Cloud Computing Practice Questions
Cloud Computing Practice Questions
Cloud Computing Practice Questions
Sl Question
No
1 Uniprocessor computing is known as
(a) Centralized computing
(b) Distributed computing
(c) None of the above
Ans: a (Hint: From the definition of uniprocessor computing.)
2 Which of the following is/are distributed system?
(a) Internet
(b) Workgroups
(c) Both a and b
(d) None of these
Ans: c (Hint: Both Internet and Workgroups are distributed system.)
3 The basic building blocks of clusters are
(a) Nodes
(b) Network
(c) Network characterization
(d) All of these
Ans: d (Hint: Nodes, network as well as network characterization are all basic building
blocks of cluster.)
4 Utility computing is a model where service provider
(a) makes computing resources available to the customer as needed
(b) makes computing resources available to the customer for some amount of time
(c) Can’t say – implementation dependent
Ans: a (Hint: Service provider makes computing resources available to the customer as
needed in utility computing.)
5 In utility computing model, the service provider charges the customer
(a) at a flat rate
(b) based on the usage
(c) None of these
Ans: b (Hint: Service provider charges the customer based on the usage in utility
computing.)
6 Which is/are true regarding cloud computing?
(a) It does not provide ubiquitous access
(b) It provides on-demand network access
(c) Resources can be released with no management effort
(d) None of these
Ans: b (Hint: Cloud computing provides network access when demanded by the client.)
7 Which are essential characteristics of cloud computing?
(a) On-demand self service
(b) Resource pooling
(c) Rapid elasticity
(d) None of these
Ans: a,b,c (Hint: On-demand self service, resource pooling as well as rapid elasticity are
features of cloud computing.)
8 Cloud computing is a distributed computing model.
JULY-2019
Ans: a,b (Hint: Load balancer and data storage services are infrastructure as a service.)
22 SaaS is useful in case of applications where extremely fast processing of real time data is needed.
(a) True (b) False
Ans: b (Hint: It is not true.)
23 Which of these is/are managed by the user in PaaS?
(a) Data (b) Application (c) Runtime (d) All of these
Ans: a,b (Hint: Data and application are managed by the user in platform as a service.)
JULY-2019
Sl Question
No
1
Point out the wrong statement.
(a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
(b) Virtualization assigns a logical name for a physical resource and then provides a pointer to
that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be assigned on
demand to users
d) None of the above
Ans: c
Solution: Several important cloud computing approaches use a strictly hardware-based
approach to abstraction.
2
The technology used to distribute service requests to resources is referred to as :
a) load performing
b) load scheduling
c) load balancing
d) None of the above
Ans: c
Explanation: Load balancing is an optimization technique.
4
Point out the correct statement :
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based on
conditions
c) Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
d) None of the above
Ans: a,b,c
Solution: Alternatively, systems can be virtualized through load-balancing technologies.
(c) Mature
(d) None of these
Ans: b
Solution: An XML document is called well-formed if it satisfies certain rules, specified by the
W3C. These rules are: A well-formed XML document must have a corresponding end tag for all
of its start tags. Nesting of elements within each other in an XML document must be proper.
6
W3C supports an XML-based alternative to DTD, called _______.
(a) XML Schema
(b) HTML DOM
(c) XML Parser
(d) None of these
Ans: a
Solution: XML Schema is commonly known as XML Schema Definition (XSD). It is used to
describe and validate the structure and the content of XML data. XML schema defines the
elements, attributes and data types. Schema element supports Namespaces. It is similar to a
database schema that describes the data in a database.
7
UDDI Stands for ______________________.
(a) Universal Description, Development and Integration
(b) Universal Description, Discovery and Integration
(c) Universal Development, Design and Integration
(d) Universal Description, Discovery and Interaction
Ans: b
Solution: UDDI is an XML-based standard for describing, publishing, and finding web services.
UDDI stands for Universal Description, Discovery, and Integration. UDDI is a specification for a
distributed registry of web services.
Ans: (c)
Solution: XML stands for eXtensible Markup Language. XML was designed to store and transport
data.XML was designed to be both human- and machine-readable. HTTP means HyperText
Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this
protocol defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
9
Which of the following is/are type(s) of deployment model of cloud?
(a) IaaS
(b) PaaS
(c) Hybrid Cloud
(d) Community Cloud
JULY-2019
Ans: (c),(d)
Solution: A cloud deployment model is a “configuration” of certain cloud environment
parameters such as the storage size, accessibility and proprietorship. There are four main
cloud deployment models that differ significantly and for which most of the companies opt: a
public, private, hybrid and a community one.
10 XML Metadata Interchange (XMI) helps in
a) Integration of different data models, generated using the Unified Modeling Language (UML)
b) Exchanging information about data warehouses
c) Express a set of rules to which an XML document must conform
d) None of the above
Ans: a,b
QUESTION 1:
In cloud, service uptime is 50 minutes and downtime is 10 minutes. What is the
availability of the service?
a. 0.25
b. 0.2
c. 0.8
d. 0.75
Correct Answer: c
______________________________________________________________________________
QUESTION 2:
Which of the following is/are QoS Parameters of Cloud SLA?
a. Security
b. Privacy
c. Trust
d. None of the above
Detailed Solution: Security, Privacy and Trust are the QoS Parameters of Cloud SLA.
______________________________________________________________________________
QUESTION 3:
What is the parallel efficiency(Eff) of an algorithm? Where a task takes time T in uniprocessor
system, P is number of processors, M is time taken by each processor.
a. Eff = (T*P)/M
b. Eff = T*(M/P)
c. Eff = T/(P*M)
JULY-2019
d. Eff = T*P*M
Correct Answer: c
______________________________________________________________________________
QUESTION 4:
Which of the following is/are correct?
Detailed Solution: The correct statements are: (a) SLA contains SLO. (d) KPIs are
aggregated to SLO.
______________________________________________________________________________
QUESTION 5:
Distributed Computing is inefficient over parallel computing in which of the following
scenario(/s)?
a. Processors synchronization
b. Imbalance work distribution to processor
c. Message communication overhead between processors
d. None of the above
______________________________________________________________________________
QUESTION 6:
Independent server clusters share storage through high-speed network storage in -
JULY-2019
Correct Answer: c
______________________________________________________________________________
QUESTION 7:
Which of the following OpenStack component is used for networking services?
a. Swift
b. Keystone
c. Neutron
d. Cinder
Correct Answer: c
______________________________________________________________________________
QUESTION 8:
Which of the following is/are managed by Swift?
a. Object storage
b. Block storage
c. Ephemeral storage
d. All of the above
Correct Answer: a
______________________________________________________________________________
JULY-2019
QUESTION 9:
Image URI is looked up through _______
a. Swift
b. Keystone
c. Glance
d. Cinder
Correct Answer: c
______________________________________________________________________________
QUESTION 10:
Which of the following is/are follow(s) Quorum protocol for a large number of concurrent reads &
writes.
Correct Answer: c
______________________________________________________________________________
************END*******
JULY-2019
Sl Question
No
1 Which component of OpenStack is responsible for providing persistent block storage to running
instances?
(a) Neutron
(b) Nova
(c) Swift
(d) Cinder
Ans: d
Solution: Cinder is a Block Storage service for OpenStack. It's designed to present storage
resources to end users that can be consumed by the OpenStack Compute Project.
2 Which of the following OpenStack component is/are responsible for on demand scheduling of virtual
machines?
(a) Cinder
(b) Nova
(c) Swift
(d) Glance
Ans: b
Solution: OpenStack Nova is a component within the OpenStack open source cloud computing
platform developed to provide on-demand access to compute resources by provisioning and
managing large networks of virtual machines (VMs).
Ans: b
Solution: Neutron allows you to create virtual routers and manage routing.
Ans: a
Google App Engine is a Platform as a Service and cloud computing platform for developing and
hosting web applications in Google-managed data centers. Applications are sandboxed and run
across multiple servers.
c) Security
d) None of the above
Ans: a,b
a)A-2,B-3,C-1
b)A-3,B-1,C-2
c)A-3,B-2,C-1
d)None
Ans: a
Solution: GoogleAppEngine: PaaS, used to run applications;
GoogleCloudEndPoints: Scale your application;
GoogleComputeEngine: Create/ run VMs;
7 OpenStack: Different components of Nova (e.g. scheduler, Compute, api etc.) communicates via
8
OpenStack: Security groups-
(a) Are quick alternative to Firewall
(b) Prevent Virus and Spams
(c) Prioritize VMs from low to high security
(d) None of the above
Ans: a
Solution: Security group acts as a virtual firewall for servers and other resources on a network.
It is a container for security group rules which specify the network access rules.
9
OpenStack: Which IP use is preferred for transferring data to a VM from
(i) Another VM in the same cloud (ii) Your organization's network-
(a) i. Floating IP ii. Private IP
JULY-2019
Ans: b
Solution: The private IP address is likely to be used for accessing the instance by other
instances in private networks while the floating IP address would be used for accessing the
instance from public networks
Ans: c
Solution: Once the VM is terminated, all the resources including the Ephemeral storage, all IPs,
RAM and vCPUs are freed. Because, the VM controls the entire OS. Ephemeral storage, all IPs,
RAM and vCPUs run in the OS memory. So, upon termination of the VM all the resources are
freed.
JULY-2019
QUESTION 1:
Which of the following indicates that cloud is costlier than owning of computer infrastructures?
Where U is Utility Premium, P is Peak Demand, and A is Average Demand
a. U < P/A
b. U > P/A
c. U = A/P
d. U>P
Correct Answer: b
Detailed Solution: When U > P/A, the cloud is costlier than owning of computer
infrastructures.
______________________________________________________________________________
QUESTION 2:
Which of the following part of the MapReduce is responsible for processing one or more
chunks of data and producing the output results?
a. Map Task
b. Task execution
c. Reduce Task
Correct Answer: a
Detailed Solution: Map Task of the MapReduce is responsible for processing one
or more chunks of data and producing the output results.
______________________________________________________________________________
QUESTION 3:
JULY-2019
a. Files are sorted by a key and stored to the local file system
c. Each mapper reads approximately 1/M of the input from the global file
system
d. None of these
Detailed Solution: The followings are true for Map phase: (a) Files are sorted by a
key and stored to the local file system, (b) Each mapper writes computation
results in one file per reducer and (c) Each mapper reads approximately 1/M of
the input from the global file system
______________________________________________________________________________
QUESTION 4:
Which of the following function is responsible for consolidating the results produced by
each of the Map() functions/tasks?
a. Map
b. Reducer
c. Reduce
d. None of these
Correct Answer: c
______________________________________________________________________________
QUESTION 5:
For service availability, the KPI can be
a. Uptime
JULY-2019
b. Downtime
c. None of these
Detailed Solution: For service availability, the KPI can be uptime and downtime.
______________________________________________________________________________
QUESTION 6:
Which of the following is/are the objective(s) of Resource Management?
a. Reduce throughput
b. Reduce latency
c. Reduce overheads
d. Increase latency
Detailed Solution: The objectives of resource management are (b) reduce latency
and (c) reduce overheads.
______________________________________________________________________________
QUESTION 7:
When load increases, VM management can be done by
c. All of these
d. None of these
Correct Answer: a
______________________________________________________________________________
JULY-2019
QUESTION 8:
In hadoop, which of the following stores metadata?
a. Data node
b. Name node
c. Client node
d. None of these
Correct Answer: b
______________________________________________________________________
QUESTION 9:
Performance metrics for resource management are
a. Ease of deployment
b. QoS
c. Delay
d. None of these
Detailed Solution: Performance metrics for resource management are (a) ease of
deployment, (b) QoS and (c) delay.
______________________________________________________________________________
QUESTION 10:
Statement 1: The relationship between the number of processes used and power
consumption is non-linear.
Correct Answer: a
Detailed Solution: The relationship between the number of processes used and
power consumption is non-linear. Network throughput is a logical resource.
______________________________________________________________________________
************END*******
JULY-2019
Sl Question
No
1 Which of the options is/are the basic component(s) of security?
(a) Confidentiality
(b) Integrity
(c) Reliability
(d) Efficiency
Ans: a,b
Solution: Refer to def. of Security.
Ans: b
Solution: In computing, para-virtualization is a virtualization technique that presents a
software interface to the virtual machines which is similar, yet not identical to the underlying
hardware–software interface.
3 Spoofing is an example of
(a) Deception
(b) Disclosure
(c) Usurpation
(d) Disruption
Ans: a,c
Solution: In the context of information security, and especially network security, a spoofing
attack is a situation in which a person or program successfully masquerades as another by
falsifying data, to gain an illegitimate advantage
Ans: a
Solution: The Recovery Time Objective (RTO) is the targeted duration of time and a service level
within which a business process must be restored after a disaster (or disruption) in order to
avoid unacceptable consequences associated with a break in business continuity.
(a) Confidentiality
(b) Availability
(c) Integrity
(d) Authenticity
Ans: d
Solution: An unauthorized party inserts counterfeit objects into the system and basically
attacks the authenticity of the system.
(a) You can use proxy and brokerage services to separate clients from direct access to shared
cloud storage
(b) Any distributed application has a much greater attack surface than an application that is
closely held on a Local Area Network
(c) Cloud computing don’t have vulnerabilities associated with Internet applications
(d) None of the mentioned
Ans: c
Solution: Cloud environments run software, software has vulnerabilities, and adversaries try to
exploit those vulnerabilities.
a) Traffic Analysis
b) Release of message contents
c) Denial of service
d) Replay
Ans: c,d
Solution: A passive attack is a network attack in which a system is monitored and sometimes scanned
for open ports and vulnerabilities. The purpose is solely to gain information about the target and no
data is changed on the target.
Ans: a,c
Solution: Access control is a security technique that regulates who or what can view or use
resources in a computing environment
9
Interception security attack is an attack on
a) Confidentiality
JULY-2019
b) Availability
c) Integrity
d) Authenticity
Ans: a
Solution: An interception means that some unauthorized party has gained access to an asset. The
outside party can be a person, a program, or a computing system. Examples of this type of failure are
illicit copying of program or data files, or wiretapping to obtain data in a network.
10
Which of the following service(s) that need(s) to be negotiated in Service Level Agreements?
(a) Logging
(b) Auditing
(c) Regulatory compliance
(d) None of the mentioned
Ans: a,b,c
QUESTION 1:
Cloudlet is a trusted, resource-rich computer or cluster of computers
______________________________________________________________________________
QUESTION 2:
Which of the following is correct about code offloading
Detailed Solution: The followings are correct about code offloading (a) It
offloading the code to the remote server and executing it, (c) It decreases latency
by using a single-hop network and (d) It decreases battery consumption by using
Wi-Fi or short-range radio.
______________________________________________________________________________
QUESTION 3:
Offloading is beneficial when
JULY-2019
Correct Answer: c
______________________________________________________________________________
QUESTION 4:
Challenges in Mobile Cloud Computing are
Detailed Solution: Challenges in Mobile Cloud Computing are (c) low bandwidth,
heterogeneity and (d) low bandwidth, service availability.
______________________________________________________________________________
QUESTION 5:
Which of the following statement(s) is/are True?
a. Fog computing enables some of transactions and resources at the edge of the
cloud
b. Fog computing enables all of transactions and resources at the edge of the cloud
c. Fog computing decreases the need for bandwidth by sending every bit of
information over cloud channels
d. Fog computing increases the need for bandwidth by sending every bit of
information over cloud channels
Correct Answer: a
JULY-2019
______________________________________________________________________________
QUESTION 6:
Statement 1: Geospatial cloud ease the sharing of geospatial data among organizations.
Statement 2: Geospatial cloud make GIS decision easily.
Correct Answer: c
Detailed Solution: Geospatial cloud ease the sharing of geospatial data among
organizations. Geospatial cloud make GIS decision easily.
______________________________________________________________________________
QUESTION 7:
How resources are managed in Fog network?
Detailed Solution: Resources are managed in Fog network by (b) perform efficient
load balancing and (d) meet the delay requirements of real-time applications.
______________________________________________________________________________
QUESTION 8:
Statement 1: Deficit of effective handoff mechanisms in WiFi decreases the number of packet
losses in mobile communication.
JULY-2019
Statement 2: Increment of physical distance between the user and the cloud resources
increases delay in mobile communication.
Correct Answer: b
Detailed Solution: Increment of physical distance between the user and the cloud
resources increases delay in mobile communication.
______________________________________________________________________
QUESTION 9:
Mobile cloud computing (MCC) is the combination of ___________, __________ and
___________.
a. Grid computing, Mobile computing, Wireless networks.
b. Cloud computing, Mobile computing, Wireless networks.
c. Cloud computing, Mobile computing, Wired networks.
d. Cloud computing, Grid computing, Wired networks.
Correct Answer: b
QUESTION 10:
Which of the following is/are the need(s) of Geospatial Cloud?
Detailed Solution: The needs of Geospatial Cloud are (a) Sharing of geospatial
data among organizations, (b) Lack of GIS expertise in the organizations and (c)
Make GIS decision easily.
______________________________________________________________________________
************END*******
JULY-2019
Sl Question
No
1 Docker containers take more space than VMs
(a) True (b) False
Ans: b
2 A single kernel can be shared by more than one containers
(a) True (b) False
Ans: a
3 In 3-tier cloud data centers, following layers are present:.
(a) Core (b) Access (c) Storage (d) Aggregation
Ans:a, b, d
4 Popular connectivity protocols of IoT is/are
a) MQTT (b) HTTP (c) SNMP (d) All
Ans: a, b
5 Docker container is having following major features
(a) ship (b) develop (c) run anywhere (d) Compile
Ans: a, b, c
6 In the context of Green Cloud Computing, the Power Usage Effectiveness value lies between
(a) [0, 1] (b) [1, ∞] (c) [-1, 1] (d) None
Ans: b
7 In one-to-many Virtual Sensors, many physical sensors correspond to one virtual sensor
(a) True (b) False
Ans: b
8 A typical IoT-based vehicular data cloud offers a variety of cooperative information services, like traffic
information, parking availability etc., which can be termed as
a) Network-as-a-Service b)Platform-as-a-Service c)Storage-as-a-Service d)None
Ans: b