On This Page

This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 36

Q1 | Which of the following is the standard for interoperable cloud-based key management?
  • kmip
  • pmik
  • aimk
  • none of the mentioned
Q2 | Which of the following was one of the weaker aspects of early cloud computing service offerings?
  • logging
  • integrity checking
  • consistency checking
  • none of the mentioned
Q3 | Which of the following is one of the most actively developing and important areas of cloud computing technology?
  • logging
  • auditing
  • regulatory compliance
  • none of the mentioned
Q4 | Amazon Web Services supports                  Type II Audits.
  • sas70
  • sas20
  • sas702
  • none of the mentioned
Q5 | Which of the following is the most complete cloud computing service model?
  • paas
  • iaas
  • caas
  • saas
Q6 | Point out the correct statement.
  • platforms can be based on specific types of development languages, application frameworks, or other constructs
  • saas is the cloud-based equivalent of shrink-wrapped software
  • software as a service (saas) may be succinctly described as software that is deployed on a hosted service
  • all of the mentioned
Q7 | Which of the following aspect of the service is abstracted away?
  • data escrow
  • user interaction
  • adoption drivers
  • none of the mentioned
Q8 | Which of the following SaaS platform is with an exposed API?
  • salesforce.com
  • amazon.com
  • flipkart.com
  • all of the mentioned
Q9 | Point out the wrong statement.
  • saas applications come in all shapes and sizes
  • every computer user is familiar with saas systems
  • saas software is not customizable
  • none of the mentioned
Q10 | Which of the following is a SaaS characteristic?
  • the typical license is subscription-based or usage-based and is billed on a recurring basis
  • the software is available over the internet globally through a browser on demand
  • the software and the service are monitored and maintained by the vendor
  • all of the mentioned
Q11 |                    applications have a much lower barrier to entry than their locally installed competitors.
  • iaas
  • caas
  • paas
  • none of the mentioned
Q12 | SaaS supports multiple users and provides a shared data model through                     model.
  • single-tenancy
  • multi-tenancy
  • multiple-instance
  • all of the mentioned
Q13 | Open source software used in a SaaS is called                SaaS.
  • closed
  • free
  • open
  • all of the mentioned
Q14 | The componentized nature of SaaS solutions enables many solutions to support a feature called                            
  • workspace
  • workloads
  • mashups
  • all of the mentioned
Q15 | Which of the following service provider provides the highest level of service?
  • saas
  • paas
  • iaas
  • all of the mentioned
Q16 | Point out the correct statement.
  • paas supplies the infrastructure
  • iaas adds application development frameworks, transactions, and control structures
  • saas is an operating environment with applications, management, and the user interface
  • all of the mentioned
Q17 | Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
  • cas
  • csa
  • sac
  • all of the mentioned
Q18 | For the                    model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
  • saas
  • paas
  • iaas
  • all of the mentioned
Q19 | Point out the wrong statement.
  • each different type of cloud service delivery model creates a security boundary
  • any security mechanism below the security boundary must be built into the system
  • any security mechanism above the security boundary must be maintained by the customer
  • all of the mentioned
Q20 | Which of the following model allows vendor to provide security as part of the Service Level Agreement?
  • saas
  • paas
  • iaas
  • all of the mentioned
Q21 | Which of the following cloud does not require mapping?
  • public
  • private
  • hybrid
  • none of the mentioned
Q22 | Which of the following service model is owned in terms of infrastructure by both vendor and customer?
  • public
  • private
  • hybrid
  • none of the mentioned
Q23 | Which of the following model type is not trusted in terms of security?
  • public
  • private
  • hybrid
  • none of the mentioned
Q24 | Which of the following has infrastructure security managed and owned by the vendor?
  • hybrid
  • private/community
  • public
  • none of the mentioned
Q25 | Which of the following feature make cloud-based storage systems highly reliable?
  • redundant networks
  • redundant name servers
  • replication
  • all of the mentioned