Top 1000+ Solved Cloud Computing MCQ Questions Answer
Q. Point out the wrong statement.
a. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
b. any distributed application has a much greater attack surface than an application that is closely held on a local area network
c. cloud computing doesn’t have vulnerabilities associated with internet applications
d. all of the mentioned
Q. Which of the following is the operational domain of CSA(Cloud Security Alliance)?
a. scalability
b. portability and interoperability
c. flexibility
d. none of the mentioned
Q. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
a. cas
b. csa
c. sac
d. all of the mentioned
Q. For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
a. saas
b. paas
c. iaas
d. all of the mentioned
Q. Which of the following model allows vendor to provide security as part of the Service Level Agreement?
a. saas
b. paas
c. iaas
d. all of the mentioned
Q. Which of the following cloud does not require mapping?
a. public
b. private
c. hybrid
d. none of the mentioned
Q. Which of the following service model is owned in terms of infrastructure by both vendor and customer?
a. public
b. private
c. hybrid
d. none of the mentioned
Q. Which of the following model type is not trusted in terms of security?
a. public
b. private
c. hybrid
d. none of the mentioned
Q. Which of the following has infrastructure security managed and owned by the vendor?
a. hybrid
b. private/community
c. public
d. none of the mentioned
Q. Point out the wrong statement.
a. each different type of cloud service delivery model creates a security boundary
b. any security mechanism belowthe security boundary must be built into the system
c. any security mechanism above the security boundary must be maintained by the customer
d. all of the mentioned
Q. is an application for collecting messages sent in RSS and Atom format from information providers.
a. google reader
b. yahoo mail
c. emailrackspace
d. all of the mentioned
Q. Which of the following was developed an alternative to XML syndication by IETF?
a. atom publishing protocol
b. atom subscribing protocol
c. atom subscribe protocol
d. none of the mentioned
Q. The full form of AJAX is
a. asynchronous javascript and xml
b. another java and xml library
c. abstract json and xml
d. none of the mentioned
Q. The advantages of Ajax is
a. bandwidth utilization
b. more interactive
c. speeder retrieval of data
d. all of these