Headlines
Loading...
Cloud Computing MCQ (Multiple Choice Questions) - SchoolingAxis

Cloud Computing MCQ (Multiple Choice Questions) - SchoolingAxis

Cloud Computing MCQ (Multiple Choice Questions)

Que-  Which of the following is a virtualization provisioning system that will be rolled into Dell’s AIM ? 

a.  Dell Scalent 

b.  CloudKick 

c.  Elastra 

d.  All of the mentioned 


Answer-  Dell Scalent 


Que-  Which of the following is used for Web site monitoring and analytics ? 

a.  Gomez 

b.  Ganglia 

c.  Elastra 

d.  None of the mentioned 


Answer-  Gomez 


Que-  Which of the following is used for performance management for virtualized Java Apps with VMware integration ? 

a.  Hyperic 

b.  Internetseer 

c.  RightScale 

d.  All of the mentioned 


Answer-  Hyperic 


Que-  Which of the following is a core management feature offered by most cloud management service products ? 

a.  Support of different cloud types 

b.  Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications 

c.  Performance reporting including availability and uptime, response time, resource quota usage, and other characteristics 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Point out the correct statement: 

a.  Eucalyptus and Rackspace both use Amazon EC2 and S3 services 

b.  The RightScale user interface provides real-time measurements of individual server instances 

c.  RightScale server templates and the Rightscript technology are highly configurable and can be run under batch control 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Which of the following is an industry organization that develops industry system management standards for platform interoperability ? 

a.  DMTF 

b.  DMS 

c.  EBS 

d.  All of the mentioned 


Answer-  DMTF 


Que-  Which of the following is used to extend CIM to virtual computer system management ? 

a.  OVF 

b.  VMAN 

c.  OCSI 

d.  None of the mentioned 


Answer-  VMAN 


Que-  Point out the wrong statement: 

a.  Cloudkick’s Insight module is powerful and particularly easy to use 

b.  Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances 

c.  All of the service models support monitoring solutions 

d.  All of the mentioned 


Answer-  Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances 


Que-  Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost ? 

a.  CCE 

b.  OCCI 

c.  SMI 

d.  All of the mentioned 


Answer-  SMI 


Que-  Which of the following is open and both hypervisor and processor-architecture-agnostic ? 

a.  Dell Scalent 

b.  CloudKick 

c.  Elastra 

d.  All of the mentioned 


Answer-  Dell Scalent 


Que-  Which of the following is a workflow control and policy based automation service by CA ? 

a.  CA Cloud Optimize 

b.  CA Cloud Orchestrate 

c.  CA Cloud Insight 

d.  CA Cloud Compose 


Answer-  CA Cloud Orchestrate 


Que-  Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons ? 

a.  CloudWatch 

b.  CloudSensor 

c.  CloudMetrics 

d.  All of the mentioned 


Answer-  CloudSensor 


Que-  Which of the following is a compliance standard? 

a.  PCI-DSS 

b.  HIPPA 

c.  GLBA 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Point out the correct statement: 

a.  The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements 

b.  To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying 

c.  A security control model includes the security that you normally use for your applications only 

d.  All of the mentioned 


Answer-  To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying 


Que-  Which of the following is key mechanism for protecting data? 

a.  Access control 

b.  Auditing 

c.  Authentication 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  How many security accounts per client is provided by Microsoft? 

a. 1 

b. 3 

c. 5 

d. 7 


Answer- 5 


Que-  Point out the wrong statement: 

a.  Securing data sent to, received from, and stored in the cloud is the single largest security concern 

b.  The problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider’s system 

c.  One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data 

d.  All of the mentioned 


Answer-  One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data 


Que-  Which of the following is a common means for losing encrypted data? 

a.  lose the keys 

b.  lose the encryption standard 

c.  lose the account 

d.  all of the mentioned 


Answer-  lose the keys 


Que-  Which of the following is the standard for interoperable cloud-based key management? 

a.  KMIP 

b.  PMIK 

c.  AIMK 

d.  None of the mentioned 


Answer-  KMIP 


Que-  Which of the following was one of the weaker aspects of early cloud computing service offerings? 

a.  Logging 

b.  Integrity checking 

c.  Consistency checking 

d.  None of the mentioned 


Answer-  Logging 


Que-  Which of the following is one of the most actively developing and important areas of cloud computing technology? 

a.  Logging 

b.  Auditing 

c.  Regulatory compliance 

d.  None of the mentioned 


Answer-  Regulatory compliance 


Que-  Amazon Web Services supports ________ Type II Audits. 

a.  SAS70 

b.  SAS20 

c.  SAS702 

d.  None of the mentioned 


Answer-  SAS70 


Que-  Which of the following is done by Identity management ? 

a.  controlling access to data in the cloud 

b.  maintaining user roles 

c.  preventing unauthorized uses 

d.  all of the mentioned 


Answer-  all of the mentioned 


Que-  Point out the correct statement: 

a.  Identities are not tied to the concept of accounts and can be used for contacts or “ID cards” 

b.  Identities are important from a reliability standpoint 

c.  Presence is important in cloud computing because it adds context that can modify services and service delivery 

d.  All of the mentioned 


Answer-  Presence is important in cloud computing because it adds context that can modify services and service delivery 


Que-  Which of the following is required by Cloud Computing ? 

a.  That you establish an identity 

b.  That the identity be authenticated 

c.  That the authentication be portable 

d.  All of the mentioned 


Answer-  All of the mentioned 


Que-  Which of the following standard is the key to creating Single Sign-On (SSO) systems ? 

a.  OpenID 2.0 

b.  CHAP 

c.  SMAL 

d.  None of the mentioned 


Answer-  OpenID 2.0 


Que-  Point out the wrong statement: 

a.  OpenID 2.0 is the standard associated with creating an identity 

b.  OpenID doesn’t specify the means for authentication of an identity, 

c.  OpenID provides access to important Web sites 

d.  None of the mentioned 


Answer-  None of the mentioned 


Que-  Which of the following is a complementary mechanism to OpenID and is used to create SSO systems ? 

a.  OpenSSL 

b.  CHAP 

c.  SMAL 

d.  None of the mentioned 


Answer-  SMAL 


Que-  Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials ? 

a.  serving party 

b.  relieving party 

c.  relaying party 

d.  none of the mentioned 


Answer-  relaying party 


Que-  Which of the following provides a token service that can be used to present validated access to resources ? 

a.  OAuth 

b.  OCheck 

c.  SAML 

d.  None of the mentioned 


Answer-  OAuth 


Que-  Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards ? 

a.  Windows Wor kflow 

b.  Windows Identity 

c.  Windows compliance 

d.  None of the mentioned 


Answer-  Windows Identity 


Que-  __________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity. 

a.  AD FS 

b.  AC 

c.  SAS 

d.  None of the mentioned 


Answer-  AD FS 


Que-  Which of the following service provider provides the least amount of built in security ? 

a.  SaaS 

b.  PaaS 

c.  IaaS 

d.  All of the mentioned 


Answer-  IaaS 


Que-  Point out the correct statement: 

a.  Different types of cloud computing service models provide different levels of security services 

b.  Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider 

c.  Data should be transferred and stored in an encrypted format for security purpose 

d.  All of the mentioned 


Answer-  All of the mentioned