Top 1000+ Solved Cloud Computing MCQ Questions Answer
Q. The need for data replication can arise in various scenarios like
a. DataNode is the slave/worker node and holds the user data in the form of Data Blocks
b. DataNode goes down
c. Data Blocks get corrupted
d. All of the above
Q. If the IP address or hostname of a data node changes
a. The namenode updates the mapping between file name and block name
b. The data in that data node is lost forever
c. The namenode need not update mapping between file name and block name
d. There namenode has to be restarted
Q. For the frequently accessed HDFS files the blocks are cached in
a. The memory of the data node
b. In the memory of the namenode
c. Both the above
d. None of the above
Q. Which of the following is not the feature of Network management systems?
a. Accounting
b. Security
c. Performance
d. None of the mentioned
Q. Which of the following service provider provides the least amount of built in security?
a. SaaS
b. PaaS
c. IaaS
d. All of the mentioned
Q. Point out the correct statement.
a. Different types of cloud computing service models provide different levels of security services
b. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required
c. Data should be transferred and stored in an encrypted format for security purpose
d. All of the mentioned
Q. Point out the wrong statement.
a. You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
b. Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
c. Cloud computing doesn’t have vulnerabilities associated with Internet applications
d. All of the mentioned
Q. Which of the following is the operational domain of CSA(Cloud Security Alliance)?
a. Scalability
b. Portability and interoperability
c. Flexibility
d. None of the mentioned
Q. Which of the following is considered an essential element in cloud computing by CSA?
a. Multi-tenancy
b. Identity and access management
c. Virtualization
d. All of the mentioned
Q. Which of the following is used for Web performance management and load testing?
a. VMware Hyperic
b. Webmetrics
c. Univa UD
d. Tapinsystems
Q. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
a. CAS
b. CSA
c. SAC
d. All of the mentioned
Q. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
a. SaaS
b. PaaS
c. IaaS
d. All of the mentioned
Q. Which of the following cloud does not require mapping?
a. Public
b. Private
c. Hybrid
d. None of the mentioned
Q. Point out the wrong statement.
a. Each different type of cloud service delivery model creates a security boundary
b. Any security mechanism below the security boundary must be built into the system
c. Any security mechanism above the security boundary must be maintained by the customer
d. All of the mentioned