Cloud Computing MCQ (Multiple Choice Questions) - SchoolingAxis

Cloud Computing MCQ (Multiple Choice Questions)

 Que-  Which of the following services that need to be negotiated in Service Level Agreements ? 

a.  Logging 

b.  Auditing 

c.  Regulatory compliance 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  The following flowchart is intended to evaluate __________ in any cloud. 

a.  risk 

b.  errors 

c.  inconsistencies 

d.  none of the mentioned 


Answer-  risk 


Que-  Point out the wrong statement: 

a.  You can use proxy and brokerage services to separate clients from direct access to shared cloud storage 

b.  Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network 

c.  Cloud computing don’t have vulnerabilities associated with Internet applications 

d.  All of the mentioned 


Answer-  Cloud computing don’t have vulnerabilities associated with Internet applications 


Que-  Which of the following area of cloud computing is uniquely troublesome ? 

a.  Auditing 

b.  Data integrity 

c.  e-Discovery for legal compliance 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Which of the following is operational domain of CSA ? 

a.  Scalability 

b.  Portability and interoperability 

c.  Flexibility 

d.  None of the mentioned 


Answer-  Portability and interoperability 


Que-  Which of the following is considered an essential element in cloud computing by CSA ? 

a.  Multi-tenancy 

b.  Identity and access management 

c.  Virtualization 

d.  All of the mentioned 


Answer-  Multi-tenancy 


Que-  Which of the following is used for Web performance management and load testing ? 

a.  VMware Hyperic 

b.  Webmetrics 

c.  Univa UD 

d.  Tapinsystems 


Answer-  Webmetrics 


Que-  Which of the following is application and infrastructure management software for hybrid multi-clouds ? 

a.  VMware Hyperic 

b.  Webmetrics 

c.  Univa UD 

d.  Tapinsystems 


Answer-  Univa UD 


Que-  Which of the following service provider provides the highest level of service ? 

a.  SaaS 

b.  PaaS 

c.  IaaS 

d.  All of the mentioned 


Answer-  SaaS 


Que-  Point out the correct statement: 

a.  PaaS supplies the infrastructure 

b.  IaaS adds application development frameworks, transactions, and control structures 

c.  SaaS is an operating environment with applications, management, and the user interface 

d.  All of the mentioned 


Answer-  SaaS is an operating environment with applications, management, and the user interface 


Que-  Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model ? 

a.  CAS 

b.  CSA 

c.  SAC 

d.  All of the mentioned 


Answer-  CSA 


Que-  For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer. 

a.  SaaS 

b.  PaaS 

c.  IaaS 

d.  All of the mentioned 


Answer-  PaaS 


Que-  Point out the wrong statement: 

a.  Each different type of cloud service delivery model creates a security boundary 

b.  Any security mechanism below the security boundary must be built into the system 

c.  Any security mechanism above the security boundary must be maintained by the customer 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Which of the following model allows vendor to provide security as part of the Service Level Agreement ? 

a.  SaaS 

b.  PaaS 

c.  IaaS 

d. None of the mentioned 


Answer-  SaaS 


Que-  Which of the following cloud does not require mapping ? 

a.  Public 

b.  Private 

c.  Hybrid 

d.  None of the mentioned 


Answer-  Public 


Que-  Which of the following service model is owned in terms of infrastructure by both vendor and customer ? 

a.  Public 

b.  Private 

c.  Hybrid 

d.  None of the mentioned 


Answer-  Hybrid 


Que-  Which of the following model type is not trusted in terms of security ? 

a.  Public 

b.  Private 

c.  Hybrid 

d.  None of the mentioned 


Answer-  Public 


Que-  Which of the following has infrastructure security managed and  owned by vendor ? 

a.  Hybrid 

b.  Private/Community 

c.  Public 

d.  None of the mentioned 


Answer-  Private/Community 


Que-  Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand ? 

a.  SOA 

b.  EBS 

c.  GEC 

d.  All of the mentioned 


Answer-  SOA 


Que-  Point out the correct statement: 

a.  Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results 

b.  SOA provides the translation and management layer in an architecture that removes the barrier for a client obtaining desired services 

c.  With SOA, clients and components can be written in different languages and can use multiple messaging protocols 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Which of the following is a repeatable task within a business process ? 

a.  service 

b.  bus 

c.  methods 

d.  all of the mentioned 


Answer-  service 


Que-  Point out the wrong statement: 

a.  SOA provides the standards that transport the messages and makes the infrastructure to support it possible 

b.  SOA provides access to reusable Web services over a SMTP network 

c.  SOA offers access to ready-made, modular, highly optimized, and widely shareable components that can minimize developer and infrastructure costs 

d.  None of the mentioned 


Answer-  SOA provides access to reusable Web services over a SMTP network 


Que-  Which of the following is used to define the service component that performs the service ? 

a.  WSDL 

b.  SCDL 

c.  XML 

d.  None of the mentioned 


Answer-  SCDL 


Que-  Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint ? 

a.  WSDL 

b.  SCDL 

c.  XML 

d.  None of the mentioned 


Answer-  WSDL 


Que-  Which of the following provides commands for defining logic using conditional statements ? 

a.  XML 

b.  WS-BPEL 

c.  JSON 

d.  None of the mentioned 


Answer-  WS-BPEL 


Que-  Which of the following is policy based XML security service by Cisco ? 

a.  Application Oriented Manager 

b.  Application Oriented Networking 

c.  Application Process Networking 

d.  All of the mentioned 


Answer-  Application Oriented Networking 


Que-  Point out the wrong statement: 

a.  SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren’t likely to be effective 

b.  An atomic service cannot be decomposed into smaller services that provide a useful function 

c.  XML security service may be found in Citrix’s NetScaler 9.0 

d.  None of the mentioned 


Answer-  None of the mentioned 


Que-  Which of the following is not a OASIS standard for SOA Security ? 

a.  Security Assertion Markup Language 

b.  Synchronized Multimedia Integration Language 

c.  WS-SecureConversion 

d.  All of the mentioned 


Answer-  Synchronized Multimedia Integration Language 


Que-  Which of the following provides data authentication and authorization between client and service ? 

a.  SAML 

b.  WS-SecureConversion 

c.  WS-Security 

d.  All of the mentioned 


Answer-  SAML 


Que-  Point out the wrong statement: 

a.  To address SOA security, a set of OASIS standards have been created 

b.  WS-SecureConversion attaches a security context token to communications such as SOAP used to transport messages in an SOA enterprise 

c.  WS-Trust is an extension of SOA that enforces security by applying tokens such as Kerberos, SAML, or X.509 to messages 

d.  None of the mentioned 


Answer-  WS-Trust is an extension of SOA that enforces security by applying tokens such as Kerberos, SAML, or X.509 to messages 


Que-  Which of the following is web services protocol for creating and sharing security context ? 

a.  WS-Trust 

b.  WS-SecureConversion 

c.  WS-SecurityPolicy 

d.  All of the mentioned 


Answer-  WS-SecureConversion 


Que-  Which of the following is part of a general WS-Policy framework ? 

a.  WS-Trust 

b.  WS-SecureConversion 

c.  WS-SecurityPolicy 

d.  All of the mentioned 


Answer-  WS-SecurityPolicy 


Que-  Which of the following extends WS-Security to provide a mechanism to issue, renew, and validate security tokens ? 

a.  WS-Trust 

b.  WS-SecureConversion 

c.  WS-SecurityPolicy 

d.  All of the mentioned 


Answer-  WS-Trust 


Que-  __________ is a mechanism for attaching security tokens to messages. 

a.  STT 

b.  STS 

c.  SAS 

d.  All of the mentioned 


Answer-  STS 


Que-  Providing XML Gateway SOA security requires a _________ so that encryption is enforced by digital signatures. 

a.  Public Key Infrastructure 

b.  Private Key Infrastructure 

c.  Hybrid Key Infrastructure 

d.  None of the mentioned 


Answer-  Public Key Infrastructure 


Que-  Which of the following products have SOA management tool ? 

a.  HP Software and Solutions OpenView SOA Manager 

b.  IBM Tivoli Framework Composite Application Manager 

c.  Oracle BPEL Process Manager 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Point out the wrong statement: 

a.  A service in SOMF that is granular and very narrow in scope is referred to as an atomic service 

b.  An atomic service can be decomposed into smaller services that provide a useful function 

c.  SOA describes a distributed collection of services performing business process functions 

d.  All of the mentioned 


Answer-  An atomic service can be decomposed into smaller services that provide a useful function 


Que-  Which of the following is an automated SOA problem-resolution package ? 

a.  AppSight 

b.  LISA 

c.  CoreFirst 

d.  All of the mentioned 


Answer-  AppSight 


Que-  Which of the following is a SOA transaction manager ? 

a.  AppSight 

b.  LISA 

c.  CoreFirst 

d.  All of the mentioned 


Answer-  CoreFirst 


Que-  Point out the wrong statement: 

a.  Service clusters may be composed of both atomic services and composite services 

b.  Large functions such as payroll modules would normally be atomic SOA services 

c.  A composite service is usually organized as a hierarchical topology and is multi-functional or a coarse-grained entity 

d.  None of the mentioned 


Answer-  Large functions such as payroll modules would normally be atomic SOA services 

Previous Post Next Post

Responsive Ad