0% found this document useful (0 votes)
682 views49 pages

Cloud Computing Reference Mcqs

The document contains 10 multiple choice questions related to distributed computing topics like cloud computing, utility computing, and virtualization. It also includes short explanations and solutions for each question. The key topics covered include characteristics of distributed systems like fault tolerance, peer-to-peer applications, applications that use grid computing, components of cluster computing, characteristics of cloud computing, examples of different cloud service models, and concepts related to private and public clouds.

Uploaded by

rajeshkotha214
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
682 views49 pages

Cloud Computing Reference Mcqs

The document contains 10 multiple choice questions related to distributed computing topics like cloud computing, utility computing, and virtualization. It also includes short explanations and solutions for each question. The key topics covered include characteristics of distributed systems like fault tolerance, peer-to-peer applications, applications that use grid computing, components of cluster computing, characteristics of cloud computing, examples of different cloud service models, and concepts related to private and public clouds.

Uploaded by

rajeshkotha214
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 49

1) Interrupts are handled in which mode?

a) Kernel mode

b) User mode

c) Can be handled in both of them

d) None of the options

Answer:- a) Kernel mode

2) Which device(s) need(s) physical address (MAC address)? Answers:-

a) Router

b) Switch

c) Bridge

d) Hub

3) Which of the following require(s) device driver(s)?

Answer:- Disk

4) Which one of the following is not a client-server application?

Answer:- Web browsing

5) Which of the following hierarchy is true for storage devices with respect to speed in decreasing order.

Answer:- registers, cache, main memory, solid state disk, hard disk, optical disk, magnetic tapes

6) In classful addressing, the IP address 128.255.255.255 belongs to which class? Answer:- Class B

7) Which of the following statements is/are true?

Answer:- b) CSMA/CA is generally used in wireless networks c) CSMA/CD is generally used in wired
networks
8) Which of the following(s ) is/are true for System calls?

A. It allows user level processes to communicate with the operating system.

B. read and write() are system calls but fork() is not a system call.

C. System calls execute in user-mode D. None of the options

Answer:- It allows user level processes to communicate with the operating system.

9) Which of the following HTTP methods is used to update a resource at the server? a)

GET b) HEAD

c) POST d) PUT

Answer:- PUT

10) In OSI network architecture, which layer supports congestion and flow controls:

a) Network Layer b) Transport Layer

c) Physical Layer d) Session Layer

Answer:- Transport Layer

11) QUESTION 1:

Which of the following is a common property of distributed computing?

A) Centralized control

B) Fault tolerance

C) Single point of failure

D) Limited scalability

Correct Answer: B

Detailed Solution: Distributed systems are designed to be resilient, incorporating fault tolerance
mechanisms to avoid single points of failure.

QUESTION 2:

Peer-to-Peer computing resembles truly distributed applications.


A) True B) False

Correct Answer: A

Detailed Solution: Refer to slide-13 of Week-1 (Distributed applications)

QUESTION 3:

Which of the following application(s) uses grid computing?

A) Reactor Applications

B) Air conditioning

C) Crystallography

D) Steganography

Correct Answer: A and C

Detailed Solution: Refer to slide-21 of week-1 (Who uses grid computing?)

QUESTION 4:

Which of the following is(are) a key component(s) of cluster computing?

A) Parallel programming environment

B) Single central processing unit

C) Symmetric Multiprocessing (SMP)

D) Node affinity

Correct Answer: A, and C

Detailed Solution: A cluster is a type of parallel or distributed computing platform consisting of a


collection of interconnected stand-alone computing computers working together in a single integrated
computing resource. So, key components of stand-alone computers may be PC workstations or SMPs,
operating systems, hyper-performance interconnects middleware, parallel programming environment
and applications.

QUESTION 5:

Utility computing is aresources andmodel, in which a service provider makes computingavailable to the
customer.

A) service-provisioning, infrastructure management


B) infrastructure management, service-provisioning

C) cloud computing, resource management

D) service-provisioning, resource management

Correct Answer: A

Detailed Solution: Utility computing is a service-provisioning model, in which a service provider makes

computing resources and infrastructure management available to the customer.

QUESTION 6:

Utility computing encapsulates the following characteristic(s)

A) Mobility amalgamation

B) Pay-per-use pricing business model

C) No impact on resource utilization

D) None of above

Correct Answer: B

Detailed Solution: Utility computing is a pay-per-use pricing business model.

QUESTION 7:

In utility computing, the payment model differs for different customers based on scale and payment

frequency alone.

A) True

B) False

Correct Answer: B

Detailed Solution: In utility computing, the payment model differs with the customers based on many

factors like scale, payment frequency, and commitments.

QUESTION 8:

What are the different characteristic(s) of cloud computing?

A) Virtualization

B) Service disagreement
C) Service orientated D) Scalability

Correct Answer: A, C and D Detailed Solution: Refer to slide- "common characteristics" of week-1.

QUESTION 9:

Google Spreadsheet is an example of:

A) Platform as a Service or PaaS

B) Software as a Service or SaaS

C) Function as a Service of FaaS

D) Infrastructure as a Service or laas

Correct Answer: B

Detailed Solution: Google Workspace (previously known as G Suite) is a collection of productivity tools
that includes Google Spreadsheet, a web-based spreadsheet application. Users can create, edit, and
collaborate on spreadsheets online without the need for local software installation. Users can access the
application through their web browsers, and Google is responsible for managing the underlying
infrastructure and software. Therefore, Google Spreadsheet falls under the category of Software as a
Service (SaaS).

QUESTION 10:

In the case of the client-server model: Statement (1) Virtualization is a core concept; Statement (ii)

system can scale infinitely A) Only Statement (i) is correct

B) Only Statement (ii) is correct

C) Both Statements (i) and (ii) are correct

D) None of the statements is correct

Correct Answer: D

Detailed Solution: In the case of the client-server model: there is no concept of virtualization; the system
can scale up to a certain extent.

QUESTION 1:

Public cloud has andservice level agreements(SLAs)

A) loosely coupled, default

B) restrictive, customized
C) customized, default

D) default, restrictive

Correct Answer: D

Detailed Solution: Public cloud has default and restrictive service level agreements(SLAs)

QUESTION 2:

In the XML parser processing model, the parser should not stop processing even if the data is
notwellformed

A) True

B) False:

Correct Answer: B

Detailed Solution: In the XML parser processing model, the parser must stop processing and throw
anexception if the data is not well-formed.

QUESTION 3:

The on-site private cloud's network capacity restricts on-demand bulk data import or export.

A) True

B) False

Correct Answer: A

Detailed Solution: On-demand bulk data import or export is limited by the network capacity of the onsite
private cloud, and real-time processing may be problematic due to networking limitations

QUESTION 4:

Electronic Data Interchange (EDI) hus errors andaccuracy.

A) low, medium

B) medium, low

C) high, medium

D) low, high

Correct Answer: D
Detailed Solution: EDI is computer to computer exchange of business data and documents between
companies using standard formats recognized both nationally and internationally. EDI has low errors and
high accuracy.

QUESTION 5:

Web services provide capabilities similar to EDI but are expensive

to implement.

A) more

B) less

C) not applicable

D) equal

Correct Answer: B

Detailed Solution: Web services provide bilimlar to ED bure simpler andless expensive to implement.

QUESTION 6:

In XML, a special "xmlsn' attribute is used to define the namespace.Sign in

A) True B) False

Correct Answer: B

Detailed Solution: In XML a special "xmlns' attribute is used to define the namespace

QUESTION 7:

Following is(are) example(s) private cloud

A) Amazon VPC

B) Eucalyptus

C) Microsoft Azure

D) Oracle Cloud

Correct Answer: A and B

Detailed Solution: Refer to slide-9 of Week-2 (Private Cloud)


QUESTION 8:

What is(are) goal(s) for a virtual machine architecture?

A) Equivalence

B) Resource control

C) Efficiency

D) None of these

Correct Answer: A, B and C

Detailed Solution: Virtual machine architecture has three goals: equivalence, resource control,
andefficiency.

QUESTION 9:

Within a cluster manager,manager is connected via high-speed network

A) grid

B) cloud

C) computer

D) Node

Correct Answer: C

Detailed Solution: Within a cluster manager the computer manager is connected via high-speed network.

QUESTION 10:

Which statement(s) is (are) application to Data Object Storage (DOS)?/ Statement(i) DOS stores user
credentials; Statement(ii)DOS is usually single for a cloud.

A) Only Statement (i) is correct

B) Only Statement (ii) is correct

C) Both Statements (1) and (ii) are correct

D) None of the statements is correct

Correct Answer: C

Detailed Solution: Data Object Storage (DOS) stores user credentials and is usually single for a cloud
1__In the context of aggregated demand in resource provisioning in the cloud, how does adding
independent demands affect the coefficient of variation (CV)?
A) Increases the Cv

B) Decreases the Cv

C) Does not change the Cv

D) Inversely proportional to the mean

Correct Answer: B .

Detailed Solution: Adding n independent demands reduces the Cv by 1/vn

QUESTION 2:

What does the term "biasness towards vendors" imply in the context of SLA monitoring?

A) Vendor-driven selection of monitoring parameters

B) Customer-driven selection of monitoring parameters

C) Balanced approach in monitoring parameters D) Lack of active monitoring on the customparameter

Correct Answer: A

Detailed Solution: Biasness towards vendors means measurement of parameters is mostly established
according to vendor advantage or in other words vendor-driven selection of monitoringparameters

QUESTION 3:

storage persists until the VM is terminated and is

In the Openstack storage concept,managed by

A) Nova, Cinder

B) Ephemeral, Cinder

C) Cinder, Ephemeral D) Ephemeral, Nova

Correct Answer: D

Detailed Solution: In the Openstack storage concept, ephemeral storage persists until the VMterminates
and is managed by Nova.

QUESTION 4:

What condition makes periodic provisioning acceptable in the presence of linear demand?

A) High resource utilization


By Non-linear demand

C) Instantaneous demand

D) Flat demand

Correct Answer: D

Detailed Solution: If demand is flat, it is linear and periodic provisioning is acceptable.

QUESTION 5:

What is (are) the key factor(s) to consider in a hybrid model for utility pricing?

A) Reliability and accessibility

B) Network cost and usage costs

C) Peak to average demand ratio

D) Interoperability overhead

Correct Answer: C

Detailed Solution: The key faces to consider in a hybrid model for utility pricing is ratio of peak to average
demand.

QUESTION 6:

What architecture is used in a parallel database for the efficient execution of SQL queries?Sign in

A) Shared memory architecture B) Shared disk architecture

C) Shared nothing architecture D) Shared cache architecture

Correct Answer: C

Detailed Solution: For shared-nothing architecture in the parallel database, tables are partitioned and
distributed across multiple processing nodes and SQL optimizer handles distributed joins.

QUESTION 7:

What type of environment benefits from utility pricing? A) Environments with fixed demand levels

B) Environments with limited resource scalability

C) Environments with variable demand levels D) Environments with prepaid resource allocation Correct

Answer: C
Detailed Solution: Utility pricing or pay-per-use pricing benefits apply in environments with variable
demand levels.

QUESTION 8:

What is the role of Neutron in the provisioning flow in OpenStack?

A) Fetches information about the whole cluster from the database

B) Publishes a message to the compute queue to trigger VM provisioning

C) Configures IP, gateway, DNS name, and 1.2 connectivity

D) Contacts Cinder to get volume data

Correct Answer: C

Detailed Solution: Refer to slide 18 of OpenStack

QUESTION 9:

How does the master node in the Google File System maintain communication with chunk servers"?

A) Command messages

B) Update messages

C) Query messages

D) Heartbeat messages

Correct Answer: D

Detailed Solution: In GFS, master maintains regular communication with chunk servers by Heartbeat
messages

QUESTION 10:

What does the 'availability' metric represent in the monitoring and auditing of SLAs? A) The speed at
which a service responds

B) The percentage of uptime for a service

C) How often the service is available

D) The ability for a resource to grow infinitely

Correct Answer: B
Detailed Solution: Availability is represented as a percentage of uptime for a service in a given
observation period

QUESTION 1:

In Microsoft Azure, a deployment user is required for FTP and local Git deployment to a web app.

A) TRUE

B) FALSE

Correct Answer: A

Detailed Solution: A deployment user is required for FTP and local Git deployment to a web app
inMicrosoft Azure

QUESTION 2:

Azure Web Apps lack scalability

A) TRUE

B) FALSE

Correct Answer: B Detailed Solution: Azure Web Apps are highly scalable, self-patching web hosting
services. Therefore, thestatement is false

QUESTION 3:

Match the Google Cloud Platform services with their respective domain (compute, storage or app
services). Column I

Column II

L IL

1. BigQuery

2 App Engine 3. Cloud SQL

Compute App Services

Storage

111, 21, 31
e III, 21,311

₫ 11,2 III, 3=11

Correct Answer: B

Detailed Solution: In Google Cloud Platform (GCP), BigQuery is used as an app service, App Engine is
used as a compute service and Cloud SQL provides storage service.

QUESTION 4:

Which of the following is/are App services provided by Google Cloud Platform?

A) Cloud Endpoints

B) Google App Engine C) Cloud SQL

Dj BigQuery

Correct Answer: A, D

Detailed Solution: Cloud Endpoints and BigQuery are App services provided by Google Cloud Platform.

QUESTION 5:

Identify the correct statement(s) about Google Cloud Platform(GCP) storage.

A) Cloud SQL is Google's fully managed, petabyte scale, low cost analytics data warehouse to
findmeaningful insights

B) MySQL or NoSQL databases are present in Google DataStore

C) BigQuery maintains, manages, and administers relational databases on Google Cloud Platform

D) Cloud Storage provides flexible ones with pinbat edpo caching

Correct Answer: B, D

Detailed Solution: Cloud SQL mai voterventional databases on Google Cloud

QUESTION 6:

At the time of deployment of an app in Azure, the system asks for a password. The password used to
login to the Azure portal should be entered Sign in

A) True B) False
Correct Answer: B

Detailed Solution: The user should make sure to enter the password created in "Configure a deployment

user", not the password used to log in to the Azure portal.

QUESTION 7:

Google APIs help 10:

A) migrate the web app to Google Cloud Platform

B) scale up the app according to the demand/ service requests

C) provide flexible object storage with global edge caching

D) integrate Google's services into the application.

Correct Answer: D

Detailed Solution: Google APIs help to integrate Google's services into the application

QUESTION 8:

Statement 1: Azure supports public cloud platforms Statement 2: Azure App Service plan defines security.

A) Statement 1 is True and Statement 2 is False B) Statement I is False and Statement 2 is True

C) Both statements are True

D) Both statements are False

Correct Answer: A

Detailed Solution: Microsoft Azure is Microsoft's public cloud computing platform. Azure App Service
Plan is the container for hosting Web Apps, API Apps, Mobile Apps and Function Apps.

QUESTION 9:

What core function(s) do(es) Keystone perform in OpenStack?

A) Networking

B) Compute

C) Authentication and Identity service D) Storage

Correct Answer: C
Detailed Solution: Keystone is an OpenStack service that provides API client authentication, service
discovery, and distributed multi-tenant authorization by implementing OpenStack's Identity API. So, the
correct option is C.

QUESTION 10:

Identify the incorrect statement(s) on Google App Engine.

A) It is a part of Google Cloud Platform (GCP) "compute" infrastructure

B) It is a part of Google Cloud Platform (GCP) "services" infrastructure

C) While using Google App Engine, we need to worry about patching and maintenance, D) It is a Platform
as a Service (PaaS) component of GCP

Correct Answer: B, C

Detailed Solution: Google App Service is a part of GCP compute infrastructure. It is a Platform as a

Service (PaaS) component of GCP Using App Engine, we can just focus on our code and do not need to

worry about patching or maintenance. So, the incorrect options are B and CGC

Which of the following is/are the objective(s) of Resource Management?

A) Increased overhead

B) Increased throughput

C) Increased latency

D) Scalability

Answer:- Increased throughput, Scalability

__Multiple KPIs are aggregated to SLA.

A) True

B) False

Answer:- False

_In computing. Performance/Watt follows Moore's law

A) True B) False

Answer:- False
4) Which of the following is/are resource adaptation approaches?

A) Reinforcement learning guided control policy

B) Intelligent multi-agent model C) Network queueing model

D) Web-service based prototype

Answer:- Reinforcement learning guided control policy, Web-service based prototype.

A third party application runs in the cloud for 18 hours/day. At the end of one month (30 days), it was
found

that the cloud suffered outages totaling 6 hours and Thours, on different days over the service period.
The cloud guarantees service availability for 98% of the time. What are the value(s) of T among the given
options such that the SLA negotiation does NOT get honored in terms of service availability?

A) 3 hours B) 5 hours

C) 6 hours D) 4 hours

Answer:- 5 hours, , 6 hours

Consider that the peak computing demand for an organization is 200 units. The demand as a function of
time can be expressed as D(t) = 8t. Baseline (owned) unit cost is 120 and cloud unit cost is 150. The cloud
is

owned for a period of T time units. Select the values of T for which cloud is cheaper than owning

A) 25

B) 30 C) 35

D) 45
Answer:- A) 25 B) 30 C) 35

Which of the following is/are true regarding penalty cost? (Here D(t) and R(t) are instantaneous demand
and

resources at time t.)

A) If demand is flat, the penalty is equal to 0. B) Penalty cost [ID(t)/R(t)]dt

C) If demand is exponential (D(-e), any fixed provisioning interval (tp) according to the current D) The
penalty cost for exponential demand is exponential

demands will fall linearly behind

Answer :- A) If demand is flat, the penalty is equal to 0.,D) The penalty cost for exponential demand is
exponential

In resource management, its duration, predecessor activities, predecessor relationships etc.

is determining when an activity should start or end, depending on

A) Resource allocation B) Resource mapping

C) Resource scheduling D) Resource modeling

Answer:- Resource scheduling

Which of the following techniques can be used to conserve energy within a Cloud environment? A)

Schedule VMs to conserve energy. B) Optimize data center design

C) Maximize operating inefficiencies for non-essential tasks. D) Management of both VMs and underlying
infrastructure

Answer:- .A) Schedule VMs to conserve energy. B) Optimize data center design, D) Management of both
VMs and underlying infrastructure
10) An app collects the ratings of restaurants in a particular location and logs it in the following form:
<userld, restaurantId, rating>. ‘restaurantId’ takes any of the values (A, B, C, D) and each user having a
unique userld can provide [0,5] rating. There are three files and each file consists of three columns:
userId, restaurantId and rating. Each file may consist of the data for the same user or same restaurant
multiple times. Now, out of this data, we need to calculate the number of times each restaurant gets a “5
star rating from users.

The MapReduce framework will divide it into three map tasks and each map task will perform data
functions on one of the three files. The inputs are as shown below.

MI: ((ul,A,5); (ul,B,3); (u2,A,5); (u3,C,5); (u3,D,2); (u7,D,5)}

M2: ((u1,C,3); (ul,D,5); (u2,C,5), (u2,D,5); (u4,D,5); (u6,A,5)}

M3: ((ul,A,5), (u2,A,5), (u2, B,5), (u3.B.5); (u4,C,5); (u3,D,5)}

The tasks of all mappers (M1, M2 and M3) are passed to the reducer job. Reducer will output:

(a) <A, 5>; <B, 5>; <c, 5>; <D, 5>

(b) <A, 5> <B, 2>; <C, 3>; <D, 5>

© A, B, C, D

(c) <A, 5>; <D,5>

(d)

Accepted Answer:- b.) <A, 5> <B, 2>; <C, 3>; <D, 5>

1__Fabrication is an attack on:


Answers:-- Authenticity

2___Reliability and efficiency are basic components of security.

A) True B) False

Answer:- False

3___Spoofing threat on cloud security is an example of.

A) Deception B) Disruption.
B) Usurpation D) Disclosure

Answer:---Deception, Usurpation

4_____Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates alerts
when suspected scans attacks are in progress

Statement II: Authentication is the determination of whether or not an operation is allowed by a certain

User.

A) Statement I is TRUE and Statement II is FALSE. Statement I is FALSE.

B) Statement II is TRUE and

C) Both statements are TRUE. D) Both statements are FALSE Answer:- Statement I is TRUE and
Statement II is FALSE.

5____Which of the following is/are hypervisor risks associated with rough hypervisor root kits?

A) Improper configuration of VM.

B) Hypervisor that hides itself from normal malware detection systems.


C) Hypervisor that creates a covert channel to dump unauthorized code.

D) Vulnerable virtual machine applications like Vmchat, VMftp. Vmcat etc.

Answer:-- Hypervisor that hides itself from normal malware detection systems.,, Hypervisor that creates
a covert channel to dump unauthorized code.

6____In fault tolerance, replication is mirroring/sharing data over disks which are located in separate
physical locations to maintain consistency.

A) True B) False Answer:---- True

7______In which of the following web service(s) based security attacks does (do) the attacker send huge
amounts of requests to a certain service, causing denial of service? A)

B) Flooding

C) Cross-site scripting (XSS)

D) Metadata (WSDL) spoofing attack

Answer:---- Flooding

8) When is it better to switch cloud providers?

1 point

A) Contract price decrease

B) Provider bankruptcy

C) Provider service shutdown D) Increase in service quality


Answer:-- B) Provider bankruptcy, C) Provider service shutdown

9) Which of the following Open-source tools is/are used to perform TCP SYN trace routes on the
Amazon EC2

platform?

A) wget B) nmap

C) ipconfig

D) hping

Answer:- hping

10) In risk-based access control (RAC), computing security uncertainty is addressed

A) True B) False Answer:---


false

1___ensures the ability to exchange/ obtain the information to be

“consumed”.

a) Data Level Interoperability

b) Security Level Interoperability

e) Service Level Interoperability

c) None of the above

Answer:- Service Level Interoperability


2___Fog computing enablers are

1 point

a. Virtualization

b. Big data

c. Service oriented architecture

d. None of these

Answer:- Virtualization, c. Service oriented architecture

3___Consider the following statements:

Statement 1: In Geospatial Cloud, it is needed to integrate data from heterogeneous back-end

Data

Services.

Statement 2: Data services can be inside and/or outside of the cloud environment in Geospatial

Cloud.

a. Statement 1 is Correct, but Statement 2 is Incorrect b. Statement 2 is Correct, but Statement 1 is


Incorrect.

b. Both statements are Correct.


c. Both statements are Incorrect

Answer:--- Both statements are Correct.

4___Which of the following statements is false about Code offloading using cloudlet?

(Choose the most appropriate option)

Statement 1: The architecture reduces latency by using multi-hop network.

Statement 2: It potentially lowers battery consumption by using short range radio.

a. Statement 1 is correct but Statement 2 is incorrect b. Statement 2 is correct but Statement 1 is


incorrect

b. Both the statements are correct

c. Both the statements are incorrect.

Answer:-- Statement 2 is correct but Statement 1 is incorrect

5__ Which of the following is/are a feature(s ) of Mobile Cloud Computing?

a) Uses lesser mobile device resources because applications are cloud-supported

b) Reduces reliability with information backed up and stored in the cloud

c) Mobile devices connect to services delivered through an API architecture

d) Facilitates slower development, delivery and management of mobile apps

Answer:-- Uses lesser mobile device resources because applications are cloud-supported, Mobile
devices connect to services delivered through an API architecture..

6__Which of the following statement(s) is/are FALSE about Fog Computing?


a) Fog nodes present near to the end-user

b) Fog computing enables real-time applications

c) Fog nodes’ response time is much higher than Cloud’s d) Network routers, WiFi Gateways will
not be capable of running applications

Answer:------ c) Fog nodes’ response time is much higher than Cloud’s d) Network routers, WiFi
Gateways will not be capable of running applications

7__ Which of the following options is correct about geographic information?

Statement 1: Geographic information could be static or dynamic.

Statement 2: Geographic information varies in scale.

Statement 3: Population of a city/town is a static geographic information

a. Statement 1 & 2 are True, but Statement 3 is False.

b. Statement 2 & 3 are True, but Statement 1 is False.

c. Statement 1& 3 are True, but Statement 2 is False.

d. All the statements are True.

Answer:--- Statement 1 & 2 are True, but Statement 3 is False.

8____ Benefits of Fog Computing is are:

a. Immobility
b. Low latency and location-aware.
c. Homogeneity d. Widespread geographical distribution.
Answer:---- Low latency and location-aware., Widespread geographical distribution.

9___ Distance between the client and server in Cloud Computing is of

And Fog computing is

a) One Hop, Multiple Hop

b) One Hop, One Hop

c) Multiple Hop, One Hop

d) Multiple Hop, Multiple Hop

Answer:--- Multiple Hop, One Hop

10__Match the following tables related to Mobile Cloud Computing key components:

Table-I Table-II

Table-1

1. Profiler

Table-II

Į. Collects results of split execution and combine,

2. Solver
3. Synchronizer

And make the execution

Details transparent to the user

ii. Monitors application execution to collect data about execution time, power The task of selecting which
parts of an app runs on mobile and cloud

Answer:- 1.-> (1), 2->(), 3.-> (1)

1__Statement 1: Sensor-Cloud proxy exposes sensor resources as cloud services Statement 2: Sensor
network is still managed from the Sensor-Cloud Interface via Sensor

Network Proxy

a. Statement 1 is True and Statement 2 is False

b. Statement 2 is True and Statement 1 is False

c. Both statements are True

d. Both statements are False

Answer:----Both statements are True

2___A typical cloud broker performs scheduling of applications and a Green broker performs carbon

Aware scheduling

a. True
b. False

Answer:---- True

3___In IoT based vehicular data clouds, vehicles providing their networking and data processing
capabilities to other vehicles through the cloud is best identified with which of the following Services? A.
SaaS

c. PaaS

d. IaaS d. BaaS

Answer:--- IaaS

4___Which of the following statements is/are true about Docker? Statement 1: Docker hub is used for
building docker images and creating docker containers Statement 2: Docker compose is a registry used to
host various docker images.

A Statement 1 is correct but Statement 2 is incorrect

b. Statement 2 is correct but Statement 1 is incorrect

d. Both the statements are correct

e. Both the statements are incorrect.

Answer:-- d. Both the statements are incorrect..

5___Choose the most appropriate option.

Statement 1: An image is a lightweight, stand-alone, executable package that includes everything

To run a piece of software.

Statement 2:Container is a run time instance of an image.


A Statement 1 is correct but Statement 2 is incorrect b. Statement 2 is correct but Statement 1 is
incorrect

d. Both the statements are correct

e. Both the statements are incorrect.

Answer:--- c. Both the statements are correct

6__ Sensor data can be easily shared by different groups of users without any extra effort/ measure

a. True b. False

Answer:--- False

7__ An IoT platform’s basic building blocks is/are (choose the correct option(s)).

a. Gateway

b. Images c. Network and Cloud

c. Containers

Answer:--- a. Gateway, c. Containers

8___enables different networks, spreads in a huge geographical area to connect together

And be employed simultaneously by multiple users on demand a) Serverless

b) IoT Cloud

d) Sensor Cloud
e) Green Cloud

Answer:--- Sensor Cloud

9___In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as

a. Power Delivered / Overall Power

b. Overall Power/Power Delivered

c. Overall Power Power Delivered

d. None of these

Answer:--- b. Overall Power/Power Delivered

10___ -get virtual access to host resources through a hypervisor

a) Containers

b) Virtual machines c) Both a and b

c) Images

Answer:---- b) Virtual mmachine

Statement I: Fog computing supports real-time interactions which is not the case in cloud computing
Statement II: Fog computing reduces latency compared to cloud computing.

Select the correct option.

A) Statement Iis TRUE and Statement II is FALSE.


B) Statement II is TRUE and Statement I is FALSE.

C) Both statements are TRUE.

D) Both statements are FALSE

1__ Statement I: Fog computing supports real-time interactions which is not the case in cloud computing
Statement II: Fog computing reduces latency compared to cloud computing.

Select the correct option.

A) Statement Iis TRUE and Statement II is FALSE.

B) Statement II is TRUE and Statement I is FALSE.

C) Both statements are TRUE.

C) Both statements B) Statement II is TRUE and Statement I is FALSE.


D)
E) are FALSE

Answer:--- B) Statement II is TRUE and Statement I is FALSE.

2___ In the Cloud-Fog-Edge Computing paradigm, Cellular base stations, Network routers and WiFi
Gateways

can run applications.

A) True

B) False

Answer:--- A) True
3__Which of the following statement(s) are true regarding the cloud-fog environment model?

A) The cloud-fog environment model consists of three layers: a client layer (edge), a fog layer, and a

Cloud layer.

B) Virtual machines (VMs) operate for the cloud data server, process them, and then deliver the
results

To the cloud server manager. C) If there is no limited availability of resources in the fog layer, then
the request is passed to the cloud

Layer. D) Fog servers contain fog server manager and virtual machines to manage requests by using
container Virtualization technique.

Answer:--- A) The cloud-fog environment model consists of three layers: a client layer (edge), a fog
layer, and aCloud layer.

C) If there is no limited availability of resources in the fog layer, then the request is passed to the
cloudLayer.

4___Which of the following algorithms used in resource management in cloud-fog-edge computing


is used to capture the performance (of entities like, CPU, storage, network, etc.) of a computing
system?

A) Discovery

C) Load Balancing

D) Placement D) Benchmarking

Answer:---D) Benchmarking

5___According to the service placement taxonomy in fog-edge computing, which of the following can be
Classified as online ys offline?

A) Control plan design

B) Placement characteristic

C) System dynamicity

D) Mobility support

Answer:--- B) Placement characteristic

6__Select the correct statement(s) regarding offloading

A) Offloading is a technique in which a server, an application, and the associated data are moved from
the edge to the cloud.

B) Offloading augments the computing requirements of individuals or a collection of user devices.

C) Offloading from cloud to the edge can be achieved by server offloading

E) Offloading from user device to edge can be achieved by application partitioning.

Answer:--- B) Offloading augments the computing requirements of individuals or a collection of user


devices.

D) Offloading from cloud to the edge can be achieved by server offloading E) Offloading from user
device to edge can be achieved by application partitioning.

7__Different Cloud Service Providers join together to form a federation.

A) True

B) False
Answer:-- A) True

8__Which of the following are NOT benefits of cloud federation?

A) Minimize resource utilization B) Load balancing C) Maximize power consumption

C) Global utility

Answer:-- A) Minimize resource utilization, C) Global utility

9__In which of the following cloud federation architectures, creation of cross site networks and cross
site35Migration of VMs are used?

A) Loosely coupled federation B) Partially coupled federation

B) Tightly coupled federation

C) None of the above

Answer:--- C) Tightly coupled federation

10___In which of the following architectures, two or more partner clouds interoperate to aggregate their
resources and provide users with a larger virtual infrastructure?

A) Hybrid Bursting Architecture

B) Aggregated Architecture

C) Broker Architecture D) Multiplier Architecture

Answer:---- B) Aggregated Architecture

1__QUESTION 1:
Given the VM memory size of 1024 GB and the transmission rate of 16 MB/sec What are the total
migration time and downtime for non-live VM migration? Choose the most appropriate option.

A. 20 hours, 25 hours

b. 18 hours, 18 hours

c. 16 hours, 16 hours

d. 24 hours, 20 hours

Correct Answer: b Detailed

Solution: Total

Migration

Time

VM

Memory

Size/

Transmission

Rate
(1024x2^30)/(16x2^20)-65536 secs 18 hours. For non-live migration, overall migration time is the same
as overall downtime

QUESTION 2:

Which of the following is (are) true in the case of Docker architecture?

Statement-1. Private Docker registry is a service that stores Docker images. Statement-2 Docker on the
host machine is split into two parts- a daemon with a RESTful API and

A client who talks with the daemon

a. Only Statement-1 is true

b. Only Statement-2 is true

e. Both Statement-1 and 2 are true d. Neither Statement I nor 2 is true

Correct Answer: c

Detailed Solution: Private Docker registry is a service that stores Docker images. Moreover, Docker on the
host machine is split into two parts- a daemon with RESTful API and a

Chent who talks with the daemon.

QUESTION 3:

NPIEL Online Certification Courses

Indian Institute of Technology Kharagpur


NPTEL

What is (are) the key advantage(s) of Docker?

a. Facilitating microservices

b. Modeling networks. Packaging software

c. None of these

Correct Answer: a,b,c

Detailed Solution: Facilitating microservices, packaging software, and modeling networks for initiating
multiple isolated containers on a single machine, are the key advantages of Docker

QUESTION 4:

What is (are) the reason(s) to opt for VM migration in the cloud computing paradigm?

a. No particular reason; depends on the will of the end client/user.

b. To remove a physical machine from service

c. To save power consumption

d. To relieve the load on the congested hosts.

Correct Answer: b.d


QUESTION 5:

A Kubernetes cluster consists of a set of worker machines called,

A Pods

c. Nodes

d. Control plane

e. Centers Correct Answer: b

Detailed Solution: A Kubernetes cluster consists of set of worker machines, called nodes.

QUESTION 6:

Docker builds are more reproducible and and replicable than traditional software building methods.

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

NPTEL

a. True

b. False
Correct Answer: a

Detailed Solution: Docker builds are more reproducible and and replicable than traditional software
building methods. This makes implementing CD much easier.

QUESTION 7:

VM migration is the process of moving running applications or VMs from one physical host to

Another host a. True

c. False

Correct Answer: a

Detailed Solution: VM migration is a process to move running applications or VMs from one physical
host/server to another host. So option (a) is correct.

QUESTION 8:

In Docker utility. Is a collection of filesystem layers and some metadata that, if taken together, can be
spun up as Docker containers:

a. Operating System
b. Microservice
c. Virtual Machine
d. Image

Correct Answer: d

Detailed Solution: In Docker utility, an image is a collection of filesystem layers and some metadata which
if taken together, they can be spun up as Docker containers.

QUESTION 9:

Post-copy and Pre-copy migration approaches are followed in:

a. Live Migration process


b. Non-live Migration process c. Hybrid Migration process
c. None of these

Correct Answer: a

Detailed Solution: Both Post-copy and Pre-copy are approaches for live migration process

QUESTION 10:

Kubernetes operates at the hardware level.


a. True
b. False

Correct Answer: b

Detailed Solution: Kubernetes operates at the container level.

1__ Server less covers a wide range of technologies that can be grouped into two categories a.

BaaS and YaaS

b. FaaS and BaaS

c. FaaS and YaaS

c. None of these

Answer:--- b. FaaS and BaaS

2__BigQuery is a fully-managed, server less data warehouse by___

a. AWS
b. Google
c. Microsoft
d. IBM

Answer:--- b. Google

3__Which of the following statements is/are false?

A. Server less computing allows the users with more control over the deployment environment

Compared to PaaS.

b. Server less computing is a form of cloud computing that allows users to run event drivengranular
applications

Answer:-- A

4___ Which of the following statements is/are false?

a. Server less computing allows the users with more control over the deployment environmen

Compared to PaaS.

b. Server less computing is a form of cloud computing that allows users to run event driven

Granular applications.

Answer:- d
5___Runtimes allows you to annotate your function code with custom logging statements which helps
you to analyze the execution flow and performance of your AWS Lambda functions a. True
b. False

Answer:-- false

6__Which of the following is not a category of a research initiative on sustainable cloud computing? a.

Renewable Energy

b. Capacity planning
c. Environment Sandboxing
d. None of these

Answer:---c. Environment SSandboxing

7____VMs can be migrated to a remote CDC to balance the load effectively as per sustainable
cloudComputing model

a. True
b. False

Answer:- a. True

8__The focus of cloud computing was.-------and the server less is------ A.

programmers, system administrators

b. system administrators, programmers

Answer:---b.system administrators, programmers

9__Cloud Data Centers (CDCs) consist of a chassis and racks to place the servers to process the IT

Workloads.

a. True
b. False

Answer:- a. True

10__------- are an important distribution mechanism for

Libraries and custom Runtimes in AWS server less ecosyste

A. Runtimes
B. Lambda Layers
C. Log streams
D. None of these

Answer:- b. Lambda Layers


1__In which computing environment is latency fixed due to the location of application modules at the

Area Gateway?

A) Fog computing
B) Cloud computing
C) Serverless Computing
D) None of the above

Answer:--- A) Fog computing

2___What does spatial cloud support in terms of resource pooling?

A) Individual resource allocation for participating organizations


B) Exclusive resource ownership for each organization
C) Shared resource pooling for participating organizations
D) Restricted access to network, servers, apps, services, storages, and databases

Answer:--- C) Shared resource pooling for participating organizations

3__Dew computing is an on premises computer software-hardware organization paradigm where on


premises computers provide functionality that is-----With cloud services.

Of cloud services and is also

A) Independent, serverless
B) Dependant, collaborative
C) Independent, collaborative
D) Serverless, collaborative

Answer:--- C) Independent, collaborative

4___Fog-Edge computing leads to increased network congestion

A) True

B) False

Answer:-- B) False

5__A Cyber Physical Cloud Computing (CPCC) architectural framework is a that can rapidly build, modify
and provision cyber-physical systems composed of a set based sensor, processing, control, and data
servic

Environment Of

A) System, cloud computing


B) Cloud computing, system
C) C) system, edge computing
D) Edge, system computing

Answer:-- A) System, cloud computing

6___What is (are) the key feature(s) of Mobile Cloud computing for 5G networks?

A) Increased resource consumption by mobile applications


B) Improved reliability due to data storage in the cloud

24

C) Sharing resources for mobile applications


D) D) None of these

Answer:--- B) Improved reliability due to data storage in the cloud24

C) haring resources for mobile applications

7__The key aspect of the intelligent transportation system is efficient-------

A) cost
B) B) mobility
C) speed
D) delivery

Answer:-- B) mobility

8___In conjunction with 5G and cloud computing, what should service providers focus on in the evolving
computing paradigm?

A) Limiting end-to-end orchestration


B) Providing manual service layer agreements
C) Offering limited self-service options
D) Providing full end-to-end orchestration with defined service layer agreements

Answer:--- D) Providing full end-to-end orchestration with defined service layer agreements

9____Mobility Analytics utilizes the cloud platform for computation and storage

A) True B) False

Answer:--- A) True

10___What is (are) the benefit(s) of 5G technology for enhanced mobile Broadband

A) Slower data rates


B) B) Higher latency
C) Lower cost-per-bit
D) Limited device compatibility
Answer:-- C) Lower cost-per-bit

1. Which of the following models allow you to either use servers or stomige in the cloud?

laaS

h. PaaS c. Sans

c. BPaaS
Answer:- laaS

2. Which of the following APIs provide an abstraction to the cloud provider’s infrastructure?

Cloud provider AP

c. Cross-platform APIs

d. Infrastructure cloud APIs

e. Platform cloud APIs


Answer:-- Cloud provider APls

3. Which of the following features allow a consumer to set up computing capabilities? On demand sof
service

h. broad network access

d. Resource pooling d. Rapid elasticity


Answer:- on demand self service

4. A is a set of programming instructions and tools that provides abstractions over a specific provider
cloud.

a. Cloud network

b. Cloud API

c. Mobile client

d. Thin client
Answer:--Cloud API
5. Architecture is a network of hosts in which resource sharing, processing, and communication control
are completely decentralized.

Peer to poor h client server

c. Cloud computing

d. Server virtualisation
Answer:---peer to peer

6. Architecture is a form of distributed computing where requesters (client) dependent number of


providers (servers) for various services or resources such as database, applications, security, printing
and backups

Peer to peer

c. Client server

d. Cloud computing

e. Server virtualisation
Answer:-- client server

7. Is one of the fundamental elements or building blocks of cloud computing Virtualizati

H cloud API

f. Client server architecture

e. None of the above


Answer:-- Virtualization

8. Which of the following is a component of cloud computing

a. Client

b. Cloud network

c. Cloud API
d. All of the above
Answer:-- all of the above

9.Is the integration of the mobile Cloud Computing environment with the cloud computing services

A mobile Cloud Computing

c. Cloud computing

d. Mobile computing

e. None of the above


Answer:- mobile Cloud Computing

10. Which layer provides infrastructure and Hardware facilities to the cloud

a. Data centre

b. IaaS

c. PaaS

d. SaaS
Answer:- data centre

II. which layer facilitates the clients to store servers and hardware components

a. Data centre

laaS

b. PaaS

c. SaaS
Answer:- laaS

12. is a cloud service where the customer gets a set of application and product development tool hosted
on the provider’s infrastructure
a. Paas

b. laaS

c. XaaS

d. SaaS
Answer:--- Paas

13. has a service called database.com that enables you to build tables, field and relationships.

a. Force.com

b. Ebay.com

c. SaaS

d. None of the above


Answer:--- Force.com

14. Is the capability to use the providers application running on a cloud infrastructure
a. PaaS
b. IaaS
c. XaaS
a. SaaS
Answer:--- SaaS

15. can replicate its data to a provider’s data centre and configure servers for use in the event of a
disaster
a. Cloud backup services
b. SaaS
c. PaaS
d. laaS
Answer:-- cloud backup services

16. Organisations can use a shared database on a private or public cloud. In either case the data for each
application is explicitly protected by the centralised service called
A. SaaS
b. DBaaS
c. XaaS
d. IaaS
Answer:-- DBaaS

17. Which of the following is a method of performing a single, common job by engaging various
Geographically dispersed resources
DCaaS
c. PaaS
d. IaaS
e. DBaaS
Answer:-- DCaaS

18. Cloud providers especially of a database based on commercial products such as postgresSQL, MySQL,
Oracle or Microsoft SQL.
a. SaaS
b. DBaaS
c. XaaS
d. PaaS
Answer:-- PaaS

19. Which of the following facilities of virtualization helps organisations utilise the maximum amount of
required resources
a. Pay-as-you-go
b. Testing beta software
c. Reduce hardware cost
d. None of the above
Answer:--- Pay-as-you-go

20. which of the following virtualization is a critical virtualisation component, which involves physical
memory to be shared and allocated dynamically to the virtual machine
A memory virtualisation
b. i/o virtualization
d. CPU virtualisation
e. None of the above
Answer:-- memory virtualisation

21. A host machine comprising four guest machines managed by that is running directly on the physical
hhardwar
a. Xen hypervisor
b. Kvm
c. Open source virtualization
d. Paravirtualization
Answer:---- xen hypervisor

22. Which of the following key features of xen hypervisor provides optimisation support for
paravirtualized guests so that they can be run as virtual machines?

a. Support for paravirtualization

b. Isolation of drivers from the rest of the system

c. Scope for other operating systems

d. Robustness and security


Answer:-- robustness and security

23. Which of the following is used by users for storing persistent data in the form of buckets and objects

a. Cloud controller

b. Walrus

c. Cluster controller

d. Storage controller
Answer:--Walrus

24. Which of the following is placed at the cluster level and is similar to the elastic block storage of
Amazon in functionality

a. Cloud controller

b. Walrus

c. Cluster controller

d. Storage controller
Answer:-- storage controller

25. The code name given to openstack dashboard is


a. Horizon
b. Neutron
e. Cinder
Answer:-- Horizon

26. which of the following is not a feature of openstack


c. Nova
a. Live upgrades
b. Federated identity
c. Trove
d. Object storage
Answer:---- object storage

You might also like