250+ TOP MCQs on Security Service Boundary and Answers

Cloud Computing online test focuses on “Security Service Boundary”.

1. Which of the following service provider provides the highest level of service?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer: a
Clarification: As you move upward in the stack, each service model inherits the capabilities of the model beneath it, as well as all the inherent security concerns and risk factors.

2. Point out the correct statement.
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control structures
c) SaaS is an operating environment with applications, management, and the user interface
d) All of the mentioned

Answer: c
Clarification: IaaS has the least levels of integrated functionality and the lowest levels of integrated security, and SaaS has the most.

3. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
a) CAS
b) CSA
c) SAC
d) All of the mentioned

Answer: b
Clarification: Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud.

4. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer: b
Clarification: In the PaaS model, the customer would be responsible for the security of the application and UI at the top of the stack.

5. Point out the wrong statement.
a) Each different type of cloud service delivery model creates a security boundary
b) Any security mechanism below the security boundary must be built into the system
c) Any security mechanism above the security boundary must be maintained by the customer
d) All of the mentioned

Answer: d
Clarification: As you move up the stack, it becomes more important to make sure that the type and level of security is part of your Service Level Agreement.

6. Which of the following model allows vendor to provide security as part of the Service Level Agreement?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer: a
Clarification: Compliance, governance, and liability levels are stipulated under the contract for the entire stack.

7. Which of the following cloud does not require mapping?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

Answer: a
Clarification: Private cloud may be internal or external to an organization.

8. Which of the following service model is owned in terms of infrastructure by both vendor and customer?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

Answer: c
Clarification: Infrastructure location is both on- and off-premises.

9. Which of the following model type is not trusted in terms of security?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

Answer: a
Clarification: It is owned by a vendor.

10. Which of the following has infrastructure security managed and owned by the vendor?
a) Hybrid
b) Private/Community
c) Public
d) None of the mentioned

Answer: b
Clarification: Cloud computing has a tendency to blur the location of the defined security perimeter in such a way that the previous notions of network firewalls and edge defenses often no longer apply.

250+ TOP MCQs on Cloud Storage in the Digital Universe and Answers

Cloud Computing Multiple Choice Questions on “Cloud Storage in the Digital Universe”.

1. Which of the following is storage data interchange interface for stored data objects?
a) OCC
b) OCCI
c) OCMI
d) All of the mentioned

Answer: b
Clarification: OCCI stands for Open Cloud Computing Interface.

2. Point out the correct statement.
a) To determine whether your application will port successfully, you should perform a functionality mapping exercise
b) Cloud computing supports some application features better than others
c) Cloud bursting is an overflow solution that clones the application to the cloud and directs traffic to the cloud during times of high traffic
d) All of the mentioned

Answer: d
Clarification: Mapping process involves determining the critical application features and then matching them to the cloud provider’s offering to see if those features can be supported.

3. ________ data represents more than 50 percent of the data created every day.
a) Shadow
b) Light
c) Dark
d) All of the mentioned

Answer: a
Clarification: Lots of shadow data does get retained, having never been touched by a human being.

4. Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC.
a) 10
b) 15
c) 20
d) None of the mentioned

Answer: d
Clarification: There will be a steady growth of cloud storage at the expense of online storage over the next decade.

5. Point out the wrong statement.
a) Some APIs are both exposed as SOAP and REST
b) The role of a cloud vendor specific API has impact on porting an application
c) There are mainly three types of cloud storage
d) None of the mentioned

Answer: c
Clarification: Cloud storage can be either unmanaged or managed.

6. Which of the following system does not provision storage to most users?
a) PaaS
b) IaaS
c) CaaS
d) SaaS

Answer: b
Clarification: Cloud storage is storage accessed by a Web service API.

7. The addition of a software package on top of a cloud storage volume makes most cloud storage offerings conform to a ________ as a Service model.
a) Software
b) Platform
c) Analytics
d) None of the mentioned

Answer: a
Clarification: Most users interact with cloud storage using backup, synchronization, archiving, staging, caching, or some other sort of software.

8. How many categories of storage devices broadly exist in cloud?
a) 1
b) 2
c) 3
d) None of the mentioned

Answer: b
Clarification: Storage devices may be broadly categorized as either block storage devices or file storage devices.

9. Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes?
a) block
b) file
c) disk
d) all of the mentioned

Answer: a
Clarification: It is up to the operating system to create and manage the file system.

10. Which of the following impose additional overhead on clients and offer faster transfer?
a) Block storage
b) File Storage
c) File Server
d) All of the mentioned

Answer: a
Clarification: File-oriented storage devices are generally slower, but require less overhead from attached clients.

250+ TOP MCQs on Communicating with the Cloud and Answers

Advanced Cloud Computing Questions & Answers focuses on “Communicating with the Cloud”.

1. How many types of protocols are important for instant messaging?
a) 2
b) 3
c) 4
d) All of the mentioned

Answer: b
Clarification: In an effort to create an interoperability standard between different IM clients, several instant messaging protocols have been created.

2. Point out the correct statement.
a) Every third-party IM clients aim to allow their users to connect to the different major IM services
b) SIP stands for Secure Initiation Protocol
c) XMPP stands for Extensible Messaging and Presence Protocol
d) All of the mentioned

Answer: c
Clarification: SIP stands for Session Initiation Protocol.

3. Which of the following protocol is adopted for interoperability by top three IM service providers?
a) SIP
b) SIMPLE
c) XMPP
d) IMPS

Answer: b
Clarification: They allow their users to connect with the other services’ public users for a fee.

4. Which of the following protocol is not an Internet Engineering Task Force standard?
a) SIP
b) SIMPLE
c) XMPP
d) IMPS

Answer: d
Clarification: IMPS is an IM communications standard.

5. Point out the wrong statement.
a) All IM clients use peer-to-peer messaging
b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server architecture
c) Instant messaging is as popular in business as it is in personal communications
d) None of the mentioned

Answer: d
Clarification: Some IM clients use peer-to-peer messaging.

6. Which of the following IM client allow their users to connect to the different major IM services?
a) Pidgin
b) Miranda IM
c) Trillian
d) All of the mentioned

Answer: d
Clarification: Trillian runs on Windows, Macintosh, IOS (iPhone OS), Android, Blackberry, and inside browsers.

7. Which of the following is also referred to as Short Message Service?
a) Mini-blogs
b) Micro-blogs
c) Nano-blogs
d) None of the mentioned

Answer: b
Clarification: When a service collects your messages in a conversation, it is called a micro-blog.

8. Which of the following is a good example of an SMS service organized into a social network and blog?
a) Twitter
b) Facebook
c) Instagram
d) None of the mentioned

Answer: a
Clarification: It is sometimes referred to as the SMS of the Internet or as a form of Internet Relay Chat (IRC).

9. Which of the following language is used to build a message server queue in twitter?
a) Ruby
b) Scala
c) Java
d) All of the mentioned

Answer: b
Clarification: The Twitter Web client was built using Ruby on Rails and deployed on the Ruby Enterprise Edition, with the message queue server written in Scala.

250+ TOP MCQs on Push Services and Answers

Cloud Computing Multiple Choice Questions on “Push Services”.

1. Which of the following allows an IMAP server to automatically keep a connection alive?
a) P-IMAP
b) C-IMAP
c) I-IMAP
d) None of the mentioned

Answer: a
Clarification: P-IMAP contains a feature that sends rich email in a manner similar to SMTP.

2. Point out the wrong statement.
a) All push technologies used in mobile applications are server-based
b) Push email is the penultimate example of a push service
c) In push email, the service is always connected to the client, and it sends out to the client more or less immediately any new email that arrives at the server
d) All of the mentioned

Answer: a
Clarification: Not all push technologies used in mobile applications are server-based.

3. Which of the following IMAP command is used to update and amounts to a heartbeat signal and response?
a) EXIT
b) IDLE
c) CLOSE
d) All of the mentioned

Answer: b
Clarification: Some polling mechanisms set the polling interval so short that the system appears to behave as if it is a push technology.

4. Which of the following services uses push email?
a) Apple MobileMe
b) Google Gmail
c) RIM’s BlackBerry Enterprise Server
d) All of the mentioned

Answer: d
Clarification: Both push and polling have pluses and minuses associated with them.

5. Point out the correct statement.
a) The well-known email protocol POP3 is a polling protocol
b) IMAP cannot support both push and polling
c) Push-IMAP is a push technology, as is the SMTP protocol
d) All of the mentioned

Answer: a
Clarification: IMAP can support both push and polling.

6. Which of the following is an incorrect step in pushing blackberry service?
a) Content provider sends a push request to the server
b) BlackBerry servers send a response back to the content provider
c) BlackBerry servers forward the acknowledgement to the content provider
d) All of the mentioned

Answer: d
Clarification: The Push Service transfers up to 8KB messages directly.

7. Which of the following uses a set of email extensions to provide access to mobile devices?
a) Black Profile
b) Lemonade Profile
c) B2B Profile
d) None of the mentioned

Answer: a
Clarification: The Lemonade Profile is an alternative mechanism for push email.

8. The Lemonade Profile is a specification of the _____ as RFC 5550.
a) IETF
b) IETE
c) IETC
d) All of the mentioned

Answer: a
Clarification: A Push-IMAP specification has been developed but not standardized.

9. How many number of characters can be sent in a single message through SMS?
a) 140
b) 200
c) 240
d) None of the mentioned

Answer: b
Clarification: The Short Message Service (SMS) is a text-notification service that has evolved into a primary communications protocol for near-real-time message passing.

10. Which of the following allows longer messages to be sent using multiple packets containing a User Data Header that contains the segment number?
a) Long SMS
b) Large SMS
c) Big SMS
d) All of the mentioned

Answer: a
Clarification: The limit for this multipart or segmented SMS is 153 characters for 7-bit, 134 for 8-bit, and 67 for 16-bit encoding.

250+ TOP MCQs on Cloud Types and Answers

Cloud Computing Questions & Answers for entrance exams focuses on “Cloud Types”.

1. Which of the following is owned by an organization selling cloud services?
a) Public
b) Private
c) Community
d) Hybrid

Answer: a
Clarification: The public cloud infrastructure is available for public use alternatively for a large industry group.

2. Point out the wrong statement.
a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in which infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services, development frameworks, transactions, and control structures
d) All of the mentioned

Answer: c
Clarification: PaaS provides virtual machines, operating systems, applications, services, development frameworks, transactions, and control structures.

3. _______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

Answer: a
Clarification: The IaaS service provider manages all the infrastructure, while the client is responsible for all other aspects of the deployment.

4. Which of the following provides development frameworks and control structures?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

Answer: c
Clarification: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.

5. Point out the wrong statement.
a) A PaaS service adds integration features, middleware, and other orchestration and choreography services to the IaaS model
b) XaaS or ‘anything as a service’ is the delivery of IT as a Service through hybrid Cloud computing
c) Monitoring as a Service (MaaS) is at present still an emerging piece of the Cloud jigsaw
d) None of the mentioned

Answer: d
Clarification: Monitoring as a Service provides the option to offload a large majority of those costs by having it run as a service as opposed to a fully invested in house tool.

6. _______ is a complete operating environment with applications, management, and user interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

Answer: b
Clarification: In the SaaS model, the application is provided to the client through a thin client interface.

7. How many types of service model are mainly present in Cloud?
a) 1
b) 2
c) 3
d) 4

Answer: c
Clarification: Three types of Service model exist.

8. The three different service models are together known as the _____ model of cloud computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned

Answer: a
Clarification: Many other service models are also present.

9. CaaS stands for _____________ as service.
a) Compliance
b) Computer
c) Community
d) Communication

Answer: d
Clarification: Communication as a Service (CaaS), enables the consumer to utilize Enterprise level VoIP, VPNs, PBX and Unified Communications without the costly investment of purchasing, hosting and managing the infrastructure.

10. Which of the following is the IaaS service provider?
a) EC2
b) EC1
c) EC10
d) Hybrid

Answer: a
Clarification: On Amazon EC2, a client would provision a computer in the form of a virtual machine image.

250+ TOP MCQs on CaaS and Answers

Questions on “CaaS – Communication as a Service”.

1. Which of the following is an example of a vertical cloud that advertise CaaS capabilities?
a) FedCloud
b) ClearPoint PCI
c) Rackserve PCI
d) All of the mentioned

Answer: d
Clarification: It’s much easier to envisage a CaaS system built inside a private cloud where the data is under the control of a single entity.

2. Point out the wrong statement.
a) SPML is used to prepare Web services and applications for use
b) With SPML, a system can provide automated user and system access
c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
d) All of the mentioned

Answer: c
Clarification: Without a provisioning system, a cloud computing system can be very inefficient and potentially unreliable.

3. Which of the following allows a distributed ID system to write and enforce custom policy expressions?
a) XACML
b) XML
c) SOAP
d) None of the mentioned

Answer: a
Clarification: This is a general-purpose authorization policy language.

4. Which of the following is a man-in-the-middle type of service?
a) CaaS
b) IaaS
c) AaaS
d) All of the mentioned

Answer: a
Clarification: A CaaS would need to be able to manage cloud relationships, understand security policies and procedures.

5. Point out the correct statement.
a) Cloud computing by its very nature spans same jurisdictions
b) SaaS is much more than simply providing an anonymous service token to an identity
c) A Compliance as a Service application would need to serve as a trusted third party
d) All of the mentioned

Answer: c
Clarification: CaaS may need to be architected as its own layer of an SOA architecture in order to be trusted.

6. Which of the following can be used for the banking industry?
a) athenahealth
b) bankserve
c) bankingsol
d) all of the mentioned

Answer: b
Clarification: Athenahealth is used for the medical industry.

7. ________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
a) Software
b) Platform
c) Analytics
d) Compliance

Answer: a
Clarification: Most of the cloud computing compliance systems to date have been built using private clouds.

8. Which of the following is a PCI CaaS service?
a) FedCloud
b) ClearSoln
c) Rackserve PCI
d) All of the mentioned

Answer: c
Clarification: FedCloud is used for government.

9. _________ is used for merchant transactions under the Payment Card Industry Data Security Standard.
a) ClearPoint PCI
b) ClearSoln
c) Rackserve PCI
d) All of the mentioned

Answer: a
Clarification: Organizations can manage PCI compliance risk more effectively with the help of ClearPoint PCI.

10. ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.
a) Software
b) Platform
c) Analytics
d) Compliance

Answer: b
Clarification: Service types are models upon which distributed applications are created and hosted.