. Virtualization enables realization of compute, network, and storage service platforms from the underlying virtual hardware

D. Virtualization enables emulating compute, network, and storage service platforms from the underlying virtual hardware

Answer:
B. Virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware
1033. Which one is NOT generally a change after Virtualization?
A. Virtual machines can be provisioned to any system

B. Hardware-independence of operating system and applications

C. Can manage OS and application as a single unit by encapsulating them into virtual machines.

D. Software and hardware tightly coupled

Answer:
D. Software and hardware tightly coupled
1034. Appear IQ, Mendix, Amazon Web Services (AWS) Elastic Beanstalk, Google App Engine and Heroku, are some of the example of providing services for:
A. IaaS

B. SaaS

C. PaaS

D. None

Answer:
C. PaaS
1035. What makes Ajax unique?
A. It works as a stand-alone Web-development tool

B. It works the same with all Web browsers

C. It uses C++ as its programming language

D. It makes data requests asynchronously

Answer:
D. It makes data requests asynchronously

1036. _______ JavaScript is also called server-side JavaScript.
A. Microsoft

B. Navigator

C. LiveWire

D. None

Answer:
C. LiveWire
1037. AMI(Amazon Machine Image) imaging service is provided by Amazon for ______________
A. private use

B. public use

C. pay-per-use

D. all of the mentioned

Answer:
D. all of the mentioned
1038. Virtualization allows sharing the resources of hardware across multiple a
environments.
A. True

B. false

Answer:
A. True
1039. A virtual machine running on a server of a particular make cannot be relocated to b
the server of another make.
A. True

B. false

Answer:
B. false
1040. Amazon Web Services (AWS) is an example of______________________
A. Software as a service (SaaS)

B. Infrastructure as a service (IaaS)

C. Platform as a Service (PaaS)

D. None of the mentioned

Answer:
B. Infrastructure as a service (IaaS)
1041. In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware.
A. paravirtualization

B. full virtualization

C. emulation

D. none of the mentioned

Answer:
C. emulation

1042. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
A. paravirtualization

B. full virtualization

C. emulation

D. none of the mentioned

Answer:
B. full virtualization
1043. Full virtualization
Full virtualization
A. Simulates hardware within software

B. Has VMs with the same OS

C. Clones images

D. Alters the guest OS

Answer:
A. Simulates hardware within software
1044. If virtualization occurs at application level, OS level and hardware level, then such service in cloud is
A. IaaS

B. SaaS

C. PaaS

D. no such service

Answer:
B. SaaS
1045. Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request iii) VM in operation iv) VM Provision
A. ii, i, iii, iv

B. i, ii, iii & iv

C. ii, iii, iv & i

D. ii, iv, iii & i

Answer:
D. ii, iv, iii & i
1046. Which of the following is Amazon’s technical support and consulting business?
A. Amazon Virtual Private Cloud

B. AWS Premium Support

C. Amazon Fulfillment Web Services

D. All of the mentioned

Answer:
B. AWS Premium Support
1047. Point out the wrong statement.
A. The standard instances are not suitable for standard server applications

B. High memory instances are useful for large data throughput applications such as SQL Server databases and data caching and retrieval

C. FPS is exposed as an API that sorts transactions into packages called Quick Starts that makes it easy to implement

D. None of the mentioned

Answer:
A. The standard instances are not suitable for standard server applications

1048. Amazon EMR uses Hadoop processing combined with several __________ products.
A. AWS

B. ASQ

C. AMR

D. AWES

Answer:
A. AWS
1049. ________________ is the central application in the AWS portfolio.
A. Amazon Simple Queue Service

B. Amazon Elastic Compute Cloud

C. Amazon Simple Notification Service

D. All of the above

Answer:
B. Amazon Elastic Compute Cloud
1050. Amazon ______ cloud-based storage system allows you to store data objects ranging in size from 1 byte up to 5GB.
A. S1

B. S2

C. S3

D. S4

Answer:
C. S3

1051. CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.
A. table caching

B. geocaching

C. index caching

D. windows Media Server

Answer:
B. geocaching
1052. Point out the correct statement.
A. A volume is mounted on a particular instance and is available to all instances

B. The advantages of an EBS boot partition are that you can have a volume up to 1TB

C. You cannot mount multiple volumes on a single instance

D. All of the mentioned

Answer:
B. The advantages of an EBS boot partition are that you can have a volume up to 1TB
1053. Data stored in __________ domains doesn’t require maintenance of a schema.
A. SimpleDB

B. SQL Server

C. Oracle

D. RDS

Answer:
A. SimpleDB
1054. AWS reaches customers in ______________countries.
A. 137

B. 182

C. 190

D. 86

Answer:
C. 190
1055. Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud?
A. Amazon Elastic MapReduce

B. Amazon Mechanical Turk

C. Amazon DevPay

D. Multi-Factor Authentication

Answer:
A. Amazon Elastic MapReduce

1056. _________ is a virtual server platform that allows users to create and run virtual machines on Amazon’s server farm.
A. EC2

B. Azure

C. EC5

D. None of the mentioned

Answer:
A. EC2
1057. AMIs are operating systems running on the _____ virtualization hypervisor.
A. Yen

B. Xen

C. Ben

D. Multi-Factor Authentication

Answer:
B. Xen
1058. Which of the following instance class is best used for applications that are processor or compute-intensive?
A. Standard Instances

B. High Memory Instances

C. High CPU Instances

D. None of the mentioned

Answer:
C. High CPU Instances
1059. Amazon Relational Database Service is a variant of the _______ 5.1 database system.
A. Oracle

B. MySQL

C. SQL Server

D. All of the mentioned

Answer:
B. MySQL
1060.
The types of AMI provided by AWS are:
A. Instance store backed

B. EBS backed

C. Both A & B

D. None of the above

Answer:
C. Both A & B

1061.
Storage classes available with Amazon s3 are –
A. Amazon S3 standard

B. Amazon S3 standard-infrequent Access

C. Amazon Glacier

D. All of the above

Answer:
D. All of the above
1062. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as ________.
A. Web Sphere

B. Tivoli

C. Nebula

D. Altix

Answer:
B. Tivoli
1063. Cloud system from SGI is functionally considered as an ________.
A. on-demand cloud computing service

B. on-demand cloud storage service

C. on-demand cloud accessing service

D. on-demand

Answer:
A. on-demand cloud computing service
1064. NASA created ________ can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
A. Nebula Cloud

B. Cyclone Cloud

C. Force.com Cloud

D. CERN Cloud

Answer:
A. Nebula Cloud
1065. To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a ________ grid and workload management solution of cloud computing platform
A. Load Setting Facility

B. Load Sharing Facility

C. Load Setting Faculty

D. Load assigning Faculty

Answer:
B. Load Sharing Facility
1066. One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.

A. true

B. false

Answer:
A. true

1067. A mashup cloud can be designed by utilizing the Scalability of AWS and ________ of GAE platforms
A. Accessibility

B. Mobility

C. Agility

D. Scalability

Answer:
C. Agility
1068. The Cloudlets have a ________ ownership unlike that of Clouds.

A. centralized

B. decentralized

C. global

D. None of the above

Answer:
B. decentralized
1069. The Data-Intensive Scalable Computing(DISC) utilizes a ________ data-center clusters to gather and maintain data.
A. HTC

B. HPC

C. HCC

D. HAC

Answer:
A. HTC
1070. ________ refers to an increase in the performance by the addition of more resources along the service layers
A. Horizontal Scalability

B. Vertical Scalability

C. Diagonal Scalability

D. None of the above

Answer:
B. Vertical Scalability
1071. The percentage of time the system is up and running smoothly is referred as ________.
A. system up time

B. system scalability

C. system availability

D. system efficiency

Answer:
C. system availability
1072. ________ is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
A. GPS

B. Cloud

C. IoT

D. RFID

Answer:
D. RFID

1073. RFID stand for ________.
A. Rangeable Frequency Identification

B. Radio Fragment Identification

C. Radio Frequency Identification

D. Rangeable Fragment Identification

Answer:
C. Radio Frequency Identification
1074. The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer
A. i, ii, iv

B. i, iii, iv

C. ii, iii, iv

D. ii, iii, iv

Answer:
A. i, ii, iv
1075. ________ tags contain battery and transmit signals autonomously
A. Acitve RFID

B. Passive RFID

C. Battery-assisted passive RFID

D. Battery-assisted RFID

Answer:
A. Acitve RFID

1076. ________ tags needs an external source to wake up the battery.

A. Acitve RFID

B. Passive RFID

C. Battery-assisted passive RFID

D. Battery-assisted active RFID

Answer:
C. Battery-assisted passive RFID
1077. The three major components of RFID hardware based on functionality include :
A. RFID Reader

B. Reader Antenna

C. Reader

D. All of the above

Answer:
D. All of the above
1078. Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor
A. i, ii, iii

B. i, ii, iii, iv

C. ii, iii, iv

D. i, ii, iv

Answer:
A. i, ii, iii
1079. Even with two-factor authentication, users may still be vulnerable to_____________attacks.
A. Scripting

B. Cross attack

C. Man-in-the-middle

D. Radiant

Answer:
C. Man-in-the-middle
1080. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
A. Making infrastructure vulnerable to malware

B. Potential for noncompliance

C. Data Loss

D. All of the above

Answer:
D. All of the above

1081. Which of the following terms indicates that information is to be read only by those people for whom it is intended?
A. Availability

B. Accounting

C. Integrity

D. Confidentiality

Answer:
D. Confidentiality
1082. What is the full form of SCADA?
A. Supervisory Control and Document Acquisition

B. Supervisory Control and Data Acquisition

C. Supervisory Column and Data Assessment

D. Supervisory Column and Data Assessment

Answer:
B. Supervisory Control and Data Acquisition
1083. DCS is a ________
A. Distributed Control System

B. Data Control System

C. Data Column System

D. Distributed Column System

Answer:
A. Distributed Control System
1084. What is SCADA?
A. Software

B. Process

C. System

D. Hardware

Answer:
B. Process
1085. Which of the following is not the component of a SCADA system?
A. Database server

B. I/O system

C. PLC controller

D. Sparger controller

Answer:
D. Sparger controller

1086. Which of the following is not involved in working of IoT?
A. RFID

B. Sensor

C. Nano tech

D. Server

Answer:
D. Server
1087. M2M is a term introduced by
A. IoT service providers

B. Fog computing service providers

C. Telecommunication service providers

D. None of these

Answer:
C. Telecommunication service providers
1088. Which of these statements regarding sensors is TRUE?
A. Sensors are input devices.

B. Sensors can be analog as well as digital

C. Sensors respond to some external stimuli.

D. All of these

Answer:
D. All of these
1089. Smart Dust can be used to measure the
A. Temperature of the industrial lathe machine

B. Heat inside a computer’s CPU

C. Chemical in the soil

D. Strength of a solid material

Answer:
C. Chemical in the soil
1090. Request field is present in which message format?
A. Request message

B. Response message

C. Both request and response

D. Neither request nor response

Answer:
A. Request message
1091. CoAP provides which of the following requirements?
A. Multicast support and simplicity

B. Low overhead and multicast support

C. Simplicity and low overhead

D. Multicast support, Low over head, and simplicity

Answer:
D. Multicast support, Low over head, and simplicity

1092. CoAP is a specialized _________ protocol.
A. Web Transfer

B. Power

C. Application

D. Resource

Answer:
A. Web Transfer
1093. Which of the following IEEE standards provides the lowest level of the ZigBee software stack?
A. IEEE 802.11.

B. IEEE 802.15.1.

C. IEEE 802.15.3.

D. IEEE 802.15.4.

Answer:
D. IEEE 802.15.4.
1094. Which of the following layers are defined by the ZigBee stack?
A. Transport layer

B. Physical layer.

C. Application Support sub-layer.

D. Medium Access layer

Answer:
D. Medium Access layer
1095. _ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
A. Cross-site scoring scripting

B. Cross-site request forgery

C. Two-factor authentication

D. Cross-site scripting

Answer:
D. Cross-site scripting
1096. Representational State Transfer (REST) is the standard interface between
A. Two machines in a LAN

B. HTTP client and user

C. HTTP client and servers

D. None of the above

Answer:
C. HTTP client and servers
1097. Which of the following is not a messaging mode in CoAP?
A. Confirmable

B. Separate

C. Direct

D. Piggyback

Answer:
C. Direct

1098. Which of the following is the full form of XMPP?
A. Extension Messaging and Presence Protocol

B. Extensible Messaging and Presence Protocol

C. Extension Messaging and Privacy Protocol

D. Extensible Messaging and Privacy Protocol

Answer:
B. Extensible Messaging and Presence Protocol
1099. In 6LoWPAN address, how many bits are globally unique?
A. 16 bits

B. 32 bits

C. 64 bits

D. 128 bits

Answer:
C. 64 bits
1100. IEEE 802.15.4 uses which of the following for accessing the channel?
A. Carrier sense multiple access (CSMA)

B. Carrier sense multiple access with collision detection (CSMA‐CD)

C. Carrier sense multiple access with collision avoidance (CSMA‐CA)

D. None of these

Answer:
C. Carrier sense multiple access with collision avoidance (CSMA‐CA)

1101. What second programming language did Google add for App Engine development?
A. C++

B. Flash

C. Java

D. Visual Basic

Answer:
C. Java
1102. what facet of cloud computing helps to guard against downtime and determines costs?
A. Service-level agreements

B. Application programming interfaces

C. Virtual private networks

D. Bandwidth fees

Answer:
A. Service-level agreements
1103. Which of these is not a major type of cloud computing usage?
A. Hardware as a Service

B. Platform as a Service

C. Software as a Service

D. Infrastructure as a Service

Answer:
A. Hardware as a Service
1104. Cloud Services have a________ relationship with their customers.
A. Many-to-many

B. One-to-many

C. One-to-one

Answer:
B. One-to-many
1105. What is the name of Rackspace’s cloud service?
A. Cloud On-Demand

B. Cloud Servers

C. EC2

Answer:
B. Cloud Servers

1106. What is the name of the organization helping to foster security standards for cloud computing?
A. Cloud Security Standards Working Group

B. Cloud Security Alliance

C. Cloud Security WatchDog

D. Security in the Cloud Alliance

Answer:
B. Cloud Security Alliance
1107. Which of these companies specializes in cloud computing management tools and services?
A. RightScale

B. Google

C. Salesforce.com

D. Savis

Answer:
A. RightScale
1108. What’s the most popular use case for public cloud computing today?
A. Test and development

B. Website hosting

C. Disaster recovery

D. Business analytics

Answer:
A. Test and development
1109. Virtual Machine Ware (VMware) is an example of
A. Infrastructure Service

B. Platform Service

C. Software Service

Answer:
A. Infrastructure Service
1110. Cloud Service consists of
A. Platform, Software, Infrastructure

B. Software, Hardware, Infrastructure

C. Platform, Hardware, Infrastructure

Answer:
A. Platform, Software, Infrastructure

1111. Google Apps Engine is a type of
A. SaaS

B. PaaS

C. IaaS

D. NA

Answer:
D. NA
1112. Which vendor recently launched a cloud-based test and development service for enterprises?
A. HP

B. Cisco

C. IBM

D. Oracle

Answer:
C. IBM
1113. Geographic distribution of data across a cloud provider’s network is a problem for many enterprises
because it:
A. Breaks compliance regulations

B. Adds latency

C. Raises security concerns

D. Makes data recovery harder

Answer:
A. Breaks compliance regulations
1114. Amazon Web Services is which type of cloud computing distribution model?
A. Software as a Service

B. Platform as a Service

C. Infrastructure as a Service

Answer:
C. Infrastructure as a Service
1115. Cloud computing networks are designed to support only private or hybrid clouds.
A. True

B. False

Answer:
B. False
1116. A good cloud computing network can be adjusted to provide bandwidth on demand.
A. True

B. False

Answer:
A. True

1117. A larger cloud network can be built as either a layer 3 or layer 4 network.
A. True

B. False

Answer:
B. False
1118. The typical three-layer switching topology will not create latency within a cloud network.
A. True

B. False

Answer:
B. False
1119. The term ‘Cloud’ in cloud-computing refers to ______.
A. The Internet

B. Cumulus Clouds

C. A Computer

D. Thin Clients

Answer:
A. The Internet
1120. In order to participate in cloud-computing, you must be using the following OS _______ .
A. Windows

B. Mac OS

C. Linux

D. All of the above

Answer:
D. All of the above
1121. Which of the following is true of cloud computing?
A. It’s always going to be less expensive and more secure than local computing.

B. You can access your data from any computer in the world, as long as you have an Internet connection.

C. Only a few small companies are investing in the technology, making it a risky venture.

Answer:
B. You can access your data from any computer in the world, as long as you have an Internet connection.
1122. What is private cloud?
A. A standard cloud service offered via the Internet

B. A cloud architecture maintained within an enterprise data center.

C. A cloud service inaccessible to anyone but the cultural elite

Answer:
B. A cloud architecture maintained within an enterprise data center.

1123. Google Docs is a type of cloud computing.
A. True

B. False

Answer:
A. True
1124. What is Cloud Foundry?
A. A factory that produces cloud components

B. An industry wide PaaS initiative

C. VMware-led open source PaaS.

Answer:
C. VMware-led open source PaaS.
1125. Which of the following statements about Google App Engine (GAE) is INCORRECT.
A. It’s a Platform as a Service (PaaS) model.

B. Automatic Scalability is built in with GAE. As a developer you don’t need to worry about application scalability

C. You can decide on how many physical servers required for hosting your application.

D. The applications deployed on GAE have the same security, privacy and data protection policies as that of Google’s applications. So, applications can take advantage of reliability, performance and security of Google’s infrastructure.

Answer:
C. You can decide on how many physical servers required for hosting your application.

1126. I’ve a website containing all static pages. Now I want to provide a simple Feedback form for end users. I don’t have software developers, and would like to spend minimum time and money. What should I do?
A. Hire software developers, and build dynamic page.

B. Use ZOHO creator to build the required form, and embed in html page.

C. Use Google App Engine (GAE) to build and deploy dynamic page.

Answer:
B. Use ZOHO creator to build the required form, and embed in html page.
1127. What is the name of the organization helping to foster security standards for cloud computing?
A. Cloud Security Standards Working.

B. Cloud Security Alliance.

C. Cloud Security WatchDog.

D. Security in the Cloud Alliance.

Answer:
B. Cloud Security Alliance.
1128. “Cloud” in cloud computing represents what?
A. Wireless

B. Hard drives

C. People

D. Internet

Answer:
D. Internet
1129. Geographic distribution of data across a cloud provider’’ network is a problem for many enterprises
because it:
A. Breaks compliance regulations

B. Adds latency

C. Raises security concerns

D. Makes data recovery harder

Answer:
A. Breaks compliance regulations
1130. The term ‘‘loud’ in cloud-computing refers to ______.
A. The Internet

B. Cumulus Clouds

C. A Computer

D. Thin Clients

Answer:
A. The Internet

CLOUD COMPUTING Questions and Answers pdf Download Online QUiz Test

Leave a Reply

Your email address will not be published. Required fields are marked *