Cloud Computing Set 4
On This Page
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 4
Q1 | Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?
- amazon elastic compute cloud
- amazon associates web services
- alexa web information service
- all of the mentioned
Q2 | Which of the following is a billing and account management service?
- amazon elasticmapreduce
- amazon mechanicalturk
- amazon devpay
- multi-factorauthentication
Q3 | Which of the following is not the feature of Network management systems?
- accounting
- security
- performance
- none of thementioned
Q4 | Which of the following service provider provides the least amount of built insecurity?
- saas
- paas
- iaas
- all of the mentioned
Q5 | Point out the correct statement.
- different types of cloud computing service models provide different levels of security services
- adapting your on- premises systems to a cloud model requires that you determine what security mechanisms are required
- data should be transferred and stored in an encrypted format for security purpose
- all of the mentioned
Q6 | Which of the following services that need to be negotiated in Service LevelAgreements?
- logging
- auditing
- regulatorycompliance
- all of the mentioned
Q7 | The following flowchart is intended to evaluate in any cloud.
- risk
- errors
- inconsistencies
- none of the mentioned
Q8 | Point out the wrong statement.
- you can use proxy and brokerage services to separate clients from direct access to shared cloud storage
- any distributed application has a much greater attack surface than an application that is closely held on alocal area network
- cloud computing doesn’t have vulnerabilities associated with internet applications
- all of the mentioned
Q9 | Which of the following area of cloud computing is uniquely troublesome?
- auditing
- data integrity
- e-discovery for legalcompliance
- all of the mentioned
Q10 | Which of the following is the operational domain of CSA(Cloud SecurityAlliance)?
- scalability
- portability andinteroperability
- flexibility
- none of thementioned
Q11 | Which of the following is considered an essential element in cloud computingby CSA?
- multi-tenancy
- identity and accessmanagement
- virtualization
- all of the mentioned
Q12 | Which of the following is used for Web performance management and loadtesting?
- vmware hyperic
- webmetrics
- univa ud
- tapinsystems
Q13 | Which of the following service provider provides the highest level of service?
- saas
- paas
- iaas
- all of the mentioned
Q14 | Point out the correct statement.
- paas supplies the infrastructure
- iaas adds application development frameworks, transactions, and control structures
- saas is an operating environment with applications, management, and the user interface
- all of the mentioned
Q15 | Which of the following functional cloud computing hardware/software stackis the Cloud Reference Model?
- cas
- csa
- sac
- all of the mentioned
Q16 | For the model, the security boundary may be defined for thevendor to include the software framework and middleware layer.
- saas
- paas
- iaas
- all of the mentioned
Q17 | Which of the following model allows vendor to provide security as part of theService Level Agreement?
- saas
- paas
- iaas
- all of the mentioned
Q18 | Which of the following cloud does not require mapping?
- public
- private
- hybrid
- none of thementioned
Q19 | Which of the following service model is owned in terms of infrastructure byboth vendor and customer?
- public
- private
- hybrid
- none of thementioned
Q20 | Which of the following model type is not trusted in terms of security?
- public
- private
- hybrid
- none of thementioned
Q21 | Which of the following has infrastructure security managed and owned bythe vendor?
- hybrid
- private/community
- public
- none of thementioned
Q22 | Point out the wrong statement.
- each different type of cloud service delivery model creates a security boundary
- any security mechanism below the security boundary must be built into the system
- any security mechanism above the security boundary must be maintained by the customer
- all of the mentioned
Q23 | is an application for collecting messages sent in RSS and Atomformat from information providers.
- google reader
- yahoo mail
- emailrackspace
- all of the mentioned
Q24 | Which of the following application is a newsreader?
- google reader
- bloglines
- newsgator online
- all of the mentioned
Q25 | Which of the following was developed an alternative to XML syndication byIETF?
- atom publishingprotocol
- atom subscribingprotocol
- atom subscribeprotocol
- none of thementioned