CS8791 Cloud Computing
CS8791 Cloud Computing
M
pay-as-you-go, infinitely scalable, universally
available system
d) All of the mentioned
CSE - Seventh
O
Answer: b
Semester Explanation: Cloud Computing is
C
distinguished by the notion that resources are
virtual and limitless and that details of the
T.
Regulations 2017 physical systems on which software runs are
abstracted from the user.
O
3. ________ as a utility is a dream that dates
from the beginning of the computing industry
itself.
SP
UNIT I INTRODUCTION a) Model
b) Computing
c) Software
TOPIC 1.1 INTRODUCTION TO d) All of the mentioned
G
CLOUD COMPUTING
Answer: b
LO
resources. b) Productivity
a) Distributed c) Abstraction
b) Cloud d) All of the mentioned
c) Soft
d) Parallel
-R
Answer: c
Explanation: Cloud computing abstracts the
Answer: b details of system implementation from users
Explanation: Cloud Computing applications and developers.
SE
the technology it is built on is evolutionary systems, the intranet too becomes identified
d) None of the mentioned as a cloud.
M
control, and in particular security and presenting them as a ________ resource.
regulatory compliance are of particular a) real
concern. b) virtual
O
c) cloud
6. Which of the following cloud concept is d) none of the mentioned
C
related to pooling and sharing of resources?
a) Polymorphism Answer: b
T.
b) Abstraction Explanation: Cloud Computing is a new
c) Virtualization model for provisioning resources, for staging
d) None of the mentioned applications, and for platform-independent
user access to services.
O
Answer: c
Explanation: Applications run on physical 10. Which of the following is Cloud Platform
SP
systems that aren’t specified, data is stored in by Amazon?
locations that are unknown, administration of a) Azure
systems is outsourced to others, and access by b) AWS
users is ubiquitous. c) Cloudera
G
d) All of the mentioned
7. ________ has many of the characteristics
of what is now being called cloud computing. Answer: b
LO
b) Remote Invocation
d) All of the mentioned c) Cloud Computing
d) Private Computing
Answer: c
Explanation: When an intranet becomes Answer: c
C
large enough that a diagram no longer wishes Explanation: Cloud computing is a paradigm
to differentiate between individual physical of distributed computing to provide the
customers with on-demand, utility based
M
the cloud users. 6. In this type of cloud, an organization rents
a) True cloud services from cloud providers on-
b) False demand basis.
O
a) Private
Answer: a b) Public
C
Explanation: The statement is true. There are c) Protected
three types of users often called as cloud d) Hybrid
T.
stakeholders.
Answer: b
3. Which of the following is not a cloud Explanation: This happens in public cloud.
stakeholder? Services are provided to the users using
O
a) Cloud providers utility computing model.
b) Clients
SP
c) End users 7. In this type of cloud, the cloud is composed
d) Cloud users of multiple internal or external cloud.
a) Private
Answer: b b) Public
Explanation: There are three types of
G
c) Protected
stakeholders cloud providers, cloud users and d) Hybrid
the end users.
LO
Answer: d
4. These cloud services are of the form of Explanation: The hybrid cloud is composed
utility computing i.e. the _________ uses of multiple internal or external clouds. This is
these services pay-as-you-go model. the scenario when an organization moves to
a) Cloud providers
.B
M
d) template a) server
b) every system in the network
Answer: b c) both server and every system in the
O
Explanation: Most of the cloud architectures network
are built on Grid architecture. Grid is a type d) none of the mentioned
C
of distributed computing architecture where
organizations owning data centers collaborate Answer: a
T.
with each other to have common benefits. Explanation: None.
O
b) System Software and services data in a distributed-memory parallel system?
c) Software as a system a) cache coherence scheme
SP
d) System as a service b) computation migration
c) remote procedure call
Answer: a d) message passing
Explanation: SAAS is Software as a service.
Answer: b
G
It delivers a single application through the
web browser to thousands of customers using Explanation: None.
a multitenant architecture.
LO
AND DISTRIBUTED
COMPUTING d) data migration
Answer: a
17
Explanation: None.
Answer: b
2. If one site fails in distributed system then Explanation: None.
___________
C
a) the remaining sites can continue operating 7. Which routing technique is used in a
b) all the sites will stop working distributed system?
c) directly connected sites will stop working a) fixed routing
d) none of the mentioned b) virtual routing
M
commercial music.
8. In distributed systems, link and site failure
is detected by ___________ 2. Point out the correct statement.
O
a) polling a) Google’s cloud includes perhaps some 10
b) handshaking data centers worldwide
C
c) token passing b) Flipkart.com’s infrastructure was built to
d) none of the mentioned support elastic demand so the system could
T.
accommodate peak traffic
Answer: b c) Data centers have been sited to optimize
Explanation: None. the overall system latency
d) All of the mentioned
O
9. The capability of a system to adapt the
increased service load is called ___________ Answer: c
SP
a) scalability Explanation: Datacenter can Keep land costs
b) tolerance modest and occupation unobtrusive.
c) capacity
d) none of the mentioned 3. Which of the following benefit is related to
G
creates resources that are pooled together in a
Answer: a system that supports multi-tenant usage?
Explanation: None. a) On-demand self-service
LO
Answer: a
c) ftp Explanation: A cloud service provider
d) rpc creates resources that are pooled together in a
system that supports multi-tenant usage.
17
Answer: a
Explanation: None. 4. The _____ is something that you can
obtain under contract from your vendor.
TOPIC 1.5 CLOUD a) PoS
-R
b) QoS
CHARACTERISTICS c) SoS
d) All of the mentioned
1. Which of the following was one of the top
SE
M
productivity applications
c) A client can provision computer resources 9. You can’t count on a cloud provider
maintaining your _____ in the face of
O
without the need for interaction with cloud
service provider personnel government actions.
d) None of the mentioned a) scalability
C
b) reliability
Answer: a c) privacy
T.
Explanation: Data centers have been sited to d) none of the mentioned
have access to low cost power.
Answer: c
6. All cloud computing applications suffer Explanation: Cloud computing industry
O
from the inherent _______ that is intrinsic in continues to address security concerns.
their WAN connectivity.
SP
a) propagation 10. Which of the following architectural
b) latency standards is working with cloud computing
c) noise industry?
d) all of the mentioned a) Service-oriented architecture
G
b) Standardized Web services
Answer: b c) Web-application frameworks
Explanation: While cloud computing d) All of the mentioned
LO
b) stateful
c) reliable
TOPIC 1.6 ELASTICITY IN
d) all of the mentioned CLOUD
-R
a)
8. Which of the following is the most
important area of concern in cloud
computing?
a) Security
C
b) Storage
c) Scalability
d) All of the mentioned
M
Web service platform available to developers
on a usage-basis model
O
d) All of the mentioned
Answer: c
C
Explanation: Through hardware
virtualization on Xen hypervisors,
T.
b) Amazon.com has made it possible to create
private virtual servers that you can run
worldwide.
O
3. Which of the following is the central
application in the AWS portfolio?
SP
a) Amazon Elastic Compute Cloud
b) Amazon Simple Queue Service
c) Amazon Simple Notification Service
d) Amazon Simple Storage System
G
Answer: a
Explanation: Amazon Elastic Compute
LO
Answer: b
d) None of the mentioned Explanation: In a loosely coupled SOA
SE
M
information or perform updates.
Answer: b
Explanation: EC2 is estimated to run on over 9. Which of the following metrics are used to
O
40,000+ servers worldwide divided into six support Elastic Load Balancing?
availability zones. a) CloudWatch
C
b) Amazon Elastic Block Store
6. Which of the following is a system for c) AWS Import/Export
T.
creating block level storage devices that can d) All of the mentioned
be used for Amazon Machine Instances in
EC2? Answer: a
a) CloudWatch Explanation: Amazon Machine Instances
O
b) Amazon Elastic Block Store (AMIs) in EC2 can be load balanced using
c) AWS Import/Export the Elastic Load Balancing.
SP
d) All of the mentioned
10. Which of the following is an online
Answer: b backup and storage system?
Explanation: The Load Balancing feature a) Amazon Elastic Compute Cloud
G
can detect when an instance is failing and b) Amazon Simple Queue Service
reroute traffic to a healthy instance, even an c) Amazon Simple Notification Service
instance in other AWS zones. d) Amazon Simple Storage System
LO
Answer: b
Explanation: Autoscaling is part of Amazon TOPIC 1.7 ON-DEMAND
Cloudwatch and available at no additional PROVISIONING
charge.
-R
a) Managed
subscribers? b) Unmanaged
a) Amazon Elastic Compute Cloud c) Disk
b) Amazon Simple Queue Service d) All of the mentioned
c) Amazon Simple Notification Service
C
M
users demise of many of the early SSPs and to
c) In managed storage, the storage service many hosted file services?
a) The Dot.com bust in 2000
O
provider makes storage capacity available to
users b) The inability of file-hosting companies to
d) All of the mentioned successfully monetize online storage
C
c) The continued commoditization of large
Answer: b disk drives
T.
Explanation: Unmanaged storage defines the d) All of the mentioned
nature of the storage, how it may be used, and
by what applications. Answer: d
Explanation: SSP stands for Storage Service
O
3. Which of the following is the form of Provider.
unmanaged cloud storage?
SP
a) XDrive 7. Which of the following is the simplest
b) OmniDrive unmanaged cloud storage device?
c) iDrive a) file transfer utility
d) All of the mentioned b) antivirus utility
G
c) online image utility
Answer: d d) none of the mentioned
Explanation: It is unmanaged storage in the
LO
c) FreeDrive others.
d) All of the mentioned a) Facebook
b) Twitter
Answer: d c) Whatsapp
-R
5. Point out the wrong statement. and file sharing service designed for users of
a) Unmanaged storage is reliable social networks, such as Facebook, MySpace
b) Managed storage is relatively cheap to use and Bebo.
c) Most of the user-based applications that
C
work with cloud storage are of unmanaged 9. Which of the following file transfer utility
type creates a shared folder metaphor using a Web
d) None of the mentioned service?
M
Answer: a b) SOA provides the translation and
Explanation: Dropbox is a service that keeps management layer in an architecture that
your files safe, synced, and easy to share.
O
removes the barrier for a client obtaining
desired services
10. Which of the following offers Storage c) With SOA, clients and components can be
C
size of 10GB free t0 100 GB paid? written in different languages and can use
a) Adrive multiple messaging protocols
T.
b) 4shared d) All of the mentioned
c) Badongo
d) All of the mentioned Answer: d
Explanation: You don’t need SOA if you are
O
Answer: b creating a monolithic cloud application that
Explanation: As unmanaged storage performs a specific function such as backup,
SP
offerings progressed in sophistication, they e-mail, Web page access, or instant
began to offer value-added software services messaging.
such as folder synchronization and backup.
3. Which of the following is a repeatable task
G
within a business process?
a) service
b) bus
LO
TECHNOLOGIES Answer: a
.B
c) GEC d) QOS
d) All of the mentioned
Answer: d
Answer: a Explanation: QoS is established, and the
service is instantiated.
C
M
highly optimized, and widely shareable Answer: b
components that can minimize developer and Explanation: Business process is a collection
of activity graphs.
O
infrastructure costs
d) None of the mentioned
9. Which of the following is used as
C
Answer: b middleware layer in the following figure?
Explanation: Service Oriented Architecture
T.
has been part of a collaborative effort on the
part of both large and small vendors to come
up with a common solution to architecting
complex business software processes
O
efficiently.
SP
6. Which of the following is used to define
the service component that performs the
a) XML
service?
b) ESB
a) WSDL
c) UDDI
G
b) SCDL
d) None of the mentioned
c) XML
d) None of the mentioned
LO
Answer: b
Explanation: An ESB may be part of a
Answer: b
network operating system or may be
Explanation: SCDL stands for Service
implemented using a set of middleware
Component Definition Language.
products.
.B
stack?
component’s service or endpoint?
a)
a) WSDL
b) SCDL
c) XML
-R
M
d) None of the mentioned
TOPIC 2.2 REST AND SYSTEMS
OF SYSTEMS Answer: a
O
Explanation: The @PathVariable annotation
1. To publish a REST service with Spring. is added as an input parameter to the handler
C
a) publishing an application’s data as a REST method, per Spring’s MVC conventions, in
service order for it to be used inside the handler
T.
b) accessing data from third-party REST method body.
services
c) none of the mentioned 5. Notation for defining REST endpoints.
a) { }
O
d) all of the mentioned
b) *
Answer: d c) All of the mentioned
SP
Explanation: One involves publishing an d) None of the mentioned
application’s data as a REST service, the
other one involves accessing data from third- Answer: c
party REST services to be used in an Explanation: In addition to supporting the {
G
application. } notation, it’s also possible to use a wildcard
* notation for defining REST endpoints.
2. Publishing an application’s data as a REST
LO
as a REST service revolves around the use of Explanation: The membertemplate view is
the Spring MVC annotations defined as a MarshallingView type, which is a
@RequestMapping and @PathVariable. general-purpose class that allows a response
to be rendered using a marshaller.
-R
b) False
a) True
Answer: a b) False
Explanation: This recipe will explore the
simplest mechanism, which involves the use Answer: a
C
M
marshallers.
a) Jaxb2Marshaller Answer: a
b) XmlBeansMarshaller Explanation: This annotation allows the
O
c) CastorMarshalle Jaxb2Marshaller marshaller to detect a class’s
d) All of the mentioned (i.e., object’s) fields and transform them into
C
XML data.
Answer: d
T.
Explanation: The marshaller used by 12. Accessing a third-party REST service
MarshallingView belongs to one of a series of inside a Spring application.
XML marshallers provided by Spring— a) RestTemplate Class
Jaxb2Marshaller. Other marshallers provided b) ViewResolver
O
by Spring include CastorMarshaller, c) InternalViewResolver
JibxMarshaller, XmlBeansMarshaller, and d) View
SP
XStreamMarshaller.
Answer: a
9. To configure Jaxb2Marshaller marshaller Explanation: Accessing a third-party REST
we require. service inside a Spring application revolves
G
a) ClassesToBeBound around the use of the Spring RestTemplate
b) ContextPath class.
c) All of the mentioned
LO
10. In the case of classesToBeBound, the Explanation: The structure of the REST
classes assigned to this property, indicate the service end point comprises an address,
class (i.e., object) structure that is to be which starts with http:// and ends with ?, as
transformed into XML. well as a series of parameters that start with ?
-R
M
Yahoo, while the character data enclosed in 3. In contrast, the contract-first approach
each XML tag represents information related encourages you to think of the service
contract first in terms of :-
O
to a REST service request.
a) XML
15. RestTemplate class method which b) XML Schema(.xsd)
C
performs an HTTP HEAD operation. c) WSDL
a) headForHeaders(String, Object…) d) All of the mentioned
T.
b) getForObject(String, Class, Object…)
c) postForLocation(String, Object, Object…) Answer: d
d) postForObject(String, Object, Class, Explanation: In contrast, the contract-first
Object…) approach encourages you to think of the
O
service contract first, in terms of XML, using
Answer: a XML schema (.xsd) and WSDL.
SP
Explanation: headforHeaders() is a
RestTemplate class method based on HTTP 4. In some cases, it’s also hard to map an
protocol request methods. object to XML (e.g., an object graph with
cyclic references) because there’s actually an
G
impedance mismatch between an object
TOPIC 2.3 WEB SERVICES model and an XML model.
a) True
LO
described using Web Services Description 6. Spring comes with a service exporter that
Language (WSDL). In contract-last, you can export a bean as a SOAP web service.
expose an existing service interface as a web
M
service exporter that can export a bean as a
SOAP web service. We will use Apache CXF, Answer: a
which is the de facto successor to XFire. Explanation: It will generate the
O
configuration (a file called sun-jaxws.xml)
7. The standard for deploying web services on and wrapper beans required to expose your
C
the Java EE platform as of Java EE 1.4:- service.
a) JAX-RPC
T.
b) JAX 11. Spring provides a factory that can export
c) RPC beans annotated with:-
d) None of the mentioned a) javax.jws.WebService
b) javax.jws.WebServiceProvider
O
Answer: a c) all of the mentioned
Explanation: The standard for deploying web d) none of the mentioned
SP
services on the Java EE platform as of Java
EE 1.4 was called JAX-RPC. It supported Answer: c
SOAP 1.0 and 1.1, but didn’t support Explanation: Spring provides a factory that
message-oriented web services. can export beans annotated with
G
javax.jws.WebService or
8. To send objects across the wire, beans need javax.jws.WebServiceProvider inside the
to be encoded using the Java Architecture for Spring context and then publishes the services
LO
a) SimpleJaxWsServiceExporter
Explanation: JAXB supports many class b) JAX-WS
types out of the box with no special support. c) All of the mentioned
d) None of the mentioned
17
javax.jws.WebService or a) True
javax.jws.WebServiceProvider and deploy b) False
that into a container in your web application.
M
pick. Two popular choices are Axis2 and a) Software
CXF, both of which are Apache projects. b) Classes
c) Methods
O
14. CXF represents the consolidation of the d) Batch
Celtix and XFire projects, which each had
C
useful SOAP support. Answer: c
a) True Explanation: client() class provides the
T.
b) False method to create topics. publish() method
publishes messages to pub/sub. Publishing
Answer: a message is handled through the client class.
Explanation: For our example, we’ll embed
O
CXF since it’s robust, fairly well tested, and 3. ________ method publishes messages to
provides support for other important pub/sub.
SP
standards like JAX-RS, the API for REST-ful a) Client()
endpoints. b) Publish()
c) Server()
15. Factory to use our Spring bean as the d) Batch()
G
implementation:-
a) jaxws:end Answer: b
b) jaxws:endpoint Explanation: While client() provides method
LO
d) 2 arguments
TOPIC 2.4 PUBLISHSUBSCRIBE Answer: d
MODEL Explanation: This method accepts two
-R
a) Client()
b) Server() arguments.
c) Publish() a) True
d) Batch() b) False
C
Answer: a Answer: a
Explanation: Publishing message is handled Explanation: Publish() method also accepts
arbitrary keyword arguments, which are called as str, and in python 2 it is called as
passed along as attributes of the message. unicode.
6. The topic in the publish method is in which 10. When you publish a message ________ is
form? automatically created?
M
a) Binomial form a) Client
b) Canonical form b) Server
c) Nominal form c) Batch
O
d) Message form d) Server
C
Answer: b Answer: c
Explanation: The topic is passed along as a Explanation: Whenever we publish a
T.
string; all topics have the canonical form of message, a batch is automatically created.
projects/{project_name}/topic/{topic_name}. This way, if you publish a large volume of
messages, it reduces the number of requests
7. The message in pub/sub is an opaque blob made to the server.
O
of ________
a) Bits 11. When the batch is created, it begins a
SP
b) Bytes countdown that publishes the batch once
c) Word sufficient time has elapsed.
d) Nibble a) True
b) False
Answer: b
G
Explanation: The message in pub/sub is an Answer: a
opaque blob of bytes, and as such, you must Explanation: When the batch is created, it
LO
send a bytes object in python 3. begins a countdown that publishes the batch
once sufficient time has elapsed.
8. ________ error will show if we try to send
text string instead of bytes. 12. What is the time elapsed after a batch is
a) TypeError created?
.B
d) 1 second
Answer: a
Explanation: If we send a text string the Answer: b
method will raise TypeError. TypeError will Explanation: When the batch is created, it
-R
show if we try to send text string instead of begins a countdown that publishes the batch
bytes. once sufficient time has elapsed by default it
is 0.05 seconds.
9. What do we call string in python 2?
SE
c) Server
Answer: b d) Future
Explanation: In python 2 the text string is
Answer: d
Explanation: Every call to publish() will
return a class that conforms to the future
interface. You can use this to ensure that the
publish.
M
TOPIC 2.5 BASICS OF
O
VIRTUALIZATION d) All of the mentioned
C
Answer: a
TOPIC 2.6 TYPES OF Explanation: You can define the features in
VIRTUALIZATION software and hardware that enables flexibility
T.
as conforming to one or more of the mobility
patterns.
TOPIC 2.7 IMPLEMENTATION
O
LEVELS OF VIRTUALIZATION 2. Point out the wrong statement.
a) Abstraction enables the key benefit of
SP
cloud computing: shared, ubiquitous access
TOPIC 2.8 VIRTUALIZATION b) Virtualization assigns a logical name for a
STRUCTURES physical resource and then provides a pointer
to that physical resource when a request is
made
G
1. Which of the following correctly represents c) All cloud computing applications combine
different types of mobile patterns? their resources into pools that can be assigned
LO
a) on demand to users
d) All of the mentioned
Answer: c
Explanation: Several important cloud
.B
b) Application
c) CPU
d) All of the mentioned
SE
Answer: d
Explanation: To enable these characteristics,
c) resources must be highly configurable and
flexible.
C
M
sophisticated load balancer?
Answer: c a) workload managers
Explanation: Load balancing is an b) workspace managers
O
optimization technique. c) rackserve managers
d) all of the mentioned
C
5. Point out the correct statement.
a) A client can request access to a cloud Answer: a
T.
service from any location Explanation: They determine the current
b) A cloud has multiple application instances utilization of the resources in their pool.
and directs requests to an instance based on
conditions 9. A ______ is a combination load balancer
O
c) Computers can be partitioned into a set of and application server that is a server placed
virtual machines with each machine being between a firewall or router.
SP
assigned a workload a) ABC
d) All of the mentioned b) ACD
c) ADC
Answer: d d) All of the mentioned
G
Explanation: Alternatively, systems can be
virtualized through load-balancing Answer: c
technologies. Explanation: An Application Delivery
LO
b) Apache mod_proxy_balancer
c) F6’s BigIP replaced with the question mark in the
d) All of the mentioned following figure?
17
Answer: b
Explanation: Load balancing can be used to
increase utilization and throughput, lower
latency, reduce response time, and avoid
-R
system overload.
a) Abstraction
a) Connections through intelligent switches b) Virtualization
b) DNS c) Mobility Pattern
c) Storage resources d) All of the mentioned
d) All of the mentioned
C
Answer: b
Answer: d Explanation: Virtualization is a key enabler
Explanation: Load balancing provides the
of the first four of five key attributes of cloud b) The devices connected using I/O mapping
computing. have a bigger buffer space
c) The devices have to deal with fewer
address lines
TOPIC 2.9 TOOLS AND d) No advantage as such
M
MECHANISMS
VIRTUALIZATION OF CPU, Answer: c
Explanation: Since the I/O mapped devices
O
MEMORY AND I/O DEVICES
have a separate address space the address
lines are limited by the amount of the space
C
1. In memory-mapped I/O ____________ allocated.
a) The I/O devices and the memory share the
same address space
T.
5. The system is notified of a read or write
b) The I/O devices have a separate address operation by ___________
space a) Appending an extra bit of the address
c) The memory and I/O devices have an b) Enabling the read or write bits of the
O
associated address space devices
d) A part of the memory is specifically set c) Raising an appropriate interrupt signal
SP
aside for the I/O operation d) Sending a special signal along the BUS
Answer: a Answer: d
Explanation: Its the different modes of Explanation: It is necessary for the processor
accessing the i/o devices.
G
to send a signal intimating the request as
either read or write.
2. The usual BUS structure used to connect
LO
b) Status flags
c) Interrupt signals
Answer: c d) Exceptions
Explanation: BUS is a collection of address,
17
separate 16 bit address space for the I/O wait till the I/O operation is done. It can
devices. continue with its work until the status flag is
a) False set.
b) True
SE
b) Memory-mapped I/O
4. The advantage of I/O mapped devices to
c) I/O mapped
memory mapped is ___________
d) None of the mentioned
a) The former offers faster transfer of data
Answer: a
TOPIC 2.10 VIRTUALIZATION
Explanation: In this method, the processor
constantly checks the status flags, and when it SUPPORT AND DISASTER
finds that the flag is set it performs the RECOVERY
appropriate operation.
M
This set of SAN multiple choice questions
8. The method of synchronising the processor and answers focuses on Backup and
with the I/O device in which the device sends
O
Recovery.
a signal when it is ready is?
a) Exceptions 1. The purpose of backup is:
C
b) Signal handling a) To restore a computer to an operational
c) Interrupts state following a disaster
T.
d) DMA b) To restore small numbers of files after they
have been accidentally deleted
Answer: c c) To restore one among many version of the
Explanation: This is a method of accessing
O
same file for multiple backup environment
the I/O devices which gives the complete d) All of the mentioned
power to the devices, enabling them to
SP
intimate the processor when they’re ready for Answer: d
transfer.
2. Backup of the source data can be created
9. The method which offers higher speeds of a) On the same device
G
I/O transfers is ___________ b) On another device
a) Interrupts c) At some other location
b) Memory mapping d) All of the mentioned
LO
c) Program-controlled I/O
d) DMA Answer: d
Answer: d 3. Which of the following backup technique
.B
c) Reviewing backup
d) Echoing b) Tape library is an example of nearline
storage
Answer: a c) Data recovery can take hours for offline
Explanation: None. backup
C
Answer: d
5. Which of the following qualifies as best 10. Which of the following is Backup
DR (Disaster Recovery) site? software?
a) DR site in the same campus a) Amanda
b) DR site in the same city b) Bacula
c) DR site in the same country c) IBM Tivoli Storage Manager
M
d) DR site in a different country d) All of the mentioned
Answer: d Answer: d
O
6. Which of the following techniques can be
C
used for optimizing backed up data space?
a) Encryption and Deduplication
UNIT III CLOUD
T.
b) Compression and Deduplication
c) Authentication and Deduplication
d) Deduplication only ARCHITECTURE
SERVICES AND
O
Answer: b
STORAGE
SP
7. To decide on a backup strategy for your
organization, which of the following should
TOPIC 3.1 LAYERED CLOUD
you consider?
a) RPO (Recovery Point Objective) ARCHITECTURE DESIGN
b) RTO (Recovery Time Objective)
G
c) Both RPO & RTO 1. Which of the following is incorrect?
d) None of the mentioned a) A Layered-style program is divided into an
LO
b) A backup is as useful as its associated b) The static structure of the Layered style is
restore strategy nothing more than a constraint on interactions
c) Storing the backup copy near to its original between layers
site is best strategy c) All of the mentioned
C
Answer: c
M
than a constraint on interactions between on the layer below it being present and
layers. correct. A layer may call other layers above
and below it, as long as it does not use them.
O
3. What is Relaxed Layered Style?
a) Each layer can be constrained to use only 6. What is Onion diagram illustrates?
C
the layer directly below it a) It illustrates the connection between the
b) Sometimes this constraint is relaxed layers in communications protocols, such as
T.
slightly to allow each layer to use all the the International Standards Organization
layers below it Open Systems Interconnection (ISO OSI)
c) All of the mentioned model,or the layers in user interface and
d) None of the mentioned windowing systems, such as the X Window
O
System
Answer: b b) It often illustrates operating system layers,
SP
Explanation: Each layer can be constrained with the kernel at the core
to use only the layer directly below it—this is c) All of the mentioned
a Strict Layered style whereas Sometimes this d) None of the mentioned
constraint is relaxed slightly to allow each
G
layer to use all the layers below it—this is a Answer: d
Relaxed Layered style. Explanation: Onion diagram illustrates
operating system layers, with the kernel at the
LO
b) Module A calls (or invokes ) module B if a) Layers are by definition highly cohesive,
B triggers execution of A thus satisfying the Principle of Cohesion
c) All of the mentioned b) Layers doesn’t support information hiding
d) None of the mentioned c) Layers are constrained to use only above
17
layers
Answer: a d) All of the mentioned
Explanation: Module A uses Module B if a
correct version of B must be present for A to Answer: a
-R
execute correctly and Module A calls (or Explanation: Layers are by definition highly
invokes ) module B if A triggers execution of cohesive, thus satisfying the Principle of
B. Cohesion. Layers support information hiding
SE
b) A layer may call other layers above and changeable, so this pattern can be used when
below it, as long as it uses them changeability is an important quality attribute
b) Layered-style programs are easy to modify
because changes can be made to a layer 1. Which of the following is one of the unique
independently of the rest of the program attributes of Cloud Computing?
c) All of the mentioned a) utility type of delivery
d) None of the mentioned b) elasticity
c) low barrier to entry
M
Answer: d d) all of the mentioned
Explanation: All of the mentioned are
correct. Answer: d
O
Explanation: These attributes change how
9. What are the drawbacks for Layers? applications are created, priced, and
C
a) It is often necessary to pass data through delivered.
many layers, which can slow performance
T.
significantly 2. Point out the correct statement.
b) Layers support information hiding a) Service Level Agreements (SLAs) is small
c) Multi-layered programs can be hard to aspect of cloud computing
debug because operations tend to be b) Cloud computing does not have impact on
O
implemented through a series of calls across software licensing
layers c) Cloud computing presents new
SP
d) None of the mentioned opportunities to users and developers
d) All of the mentioned
Answer: c
Explanation: Layers support information Answer: c
G
hiding is an advantage and not a drawback. Explanation: Because it is based on the
paradigm of a shared multi-tenant utility.
10. Which of the following is correct?
LO
a) Layers are not strongly coupled to the 3. Applications that work with cloud
layers above them computing that have low margins and usually
b) Each layer is strongly coupled only to the low risk are _____________
layer immediately below it a) high touch
.B
Answer: d Answer: b
Explanation: Layers are not strongly coupled Explanation: The “high touch” applications
to the layers above them. If a program uses that come with high margins require
theStrict Layered style, then each layer is committed resources and pose more of a risk.
-R
coupled.
b) CaaS
c) PaaS
TOPIC 3.2 NIST CLOUD d) All of the mentioned
COMPUTING REFERENCE
C
ARCHITECTURE Answer: a
Explanation: Amazon web service follows
PaaS model.
M
premises 9. _______ feature allows you to optimize
c) The Google App Engine follows IaaS your system and capture all possible
transactions.
O
d) None of the mentioned
a) scalability
Answer: c b) reliability
C
Explanation: The Google App Engine c) elasticity
follows PaaS. d) none of the mentioned
T.
6. When you add a software stack, such as an Answer: c
operating system and applications to the Explanation: You have the ability to right-
service, the model shifts to _____ model. size resources as required.
O
a) SaaS
b) PaaS 10. _______ enables batch processing, which
SP
c) IaaS greatly speeds up high-processing
d) All of the mentioned applications.
a) Scalability
Answer: a b) Reliability
G
Explanation: Microsoft’s Windows Azure c) Elasticity
Platform is best described as currently using d) Utility
SaaS model.
LO
Answer: a
7. Which of the following is the most refined Explanation: This feature obviates the need
and restrictive service model? for planning and provisioning.
a) IaaS
.B
b) CaaS
c) PaaS
TOPIC 3.3 PUBLIC, PRIVATE
d) All of the mentioned AND HYBRID CLOUDS
17
M
protocols needed to manage interprocess be real physical resources, more often they
communications are virtualized resources because virtualized
resources are easier to modify and optimize.
O
c) Platforms are used to create more complex
software
d) All of the mentioned 6. A service provider reselling a _______
C
may have the option to offer one module to
Answer: d customize the information.
T.
Explanation: The most commonly used a) CaaS
services uses a set of discovery and b) AaaS
description protocols based on WSDL. c) PaaS
d) SaaS
O
3. Which of the following is the property of
the composable component? Answer: d
SP
a) stateful Explanation: Modifications are generally
b) stateless severely limited.
c) symmetric
d) all of the mentioned 7. Which of the following is the highest
degree of integration in cloud computing?
G
Answer: b a) CaaS
Explanation: A transaction is executed b) AaaS
LO
9. Which of the following benefit is provided cannot attach to the appropriate service
by the PaaS service provider? d) All of the mentioned
a) A larger pool of qualified developers
b) More reliable operation Answer: a
c) A logical design methodology Explanation: The software that runs in the
M
d) All of the mentioned virtual machines is what defines the utility of
the cloud computing system.
Answer: d
O
Explanation: The essence of a service 3. Which of the following component is
oriented design is that services are called hypervisor?
C
constructed from a set of modules using a) VGM
standard communications and service b) VMc
T.
interfaces. c) VMM
d) All of the mentioned
10. Communication between services is done
widely using _______ protocol. Answer: c
O
a) REST Explanation: VMM component is also called
b) SOAP hypervisor.
SP
c) RESTful
d) None of the mentioned 4. Applications such as a Web server or
database server that can run on a virtual
Answer: b machine image are referred to as
______________
G
Explanation: There are alternative sets of
standards as well. a) virtual server
b) virtual appliances
LO
c) machine imaging
TOPIC 3.4 IAAS, PAAS, SAAS d) all of the mentioned
c) PaaS
d) IaaS 5. Point out the wrong statement.
a) Platforms represent nearly the full cloud
Answer: d software stack
-R
M
d) All of the mentioned virtual machine monitor.
a) Imaging
Answer: c b) Parallels
O
Explanation: VMM manages I/O for the c) QEMU
virtual machines. d) None of the mentioned
C
7. Amazon Machine Images are virtual Answer: c
T.
appliances that have been packaged to run on Explanation: Parallels hosts a variety of
the grid of ____ nodes. appliances that includes Linux distros, server
a) Ben software, and other products.
b) Xen
O
c) Ken
d) Zen
TOPIC 3.5 ARCHITECTURAL
DESIGN CHALLENGES OF
SP
Answer: b CLOUD STORAGE
Explanation: You run across virtual
appliances in IaaS systems such as Amazon’s 1. Which of the following correctly represents
G
Elastic Compute Cloud. different types of mobile patterns?
a)
8. Which of the following offers virtual
LO
b) Jcinacio
c) HelpdeskLive
d) All of the mentioned
17
b)
Answer: a
Explanation: Virtual appliances have begun
to affect the PC industry in much the same
way that application stores have affected the
-R
virtual machine. c)
a) Bagvapp
b) Jcinacio
c) HelpdeskLive
C
_____________
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
M
Answer: c
Explanation: Load balancing is an
O
d) All of the mentioned optimization technique.
C
Answer: a 5. Point out the correct statement.
Explanation: You can define the features in a) A client can request access to a cloud
software and hardware that enables flexibility
T.
service from any location
as conforming to one or more of the mobility b) A cloud has multiple application instances
patterns. and directs requests to an instance based on
conditions
O
2. Point out the wrong statement. c) Computers can be partitioned into a set of
a) Abstraction enables the key benefit of virtual machines with each machine being
SP
cloud computing: shared, ubiquitous access assigned a workload
b) Virtualization assigns a logical name for a d) All of the mentioned
physical resource and then provides a pointer
to that physical resource when a request is Answer: d
made
G
Explanation: Alternatively, systems can be
c) All cloud computing applications combine virtualized through load-balancing
their resources into pools that can be assigned technologies.
LO
on demand to users
d) All of the mentioned 6. Which of the following software can be
used to implement load balancing?
Answer: c a) Apache mod_balancer
Explanation: Several important cloud
.B
b) Apache mod_proxy_balancer
computing approaches use a strictly c) F6’s BigIP
hardware-based approach to abstraction. d) All of the mentioned
17
necessary redundancy to make an intrinsically of the first four of five key attributes of cloud
unreliable system reliable through managed computing.
redirection.
M
sophisticated load balancer? SERVICE
a) workload managers
b) workspace managers
O
c) rackserve managers TOPIC 3.7 CLOUD STORAGE
d) all of the mentioned PROVIDERS, ADVANTAGES OF
C
CLOUD STORAGE
Answer: a
T.
Explanation: They determine the current
utilization of the resources in their pool. 1. Which of the following is storage data
interchange interface for stored data objects?
9. A ______ is a combination load balancer a) OCC
O
and application server that is a server placed b) OCCI
between a firewall or router. c) OCMI
d) All of the mentioned
SP
a) ABC
b) ACD
Answer: b
c) ADC
Explanation: OCCI stands for Open Cloud
d) All of the mentioned
Computing Interface.
G
Answer: c
2. Point out the correct statement.
Explanation: An Application Delivery
LO
replaced with the question mark in the c) Cloud bursting is an overflow solution that
following figure? clones the application to the cloud and directs
traffic to the cloud during times of high traffic
17
Answer: d
Explanation: Mapping process involves
-R
a) Abstraction
b) Virtualization 3. ________ data represents more than 50
c) Mobility Pattern percent of the data created every day.
d) All of the mentioned a) Shadow
C
b) Light
Answer: b
c) Dark
Explanation: Virtualization is a key enabler
d) All of the mentioned
Answer: a c) Analytics
Explanation: Lots of shadow data does get d) None of the mentioned
retained, having never been touched by a
human being. Answer: a
Explanation: Most users interact with cloud
M
4. Cloud storage data usage in the year 2020 storage using backup, synchronization,
is estimated to be _____________ percent archiving, staging, caching, or some other
resident by IDC. sort of software.
O
a) 10
b) 15 8. How many categories of storage devices
C
c) 20 broadly exist in cloud?
d) None of the mentioned a) 1
T.
b) 2
Answer: d c) 3
Explanation: There will be a steady growth d) None of the mentioned
of cloud storage at the expense of online
O
storage over the next decade. Answer: b
Explanation: Storage devices may be broadly
SP
5. Point out the wrong statement. categorized as either block storage devices or
a) Some APIs are both exposed as SOAP and file storage devices.
REST
b) The role of a cloud vendor specific API 9. Which of the following storage devices
exposes its storage to clients as Raw storage
G
has impact on porting an application
c) There are mainly three types of cloud that can be partitioned to create volumes?
storage a) block
LO
unmanaged or managed.
Explanation: It is up to the operating system
6. Which of the following system does not to create and manage the file system.
provision storage to most users?
17
c) File Server
Answer: b d) All of the mentioned
Explanation: Cloud storage is storage
accessed by a Web service API. Answer: a
SE
Service model.
a) Software
TOPIC 3.8 AMAZON S3
b) Platform
Answer: c
Explanation: Cloudfront is similar to systems
M
such as Akamai.com, but is proprietary to
Amazon.com and is set up to work with
Amazon Simple Storage
O
System (Amazon S3).
C
4. Which of the following allows you to
create instances of the MySQL database to
T.
a) SimpleDB support your Web sites?
b) RDS a) Amazon Elastic Compute Cloud
c) Amazon EC2 b) Amazon Simple Queue Service
c) Amazon Relational Database Service
O
d) All of the mentioned
d) Amazon Simple Storage System
Answer: b
SP
Explanation: Use RDS when you have an Answer: c
existing MySQL database that could be Explanation: RDS provides features such as
ported and you want to minimize the amount automated software patching, database
of infrastructure and administrative backups, and automated database scaling via
G
management required. an API call.
2. Point out the wrong statement. 5. Point out the correct statement.
LO
a) Amazon Machine Instances are sized at a) Amazon Elastic Cloud is a system for
various levels and rented on a creating virtual disks(volume)
computing/hour basis b) SimpleDB interoperates with both Amazon
b) The metrics obtained by CloudWatch may EC2 and Amazon S3
.B
services
d) None of the mentioned Explanation: Amazon SimpleDB stores data
in “buckets” and without requiring the
Answer: d creation of a database schema.
Explanation: Through hardware
-R
worldwide.
b) Amazon SimpleDB
3. Which of the following is an edge-storage c) Amazon Cloudfront
or content-delivery system that caches data in d) All of the mentioned
different physical locations?
C
M
c) Alexa Web Information Service an interactive data analysis tool for
d) All of the mentioned performing indexing.
O
Answer: b
Explanation: This service, which was called
C
Amazon E-Commerce Service (ECS), is the
means for vendors to add their products to the UNIT IV RESOURCE
T.
Amazon.com site
and take orders and payments.
MANAGEMENT AND
SECURITY IN CLOUD
8. Which of the following is a billing and
O
account management service?
a) Amazon Elastic MapReduce TOPIC 4.1 INTER CLOUD
SP
b) Amazon Mechanical Turk RESOURCE MANAGEMENT
c) Amazon DevPay
d) Multi-Factor Authentication 1. The properties necessary to guarantee a
reliable transaction in databases and other
G
Answer: c applications is referred to as _____________
Explanation: DevPay provides a developer a) BASE
API that eliminates the need for application
LO
b) ACID
developers to build order pipelines. c) ATOM
d) All of the mentioned
9. Which of the following is a means for
accessing human researchers or consultants to Answer: b
.B
program
a) Amazon Elastic MapReduce
d) None of the mentioned
b) Amazon Mechanical Turk
M
3. Which of the following is property of c) both local and cloud
ACID principle? d) none of the mentioned
a) Atomicity
O
b) Consistency Answer: c
c) Isolation Explanation: If the application needed to
C
d) All of the mentioned access data only when the client was online,
then access to cloud-based storage would be
T.
Answer: d the only data store your application would
Explanation: The ACID principle is used required.
today by any application that is reading and
writing to a stored data set. 7. Which of the following factors might offset
O
the cost of offline access in hybrid
4. Which of the following ACID property applications?
SP
states that the system must go from one a) scalability
known state to another and that the system b) costs
integrity must be maintained? c) ubiquitous access
a) Atomicity d) all of the mentioned
G
b) Consistency
c) Isolation Answer: d
d) Durability Explanation: These factors make the cloud
LO
more attractive.
Answer: b
Explanation: The ACID rules were 8. An application that needed _______
developed by Jim Gray to apply to database storage alone might not benefit from a cloud
.B
optimistic transaction commitment in a an application that gets the most value from a
multiuser application, durability requires cloud deployment is one that uses online
correcting the condition storage without the need for offline storage.
SE
transaction. a) Atomicity
b) Consistency
M
that the system cannot have other transactions instances
operate on data that is currently being c) RightScale server templates and the
processed by a transaction.
O
Rightscript technology are highly
configurable and can be run under batch
10. Which of the following property defines a control
C
transaction as something that cannot be d) All of the mentioned
subdivided and must be completed or
T.
abandoned as a unit? Answer: d
a) Atomicity Explanation: Eucalyptus is open source and
b) Consistency portable.
c) Isolation
O
d) Durability 3. Which of the following is an industry
organization that develops industry system
SP
Answer: a management standards for platform
Explanation: The isolation property states interoperability?
that the system cannot have other transactions a) DMTF
operate on data that is currently being b) DMS
G
processed by a transaction. c) EBS
d) All of the mentioned
LO
M
Answer: b
Explanation: Cloudkick and RightScale are
O
known to be easy to use with Linux virtual
servers and less so with Windows instances.
C
d) None of the mentioned
6. Which of the following initiative tries to
Answer: b
T.
provide a way of measuring cloud computing
services along dimension like cost? Explanation: Taken together, these products
a) CCE form the basis for CA’s Cloud Connected
b) OCCI Management Suite.
O
c) SMI
8. Which of the following is open and both
d) All of the mentioned
hypervisor and processor-architecture-
SP
Answer: c agnostic?
Explanation: SMI stands for Service a) Dell Scalent
Measurement Index. b) CloudKick
c) Elastra
G
7. Which of the following figure correctly d) All of the mentioned
describes products by CA technologies?
LO
a) Answer: a
Explanation: OVF is essentially a container
and a file format.
b) CA Cloud Orchestrate
c) CA Cloud Insight
d) CA Cloud Compose
b)
-R
Answer: b
Explanation: CA Cloud Insight is a cloud
metrics measurement service.
SE
b) CloudSensor
c) CloudMetrics
c) d) All of the mentioned
M
regulatory compliance are all features that
require planning in cloud computing systems.
TOPIC 4.3 GLOBAL EXCHANGE
O
OF CLOUD RESOURCES AND 4. The following flowchart is intended to
SECURITY OVERVIEW evaluate __________ in any cloud.
C
1. Which of the following service provider
T.
provides the least amount of built in security?
a) SaaS
b) PaaS
O
c) IaaS
d) All of the mentioned
SP
Answer: c
Explanation: You get the least amount of
built in security with an Infrastructure as a
Service provider, and the most with a
G
Software as a Service provider.
LO
cloud model requires that you determine what d) none of the mentioned
security mechanisms are required and
mapping those to controls that exist in your Answer: a
17
applications b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: c
Explanation: Additional vulnerabilities arise Answer: b
M
from pooled, virtualized, and outsourced Explanation: CA Cloud Insight is a cloud
resources. metrics measurement service.
O
6. Which of the following area of cloud 10. Which of the following is application and
computing is uniquely troublesome? infrastructure management software for
C
a) Auditing hybrid multi-clouds?
b) Data integrity a) VMware Hyperic
T.
c) e-Discovery for legal compliance b) Webmetrics
d) All of the mentioned c) Univa UD
d) Tapinsystems
Answer: d
O
Explanation: Storing data in the cloud is of Answer: c
particular concern. Explanation: Tapinsystems is provisioning
SP
and management service.
7. Which of the following is the operational
domain of CSA?
a) Scalability TOPIC 4.4 CLOUD SECURITY
b) Portability and interoperability CHALLENGES
G
c) Flexibility
d) None of the mentioned 1. Which of the following is a compliance
LO
standard?
Answer: b a) PCI-DSS
Explanation: CSA is an industry working b) HIPPA
group that studies security issues in cloud c) GLBA
computing and offers recommendations to its
.B
M
d) all of the mentioned
3. Which of the following is a key mechanism
for protecting data? Answer: a
O
a) Access control Explanation: Keys should have a defined life
b) Auditing cycle.
C
c) Authentication
d) All of the mentioned 7. Which of the following is the standard for
T.
interoperable cloud-based key management?
Answer: d a) KMIP
Explanation: Whatever service model you b) PMIK
choose should have mechanisms operating in c) AIMK
O
all above mentioned areas that meet your d) None of the mentioned
security requirements.
SP
Answer: a
4. How many security accounts per client is Explanation: KMIP stands for Key
provided by Microsoft? Management Interoperability Protocol.
a) 1
8. Which of the following was one of the
G
b) 3
c) 5 weaker aspects of early cloud computing
d) 7 service offerings?
LO
a) Logging
Answer: c b) Integrity checking
Explanation: On Amazon Web Service, you c) Consistency checking
can create multiple keys and rotate those keys d) None of the mentioned
.B
M
d) None of the mentioned interaction with the software, all other aspects
of the service are abstracted away.
Answer: a
O
Explanation: Becoming a cloud service 4. Which of the following SaaS platform is
provider requires a large investment. with an exposed API?
C
a) salesforce.com
b) amazon.com
TOPIC 4.5 SOFTWARE-AS-A-
T.
c) flipkart.com
SERVICE d) all of the mentioned
O
complete cloud computing service model? Explanation: SaaS does not necessarily mean
a) PaaS that the software is static or monolithic.
SP
b) IaaS
c) CaaS 5. Point out the wrong statement.
d) SaaS a) SaaS applications come in all shapes and
sizes
b) Every computer user is familiar with SaaS
G
Answer: d
Explanation: The most complete cloud systems
computing service model is one in which the c) SaaS software is not customizable
LO
Answer: d
Explanation: SaaS can be accessed globally d) All of the mentioned
over the Internet, most often in a browser.
Answer: d
3. Which of the following aspect of the Explanation: There may be executable
C
service is abstracted away? client-side code, but the user isn’t responsible
a) Data escrow for maintaining that code or its interaction
b) User Interaction with the service.
7. _________ applications have a much lower can display a Web page that shows data and
barrier to entry than their locally installed supports features from two or more sources.
competitors.
a) IaaS Answers.
b) CaaS
M
c) PaaS TOPIC 4.6 SECURITY
d) None of the mentioned
GOVERNANCE IN CLOUD
O
Answer: d
Explanation: Such applications feature 1. Which of the following service provider
C
automated upgrades, updates, and patch provides the highest level of service?
management and much faster rollout of a) SaaS
T.
changes. b) PaaS
c) IaaS
8. SaaS supports multiple users and provides d) All of the mentioned
a shared data model through _________
O
model. Answer: a
a) single-tenancy Explanation: As you move upward in the
SP
b) multi-tenancy stack, each service model inherits the
c) multiple-instance capabilities of the model beneath it, as well as
d) all of the mentioned all the inherent security concerns and risk
factors.
G
Answer: b
Explanation: The alternative of software 2. Point out the correct statement.
virtualization of individual instances also a) PaaS supplies the infrastructure
LO
Answer: c
Answer: c Explanation: IaaS has the least levels of
Explanation: A considerable amount of SaaS integrated functionality and the lowest levels
software is based on open source software. of integrated security, and SaaS has the most.
-R
10. The componentized nature of SaaS 3. Which of the following functional cloud
solutions enables many solutions to support a computing hardware/software stack is the
feature called _____________
SE
Answer: c Answer: b
Explanation: A mashup is an application that Explanation: Cloud Security Alliance (CSA)
is a not-for-profit organization with a mission 7. Which of the following cloud does not
to “promote the use of best practices for require mapping?
providing security assurance within Cloud. a) Public
b) Private
4. For the _________ model, the security c) Hybrid
M
boundary may be defined for the vendor to d) None of the mentioned
include the software framework and
middleware layer. Answer: a
O
a) SaaS Explanation: Private cloud may be internal
b) PaaS or external to an organization.
C
c) IaaS
d) All of the mentioned 8. Which of the following service model is
T.
owned in terms of infrastructure by both
Answer: b vendor and customer?
Explanation: In the PaaS model, the a) Public
customer would be responsible for the b) Private
O
security of the application and UI at the top of c) Hybrid
the stack. d) None of the mentioned
SP
5. Point out the wrong statement. Answer: c
a) Each different type of cloud service Explanation: Infrastructure location is both
delivery model creates a security boundary on- and off-premises.
G
b) Any security mechanism below the
security boundary must be built into the 9. Which of the following model type is not
system trusted in terms of security?
LO
Answer: d
Explanation: As you move up the stack, it Answer: a
becomes more important to make sure that Explanation: It is owned by a vendor.
the type and level of security is part of your
17
c) IaaS
d) All of the mentioned Explanation: Cloud computing has a
tendency to blur the location of the defined
Answer: a security perimeter in such a way that the
Explanation: Compliance, governance, and previous notions of network firewalls and
C
liability levels are stipulated under the edge defenses often no longer apply.
contract for the entire stack.
M
1. Which of the following feature make
cloud-based storage systems highly reliable? Answer: a
Explanation: StorageGRID can enforce
O
a) Redundant networks
b) Redundant name servers policies and create a tiered storage system.
c) Replication
C
5. Point out the wrong statement.
d) All of the mentioned
a) AWS S3 essentially lets you create your
T.
Answer: d own cloud storage
Explanation: Failover can involve a system b) AWS created “Availability Zones” within
simply changing the pointers to the stored regions, which are sets of systems that are
isolated from one another
O
object’s location.
c) Amazon Web Services (AWS) adds
2. Point out the correct statement. redundancy to its IaaS systems by allowing
SP
a) With Atmos, you can create your own EC2 virtual machine instances
cloud storage system or leverage a public d) None of the mentioned
cloud service with Atmos online
b) IBM is a major player in cloud computing Answer: d
G
particularly for businesses Explanation: In theory, instances in different
c) In managed storage, the storage service availability zones shouldn’t fail at the same
time.
LO
Answer: d
Explanation: Unused LUNs are the
ADVANCEMENTS
equivalent of a raw disk from which one or
more volumes may be created. TOPIC 5.1 HADOOP
M
8. Which of the following protocol is used for
discovering and retrieving objects from a 1. IBM and ________ have announced a
cloud? major initiative to use Hadoop to support
O
a) OCCI university courses in distributed computer
b) SMTP programming.
a) Google Latitude
C
c) HTTP
d) All of the mentioned b) Android (operating system)
c) Google Variations
T.
Answer: a d) Google
Explanation: Making cloud storage data
discoverable on a TCP/IP network using Answer: d
O
HTTP or some other protocol requires that Explanation: Google and IBM Announce
objects be assigned a unique identifier. University Initiative to Address Internet-
Scale.
SP
9. Which of the following disk operation is
performed When a tenant is granted access to 2. Point out the correct statement.
a virtual storage container? a) Hadoop is an ideal environment for
extracting and transforming small volumes of
G
a) CRUD
b) File system modifications data
c) Partitioning b) Hadoop stores data in HDFS and supports
LO
Answer: a
C
TECHNOLOGIES AND
M
b) OpenSolaris the data across multiple hosts and hence does
c) GNU not require ________ storage on hosts.
a) RAID
O
d) Linux
b) Standard RAID levels
Answer: b c) ZFS
C
Explanation: The OpenSolaris Hadoop d) Operating system
LiveCD project built a bootable CD-ROM
T.
image. Answer: a
Explanation: With the default replication
5. Which of the following genres does value, 3, data is stored on three nodes: two on
Hadoop produce? the same rack, and one on a different rack.
O
a) Distributed file system
b) JAX-RS 9. Above the file systems comes the
SP
c) Java Message Service ________ engine, which consists of one Job
d) Relational Database Management System Tracker, to which client applications submit
MapReduce jobs.
Answer: a a) MapReduce
G
Explanation: The Hadoop Distributed File b) Google
System (HDFS) is designed to store very c) Functional programming
large data sets reliably, and to stream those d) Facebook
LO
b) Perl
c) Java (programming language) 10. The Hadoop list includes the HBase
d) Lua (programming language) database, the Apache Mahout ________
system, and matrix operations.
17
d) Unix-like
1. The Mapper implementation processes one
line at a time via _________ method.
M
Answer: a partitioned per Reducer
Explanation: The Mapper outputs are sorted b) The total number of partitions is the same
and then partitioned per Reducer. as the number of reduce tasks for the job
O
c) The intermediate, sorted outputs are always
2. Point out the correct statement. stored in a simple (key-len, key, value-len,
C
a) Mapper maps input key/value pairs to a set value) format
of intermediate key/value pairs d) None of the mentioned
T.
b) Applications typically implement the
Mapper and Reducer interfaces to provide the Answer: d
map and reduce methods Explanation: All intermediate values
c) Mapper and Reducer interfaces form the associated with a given output key are
O
core of the job subsequently grouped by the framework, and
d) None of the mentioned passed to the Reducer(s) to determine the
SP
final output.
Answer: d
Explanation: The transformed intermediate 6. Applications can use the ____________ to
records do not need to be of the same type as report progress and set application-level
G
the input records. status messages.
a) Partitioner
3. The Hadoop MapReduce framework b) OutputSplit
LO
c) 100-150
4. Users can control which keys (and hence d) 150-200
records) go to which Reducer by
implementing a custom? Answer: b
SE
b) JobConf.setNumReduceTasks(int)
c) JobConf.setNumMapTasks(int)
d) All of the mentioned
Answer: b
M
Explanation: Reducer has 3 primary phases:
shuffle, sort and reduce.
O
9. The framework groups Reducer inputs by
key in _________ stage.
C
a) sort
b) shuffle
T.
c) reduce
d) none of the mentioned a) Type 1
b) Type 2
Answer: a
O
c) Type 3
Explanation: The shuffle and sort phases
d) All of the mentioned
occur simultaneously; while map-outputs are
SP
being fetched they are merged. Answer: a
Explanation: A hypervisor running on bare
10. The output of the reduce task is typically
metal is a Type 1 VM or native VM.
written to the FileSystem via _____________
a) OutputCollector.collect
G
2. Point out the wrong statement.
b) OutputCollector.get a) Load balancing virtualizes systems and
c) OutputCollector.receive resources by mapping a logical address to a
LO
c) real machine
d) none of the mentioned
Answer: a
Explanation: Some virtual machines are
C
M
d) All of the mentioned operating system because they are installed
on a bare system.
Answer: a
O
Explanation: VMM is another name for 8. Which of the following is Type 2 VM?
Hypervisor. a) VirtualLogix VLX
C
b) VMware ESX
5. Point out the correct statement. c) Xen
T.
a) A virtual machine is a computer that is d) LynxSecure
walled off from the physical computer that
the virtual machine Answer: c
is running on Explanation: Xen is used by Amazon Web
O
b) Virtual machines provide the capability of Services to provide Amazon Machine
running multiple machine instances, each Instances (AMIs).
SP
with their own operating system
c) The downside of virtual machine 9. Which of the following will be the host
technologies is that having resources operating system for Windows Server?
indirectly addressed means there is some a) VirtualLogix VLX
b) Microsoft Hyper-V
G
level of overhead
d) All of the mentioned c) Xen
d) All of the mentioned
LO
Answer: d
Explanation: This makes virtual machine Answer: b
technology very useful for running old Explanation: Type 2 virtual machines are
versions of operating systems, testing installed over a host operating system.
.B
a) 1
b) 2
c) 3
d) All of the mentioned
-R
Answer: a
Explanation: Because it is a complete
SE
M
be standards-based
c) In Wolf, the data and transaction
O
management conforms to the business rules
you create
d) All of the mentioned
C
Answer: d
T.
Explanation: Wolf lets you work with Adobe
Flash or Flex or with Microsoft Silverlight.
O
describe major features provided by Google
a) Host Operating System App Engine?
SP
b) Software a)
c) VM
d) None of the mentioned
Answer: a
G
Explanation: Examples of Type 2 Virtual
Machine Monitors are Containers, KVM,
LO
b)
ENGINE, PROGRAMMING
ENVIRONMENT FOR GOOGLE
APP ENGINE
17
particular page?
a) SVD
b) PageRank
c) FastMap
SE
Answer: b
Explanation: Content on pages is scanned up
C
M
d) All of the mentioned
Answer: a
O
Explanation: Sitemaps can be useful in
allowing content that isn’t browsable to be
C
d) All of the mentioned crawled.
T.
Answer: d 7. Which of the following is not provided by
Explanation: For an application to run on “Deep Web”?
GAE, it must comply with Google’s platform a) Database generated Web pages
standards, which narrows the range of b) Private or limited access Web pages
O
applications that can be run and severely c) Pages without links
limits those applications’ portability. d) All of the mentioned
SP
4. Based on PageRank algorithm, Google Answer: d
returns __________ for a query that is parsed Explanation: Online content that isn’t
for its keywords. indexed by search engines belongs to what
G
a) SEP has come to be called the “Deep Web”.
b) SAP
c) SERP 8. Dynamic content presented in Google
LO
supports both Microsoft SQL Server and that helps the Google engine crawl this
MySQL database information.
b) Applications built in Wolf are 50-percent
browser-based and support mashable and 9. Which of the following google product
-R
multisource overlaid content sends you periodic email alerts based on your
c) Google applications are cloud-based search term?
applications a) Alerts
b) Blogger
SE
M
a) Paytm Answer: b
b) Checkout Explanation: They allow their users to
c) Code connect with the other services’ public users
O
d) All of the mentioned for a fee.
C
Answer: b 4. Which of the following protocol is not an
Explanation: Google Checkout was an online Internet Engineering Task Force standard?
T.
payment processing service provided by a) SIP
Google aimed at simplifying the process of b) SIMPLE
paying for online purchases. c) XMPP
d) IMPS
O
TOPIC 5.6 OPEN STACK Answer: d
SP
Explanation: IMPS is an IM communications
1. How many types of protocols are important standard.
for instant messaging?
a) 2 5. Point out the wrong statement.
a) All IM clients use peer-to-peer messaging
G
b) 3
c) 4 b) IM software aimed at businesses such as
d) All of the mentioned XMPP, Lotus Sametime, and Microsoft
LO
3. Which of the following protocol is adopted Macintosh, IOS (iPhone OS), Android,
for interoperability by top three IM service Blackberry, and inside browsers.
providers?
M
d) None of the mentioned Explanation: The Twitter Web client was
built using Ruby on Rails and deployed on
Answer: b the Ruby Enterprise Edition, with the
O
Explanation: When a service collects your message queue server written in Scala.
messages in a conversation, it is called a
C
micro-blog. 10. Which of the following version of office
suite is shown in the figure?
T.
8. Which of the following is a good example
of an SMS service organized into a social
network and blog?
a) Twitter
O
b) Facebook
c) Instagram
SP
d) None of the mentioned
Answer: a a) Offline
Explanation: It is sometimes referred to as b) Online
c) Online and Offline
G
the SMS of the Internet or as a form of
Internet Relay Chat (IRC). d) None of the mentioned
LO