Cloud Computing Set 36
On This Page
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 36
Q1 | Which of the following is the standard for interoperable cloud-based key management?
- kmip
- pmik
- aimk
- none of the mentioned
Q2 | Which of the following was one of the weaker aspects of early cloud computing service offerings?
- logging
- integrity checking
- consistency checking
- none of the mentioned
Q3 | Which of the following is one of the most actively developing and important areas of cloud computing technology?
- logging
- auditing
- regulatory compliance
- none of the mentioned
Q4 | Amazon Web Services supports Type II Audits.
- sas70
- sas20
- sas702
- none of the mentioned
Q5 | Which of the following is the most complete cloud computing service model?
- paas
- iaas
- caas
- saas
Q6 | Point out the correct statement.
- platforms can be based on specific types of development languages, application frameworks, or other constructs
- saas is the cloud-based equivalent of shrink-wrapped software
- software as a service (saas) may be succinctly described as software that is deployed on a hosted service
- all of the mentioned
Q7 | Which of the following aspect of the service is abstracted away?
- data escrow
- user interaction
- adoption drivers
- none of the mentioned
Q8 | Which of the following SaaS platform is with an exposed API?
- salesforce.com
- amazon.com
- flipkart.com
- all of the mentioned
Q9 | Point out the wrong statement.
- saas applications come in all shapes and sizes
- every computer user is familiar with saas systems
- saas software is not customizable
- none of the mentioned
Q10 | Which of the following is a SaaS characteristic?
- the typical license is subscription-based or usage-based and is billed on a recurring basis
- the software is available over the internet globally through a browser on demand
- the software and the service are monitored and maintained by the vendor
- all of the mentioned
Q11 | applications have a much lower barrier to entry than their locally installed competitors.
- iaas
- caas
- paas
- none of the mentioned
Q12 | SaaS supports multiple users and provides a shared data model through model.
- single-tenancy
- multi-tenancy
- multiple-instance
- all of the mentioned
Q13 | Open source software used in a SaaS is called SaaS.
- closed
- free
- open
- all of the mentioned
Q14 | The componentized nature of SaaS solutions enables many solutions to support a feature called
- workspace
- workloads
- mashups
- all of the mentioned
Q15 | Which of the following service provider provides the highest level of service?
- saas
- paas
- iaas
- all of the mentioned
Q16 | Point out the correct statement.
- paas supplies the infrastructure
- iaas adds application development frameworks, transactions, and control structures
- saas is an operating environment with applications, management, and the user interface
- all of the mentioned
Q17 | Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
- cas
- csa
- sac
- all of the mentioned
Q18 | For the model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
- saas
- paas
- iaas
- all of the mentioned
Q19 | Point out the wrong statement.
- each different type of cloud service delivery model creates a security boundary
- any security mechanism below the security boundary must be built into the system
- any security mechanism above the security boundary must be maintained by the customer
- all of the mentioned
Q20 | Which of the following model allows vendor to provide security as part of the Service Level Agreement?
- saas
- paas
- iaas
- all of the mentioned
Q21 | Which of the following cloud does not require mapping?
- public
- private
- hybrid
- none of the mentioned
Q22 | Which of the following service model is owned in terms of infrastructure by both vendor and customer?
- public
- private
- hybrid
- none of the mentioned
Q23 | Which of the following model type is not trusted in terms of security?
- public
- private
- hybrid
- none of the mentioned
Q24 | Which of the following has infrastructure security managed and owned by the vendor?
- hybrid
- private/community
- public
- none of the mentioned
Q25 | Which of the following feature make cloud-based storage systems highly reliable?
- redundant networks
- redundant name servers
- replication
- all of the mentioned