Top 1000+ Solved Cloud Computing MCQ Questions Answer

From 271 to 285 of 960

Q. Point out the wrong statement.

a. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage

b. any distributed application has a much greater attack surface than an application that is closely held on a local area network

c. cloud computing doesn’t have vulnerabilities associated with internet applications

d. all of the mentioned

  • c. cloud computing doesn’t have vulnerabilities associated with internet applications

Q. Which of the following is the operational domain of CSA(Cloud Security Alliance)?

a. scalability

b. portability and interoperability

c. flexibility

d. none of the mentioned

  • b. portability and interoperability

Q. Which of the following cloud does not require mapping?

a. public

b. private

c. hybrid

d. none of the mentioned

  • a. public

Q. Which of the following service model is owned in terms of infrastructure by both vendor and customer?

a. public

b. private

c. hybrid

d. none of the mentioned

  • c. hybrid

Q. Which of the following model type is not trusted in terms of security?

a. public

b. private

c. hybrid

d. none of the mentioned

  • a. public

Q. Which of the following has infrastructure security managed and owned by the vendor?

a. hybrid

b. private/community

c. public

d. none of the mentioned

  • b. private/community

Q. Point out the wrong statement.

a. each different type of cloud service delivery model creates a security boundary

b. any security mechanism belowthe security boundary must be built into the system

c. any security mechanism above the security boundary must be maintained by the customer

d. all of the mentioned

  • d. all of the mentioned

Q.   is an application for collecting messages sent in RSS and Atom format from information providers.

a. google reader

b. yahoo mail

c. emailrackspace

d. all of the mentioned

  • a. google reader

Q. Which of the following was developed an alternative to XML syndication by IETF?

a. atom publishing protocol

b. atom subscribing protocol

c. atom subscribe protocol

d. none of the mentioned

  • a. atom publishing protocol

Q. The full form of AJAX is

a. asynchronous javascript and xml

b. another java and xml library

c. abstract json and xml

d. none of the mentioned

  • a. asynchronous javascript and xml

Q. The advantages of Ajax is  

a. bandwidth utilization

b. more interactive

c. speeder retrieval of data

d. all of these

  • d. all of these
Subscribe Now

Get All Updates & News