Description : Which of the following backup technique is most space efficient? a) Full backup b) Incremental backup c) Differential backup d) All of the mentioned
Last Answer : Incremental backup
Description : Which of the following was one of the top 5 cloud applications in 2010? a) Cloud backup b) Web applications c) Business applications d) All of the mentioned
Last Answer : All of the mentioned
Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned
Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned
Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned
Last Answer : Both RPO & RTO
Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned
Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned
Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned
Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned
Description : Which amongst the following is not an advantage of Distributed systems? a) Resource sharing b) Incremental growth c) Reliability d) None of the above
Last Answer : Reliability
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : Variable cost is also known as (a) Incremental cost ; (b) Marginal cost ; (c) Differential cost ; (d) All the three
Last Answer : (d) All the three
Description : Point out the wrong statement. a) TCO must account for the real costs of items, but frequently they do not b) A system consumes resources such as space in a datacenter or portion of ... management c) Microsoft maintains an economics page for its Windows Azure Platform d) None of the mentioned
Last Answer : None of the mentioned
Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned
Last Answer : VMM
Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations
Last Answer : Storing the backup copy near to its original site is best strategy
Description : Which of the following is an online backup and storage system? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Simple Notification Service d) Amazon Simple Storage System
Last Answer : Amazon Simple Storage System
Description : Differentiate between full backup and differential backup. -Technology
Last Answer : Differences between the full backup and differential backup are as follows:Full backupDifferential backupA complete backup of everythingthat you want to back up.The backup software looks at which fileshave changed ... since you onlyneed one set of backup data.Faster to create than a full backup.
Description : Which of the following are benefit of IaaS? A. Flexible and efficient renting of computer hardware. B. Portability, interoperability with legacy applications. C. Full control of the computing resources through administrative access to VMs. D. All of the above
Last Answer : All of the above
Description : In , the coordinates are mentioned in the program with respect to onePrevious point. a.Incremental System b.Absolute System c.Datum System d.Screen Coordinates System
Last Answer : a.Incremental System
Description : In , the coordinates are mentioned in the program with respect to onereference point a.Incremental System b.Absolute System c.Datum System d.Screen Coordinates System
Last Answer : b.Absolute System
Description : What among the following constitutes to the incremental formulation of CSP? a) Path cost b) Goal cost c) Successor function d) All of the mentioned
Last Answer : d) All of the mentioned
Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned
Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned
Last Answer : 1
Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of service c) ... come replete with tools and utilities to aid in application design and deployment d) None of the mentioned
Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned
Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service
Description : In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware. a) paravirtualization b) full virtualization c) emulation d) none of the mentioned
Last Answer : full virtualization
Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned
Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
Description : In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware. a) paravirtualization b) full virtualization c) emulation d) none of the mentioned
Last Answer : emulation
Description : Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V? a) paravirtualization b) full virtualization c) emulation d) none of the mentioned
Last Answer : paravirtualization
Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing
Last Answer : Virtualization
Description : The management model that facilitates effective and efficient security management and operations in the cloud environment so that an enterprise’s business targets are achieved is a) Cloud security b) Trust model c) Security model d) Cloud security governance
Last Answer : Cloud security governance
Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system
Last Answer : Run on single operating system
Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned
Last Answer : C. Elastic application
Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned
Last Answer : load balancing
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned
Last Answer : a)
Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ClearPoint PCI
Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ) Rackserve PCI
Description : Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned
Last Answer : bankserve
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party