0% found this document useful (0 votes)
236 views42 pages

Sem-VII Distributed Systems (MCQ)

This document contains a set of multiple choice questions related to distributed systems. The questions cover topics like introduction to distributed systems, communication and synchronization in distributed systems.

Uploaded by

ChippyVijayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
236 views42 pages

Sem-VII Distributed Systems (MCQ)

This document contains a set of multiple choice questions related to distributed systems. The questions cover topics like introduction to distributed systems, communication and synchronization in distributed systems.

Uploaded by

ChippyVijayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Tatyasaheb Kore Institute of Engineering and Technology, Warananagar

Department of Computer Science and Engineering


MCQ: Distributed Systems

Unit 1: Introduction

1. If one site fails in distributed system then ___________


a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned

2. A global system of interconnected computer networks is known as


a. Ethernet
b. Intranet
c. Internet
d. Ultra-net

3. Transparency that enables multiple instances of resources to be used, is called


a) Replication transparency
b) Scaling transparency
c) Concurrency transparency
d) Relocation transparency

4. The capability of a system to adapt the increased service load is called


a) scalability
b) tolerance
c) capacity
d) none of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

5. Distributed systems have?


a) high security
b) better resource sharing
c) better system utilization
d) low system overhead

6. Which amongst the following is not an advantage of Distributed systems?


A) Reliability
b) Incremental growth
c) Resource sharing
d) None of the above

7. Which of the following is not a goal of distributed system?


A) Making Resources Accessible
b) Scalability
c) Reliability
d) Openness

8. __________ involves taking a component, splitting it into smaller parts, and subsequently
spreading those parts across the system.
A) Replication
B) Distribution
c) Dispensation
d) Partitioning
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

9. The set of loosely connected computers are called as __________


a) LAN
b) WAN
c) Workstation
d) Cluster

10. Location transparency allows: I. Users to treat the data as if it is done at one location. II.
Programmers to treat the data as if it is at one location. III. Managers to treat the data as if
it is at one location. Which one of the following is correct?

a) I, II and III
b) I and II only
c) II and III only
d) II only

11. Which of the following computing models is not an example of distributed computing
environment?
a) Cloud computing
b) Parallel computing
c) Cluster computing
d) Peer-to-peer computing

12. Which of the following is not a transaction state?


(A) Active
(B) Partially committed
(C) Failed
(D) Compensated
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

13. A transaction that has not been completed successfully is called as _______

(A) Aborted transaction


(B) Active transaction
(C) Partially committed transaction
(D) None of above

14. What are the ACID Properties of transaction?

(A) Atomicity, Consistency, Inconsistent, Durability


(B) Atomicity, Consistency, Isolation, Durability
(C) Atomicity, Consistency, Inconsistent, Database
(D) Automatically, Consistency, Inconsistent, Durability

15. Which of the following is a property of transactions?

(A) Isolation
(B) Durability
(C) Atomicity
(D) All of above

16. The “all-or-none” property is commonly known as

(A) Isolation
(B) Durability
(C) Atomicity
(D) None of above
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

17. When more than one user is accessing same data at the same time then it is known

(A) Controlled Access


(B) Currently Access
(C) Concurrent Access
(D) Uncontrolled Access

18. Which property of a transaction that protect data from system failure

(A) Isolation
(B) Durability
(C) Atomicity
(D) None of above

19. Which of the following is not a type of communication middleware


a) RPC
b) RMI
c) MOM
d) TPS

20. A distributed system that is not able to present itself to users and applications as if it were
only a single computer system is said to be transparent.
a) True
b) False
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

21. Data-centered architectures evolve around the idea that processes cannot communicate
through a common (passive or active) repository.
a) True
b) False

22. A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent

23. A typical __________ program obtains a remote reference to one or more remote objects
on a server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent

24. RMI stands for?


a) Remote Mail Invocation
b) Remote Message Invocation
c) Remaining Method Invocation
d) Remote Method Invocation
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

25. In two-tier client/server architecture, the running of application programs and the user
interface programs is in control of
a) Modulation side
b) Client side
c) Server Side
d) Host Side

26. Central Computer which is powerful than other computers in the network is called as
__________.
a) Client
b) Server
c) Switch
d) Hub

27. Machine that places the request to access the data/service is generally called as
__________.
A) Server Machine
b) Client Machine
c) Request Machine
d) None of the above

28. Which of the following is not the correct benefit of distributed computing.
A) Resource sharing
B) Performance
C) Availability
D) Security
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

29. Which of the following is not a scaling technique.


a) Hiding communication latency
b) Replication
c) Distribution
d) Synchronous Communication
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

Unit 2: Communication and synchronization

1. In distributed systems, a logical clock is associated with ______________


a) each instruction
b) each process
c) each register
d) none of the mentioned

2. If timestamps of two events are same, then the events are ____________
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic

3. If a process is executing in its critical section ____________


a) any other process can also execute in its critical section
b) no other process can execute in its critical section
c) one more process can execute in its critical section
d) none of the mentioned

4. A process can enter into its critical section ____________


a) anytime
b) when it receives a reply message from its parent process
c) when it receives a reply message from all other processes in the system
d) none of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

5. For proper synchronization in distributed systems ____________


a) prevention from the deadlock is must
b) prevention from the starvation is must
c) prevention from the deadlock & starvation is must
d) none of the mentioned

6. In the token passing approach of distributed systems, processes are organized in a ring
structure ____________
a) logically
b) physically
c) both logically and physically
d) none of the mentioned

7. In distributed systems, what will the transaction coordinator do?


a) starts the execution of transaction
b) breaks the transaction into number of sub transactions
c) coordinates the termination of the transaction
d) all of the mentioned

8. In case of failure, a new transaction coordinator can be elected by ____________


a) bully algorithm
b) ring algorithm
c) both bully and ring algorithm
d) none of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

9. In distributed systems, election algorithms assumes that ____________


a) a unique priority number is associated with each active process in system
b) there is no priority number associated with any process
c) priority of the processes is not required
d) none of the mentioned

10. According to the ring algorithm, links between processes are ____________
a) bidirectional
b) unidirectional
c) both bidirectional and unidirectional
d) none of the mentioned

11. Message passing provides a mechanism to allow processes to communicate and to


synchronize their actions ________

a) By sharing the same address space


b) without sharing the same address space
c) by sharing the same process number and Process Identifier
d) None of the above

12. Mutual exclusion:


a) if one process is in a critical region others are excluded
b) prevents deadlock
c) requires semaphores to implement
d) is found only in the Windows NT operating system
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

13. To enforce ___________ two functions are provided enter-critical and exit-critical, where
each function takes as an argument the name of the resource that is the subject of
competition.

a) Mutual Exclusion
b) Synchronization
c) Deadlock
d) Starvation

14. In ___________ only one process at a time is allowed into its critical section, among all
processes that have critical sections for the same resource.

a) Mutual Exclusion
b) Synchronization
c) Deadlock
d) Starvation
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

Unit 3: Distributed file system and fault tolerance

1. What are the different ways in which clients and servers are dispersed across machines?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution

2. What are not the characteristics of a DFS?


a) login transparency and access transparency
b) Files need not contain information about their physical location
c) No Multiplicity of users
d) No Multiplicity if files

3. What are characteristic of a DFS?


a) Fault tolerance
b) Scalability
c) Heterogeneity of the system
d) Upgradation

4. What are the different ways file accesses take place?


a) sequential access
b) direct access
c) indexed sequential access
d) all of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

5. Which is not a major component of a file system?


a) Directory service
b) Authorization service
c) Shadow service
d) System service

6. What are the different ways of mounting of the file system?


a) boot mounting
b) auto mounting
c) explicit mounting
d) all of the mentioned

7. What is the advantage of caching in remote file access?


a) Reduced network traffic by retaining recently accessed disk blocks
b) Faster network access
c) Copies of data creates backup automatically
d) None of the mentioned

8. What is networked virtual memory?


a) Caching
b) Segmentation
c) RAM disk
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

9. What are the examples of state information?


a) opened files and their clients
b) file descriptors and file handles
c) current file position pointers
d) all of the mentioned

10. Which is not an example of state information?


a) Mounting information
b) Description of HDD space
c) Session keys
d) Lock status

11. What are the advantages of file replication?


a) Improves availability & performance
b) Decreases performance
c) They are consistent
d) Improves speed

12. What are characteristic of NFS protocol?


a) Search for file within directory
b) Read a set of directory entries
c) Manipulate links and directories
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

13. What is the coherency of replicated data?


a) All replicas are identical at all times
b) Replicas are perceived as identical only at some points in time
c) Users always read the most recent data in the replicas
d) All of the mentioned

14. What are the three popular semantic modes?


a) Unix, Coherent & Session semantics
b) Unix, Transaction & Session semantics
c) Coherent, Transaction & Session semantics
d) Session, Coherent semantics

15. What are the characteristics of Unix semantics?


a) Easy to implement in a single processor system
b) Data cached on a per process basis using write through case control
c) Write-back enhances access performance
d) All of the mentioned

16. What are the characteristics of transaction semantics?


a) Suitable for applications that are concerned about coherence of data
b) The users of this model are interested in the atomicity property for their transaction
c) Easy to implement in a single processor system
d) Write-back enhances access performance
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

17. What are non-characteristics of session semantics?


a) Each client obtains a working copy from the server
b) When file is closed, the modified file is copied to the file server
c) The burden of coordinating file sharing is ignored by the system
d) Easy to implement in a single processor system

18. The file once created cannot be changed is called ___________


a) immutable file
b) mutex file
c) mutable file
d) none of the mentioned

19. ______ of the distributed file system are dispersed among various machines of distributed
system.
a) Clients
b) Servers
c) Storage devices
d) All of the mentioned

20. _______ is not possible in distributed file system.


a) File replication
b) Migration
c) Client interface
d) Remote access
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

21. Which one of the following hides the location where in the network the file is stored?
a) transparent distributed file system
b) hidden distributed file system
c) escaped distribution file system
d) spy distributed file system

22. In a distributed file system, when a file’s physical storage location changes ___________
a) file name need to be changed
b) file name need not to be changed
c) file’s host name need to be changed
d) file’s local name need to be changed

23. In a distributed file system, _______ is mapping between logical and physical objects.
a) client interfacing
b) naming
c) migration
d) heterogeneity

24. In a distributed file system, a file is uniquely identified by ___________


a) host name
b) local name
c) the combination of host name and local name
d) none of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

25. There is no need to establish and terminate a connection through open and close operation
in ___________
a) stateless file service
b) stateful file service
c) both stateless and stateful file service
d) none of the mentioned

26. In distributed file system, file name does not reveal the file’s ___________
a) local name
b) physical storage location
c) both local name and physical storage location
d) none of the mentioned

27. Which one of the following is a distributed file system?


a) andrew file system
b) network file system
c) novel network
d) all of the mentioned

28. Which one of the property is NOT a requirement for Fault Tolerance?
a) Fault Containments
b) Fault Isolation
c) Dynamic Recovery
d) Fail Safe
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

29. Which of the operating system architecture is suitable for Fault Tolerance based systems?
a) Monolithic Kernel
b) Micro Kernel
c) Real Time Kernel
d) All of the above

30. Which of the following approaches are used to achieve reliable systems?
a) Fault Prevention
b) Fault Removal
c) Fault Tolerance
d) All of the mentioned

31. All fault tolerant techniques rely on


a) Integrity
b) Dependability
c) Redundancy
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

Unit 4: Introduction to cloud

1. _________ computing refers to applications and services that run on a distributed network
using virtualized resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel

2. Point out the wrong statement.


a) The massive scale of cloud computing systems was enabled by the popularization of the
Internet
b) Soft computing represents a real paradigm shift in the way in which systems are
deployed
c) Cloud computing makes the long-held dream of utility computing possible with a pay-
as-you-go, infinitely scalable, universally available system
d) All of the mentioned

3. Which of the following is essential concept related to Cloud?


a) Reliability
b) Productivity
c) Abstraction
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

4. Point out the wrong statement.


a) All applications benefit from deployment in the cloud
b) With cloud computing, you can start very small and become big very fast
c) Cloud computing is revolutionary, even if the technology it is built on is evolutionary
d) None of the mentioned

5. Which of the following cloud concept is related to pooling and sharing of resources?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned

6. ________ has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned

7. Which of the following can be identified as cloud?


a) Web Applications
b) Intranet
c) Hadoop
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

8. Cloud computing is an abstraction based on the notion of pooling physical resources and
presenting them as a ________ resource.
a) real
b) virtual
c) cloud
d) none of the mentioned

9. Which of the following is Cloud Platform by Amazon?


a) Azure
b) AWS
c) Cloudera
d) All of the mentioned

10. _________ model consists of the particular types of services that you can access on a cloud
computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned

11. Point out the correct statement.


a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources
c) cloud computing is nothing more than the Internet
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

12. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned

13. Which of the following is the deployment model?


a) public
b) private
c) hybrid
d) all of the mentioned

14. Point out the wrong statement.


a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine
c) Azure enables .NET Framework applications to run over the Internet
d) None of the mentioned

15. Which of the following is best known service model?


a) SaaS
b) IaaS
c) PaaS
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

16. The __________ model originally did not require a cloud to use virtualization to pool
resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned

17. Which of the following dimension is related to organization’s boundaries?


a) Physical location of data
b) Ownership
c) Security boundary
d) All of the mentioned

18. Point out the correct statement.


a) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
b) Service model defines the purpose of the cloud and the nature of how the cloud is
located
c) Cloud Square Model is meant to show is that the traditional notion of a network
boundary being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

19. Point out the wrong statement.


a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third
party
c) Private clouds may be either on- or off-premises
d) None of the mentioned

20. Which of the following is related to the service provided by Cloud?


a) Sourcing
b) Ownership
c) Reliability
d) AaaS

21. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned

22. __________ cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

23. A __________ cloud combines multiple clouds where those clouds retain their unique
identities but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid

24. Which of the following is owned by an organization selling cloud services?


a) Public
b) Private
c) Community
d) Hybrid

25. Point out the wrong statement.


a) Everything from the application down to the infrastructure is the vendor’s responsibility
b) In the deployment model, different cloud types are an expression of the manner in which
infrastructure is deployed
c) AaaS provides virtual machines, operating systems, applications, services, development
frameworks, transactions, and control structures
d) All of the mentioned

26. _______ provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

27. Which of the following provides development frameworks and control structures?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

28. _______ is a complete operating environment with applications, management, and user
interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

29. How many types of service model are mainly present in Cloud?
a) 1
b) 2
c) 3
d) 4

30. The three different service models are together known as the _____ model of cloud
computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

31. Which of the following is the IaaS service provider?


a) EC2
b) EC1
c) EC10
d) Hybrid

32. _________ as a Service is a cloud computing infrastructure that creates a development


environment upon which applications may be build.
a) Infrastructure
b) Service
c) Platform
d) All of the mentioned

33. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

Unit 5: Virtualization

1. Point out the wrong statement.


a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
b) Virtualization assigns a logical name for a physical resource and then provides a pointer
to that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be
assigned on demand to users
d) All of the mentioned

2. Which of the following type of virtualization is also characteristic of cloud computing?


a) Storage
b) Application
c) CPU
d) All of the mentioned

3. The technology used to distribute service requests to resources is referred to as


_____________
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

4. Point out the correct statement.


a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based on
conditions
c) Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
d) All of the mentioned

5. Which of the following should be replaced with the question mark in the following figure?

a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned

6. An operating system running on a Type __ VM is a full virtualization.


a) 1
b) 2
c) 3
d) Any of the above
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

7. Which of the following is Type 1 Hypervisor ?


a) Wind River Simics
b) Virtual Server 2005 R2
c) KVM
d) LynxSecure

8. Which of the following is Type 2 VM?


a) VirtualLogix VLX
b) VMware ESX
c) Xen
d) LynxSecure

9. Point out the wrong statement


a) Some hypervisors are installed over an operating system and are referred to as Type 2
or hosted VM
b) All CPUs support virtual machines
c) On a Type 2 VM, a software interface is created that emulates the devices with which a
system would normally interact
d) All of the mentioned

10. Which of the following type of virtualization is found in hypervisor such as Microsoft’s
Hyper-V ?
a) Paravirtualization
b) Full virtualization
c) Emulation
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

11. In _______, the virtual machine simulates hardware, so it can be independent of the
underlying system hardware.
a) Paravirtualization
b) Full virtualization
c) Emulation
d) None of the mentioned

12. Point out the wrong statement:


a) Full virtualization requires that the host operating system provide a virtual machine
interface for the guest operating system and that the guest access hardware through that
host VM
b) Guest operating systems in full virtualization systems are generally faster than other
virtualization schemes
c) A process virtual machine instantiates when a command begins a process
d) All of the mentioned

13. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the
hardware.
a) Paravirtualization
b) Full virtualization
c) Emulation
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

Unit 6: Cloud computing services and Data security in cloud

1. Which of the following subject area deals with pay-as-you-go usage model?
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned

2. Point out the correct statement.


a) Except for tightly managed SaaS cloud providers, the burden of resource management is
still in the hands of the user
b) Cloud computing vendors run very reliable networks
c) The low barrier to entry cannot be accompanied by a low barrier to provisioning
d) All of the mentioned

3. Security methods such as private encryption, VLANs and firewalls comes under
__________ subject area.
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

4. Point out the wrong statement.


a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve
reliability rates that are hard for private systems to achieve
b) Private data centers tend to be located in places where the company or unit was founded
or acquired
c) A network backbone is a very low-capacity network connection
d) None of the mentioned

5. Network bottlenecks occur when ______ data sets must be transferred.


a) large
b) small
c) big
d) all of the mentioned

6. The reputation for cloud computing services for the quality of those services is shared by
_________
a) replicas
b) shards
c) tenants
d) all of the mentioned

7. Cloud ________ are standardized in order to appeal to the majority of its audience.
a) SVAs
b) SLAs
c) SALs
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

8. ___________ is a function of the particular enterprise and application in an on-premises


deployment.
a) Vendor lock
b) Vendor lock-in
c) Vendor lock-ins
d) None of the mentioned

9. Which of the following is a virtual machine technology now owned by Oracle that can run
various operating systems?
a) Vmachines
b) VirtualBox
c) ThoughtPolice
d) None of the mentioned

10. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned

11. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
a) PaaS
b) IaaS
c) CaaS
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

12. Point out the correct statement.


a) Platforms cannot be based on specific types of development languages, application
frameworks, or other constructs
b) PaaS systems offer a way to create user interfaces
c) In a CaaS model, customers may interact with the software to enter and retrieve data
d) All of the mentioned

13. Which of the following is associated with considerable vendor lock-in?


a) PaaS
b) IaaS
c) CaaS
d) SaaS

14. _________ serves as a PaaS vendor within Google App Engine system.
a) Google
b) Amazon
c) Microsoft
d) All of the mentioned

15. Point out the wrong statement.


a) The customer takes no responsibility for maintaining the hardware, the software, or the
development of the applications
b) The vendor is responsible for all the operational aspects of the service
c) Google’s App Engine platform is IaaS offering
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

16. Which of the following can be considered PaaS offering?


a) Google Maps
b) Gmail
c) Google Earth
d) All of the mentioned

17. __________ is the most refined and restrictive service model.


a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned

18. Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to
______________
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned

19. Rackspace Cloud Service is an example of _____________


a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

20. Point out the correct statement.


a) Platforms can be based on specific types of development languages, application
frameworks, or other constructs
b) SaaS is the cloud-based equivalent of shrink-wrapped software
c) Software as a Service (SaaS) may be succinctly described as software that is deployed on
a hosted service
d) All of the mentioned

21. Which of the following SaaS platform is with an exposed API?


a) salesforce.com
b) amazon.com
c) flipkart.com
d) all of the mentioned

22. Point out the wrong statement.


a) SaaS applications come in all shapes and sizes
b) Every computer user is familiar with SaaS systems
c) SaaS software is not customizable
d) None of the mentioned

23. Which of the following is a SaaS characteristic?


a) The typical license is subscription-based or usage-based and is billed on a recurring basis
b) The software is available over the Internet globally through a browser on demand
c) The software and the service are monitored and maintained by the vendor
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

24. _________ applications have a much lower barrier to entry than their locally installed
competitors.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned

25. SaaS supports multiple users and provides a shared data model through _________ model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) all of the mentioned

26. Open source software used in a SaaS is called _______ SaaS.


a) closed
b) free
c) open
d) all of the mentioned

27. Salesforce.com is the largest ______ provider of CRM software.


a) PaaS
b) IaaS
c) CaaS
d) SaaS
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

28. __________ authentication requires the outside use of a network security or trust service.
a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned

29. ________ is the assignment of a network identity to a specific MAC address that allows
systems to be found on networks.
a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned

30. _________ is one of the more expensive and complex areas of network computing.
a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned

31. Point out the correct statement.


a) The cloud service model you choose does not determine the variety of security features,
compliance auditing, and other requirements
b) To determine the particular security mechanisms you need, you must perform a mapping
of the particular cloud service model to the particular application you are deploying
c) A security control model includes the security that you normally use for your applications
only
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems

32. Which of the following is a key mechanism for protecting data?


a) Access control
b) Auditing
c) Authentication
d) All of the mentioned

33. Which of the following are a common means for losing encrypted data?
a) lose the keys
b) lose the encryption standard
c) lose the account
d) all of the mentioned

34. Which of the following was one of the weaker aspects of early cloud computing service
offerings?
a) Logging
b) Integrity checking
c) Consistency checking
d) None of the mentioned

35. Which of the following is one of the most actively developing and important areas of cloud
computing technology?
a) Logging
b) Auditing
c) Regulatory compliance
d) None of the mentioned

You might also like