On This Page

This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 4

Q1 | Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
  • amazon elastic compute cloud
  • amazon associates web services
  • alexa web information service
  • all of the mentioned
Q2 | Which of the following is a billing and account management service?
  • amazon elasticmapreduce
  • amazon mechanicalturk
  • amazon devpay
  • multi-factorauthentication
Q3 | Which of the following is not the feature of Network management systems?
  • accounting
  • security
  • performance
  • none of thementioned
Q4 | Which of the following service provider provides the least amount of built insecurity?
  • saas
  • paas
  • iaas
  • all of the mentioned
Q5 | Point out the correct statement.
  • different types of cloud computing service models provide different levels of security services
  • adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
  • data should be transferred and stored in an encrypted format for security purpose
  • all of the mentioned
Q6 | Which of the following services that need to be negotiated in Service LevelAgreements?
  • logging
  • auditing
  • regulatorycompliance
  • all of the mentioned
Q7 | The following flowchart is intended to evaluate                      in any cloud.
  • risk
  • errors
  • inconsistencies
  • none of the mentioned
Q8 | Point out the wrong statement.
  • you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
  • any distributed application has a much greater attack surface than an application that is closely held on alocal area network
  • cloud computing doesn’t have vulnerabilities associated with internet applications
  • all of the mentioned
Q9 | Which of the following area of cloud computing is uniquely troublesome?
  • auditing
  • data integrity
  • e-discovery for legalcompliance
  • all of the mentioned
Q10 | Which of the following is the operational domain of CSA(Cloud SecurityAlliance)?
  • scalability
  • portability andinteroperability
  • flexibility
  • none of thementioned
Q11 | Which of the following is considered an essential element in cloud computingby CSA?
  • multi-tenancy
  • identity and accessmanagement
  • virtualization
  • all of the mentioned
Q12 | Which of the following is used for Web performance management and loadtesting?
  • vmware hyperic
  • webmetrics
  • univa ud
  • tapinsystems
Q13 | Which of the following service provider provides the highest level of service?
  • saas
  • paas
  • iaas
  • all of the mentioned
Q14 | Point out the correct statement.
  • paas supplies the infrastructure
  • iaas adds application development frameworks, transactions, and control structures
  • saas is an operating environment with applications, management, and the user interface
  • all of the mentioned
Q15 | Which of the following functional cloud computing hardware/software stackis the Cloud Reference Model?
  • cas
  • csa
  • sac
  • all of the mentioned
Q16 | For the                    model, the security boundary may be defined for thevendor to include the software framework and middleware layer.
  • saas
  • paas
  • iaas
  • all of the mentioned
Q17 | Which of the following model allows vendor to provide security as part of theService Level Agreement?
  • saas
  • paas
  • iaas
  • all of the mentioned
Q18 | Which of the following cloud does not require mapping?
  • public
  • private
  • hybrid
  • none of thementioned
Q19 | Which of the following service model is owned in terms of infrastructure byboth vendor and customer?
  • public
  • private
  • hybrid
  • none of thementioned
Q20 | Which of the following model type is not trusted in terms of security?
  • public
  • private
  • hybrid
  • none of thementioned
Q21 | Which of the following has infrastructure security managed and owned bythe vendor?
  • hybrid
  • private/community
  • public
  • none of thementioned
Q22 | Point out the wrong statement.
  • each different type of cloud service delivery model creates a security boundary
  • any security mechanism below the security boundary must be built into the system
  • any security mechanism above the security boundary must be maintained by the customer
  • all of the mentioned
Q23 |                        is an application for collecting messages sent in RSS and Atomformat from information providers.
  • google reader
  • yahoo mail
  • emailrackspace
  • all of the mentioned
Q24 | Which of the following application is a newsreader?
  • google reader
  • bloglines
  • newsgator online
  • all of the mentioned
Q25 | Which of the following was developed an alternative to XML syndication byIETF?
  • atom publishingprotocol
  • atom subscribingprotocol
  • atom subscribeprotocol
  • none of thementioned