Cloud Computing Set 35
On This Page
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 35
Q1 | An application that needed storage alone might not benefit from a cloud deployment at all.
- online
- offline
- virtual
- all of the mentioned
Q2 | The property states that the system must have a mechanism to recover from committed transactions should that be necessary.
- atomicity
- consistency
- isolation
- durability
Q3 | Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?
- atomicity
- consistency
- isolation
- durability
Q4 | Which of the following is a core management feature offered by most cloud management service products?
- support of different cloud types
- creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
- performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
- all of the mentioned
Q5 | Point out the correct statement.
- eucalyptus and rackspace both use amazon ec2 and s3 services
- the rightscale user interface provides real-time measurements of individual server instances
- rightscale server templates and the rightscript technology are highly configurable and can be run under batch control
- all of the mentioned
Q6 | Which of the following is an industry organization that develops industry system management standards for platform interoperability?
- dmtf
- dms
- ebs
- all of the mentioned
Q7 | Which of the following is used to extend CIM to virtual computer system management?
- ovf
- vman
- ocsi
- none of the mentioned
Q8 | Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
- cce
- occi
- smi
- all of the mentioned
Q9 | Which of the following is open and both hypervisor and processor-architecture- agnostic?
- dell scalent
- cloudkick
- elastra
- all of the mentioned
Q10 | Which of the following is a workflow control and policy based automation service by CA?
- ca cloud optimize
- ca cloud orchestrate
- ca cloud insight
- ca cloud compose
Q11 | Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
- cloudwatch
- cloudsensor
- cloudmetrics
- all of the mentioned
Q12 | Which of the following service provider provides the least amount of built in security?
- saas
- paas
- iaas
- all of the mentioned
Q13 | Point out the correct statement.
- different types of cloud computing service models provide different levels of security services
- adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
- data should be transferred and stored in an encrypted format for security purpose
- all of the mentioned
Q14 | Which of the following services that need to be negotiated in Service Level Agreements?
- logging
- auditing
- regulatory compliance
- all of the mentioned
Q15 | The following flowchart is intended to evaluate in any cloud.
- risk
- errors
- inconsistencies
- none of the mentioned
Q16 | Which of the following area of cloud computing is uniquely troublesome?
- auditing
- data integrity
- e-discovery for legal compliance
- all of the mentioned
Q17 | Which of the following is the operational domain of CSA?
- scalability
- portability and interoperability
- flexibility
- none of the mentioned
Q18 | Which of the following is considered an essential element in cloud computing by CSA?
- multi-tenancy
- identity and access management
- virtualization
- all of the mentioned
Q19 | Which of the following is used for Web performance management and load testing?
- vmware hyperic
- webmetrics
- univa ud
- tapinsystems
Q20 | Which of the following is application and infrastructure management software for hybrid multi-clouds?
- vmware hyperic
- webmetrics
- univa ud
- tapinsystems
Q21 | Which of the following is a compliance standard?
- pci-dss
- hippa
- glba
- all of the mentioned
Q22 | Which of the following is a key mechanism for protecting data?
- access control
- auditing
- authentication
- all of the mentioned
Q23 | How many security accounts per client is provided by Microsoft?
- 1
- 3
- 5
- 7
Q24 | Point out the wrong statement.
- securing data sent to, received from, and stored in the cloud is the single largest security concern
- the problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider’s system
- one and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
- all of the mentioned
Q25 | Which of the following are a common means for losing encrypted data?
- lose the keys
- lose the encryption standard
- lose the account
- all of the mentioned