Top 1000+ Solved Cloud Computing MCQ Questions Answer

From 751 to 765 of 960

Q. The need for data replication can arise in various scenarios like

a. DataNode is the slave/worker node and holds the user data in the form of Data Blocks

b. DataNode goes down

c. Data Blocks get corrupted

d. All of the above

  • d. All of the above

Q. If the IP address or hostname of a data node changes

a. The namenode updates the mapping between file name and block name

b. The data in that data node is lost forever

c. The namenode need not update mapping between file name and block name

d. There namenode has to be restarted

  • c. The namenode need not update mapping between file name and block name

Q. For the frequently accessed HDFS files the blocks are cached in

a. The memory of the data node

b. In the memory of the namenode

c. Both the above

d. None of the above

  • a. The memory of the data node

Q. In HDFS the files cannot be

a. Read

b. Deleted

c. Executed

d. Archived

  • c. Executed

Q. Which of the following is not the feature of Network management systems?

a. Accounting

b. Security

c. Performance

d. None of the mentioned

  • d. None of the mentioned

Q. Which of the following service provider provides the least amount of built in security?

a. SaaS

b. PaaS

c. IaaS

d. All of the mentioned

  • c. IaaS

Q. Point out the correct statement.

a. Different types of cloud computing service models provide different levels of security services

b. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required

c. Data should be transferred and stored in an encrypted format for security purpose

d. All of the mentioned

  • d. All of the mentioned

Q. Point out the wrong statement.

a. You can use proxy and brokerage services to separate clients from direct access to shared cloud storage

b. Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network

c. Cloud computing doesn’t have vulnerabilities associated with Internet applications

d. All of the mentioned

  • c. Cloud computing doesn’t have vulnerabilities associated with Internet applications

Q. Which of the following is the operational domain of CSA(Cloud Security Alliance)?

a. Scalability

b. Portability and interoperability

c. Flexibility

d. None of the mentioned

  • b. Portability and interoperability

Q. Which of the following is considered an essential element in cloud computing by CSA?

a. Multi-tenancy

b. Identity and access management

c. Virtualization

d. All of the mentioned

  • a. Multi-tenancy

Q. Which of the following is used for Web performance management and load testing?

a. VMware Hyperic

b. Webmetrics

c. Univa UD

d. Tapinsystems

  • b. Webmetrics

Q. Which of the following cloud does not require mapping?

a. Public

b. Private

c. Hybrid

d. None of the mentioned

  • a. Public

Q. Point out the wrong statement.

a. Each different type of cloud service delivery model creates a security boundary

b. Any security mechanism below the security boundary must be built into the system

c. Any security mechanism above the security boundary must be maintained by the customer

d. All of the mentioned

  • d. All of the mentioned
Subscribe Now

Get All Updates & News