Top 1000+ Solved Cloud Computing MCQ Questions Answer

From 1 to 15 of 960

Q. Cloud model relies on

a. communication api

b. middleware

c. web documents

d. embedded device

  • a. communication api

Q. What widely used service is built on cloud-computing technology?

a. twitter

b. skype

c. gmail

d. all of the above

  • d. all of the above

Q. HTTP is a protocol

a. stateful

b. unidirectional

c. bidirectional

d. full dulpex

  • b. unidirectional

Q. websocket is a         Protocol

a. stateful

b. bidirectional

c. connection oriented

d. all of the above

  • d. all of the above

Q. Websocket protocol uses which communication model

a. publish-subscribe

b. request response

c. push-pull

d. exclusive pair

  • a. publish-subscribe

Q. Which of these techniques is vital for creating cloud-computing centers

a. virtualization

b. transubstantiation

c. cannibalization

d. insubordination

  • a. virtualization

Q. An internal cloud is…

a. an overhanging threat

b. a career risk for a cio

c. a cloud that sits behind a corporate

d. the group of knowledge workers who use a social network for water- cooler gossip

  • d. the group of knowledge workers who use a social network for water- cooler gossip

Q. Which of these is not an antecedent of the cloud?

a. software as a service

b. utility computing

c. grid computing

d. desktop computing

  • d. desktop computing

Q. Which of the following subject area deals with pay-as-you-go usage model?

a. accountingmanagement

b. compliance

c. data privacy

d. all of the mentioned

  • a. accountingmanagement

Q. Point out the correct statement

a. except for tightly managed saas cloud providers

b. cloud computing vendors run very reliable networks

c. the low barrier to entry cannot be accompanied by a low barrier toprovisioning

d. all of the mentioned

  • b. cloud computing vendors run very reliable networks

Q.                  captive requires that the cloud accommodate multiple complianceregimes.

a. licensed

b. policy-based

c. variable

d. all of the mentioned

  • b. policy-based

Q. Security methods such as private encryption, VLANs and firewalls comesunder subject area.

a. accountingmanagement

b. compliance

c. data privacy

d. all of the mentioned

  • c. data privacy

Q. Which of the following captive area deals with monitoring?

a. licensed

b. variable but undercontrol

c. law

d. all of the mentioned

  • b. variable but undercontrol

Q. Network bottlenecks occur when              data sets must be transferred

a. large

b. small

c. big

d. all of the mentioned

  • a. large

Q. Amazon AWS Consists of following services

a. iaas

b. paas

c. saas

d. all of above

  • d. all of above
Subscribe Now

Get All Updates & News