0% found this document useful (0 votes)
7 views44 pages

QB - Cloud Computing - EndSem

The document outlines the Continuous Assessment Test for the Cloud Computing course, detailing course outcomes and their respective knowledge levels. It includes a distribution of marks for various assessments and a series of questions categorized by weeks, focusing on key concepts in cloud computing. The questions assess students' understanding of utility computing, service models, and various cloud technologies.

Uploaded by

abinaya.s2105
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views44 pages

QB - Cloud Computing - EndSem

The document outlines the Continuous Assessment Test for the Cloud Computing course, detailing course outcomes and their respective knowledge levels. It includes a distribution of marks for various assessments and a series of questions categorized by weeks, focusing on key concepts in cloud computing. The questions assess students' understanding of utility computing, service models, and various cloud technologies.

Uploaded by

abinaya.s2105
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 44

Continuous Assessment Test - 1

Course Code / Name 20OLCS601/Cloud Computing


Regulations 2020
Department IT
Year / Semester III /VI
Course Moderator R.Shobana Lakshmi /SIT

Course Outcomes with Knowledge Level


Upon the completion of this course the students will be able to
CO 1 To articulate the main concepts, key technologies, strengths and limitations of cloud
computing(K1).

CO 2 To explain enabling technologies that help in the development of the cloud.


(K2).

CO 3 To make use of cloud computing architecture to solve design challenges.(K2).

CO 4 To explain the core issues of cloud computing such as resource management and security.(K3)

CO 5 To install and use current cloud technologies.(K3).

CO 6 To have knowledge on the various technologies like Hadoop, Mapreduceing and Virtualbox in
cloud computing.(K3).

Distribution of COs (Percentage wise)


Exam / CO CO1 CO2 CO3 CO4 CO5 CO6
CAT 1 50 50
CAT 2 50 50
CAT 3 50 50
End Semester Exam 16.6 16.6 16.6 16.6 16.6 16.6
Total
Week - I

Marks
Sl. K–
Questions Split- CO
No. Level
up
1. Utility computing encapsulates the following characteristic(s) 1 K1 CO1
a. Mobility amalgamation b) No impact on resource
utilization
c) Pay-per-use pricing business model d) None of above
Correct Answer: c
2. In the context of the client-server architecture: Statement (i) posits 1 K1 CO1
that virtualization is a
fundamental principle; Statement (ii) claims that the system has
limited scalability.
a) Only Statement (i) is correct b) Only Statement (ii) is correct
c) Both Statements (i) and (ii) are correct d) None of the statements
is correct
Correct Answer: b
3. A cluster is a type of ________ or distributed computing platform 1 K1 CO1
consisting of a collection of interconnected stand-alone computing
computers working together in a _________computing resource.
a) computers, parallel b) single integrated, parallel
c) node, parallel d) parallel, single integrated
Correct Answer: d
4. Dropbox is an example of: 1 K1 CO1
a)Software as a Service or SaaS b) Platform as a Service or PaaS
c) Function as a Service or FaaS d) Infrastructure as a Service or
IaaS
Correct Answer: a
5. For less data-intensive applications, horizontal scale-out elasticity 1 K1 CO1
is the ideal solution.

a) True b) False
Correct Answer: b
6. “Google Doc” is an example of 1 K1 CO1
A. PaaS B. IaaS C. SaaS D. FaaS
Correct Answer: c
7. Business-Process-as-a-Service is not a part of XaaS. 1 K1 CO1
A) True B) False
Correct Answer: b
8. Web access to commercial software is one of the SaaS 1 K1 CO1
characteristics in the cloud computing paradigm.
A. True B. False
Correct Answer: a
9. PaaS (Platform as a Service) brings the benefits: (i) Creation of 1 K1 CO1
software (ii) Integration of web services and databases
A. Only (i) B. Only (ii) C. Both (i) and (ii) D. Neither (i) nor (ii)
Correct Answer: c
10. Uniprocessor computing is known as 1 K1 CO1
(a) Centralized computing (b) Distributed computing
(c) None of the above
Correct Answer: a
11. The basic building blocks of clusters are 1 K1 CO1
(a) Nodes (b) Network
(c) Network characterization (d) All of these
Correct Answer: d
12. In utility computing model, the service provider charges the 1 K1 CO1
customer
(a) at a flat rate (b) based on the usage (c) None of these
Correct Answer: b
13. Which are essential characteristics of cloud computing? 1 K1 CO1
(a) On-demand self service (b) Resource pooling
(c) Rapid elasticity (d) None of these
Correct Answer:a,b,c
14. Email service on cloud is an example of 1 K1 CO1
(a) SaaS (b) PaaS (c) None of these
Correct Answer:a
15. Virtual machines are example of 1 K1 CO1
(a) SaaS (b) PaaS (c) IaaS (d) None of these
Ans: c
16. Client server application is load balanced. 1 K1 CO1
(a) True (b) False (c) Can’t say
Ans: c
17. Which of the following is/are a type of Grid? 1 K1 CO1
a) Computational Grid b) Data Grid
c) Edge Grid d) All of the above
Correct Answer: a, b
18. Which of the following is one of the characteristics of PaaS? 1 K1 CO1
a) Provides tools to deploy user applications b) Application is
provided by the cloud provider c) Resources are
distributed as a service d) None of these
Correct Answer: a
19. Which of the following fall(s) under the “essential characteristics” 1 K1 CO1
of cloud computing?
A. Resource Pooling B. Measured Service C. Rapid Elasticity D.
Latency .
20. Which are the following applications for SaaS (Software as a 1 K1 CO1
Service) architecture?
A) Billing software B) CRM C) App engines D) None of above
Correct Answer: A,B
21. PaaS (Platform as a Service) brings the benefits: (i) Creation of 1 K1 CO1
software (ii) Integration of web services and databases
A. Only (i) B. Only (ii) C. Both (i) and (ii) D. Neither (i) nor (ii)
Correct
Correct Answer: C
22. Which of the following is false? 1 K1 CO1
a) Private cloud is dedicated solely to an organization.
b) Community cloud is a composition of public and private cloud.
c) Public cloud is available to the general public.
d) None of these .
Correct Answer: b

Week 2
Mark
K–
SI.No s
Questions Leve CO
. Split-
l
up
1. XML is designed to describe _________. 1 K1 CO1
a) pricing b) SLA
c) data d) service
Correct Option: C
2. SOAP (Simple Object Access Protocol) does not restrict the endpoint 1 K1 CO1
implementation technology choices. SOAP is a platform-neutral
choice.
a) True b) False
Correct Option: A
3. 1 K1 CO1
Service-Oriented Architecture (SOA) possess:
a) A service provider, service requestor and service broker.
b) A service provider and service requestor.
c) A service requestor and service broker.
d) Only a service broker.
Correct Option: A
4. A Cyber‐Physical Cloud Computing (CPCC) architectural framework 1 K1 CO1
is a ________environment that can rapidly build, modify and provision
cyber‐physical systems composed of a set of__________ based sensor,
processing, control, and data services.
a) system, cloud computing b) cloud computing, system
c) system, edge computing d) edge, system computing C
Correct Answer: A
5. Network Virtualization is a _________ environment that allows 1 K1 CO1
_______service providers to dynamically compose ________ virtual
networks .
a)Networking,single,single. b) Physical, single, multiple.
d) Networking ,multiple, single c)Networking,multiple,multiple.
Correct Answer: D
6. Customized wearable devices for collecting health parameters are the 1 K1 CO1
best examples of
a) IoHT b) Fog device c) Fog-Cloud interfaced. d) Cloud-Fog-
Edge-IoHT Correct Answer: d
7. Dew Computing is a paradigm where on-premises computers provide 1 K1 CO1
functionality that is _________ of cloud services and is also
collaborative with cloud services.
a) dependant b) independent c) partial dependant d) none of these
Correct Answer: B
8. SOAP uses ______ as transport protocol . 1 K1 CO1
a)UDDI b)SLA c)HTTP d)XML
Correct Answer’s
9. Virtual Machine Monitor is also known as 1 K1 CO1
a) Cluster Manager b) Virtual Machine Handler
c) Virtual Machine Manager d) Hypervisor
Correct Option: D
10. Which of the following is/are XML parser API(s)? 1 K1 CO1
a) XaaS (Anything as a Model) b) SAX (Simple API to XML)
c) CLI (Command Line Interface) d) DOM (Document Object Model)
Correct Option: B, D
11. In which cloud service model, virtual machines are provisioned? 1 K1 CO1
a)Saas b)Paas c)Iaas d)None of these.
Correct Option: D
12. In distributed computing, each processor has its own local memory. 1 K1 CO1
• True b)False
Correct Option: A
13. In PaaS, the runtime and data are managed by the service provider 1 K1 CO1
a)True b)False
Correct Option: B
14. A container engine creates virtual machines. 1 K1 CO1
a)true b)False
Correct Option :False
15. Google Sheets is an example of private cloud. 1 K1 CO1
a)true b)False
Correct Option :False
16. Which is/are private cloud? 1 K1 CO1
(a) Ubuntu Enterprise Cloud – UEC a,b,c
(b) VMware Cloud Infrastructure Suite
(c) Eucalyptus
(d) Google App Engine
Correct Option :a b c
17. Which is the consumer access point in a typical public cloud where 1 K1 CO1
subscribers sign
up for accounts?
a. Hypervisor (b) Cloud Manager (c) None of these
Correct Answer:b
18. 1 K1 CO1
Who maintains status information about how many virtual machines are
running?
a. Computer Manager (b) Cloud Manager (c) Cluster Manager (d) None
of these
Correct Answer:a
19. Which of the following XML fragment(s) is/are well-formed? 1 K1 CO1
(a) <?xml?>
(b) <?xml version="A.0"?>
(c) <?xml encoding="JIS"?>
(d) <?xml encoding="JIS" version="A.0"?>
Correct Answer:b
20. SOAP is a format for sending messages and is also called as __________. 1 K1 CO1
(a) Network protocol
(b) Data Transfer protocol
(c) Communication protocol
(d) XML description protocol
Correct Answer:c

Week 3
Sl. Marks
K–
No Questions Split- CO
Level
. up
1. Which of the following statement(s) regarding OpenStack storage 1 K1 CO2
is/are right?
A. Object storage is managed by Cinder
B. Both ephemeral storage and block storage are accessible from
within VM
C. Block storage persists until VM is terminated
D. Ephemeral storage is used to run operating system and/or scratch
space
Correct Option: B,D
2. 1 K2 CO2
A task takes time T in a uniprocessor system. In a parallel
implementation, the task runs on P processors parallelly. The
parallel efficiency is Eff, where 0<Eff<1. What is the time taken by
each processor (M) in this implementation?
A. M = T
B. M = T/(Eff × P)
C. M = T/P
D. M = (T Eff)/P
Correct Option: B
3. What does the term "biasness towards vendors" imply in the context 1 K1 CO2
of SLA monitoring?
a).Vendor-driven selection of monitoring parameters
b) Customer-driven Selection of Monitoring parameters.
c) Balanced approach in monitoring parameter.
d). Lack of active monitoring on the customer's side
Correct Answer: A
4. How does the master node in the Google File System maintain 1 K1 CO2
communication with chunk servers?
a). Command messages b). Update messages
c). Query messages d). Heartbeat messages
Correct Answer:D
5. In a cloud, total service uptime is 175 minutes and availability of the 1 K1 CO2
service is 0.85. What is the service downtime?
a)55 minutes b)148.75 minutes c) 26.25 minutes d) 45 minutes
Correct Option: C
6. Statement 1: In ephemeral storage, the stored objects persist until the VM 1 K1 CO2
is terminated.
Statement 2: The ephemeral storage is managed by Cinder in OpenStack.
a)Statement 1 is TRUE, Statement 2 is FALSE
b) Statement 2 is TRUE, Statement 1 is FALSE
c) Both statements are TRUE
d). Both statements are FALSE
Correct Answer A
7. “Midsize providers can achieve similar statistical economies to an 1 K1 CO2
infinitely large provider” Does this fall under?
a) Correlated demand b) Dependent demand
c) Independent demand d) Mixed demand
Correct Option: C
8. Let D (t) and R(t) be the instantaneous demand and resources at 1 K2 CO2
time t respectively. If demand is exponential (D(t)=et ), any fixed
provisioning interval (tp) according to the current demands will fall
linearly behind.
a). TRUE b). FALSE
Correct Option: B
9. Which of the following is/are expected common SLA parameter(s) for 1 K1 CO2
both Software-as-a-Service and Storage-as-a-Service models?
a)usability b) scalability c) recovery d). None of the
Correct Option: B
10. Data retention and deletion by cloud providers do not fall under one of the 1 K1 CO2
SLA require.
a)True b) False
Correct Option: A
11. The inter process communication between different nodes in 1 K1 CO2
Hadoop uses
a. REST API (b) RPC (c) RMI (d) IP Exchange
Correct Answer: b
12. OpenStack provides (a) Software-as-a-service (b) Platform-as-a- 1 K1 CO2
service (c) Infrastructure-as-a-service (d) All of these
Ans: d
13 Which one is the image component of OpenStack? 1 K1 CO2
(a) Swift (b) Nova (c) Glance (d) Cinder
Ans: c
14. Which component of OpenStack Stores and retrieves arbitrary 1 K1 CO2
unstructured data objects via a RESTFul, HTTP based API?
(a) Neutron (b) Glance (c) Swift (d) Keystone
Ans: c
15. Which one is false? 1 K1 CO2
a)In web-service SLA, SLA negotiation, provisioning, service
delivery, monitoring are automated.
b) Two types of SLA, namely non-negotiable SLA and negotiable
SLA are present.
c) In web service SLA, UDDI (Universal Description Discovery
and Integration) is used for advertising and discovering between
web services.
d) In Cloud SLA, resources are allocated and distributed globally
without any central directory.
Ans: a
16. Which hierarchy is correct among SLA, SLO and KPI? 1 K1 CO2
a. KPI contains SLA and multiple SLAs are aggregated to SLO
b. b) SLA contains SLO and KPIs are aggregated to SLO
c) SLO contains SLA and multiple SLAs are aggregated to KPI.
Ans: b
17. Which one of the following is incorrect? 1 K1 CO2
a. Cloud is cheaper than baseline cost if utility premium is
greater than 1.
b. In case of on-demand service, if demand is flat, than penalty
will be zero.
c. For infrastructure built to peak requirements multiplexing
demand provides higher utilization.
d) For infrastructure built to less than peak causes SLA violation.
Ans: a
18. In the context of cloudonomics, aggregating 400 workloads bring 1 K1 CO2
the penalty to 40%.
(a) True (b) False (c) Can’t say
Ans: b

Week-4
Mar
Sl.
ks K–
No Questions CO
Split Level
.
-up
1. SQL Azure is a cloud-based relational database service that is based 1 K1 CO2
on:
(a) Oracle (b) SQL Server (c) MySQL (d) None Correct Answer: b
2. Microsoft Azure provides 1 K1 CO2
a. Saas b) PaaS (c) IaaS (d) None
Correct Answer: a, b, c
3. Azure App Service plan defines 1 K1 CO2
a. Region (b) Instance size (c) Scale count (d) None
Correct Answer: a,b,c
4. The OpenStack component - Glance monitors and meters the 1 K1 CO2
OpenStack cloud for billing, benchmarking. State True of False.
a) True b) False
Correct Answer: b
5. GCP: Choose the correct option(s) 1 K1 CO2
a. To run your web-application, you need to configure only the
Google Storage bucket
b. “gcloud app deploy app.yaml” the command can be used to
deploy your app to app-engine
c. c) After launching your application to app-engine anyone can
view the app at http://[YOUR_PROJECT_ID].appspot.com
d) “gcloud app browse” – can be used to start the local development
server for the application Correct Answer: b, c
6. In OpenStack, the different components of Nova (e.g. scheduler, 1 K1 CO2
Compute, api etc.) communicates via:
a. Message Queues (b) Neutron (c) Conductor (d) Swift Correct
b. Answer: a
7. In OpenStack, __________ is a system for managing networks and IP 1 K1 CO2
addresses. (a) Nova (b) Keystone (c) Neutron (d) None of these
Correct Answer: c
8. Cloud DataStore in GCP is a NoSQL document database built for 1 K1 CO2
automatic scaling, high performance, and ease of application
development
a. True b) False Correct
Answer:a
9. GCP: Which one is/are correct statement(s)? 1 K1 CO2
a. You can reuse the project ID only after you delete the
previous project in GCP
b) A CNAME alias is a DNS record that lets you use a URL from
your own domain to access resources, such as a bucket and objects, in
Cloud Storage using your custom domain URL
c) “Multi-Regional” Storage class is used for the bucket to stream
videoes and host hot web content accessed frequently around the
world
d) “Nearline” Storage class is used for the bucket to store data
accessed frequently in one part of the world Correct
Answer: c, b
10. OpenStack: Which IP use is preferred for transferring data to a VM 1 K1 CO2
from (i) Another VM in the same cloud (ii) One organization's
network-
a. i. Floating IP, ii. Private IP
b. i. Private IP, ii. Floating IP
c. Floating IP in both cases
d. Private IP in both cases
Correct Answer: b
11. Azure provides software development kit for 1 K1 CO2
a. Java (b) .Net (c) None of these
Correct answer:a,b
12. Azure resources are deployed and managed in 1 K1 CO2
a. Azure CLI b) Azure resource group c) None of these
Correct Answer:b
13 OpenStack: Which IP use is preferred for transferring data to a VM 1 K1 CO2
from (i) Another VM in the same cloud (ii) Your organization's
network-
a)i. Floating IP ii. Private IP (b) i. Private IP ii. Floating IP
(c) Floating IP in both cases (d) Private IP in both cases
Answer:b
14. OpenStack: When a VM is terminated, which of the following 1 K1 CO2
resources are freed-
a. Ephemeral and persistent storage, All IPs, RAM and vCPUs
b. Ephemeral and persistent storage only
c. Ephemeral storage, All IPs, RAM and vCPUs
d. None
Answer:c
15. Keystone provides Authentication and Authorization service in an 1 K1 CO2
Openstack cloud for
a. Administrators and users (b) Only Administrator (c) For nova
(d) For all users and services
Answer:d
16. GCP: Choose the correct option(s): 1 K1 CO2
a. To run your web-application, you need to configure only the
Google Storage bucket
b. “gcloud app deploy app.yaml” the command can be used to
deploy your app to app-engine
c. After launching your application to app-engine anyone can
view the app at http://[YOUR_PROJECT_ID].appspot.com
d. “gcloud app browse” – can be used to start the local
development server for the application
Answer:b,c
17. GCP: Match the following pairs: 1 K1 CO2
A. GoogleAppEngine
B)Google CloudEndPoints
C)Google ComputeEngine
1) You can create and run virtual machines on Google infrastructure
2) You can migrate your web app to Google Cloud Platform for better
performance
3) You can scale your app according to the demand/ service requests
Options: a)A-2,B-3,C-1 b)A-3,B-1,C-2 c)A-3,B-2,C-1 d)None
Answer:a
18. 1 K2 CO2

19. The Azure App plan has a scale count of instances. 1 K1 CO2
a. 1 to 50
b. 1 to 20
c. 1 to 10
d. 1 to 100
Answer: b
20. Which of following is/are App Services provided Google Cloud 1 K1 CO2
Platform?
a. Big Query
b. Cloud App Engine
c. Cloud Endpoints
d. Cloud Sql
Answer: A B D
Week 5

1. --- is a formal contract between a service provider and a service 1 K1 CO3


consumer.
a. SLA
b. SLO
c. KPI
d. Utility Premium
Correct Answer: a

2. P/A indicates that cloud is costlier than owning computer 1 K1 CO3


infrastructures.
Where U is Utility Premium, P is Peak Demand, and A is Average
Demand
a. True
b. False
Correct Answer: a

3. 1 K2 CO3

Consider the peak computing demand for an organization is 110 units. The demand as a function of time c

where, δ is the delay in provisioning the extra computing recourse on


demand.The cost to provision unit cloud resource for unit time is 0.8
units.
[Assume the delay in provisioning is 4 time units and minimum
demand is 0.
(Penalty: Either pay for unused resource or missing service delivery]
Penalty is
a. 1100 units
b. 1200 units
c. 1300 units
d. None of these
4. A third party application runs in the cloud for 15 hours/day. At the 1 K2 CO3
end of one month [30 days], it was found that the cloud service
suffered 7 outages of durations: 1 hour 30 minutes, 30 minutes, 1
hour 15 minutes, 45 minutes, 2 hours, 1 hour, and H hours, each on
different days over the service period.
Suppose a cloud guarantees service availability for 97% of time.
What will be the possible value(s) of H that SLA negotiation gets
honored in terms of service availability?
a. 8 hours
b. 6 hours
c. 3 hours
d. 9 hours
Correct Answer: b, c
5. Which of the following is/are correct? 1 K1 CO3
a. SLA contains SLO
b. SLO contains SLA
c. Multiple SLAs are aggregated to KPI
d. KPIs are aggregated to SLO
Correct Answer: a, d
6. ---- is determining when an activity should start or end, depending on 1 K1 CO3
its duration, predecessor activities etc.
a. Resource estimation
b. Resource brokering
c. Resource scheduling
d. None of the above
Correct Answer: c
7. Which of the following is/are not a possible parameter of service 1 K1 CO3
level agreement (SLA) in cloud?
a. Response Time or Latency
b. Availability of the Services
c. Electricity Cost
d. Warranty of the Services
Correct Answer: c, d
8. When load increases, VM management can be done by 1 K1 CO3
a. Schedule new VMs to new nodes
b. Shutdown unused nodes
c. All of these
d. None of these
Correct Answer: a
9. In hadoop, which of the following stores metadata? 1 K1 CO3
a. Data node
b. Name node
c. Client node
d. None of these
Correct Answer: b
10. In the context of Green Cloud Computing, the DC Server Energy 1 K1 CO3
Model is
contributed by
a. CPU
b. Memory modules
c. Disks
d. None of these
Correct Answer: a, b, c
11. Which of the following is/are not a possible parameter of service 1 K1 CO3
level agreement
(SLA) in cloud
a) Response Time or Latency
b) Availability of the Services
c) Electricity Cost
d) Warranty of the Services
Ans:- (c), (d)
12. PA indices that cloud is cheaper than owning computer 1 K1 CO3
infrastructures, Where U is Utility Premium, P is Peak Demand,
and A is Average Demand.
a) True
b) false
Ans:- (a)
13. S1: SLO is a formal contract between a service provider and a service 1 K1 CO3
consumer. S2: SLA contains Service Level Objectives (SLO).
a) S1 is True and S2 is False
b) S1 is False and S2 is True
c) Both S1 and S2 are True
d) Both S1 and S2 are False
Ans:- c)

14. Which of the following is/are not a possible parameter of service 1 K1 CO3
level agreement (SLA) in cloud
a) Response Time or Latency
b) Availability of the Services
c) Electricity Cost
d) Warranty of the Services
Ans:- (c), (d)
15. PA indices that cloud is cheaper than owning computer 1 K1 CO3
infrastructures, Where U is Utility Premium, P is Peak Demand,
and A is Average Demand
a) True
b) false
Ans:- (a)
16. Which scenario Demands highest bandwidth for data transfer 1 K1 CO3
between nodes in Hadoop?
a) Different nodes on the same rack
b) Nodes on different racks in the same data center.
c) Nodes in different data centers
d) Data on the same node
Ans:- c) Nodes in different data centers
17. When load decreases, VM management can be done by 1 K1 CO3
a) Shutdown unused nodes
b) Live migrate VMs to more utilized nodes
c) None of these
18. In a SLA negotiation, provider agreed with the service availability X 1 K2 CO3
%. Consumer runsthe application for 15hours/day. At the end of one
month [31 days], it was found thattotal service outage is 10 hrs.
However, SLA negotiation (in terms of service availability)is
honored.
a) X is atleast 97.8
b) X is atmost 97.8
c) X is exactly 99
d) Insufficient information
Ans:- b) X is atmost 97.8
19. A third party application runs in the cloud for 15 hours/day. At the 1 K2 CO3
end of one month[30 days], it was found that the cloud service
suffered 7 outages of durations: 1 hour 30minutes, 30 minutes, 1 hour
15 minutes, 45 minutes, 2 hours, 1 hour, and H hours, eachon
different days over the service period. Suppose a cloud guarantees
service availabilityfor 97% of time. What will be the possible value(s)
of H that SLA negotiation getshonored in terms of service
availability?
a) 8 hours
b) 6 hours
c) 3 hours
d) 9 hours
Ans:- b) 6 hours
20. If demand is exponential (D(t)=e), any fixed provisioning interval (tp) 1 K2 CO3
according tothe current demands will fall behind.
a) linearly
b) exponentially
c) None of these
21. Consider that the peak computing demand for an organization is 250 1 K2 CO3
units. The demand as a function of time can be expressed as D(t) = 5t.
Baseline (owned) unit cost is 120 and cloud unit cost is 150. The
cloud is owned for a period of T time units. Select the values of T for
which cloud is cheaper than owning.
A. 50
B. 100
C. 150
D. 200
Correct Option: A
Week 6

1. Interception is an attack on: 1 K1 CO3


A. Integrity
B. Availability
C. Confidentiality
D. Authenticity
Correct Option: C
2. Which of the following is/are the recovery goal(s) of the security 1 K1 CO3
mechanism?
A. Stop attack, assess and repair damage
B. Detect attackers’ violation of security policy
C. Prevent attackers from violating security policy
D. Continue to function correctly even if attack succeeds
Correct Option: A, D
3. Replay attack, which is the passive capture of a data unit and its 1 K1 CO3
subsequent retransmission to
produce an unauthorized effect, is an active attack.
A. True
B. False
Correct Option: A
4. Statement I: Authorization is the identification of legitimate users. 1 K1 CO3
Statement II: Integrity is the protection against data
alteration/corruption.
A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Correct Option: B
5. Which of the following is/are NOT passive attacks? 1 K1 CO3
A. Masquerade
B. Release of message contents
C. Denial of service
D. Modification
Correct Option: A, C, D
6. In full virtualization, VMs interact with the host OS. 1 K1 CO3
A. True
B. False
Correct Option: B
7. When selecting the most suitable cloud provider satisfying 1 K1 CO3
customer’s QoS requirements using a
fuzzy inference engine, if the “Degree of SLA Satisfaction” is greater
than the “Threshold for a
cloud service provider”, the customer should migrate to a different
provider.
A. True
B. False
Correct Option: B
8. Which of the following Open-source tools is/are used to perform TCP 1 K1 CO3
connect probes in Amazon
EC2 platform?
A. wget
B. nmap
C. ifconfig
D. hping
Correct Option: B
9. Statement I: Recovery Point Objective (RPO) is the maximum 1 K1 CO3
amount of data that will be lost
following an interruption or disaster.
Statement II: Recovery Time Objective (RTO) is the amount of data
that will be lost following an
interruption or disaster.
A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Correct Option: A
10. List the motivation(s) in having a ‘middle man’ or intelligent broker 1 K1 CO3
for cloud marketplace:
A. Trustworthiness of the provider.
B. Monitoring of services.
C. Ensuring vendor lock-in.
D. Flexible selection of cloud provider.
Correct Option: A, B, D
11. Find the correct statement(s): 1 K1 CO3
a) Different types of cloud computing service models provide
different levels of security services
b) Adapting your on-premises systems to a cloud model requires that
you determine what security mechanisms are required and mapping
those to controls that exist in your chosen cloud service provider
c) Data should be transferred and stored in an encrypted format for
security purpose
d) All are incorrect statements
Correct Answer: a, b, c
12. Which of the following is/are example(s) of passive attack? 1 K1 CO3
a)Replay
b)Denial of service
c)Traffic analysis
d)Masquerade
Correct Answer: c
13. Modification is considered as an attack on 1 K1 CO3
(a)Confidentiality
(b)Availability
(c)Integrity
(d)Authenticity
Correct Answer: c
14. Spoofing is not an example of 1 K1 CO3
(a)Deception
(b)Disclosure
(c)Usurpation
(d)Disruption
Correct Answer: b, d
15. Consider the following statements: 1 K1 CO3
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data
alteration/corruption.
Identify the correct options:
a) Statement I is TRUE and statement II is FALSE.
b) Statement I is FALSE and statement II is TRUE.
c) Both statements are TRUE.
d) Both statements are FALSE.
Correct Option: b
16. Access policy control refers to 1 K1 CO3
a) Cyclic Inheritance Control
b) Virus Attack
c) Violation of SoD (separation of duties) Constraint
d) Man in the middle attack
Correct Answer: a, c
17. Which of the options is/are considered as the basic components of 1 K1 CO3
security?
a) Confidentiality
b) Integrity
c) Reliability
d) Efficiency
Correct Answer: a, b
18. Which of the following is/are not a type of passive attack? 1 K1 CO3
a) Traffic Analysis
b) Release of message contents
c) Denial of service
d) Replay
Correct Answer: c, d
19. Side channel exploitation has the potential to extract RSA & AES 1 K1 CO3
secret keys
a) True
b) False
Correct Answer: a
20. Which of the following is/are the recovery goal(s) of the security 1 K1 CO3
mechanism?
A. Stop attack, assess and repair damage
B. Detect attackers’ violation of security policy
C. Prevent attackers from violating security policy
D. Continue to function correctly even if attack succeeds
Correct Option: A, D

21. Statement I: Authorization is the identification of legitimate users. 1 K1 CO3


Statement II: Integrity is the protection against data
alteration/corruption.
A. Statement I is TRUE and statement II is FALSE.
B. Statement I is FALSE and statement II is TRUE.
C. Both statements are TRUE.
D. Both statements are FALSE.
Correct Option: B
Week 7

1. The key features of mobile cloud computing (MCC) are 1 K1 CO4


a) Facilitates the quick development, delivery and management of mobile
apps
b) Uses more device resources because applications are cloud-supported
c) Improves reliability with information backed up and stored in the cloud
d) None of these
Correct Answer: a, c
2. Dynamic runtime offloading involves the issues of 1 K1 CO4
a) Runtime application partitioning
b) Migration of intensive components
c) Continuous synchronization for the entire duration of runtime execution
platform
d) None of these
Correct Answer: a, b, c
3. What is/are true about cloudlet? 1 K1 CO4
a) Increases the latency in reaching the cloud servers
b) Reduces the latency in reaching the cloud servers
c) Resides far from the mobile devices
d) Resides near to the mobile devices
Correct Answer: b, d
4. What is/are true about mobile cloud computing (MCC)? 1 K1 CO4
a) MCC increases the running cost for computation intensive applications
b) MCC reduces the running cost for computation intensive applications
c) MCC decreases battery lifetime
d) None of these
Correct Answer: b

5. What is/are true about the execution of services in mobile cloud computing 1 K1 CO4
(MCC)?
a) All services are executed in cloud
b) Some services are executed in mobile devices and some services are
executed in cloud
c) All computation intensive services are executed in mobile devices
d) None of these
Correct Answer: b
6. What of the following is/are fog device(s)? 1 K1 CO4
a) Cellular base stations
b) Network routers
c) WiFi Gateways
d) None of these
Correct Answer: a, b, c
7. What is/are the advantage(s) of fog computing? 1 K1 CO4
a) Reduction in data movement across the network resulting in reduced
congestion
b) Increase in data movement across the network resulting in increased
congestion
c) Serving the real-time applications
d) None of these
Correct Answer: a, c

8. Consider the following statements: 1 K1 CO4


Statement 1: In Geospatial Cloud, it is needed to integrate data from
heterogeneous back-end data
service.
Statement 2: Data services can be inside and/or outside of the cloud
environment in Geospatial
Cloud.
a) Statement 1 is Correct, but Statement 2 is Incorrect.
b) Statement 2 is Correct, but Statement 1 is Incorrect.
c) Both statements are Correct.
d) Both statements are Incorrect
Correct Answer: c
9. Which of the following statement(s) is/are FALSE about Fog Computing? 1 K1 CO4
a) Fog nodes present near to the end-user
b) Fog computing enables real-time applications
c) Fog nodes’ response time is much higher than Cloud’s
d) Network routers, WiFi Gateways will not be capable of running
applications
Correct Answer: c, d

10. Which of the following is/are true about Geospatial Cloud Model? 1 K1 CO4
a) It integrates data from homogeneous back-end data services
b) Data services can be inside and/or outside the cloud environment
c) Data services inside cloud can be run through SaaS service model
d) None of the above
Correct Answer: b

11. Fog Computing is applicable in 1 K1 CO4


a) Smart Grid
b) Smart Traffic Light
c) Connected Vehicles
d) None of the above
Correct Answer: a, b, c

12. Fog Computing has ________ probability to attack on data enrouter and 1 K1 CO4
required ________
number of server nodes than Cloud Computing.
a) lower , less
b) lower, large
c) higher, less
d) higher, large
Correct Answer: b
13. Consider the following statements: 1 K1 CO4
Statement 1: In Geospatial Cloud, it is needed to integrate data from
heterogeneous back-end data
service.
Statement 2: Data services can be inside and/or outside of the cloud
environment in Geospatial
Cloud.
a. Statement 1 is Correct, but Statement 2 is Incorrect.
b. Statement 2 is Correct, but Statement 1 is Incorrect.
c. Both statements are Correct.
d. Both statements are Incorrect
Correct Answer: c
14. Which of the following is/are the challenge(s) of the Geospatial 1 K1 CO4
Cloud?
a) Scaling of Spatial Databases
b) Policy management among the tenants
c) Implementation of Spatial Databases
d) None of the above
Correct Answer: a, b, c
15. Which of the following is/are feature(s) of Mobile Cloud Computing? 1 K1 CO4
a) Uses less mobile device resources because applications are cloud-
supported
b) Reduces reliability with information backed up and stored in the
cloud
c) Mobile devices connect to services delivered through an API
architecture
d) Facilitates slower development, delivery and management of
mobile apps
Correct Answer: a, c
16. Which of the following statement(s) is/are FALSE about Fog 1 K1 CO4
Computing?
a) Fog nodes present near to the end-user
b) Fog computing enables real-time applications
c) Fog nodes’ response time is much higher than Cloud’s
d) Network routers, WiFi Gateways will not be capable of running
applications
Correct Answer: c, d
17. Choose the most appropriate option regarding CLOUDLET code 1 K1 CO4
offloading.
Statement 1: The architecture reduces latency by using a multi-hop
network.
Statement 2: It potentially lowers battery consumption by using Wi-
Fi or short range radio.
a. Statement 1 is correct but Statement 2 is incorrect
b. Statement 2 is correct but Statement 1 is incorrect
c. Both the statements are correct
d. Both the statements are incorrect.
Correct Answer: b
18. Benefits of Fog Computing is/are: 1 K1 CO4
a. Immobility
b. Low latency and location-aware.
c. Homogeneity
d. Widespread geographical distribution.
Correct Answer: b, d
19. Distance between the client and server in Cloud Computing is of 1 K1 CO4
_________ and Fog computing is
_______.
a) One Hop, Multiple Hop
b) One Hop, One Hop
c) Multiple Hop, One Hop
d) Multiple Hop , Multiple Hop
Correct Answer: c
20. Match the following tables related to Mobile Cloud Computing key 1 K1 CO4
components:
Table – I Table – II
1. Profiler i. Collects results of split execution and
combine, and make the execution
details transparent to the user.
2. Solver ii. Monitors application execution to collect
data about execution time, power
consumption, network traffic.
3. Synchronizer iii The task of selecting which parts of an
app
runs on mobile and cloud.

a. 1. -> (ii), 2. -> (iii), 3. -> (i)


b. 1. -> (iii), 2. -> (i), 3. -> (ii)
c. 1. -> (i), 2. -> (ii), 3. -> (iii)
d. 1. -> (ii), 2. -> (i), 3. -> (iii)
Correct Answer: a

Week 8
1. Docker compose is a tool for defining and running multi-container 1 K1 CO4
applications.
a)True
b)False

2. Choose the most appropriate option. 1 K1 CO4


Statement 1 : An image is a lightweight, standalone, executable
package that includes everything to run a piece of software.
Statement 2 : Container is a runt time instance of an image.
a)Statement 1 is correct but Statement 2 is incorrect
b)Statement 2 is correct but Statement 1 is incorrect
c)Both the statements are correct
d)Both the statements are incorrect
3. Vehicles providing their networking and data processing capabilities 1 K1 CO4
to other vehicles through the cloud comes under which service of
IoT-based Vehicular Data Clouds.
a)SaaS
b)PaaS
c)IaaS
d)None of these
4. An IOT platforms basic building blocks is/are 1 K1 CO4
a)Gateway
b)Images
c)Network and Cloud
d)Containers
5. In the context of Green Cloud Computing, the Power usage 1 K1 CO4
effectiveness is defined as
a)Power Delivered / Overall power
b)Overall power/ Power Delivered
c)Overall power* Power Delivered
d)None of these
6. Statement 1: Sensor- Cloud proxy exposes sensor resources as cloud 1 K1 CO4
services
Statement 2: Sensor network is still managed from the Sensor-Cloud
Interface via SensorNetwork Proxy
a)Statement 1 is True and Statement 2 is False
b)Statement 1 is False and Statement 2 is True
c)Both the statements are true
d)Both the statements are False
7. Which of the following statements is/are true about Docker? 1 K1 CO4
Statement 1 : Docker hub is used for building docker images and
creating docker containers.
Statement 2 : Docker compose is a registry used to host various
docker images
a)Statement 1 is correct but Statement 2 is incorrect
b)Statement 2 is correct but Statement 1 is incorrect
c)Both the statements are correct
d)Both the statements are incorrect
8. Sensor data can be easily shared by different groups of users without 1 K1 CO4
extra effort/measure.
a)True
b)False
9. …………………….. get virtual access to host resources through a 1 K1 CO4
hypervisor.
a)Containers
b)Virtual machines
c)Both a and b
d)Images
10. ……………………. enables different networks spreads in a huge 1 K1 CO4
geographical area to connect together and be employed
simultaneously by multiple users on demand.
a)Serverless
b)IOT Cloud
c)Sensor Cloud
d)Green Cloud

11. An IoT platform’s basic building blocks is/ are (choose the correct 1 K1 CO4
option(s)).
a. Gateway
b. Images
c. Network and Cloud
d. Containers
Correct Answer: a, c
12. __________ is used to delete a local image. 1 K1 CO4
a. Docker rm
b. Docker rmi
c. Docker rvi
d. Docker push
Correct Answer: b
13. Docker Hub is a registry used to host various docker images. 1 K1 CO4
a) True
b) False
Correct Answer: (a)
14. __________ enables different networks, spreads in a huge 1 K1 CO4
geographical area to connect together
and be employed simultaneously by multiple users on demand.
a) Serverless
b) IoT Cloud
c) Sensor Cloud
d) Green Cloud
Correct Answer: c
15. Virtual machines get virtual access to host resources through a 1 K1 CO4
________
a) Containers
b) Hypervisor
c) Both a and b
d) Images
Correct Answer: b

16. Vehicles providing their networking and data processing capabilities 1 K1 CO4
to other vehicles through the
cloud comes under which service of IoT-based Vehicular Data
Clouds.
a) SaaS
b) PaaS
c) IaaS
d) None of these
Correct Answer: c
17. Sensor data can be easily shared by different groups of users without 1 K1 CO4
any extra effort/ measure.
a. True
b. False
Correct Answer: b
18. Container is a compile time instance of an image. 1 K1 CO4
a) True
b) False
Correct Answer: (b)

19. In the context of Green Cloud Computing, the Power Usage 1 K1 CO4
Effectiveness is defined as
a. Power Delivered / Overall Power
b. Overall Power / Power Delivered
c. Overall Power * Power Delivered
d. None of these
Correct Answer: b

20. Statement 1: Sensor-Cloud proxy exposes sensor resources as cloud 1 K1 CO4


services.
Statement 2: Sensor network is still managed from the Sensor-Cloud
Interface via Sensor
Network Proxy
a. Statement 1 is True and Statement 2 is False
b. Statement 2 is True and Statement 1 is False
c. Both statements are True
d. Both statements are False
Correct Answer: c

Week 9

1. Which of the following statements best describes fog computing? 1 K1 CO5


a) Fog computing refers to a model where data, processing, and
applications are concentrated in the cloud rather than at the network
edge.
b) Fog computing is a term introduced by Cisco Systems to describe a
model that centralizes data processing in the cloud to manage
wireless data transfer to distributed IoT devices.
c) Fog computing is a model where data, processing, and applications
are concentrated in devices at the network edge rather than existing
almost entirely in the cloud.
d) The vision of fog computing is to enable applications on a few
connected devices to run directly in the cloud without interaction at
the network edge.
Correct Answer: (c)

2. Which of the following correctly describes a classification of resource 1 K1 CO5


management architectures in fog/edge computing?
Threads of a process share

a) Data Flow
b) Control.
c) Tenancy.
d) Infrastructure.
Correct Answer: (c)
3. Which of the following characteristics is NOT typically associated 1 K1 CO5
with fog computing infrastructure?

a) Location awareness and low latency


b) Better bandwidth utilization
c) High computational power concentrated solely in the Cloud
d) Support for mobility
Correct Answer: (c)
4. What is the primary goal of the application placement problem in the 1 K1 CO5
Cloud-Fog-Edge framework?

a) To map all applications onto the Cloud servers to maximize


computational power.
b) To find available resources in the network that satisfy application
requirements, respect constraints, and optimize the objective, such as
minimizing energy consumption.
c) To place all application components on edge devices to ensure low
latency.
d) To disregard resource capacities and focus solely on network
constraints.
Correct Answer: (b)
5. What is the primary purpose of offloading in the context of edge 1 K1 CO5
computing?

a) To move all data processing from edge nodes to the cloud.


b) To augment computing requirements by moving servers,
applications, and associated data closer to the network edge.
c) To reduce the number of user devices connected to the network.
d) To centralize all computational resources in the cloud for better
performance.

Correct Answer: (b)


6. Which of the following is a key benefit of forming a cloud 1 K1 CO5
federation?

a) Centralized control of global cloud services.


b) Increased resource utilization and load balancing across multiple
Cloud Service Providers (CSPs).
c) Reduced collaboration among Cloud Service Providers.
d) Limiting the geographical footprint of Cloud Service Providers.

Correct Answer: (b)


7. Fog computing is a model in which data, processing and applications 1 K1 CO5
are concentrated in devices at the __________ rather than existing
almost entirely in the cloud.
a. fog
b. local node
c. network station
d. network edge

Correct Answer: d
8. What is(are) the benefit(s) of Fog computing? 1 K1 CO5

a. Provides less data location-awareness


b. Increases network congestion
c. Causes lesser latency permits usage in real-time applications
d. None of these

Correct Answer: c
9. Virtualization software is an example of __________. 1 K1 CO5
a. Application software
b. Middleware
c. System software
d. Benchmarking

Correct Answer: c
10. Fog infrastructure consists of IoT devices, Fog Nodes, and at least 1 K1 CO5
one Cloud Data Center never
ensures scalability
a. True
b. False

Correct Answer: b

11. Benefit(s) of cloud federation is(are) 1 K1 CO5


a. Global Utility
b. Resource utilization minimization
c. Power consumption maximization
d. All of these

Correct Answer: a
12. A CSP has little or no control over remote resources in case of 1 K1 CO5
a. Tightly Coupled Federation
b. Medium Coupled Federation
c. Loosely Coupled Federation
d. None of these

Correct Answer: c

13. Which of the following challenges is most effectively addressed by 1 K1 CO5


using fog and edge computing
instead of a "cloud-only" approach for IoT applications?
a) Resource management issues related to workload balance and task
scheduling in
cloud-based environments.
b) The inefficiency of processing time-sensitive applications directly
in the cloud due to high
latency and large data bandwidth requirements.
c) The need for improved security and privacy features in cloud-
based systems, which are not
addressed by fog and edge computing.
d) The difficulty in integrating multiple cloud services and platforms
for comprehensive IoT
data management.

Correct Answer: (b)

14. What is the primary goal of a cloud federation? 1 K1 CO5


a) To centralize all cloud services under a single provider.
b) To deploy and manage multiple cloud services to meet business
needs by collaborating
among different Cloud Service Providers (CSPs).
c) To limit the geographical reach of cloud services.
d) To reduce the number of cloud service providers globally.

Correct Answer: (b)


15. Cloud Federation should prefer maximum geographical separation. 1 K1 CO5
a. True
b. False

Correct Answer: a

16. Which of the following challenges is most effectively addressed by 1 K1 CO5


using fog and edge computing
instead of a "cloud-only" approach for IoT applications?
a) Resource management issues related to workload balance and task
scheduling in
cloud-based environments.
b) The inefficiency of processing time-sensitive applications directly
in the cloud due to high
latency and large data bandwidth requirements.
c) The need for improved security and privacy features in cloud-
based systems, which are not
addressed by fog and edge computing.
d) The difficulty in integrating multiple cloud services and platforms
for comprehensive IoT
data management.

Correct Answer: (b)

17. The ___________ used for resource management in fog/edge 1 K1 CO5


computing are classified on the basis
of data flow, control and tenancy.
a. Algorithms
b. Architectures
c. Hardware
d. Infrastructure

Correct Answer: b

18. In the Cloud-Fog-Edge Computing paradigm, sensors being end 1 K1 CO5


devices, can perform basic data
processing
a. True
b. False

Correct Answer: a
19. What is(are) the application placement constraint(s) for fog nodes? 1 K1 CO5
a. Network constraints
b. Interoperability
c. Resource constraints
d. None of these

Correct Answer: a,c

Week 10

1. Post-copy and Pre-copy migration approaches are followed in : 1 K1 CO5


a. Live Migration process
b. Non-live Migration process
c. Hybrid Migration process
d. None of these

Correct Answer: a

2. Private Docker registry is a service that stores Docker images. 1 K1 CO5


a. True
b. False

Correct Answer: a

3. What is(are) the key advantage(s) of Docker? 1 K1 CO5


a. Facilitating microservices
b. Modeling networks.
c. Packaging software
d. None of these

Correct Answer: a,b,c

4. Which of the following statement is most appropriate about Docker ? 1 K1 CO5


a. Docker is a platform that allows to build and run but not ship apps.
b. Docker is a platform that allows to build and ship but but not to
run apps.
c. Docker is a platform that allows to build, ship and, run apps.
d. Docker is a platform that only allows to ship and run but not to
build apps.

Correct Answer: c

5. A Kubernetes cluster consists of set of worker machines , called 1 K1 CO5


_________ .
a. Pods
b. Nodes
c. Control plane
d. Centers
Correct Answer: b

6. Docker builds are more reproducible and and replicable than 1 K1 CO5
traditional software building methods.
a. True
b. False
Correct Answer: a

7. In Docker utility, ___________ is a collection of filesystem layers 1 K1 CO5


and some metadata that, if taken
together, can be spun up as Docker containers.
a. Operating System
b. Microservice
c. Virtual Machine
d. Image
Correct Answer: d

8. With VM memory size of 1024 GB and the transmission rate to be 1 K2 CO5


16 MB/sec
What is the total migration time ? Choose the closest correct option.
a. 32 hours
b. 18 hours
c. 26 hours
d. 24 hours
Correct Answer: b

9. Choose the most appropriate option. 1 K1 CO5


Statement 1: Container is a lightweight virtualization technique.
Statement 2: Container contains the code and all its dependencies.
a. Only statement 1 is true
b. Only statement 2 is true
c. Both statement 1 and 2 are true
d. Bothe the statements are false
Correct Answer: c

10. Containers are similar to VMs but they have unrelaxed isolation 1 K1 CO5
properties to share the operating
system among the applications.
a. True
b. False
Correct Answer: b

11. Whyis VMmigration important in cloud computing environments? 1 K1 CO5


a) Tocentralize all virtual machines on a single server.
b) Toefficiently distribute VM load across servers, allowing for
system maintenance and
operational efficiency.
c) Topermanently shut down under-utilized servers.
d) Toincrease the number of servers in a data center.
Correct Answer: (b)

12. What is the difference between cold (non-live) and hot (live) VM 1 K1 CO5
migration?
a) Cold migration turns off the VM during migration, while hot
migration keeps the VM
running.
b) Cold migration keeps the VM running during migration, while
hot migration turns off the
VM.
c) Both cold and hot migration suspend the VM during the process.
d) Cold migration requires more resources than hot migration.
Correct Answer: (a)

13. Which of the following approaches are commonly used in live VM 1 K1 CO5
migration?
a) Cold-copy and Hot-copy.
b) Pre-copy and Post-copy.
c) Suspend-copy and Resume-copy.
d) Start-copy and End-copy.
Correct Answer: (b)

14. Which of the following is a primary concern during VM migration to 1 K1 CO5


ensure service continuity?
a) Maximizing downtime and total migration time
b) Minimizing both downtime and total migration time, and
avoiding unnecessary disruption
of active services
c) Allowing resource contention with the migrating OS to speed up
the process
d) Ensuring that the migration process takes as long as possible to
ensure stability
Correct Answer: (b)

15. Which phase of live VM migration involves suspending the 1 K1 CO5


execution of the VM at the source and
copying the remaining dirty pages and CPU state to the destination?
a) Pre-Copy Phase
b) Post-Copy Phase
c) Stop-and-Copy Phase
d) On-Demand Copy Phase
Correct Answer: (c)

16. What is the primary advantage of the post-copy live memory 1 K1 CO5
migration strategy?
a) It avoids copying any memory pages from the source to the
destination.
b) It ensures that memory pages are only copied on demand,
potentially reducing unnecessary
data transfer.
c) It copies all memory pages before stopping the VM at the source.
d) It immediately restarts the VM at the source after copying the
CPU state.
Correct Answer: (b)

17. Which of the following is NOT a requirement for live VM 1 K1 CO5


migration?
a) Load balancing
b) Fault tolerance
c) Power management
d) Data replication
Correct Answer: (d)

18. In serial VM migration, what happens to the remaining VMs when 1 K1 CO5
the first VM enters the
stop-and-copy phase?
a) They continue to provide services
b) They are suspended to prevent memory dirtying
c) They start their pre-copy cycle
d) They are migrated simultaneously
Correct Answer: (b)

19. What is a key advantage of using containers in cloud computing? 1 K1 CO5


a) Containers virtualize the hardware to run multiple operating
systems
b) Containers are heavyweight virtual machines with extensive
resource requirements
c) Containers package code and dependencies, allowing applications
to run consistently
across different environments
d) Containers require specific hardware configurations to function
properly
Correct Answer: (c)

20. What is the main function of a Docker container image? 1 K1 CO5


a) Tocreate a virtual machine with its own operating system
b) Topackage an application along with its code, runtime, system
tools, libraries, and settings
c) Tomanage physical hardware resources for applications
d) Toexecute applications directly on the host operating system
without isolation
Correct Answer: (b)

Week 11

1. Which of the following best describes the key features of dew 1 K1 CO6
computing?
a. Independence and collaboration
b. Independence and centralization
c. Collaboration and decentralization
d. Connectivity and scalability Correct Answer: a

2. Which of the following best describes serverless computing? 1 K1 CO6


a. Developers manage scalability and orchestration of containers.
b. Developers run their logic as functions, and the cloud provider
manages scalability
c. Developers handle all containerization and runtime environments.
d. Developers run their applications directly on dedicated servers.
Correct Answer: b

3. Which of the following best describes Function-as-a-Service (FaaS)? 1 K1 CO6


a) Functions run continuously and scale vertically.
b) Functions are triggered by events and executed in isolated
environments.
c) Functions are always active and manage their own scaling.
d) Functions are large, continuously running parts of an application.
Correct Answer: (b)

4. How does Serverless Computing differ from traditional Cloud 1 K1 CO6


Computing?
a) It focuses on system administrators and exposes server
management.
b) It targets programmers by abstracting server management and
simplifying development.
c) It requires developers to handle all operational responsibilities.
d) It makes cloud software development more complicated.
Correct Answer: b

5. What is a key benefit of using AWS Lambda for running code? 1 K1 CO6
a) You need to manage AWS resources and scaling.
b)You have to focus on operating system management and
provisioning.
c) You upload code and AWS Lambda handles execution and scaling
based on events.
d) You must manually handle event sources and log streams.
Correct Answer: C

6. What does Google Cloud Functions primarily handle in terms of 1 K1 CO6


execution environment?
a) Server-based environments with manual provisioning
b) Fully managed environments with automatic scaling
c) Local environments requiring extensive server management
d) Dedicated virtual machines for each function
Correct Answer: b

7. What is the primary focus of Azure Functions for developers? 1 K1 CO6


a. Managing and maintaining servers
b. Writing code and configuring functions
c. Handling infrastructure scaling manually
d. Deploying compiled languages only
Correct Answer: b

8. What is one major challenge of using renewable energy sources in 1 K1 CO6


cloud datacenters?
a) High capital costs and unpredictability
b) Increased server maintenance requirements
c) Higher energy consumption from non-renewable sources
d) Decreased system reliability
Correct Answer: (a)

9. What is the primary focus of the power manager component in a 1 K1 CO6


sustainable cloud computing datacenter?
a. Controlling the temperature of the datacenter
b. Managing the power supply from renewable and grid sources
c. Handling virtual machine migrations
d. Scheduling workloads to balance energy use
Correct Answer: b
10. Which component of sustainable cloud computing aims to balance the 1 K1 CO6
temperature in cloud
datacenters to enhance energy efficiency?
a. Application Design
b. Capacity Planning
c. Cooling Management
d. Renewable Energy
Correct Answer: c

11. _________are an important distribution mechanism for libraries and 1 K1 CO6


custom runtimes in AWS
serverless ecosystem.
a. Runtimes
b. Lambda Layers
c. Log streams
d. None of these
Correct Answer: b

12. ______________ is a fully managed proprietary NoSQL database 1 K1 CO6


service that supports key–value
and document data structures.
a. Amazon DynamoDB
b. AWS S3
c. AWS Lambda
d. Amazon EFS
Correct Answer: a

13. Which component(s) of CDCs contribute(s) to consumption of huge 1 K1 CO6


amount of energy ?
a. Network
b. Storage
c. Memory
d. Cooling system
Correct Answer: a,b,c,d

14. Serverless covers a wide range of technologies that can be grouped 1 K1 CO6
into two categories
a. BaaS and YaaS
b. FaaS and BaaS
c. FaaS and YaaS
d. None of these
Correct Answer: b

15. Runtimes allows you to annotate your function code with custom 1 K1 CO6
logging statements which helps
you to analyse the execution flow and performance of your AWS
Lambda functions.
a. True
b. False
Correct Answer: b

16. Which of the following is not a category of a research initiative on 1 K1 CO6


sustainable cloud computing?
a. Renewable Energy
b. Capacity planning
c. Environment Sandboxing
d. None of these
Correct Answer: c

17. VMs can be migrated to a remote CDC to balance the load effectively 1 K1 CO6
as per sustainable cloud
computing model.
a. True
b. False
Correct Answer: a

18. The focus of cloud computing was _________ and the serverless is 1 K1 CO6
__________.
a. programmers, system administrators
b. system administrators, programmers
Correct Answer: b

19. In Google Cloud Functions, the code executes in a fully managed 1 K1 CO6
environment.
a. True
b. False
Correct Answer: a

20. Which of the following is/are the goal of sustainable cloud 1 K1 CO6
computing? Choose appropriateoption(s).
a. Minimizing the energy consumption.
b. Increasing reliability of CDCs.
c. Maximizing carbon footprint related cost.
d. Increasing network traffic
Correct Answer: a,b
Week 12

1. What is the purpose of 5G wireless technology? 1 K1 CO6


a. Deliver lower data speeds
b. Deliver higher data speeds
c. Decrease network capacity
d. Decrease availability
Answer: b

2. What is the benefit of 5G's ability to scale down in data rates, power, 1 K1 CO6
and mobility for IoT devices?
a. It provides extremely lean and low-cost connectivity solutions
b. It allows for faster data rates and lower latency
c. It enables immersive experiences like VR and AR
d. It provides ultra-reliable, low-latency links for mission-critical
communications.
Answer: a

3. How are mobile devices connected to mobile networks in Mobile 1 K1 CO6


Cloud Computing?
a. Through cloud storage servers
b. Through remote access protocols
c. Through base stations such as base transceiver station, access point,
or satellite
d. Through peer-to-peer connections
Answer: c

4. What drives the need for heterogeneous and distributed computing 1 K1 CO6
architectures?
a. Resource-constrained low-latency devices
b. Distant cloud data centres
c. High-speed internet connections
d. Availability of low-cost computing devices
Answer: a

5. What are the different aspects of CPS? 1 K1 CO6


a. Cyber, physical, and communication only
b. Cyber, dynamics, and safety only
c. Cyber, physical, and computation only
d. Cyber, physical, computation, dynamics, communication, security,
and safety
Answer: d

6. What role will service orchestration play in the future of industrial 1 K1 CO6
applications?
a. It will limit the interaction of industrial applications with network
resources
b. It will not influence traffic routing for industrial applications.
c. It will enable industrial applications to interact with the network
resources in advanced
ways.
d. It will not select the location and quality of service for industrial
applications.
Answer: c

7. What is the purpose of spatial analysis? 1 K1 CO6


a. To study the characteristics of people and their behaviors
b. To study the characteristics of places and regions and their
relationships
c. To analyze financial data and make investment decisions
d. To create maps of the physical world
Answer: b

8. How is the signal obtained from the accelerometer data for activity 1 K1 CO6
detection?
a. By calculating the square root of the x-axis, y-axis, and z-axis
signals
b. By averaging the x-axis, y-axis, and z-axis signals
c. By subtracting the x-axis, y-axis, and z-axis signals
d. By multiplying the x-axis, y-axis, and z-axis signals
Answer: a

9. According to the given definition, which of the following statement(s) 1 K1 CO6


is (are) true about dew
computing?
a. Dew computing is a cloud computing paradigm where all
computing is done on the cloud
without any reliance on on-premises computers.
b. Dew computing is a paradigm where on-premises computers
provide functionality that is
dependent on cloud services.
c. Dew computing is a paradigm where on-premises computers and
cloud services are
completely isolated from each other and do not collaborate in any
way.
d. Dew computing is a paradigm where on-premises computers
provide functionality that is
independent of cloud services and is also collaborative with cloud
services.
Answer: d

10. According to the given objectives, which of the following 1 K1 CO6


statement(s) is (are) true about the
proposed health model?
a. The health model is designed for cloud computing and does not
make use of fog or edge
computing.
b. The health model is designed for edge computing only and does not
make use of cloud or
fog computing.
c. The health model is designed for fog-edge computing and aims to
reduce latency, network
usage and cost incurred in the cloud.
d. The health model is designed for dew computing and does not
make use of cloud, fog, or
edge computing.
Answer: c

11. According to the given definition, which of the following statement(s) 1 K1 CO6
is (are) true about dew
computing?
a. Dew computing is a cloud computing paradigm where all
computing is done on the cloud
without any reliance on on-premises computers.
b. Dew computing is a paradigm where on-premises computers
provide functionality that is
dependent on cloud services.
c. Dew computing is a paradigm where on-premises computers and
cloud services are
completely isolated from each other and do not collaborate in any
way.
d. Dew computing is a paradigm where on-premises computers
provide functionality that is
independent of cloud services and is also collaborative with cloud
services.
Answer: d

12. What are the different aspects of CPS? 1 K1 CO6


a. Cyber, physical, and communication only
b. Cyber, dynamics, and safety only
c. Cyber, physical, computation, dynamics, communication, security,
and safety
d. Cyber, physical, and computation only
Answer: c

13. What is the benefit of 5G's ability to scale down in data rates, power, 1 K1 CO6
and mobility for IoT devices?
a. It allows for faster data rates and lower latency
b. It provides extremely lean and low-cost connectivity solutions
c. It enables immersive experiences like VR and AR
d. It provides ultra-reliable, low-latency links for mission-critical
communications.
Answer: c

14. Fog-Edge computing leads to increased network congestion 1 K1 CO6


a. True
b. False
Correct Answer: b

15. What is(are) the key feature(s) of Mobile Cloud computing for 5G 1 K1 CO6
networks?
a. Sharing resources for mobile applications
b. Improved reliability due to data storage in the cloud
c. Increased resource consumption by mobile applications
d. None of these
Correct Answer: a and b

16. Mobility Analytics utilizes the cloud platform for computation and 1 K1 CO6
storage.
A) True
B) False
Correct Answer: A

17. In which computing environment is latency fixed due to the location 1 K1 CO6
of application modules at the
Area Gateway?
a. Fog computing
b. Cloud computing
c. Serverless Computing
d. None of the above
Correct Answer: a

18. Resource-constrained low-latency devices drive the need of 1 K1 CO6


a. Heterogeneous and distributed computing architectures
b. Homogeneous and distributed computing architectures
c. Heterogeneous and parallel computing architectures
d. Homogeneous and parallel computing architectures
Correct Option: a

19. Customized wearable devices for collecting health parameters are the 1 K1 CO6
best examples of
a. IoHT
b. Fog device
c. Fog-Cloud interfaced.
d. Cloud-Fog-Edge-IoHT
Correct Answer: d

20. The cyber-physical system involves transdisciplinary approaches, 1 K1 CO6


merging the theory of
cybernetics, mechatronics, design, and process science.
a. True
b. False
Correct Answer: a

You might also like