Top 1000+ Solved Cloud Computing MCQ Questions Answer
Q. The following flowchart is intended to evaluate in any cloud.
a. risk
b. errors
c. inconsistencies
d. none of the mentioned
Q. Point out the wrong statement.
a. you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
b. any distributed application has a much greater attack surface than an application that is closely held on alocal area network
c. cloud computing doesn’t have vulnerabilities associated with internet applications
d. all of the mentioned
Q. Which of the following area of cloud computing is uniquely troublesome?
a. auditing
b. data integrity
c. e-discovery for legalcompliance
d. all of the mentioned
Q. Which of the following is the operational domain of CSA(Cloud SecurityAlliance)?
a. scalability
b. portability andinteroperability
c. flexibility
d. none of thementioned
Q. Which of the following is considered an essential element in cloud computingby CSA?
a. multi-tenancy
b. identity and accessmanagement
c. virtualization
d. all of the mentioned
Q. Which of the following is used for Web performance management and loadtesting?
a. vmware hyperic
b. webmetrics
c. univa ud
d. tapinsystems
Q. Which of the following service provider provides the highest level of service?
a. saas
b. paas
c. iaas
d. all of the mentioned
Q. Point out the correct statement.
a. paas supplies the infrastructure
b. iaas adds application development frameworks, transactions, and control structures
c. saas is an operating environment with applications, management, and the user interface
d. all of the mentioned
Q. Which of the following functional cloud computing hardware/software stackis the Cloud Reference Model?
a. cas
b. csa
c. sac
d. all of the mentioned
Q. For the model, the security boundary may be defined for thevendor to include the software framework and middleware layer.
a. saas
b. paas
c. iaas
d. all of the mentioned
Q. Which of the following model allows vendor to provide security as part of theService Level Agreement?
a. saas
b. paas
c. iaas
d. all of the mentioned
Q. Which of the following cloud does not require mapping?
a. public
b. private
c. hybrid
d. none of thementioned
Q. Which of the following service model is owned in terms of infrastructure byboth vendor and customer?
a. public
b. private
c. hybrid
d. none of thementioned
Q. Which of the following model type is not trusted in terms of security?
a. public
b. private
c. hybrid
d. none of thementioned
Q. Which of the following has infrastructure security managed and owned bythe vendor?
a. hybrid
b. private/community
c. public
d. none of thementioned