Description : Which of the following component is called hypervisor? a) VGM b) VMc c) VMM d) All of the mentioned
Last Answer : VMM
Description : ______ component is called hypervisor? a ) VGM b) VMc c) VMM d ) All of the mentioned
Description : Which of the following provide system resource access to virtual machines? a) VMM b) VMC c) VNM d) All of the mentioned
Description : Which of the following provide system resource access to virtual machines? a) VMM b) VMC c) VNM d) All of these
Description : Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems? a) Vmachines b) VirtualBox c) ThoughtPolice d) None of the mentioned
Last Answer : VirtualBox
Description : _________ forms the basis for most of the Web services stacks. A. WSDL B. VMc C. SOA D. SOAP
Last Answer : SOAP
Description : Which of the following lets a Web service advertise itself in terms of a collection of endpoints? a) WSDL b) VMc c) SOAP d) All of the mentioned
Last Answer : WSDL
Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned
Last Answer : Ethernet Hardware Addresses
Description : __________ allows multiple operating system instances to run as guest on the same server. A. Server. B. Hypervisor. C. Network. D. Data.
Last Answer : Hypervisor.
Description : ________ is a utility which allows users to create and run jobs with any executables as the mapper and/or the reducer. a) Hadoop Strdata b) Hadoop Streaming c) Hadoop Stream d) None of the mentioned
Last Answer : Hadoop Streaming
Description : A hypervisor is sometimes also called a? A. VMA B. VMS C. VMM D. VMR
Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.
Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned
Last Answer : None of the mentioned
Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned
Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
Description : _________ is designed specifically to run connected to the cloud as a dedicated cloud client. a) Harvera Tablet OS b) Fedora Netbook OS c) Jolicloud Netbook OS d) None of the mentioned
Last Answer : Jolicloud Netbook OS
Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned
Last Answer : All of the mentioned
Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned
Description : The most commonly used model for discovery and description used with SOAP messaging is the? A. WSDL B. VMc C. DHML D. SOA
Description : Moving expenses onto the _____ side of a budget allows an organization to transfer risk to their cloud computing provider. a) Dex b) OpEx c) Pex d) All of the mentioned
Last Answer : OpEx
Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned
Last Answer : both local memory and clock
Description : The __________ allows systems and services to be accessible within an organization. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud
Last Answer : A. Private cloud
Description : The ____________ allows systems and services to be accessible by a group of organizations. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud
Last Answer : C. Community cloud
Description : The ____________ allows systems and services to be accessible by a group of organizations. a) Private cloud b) Public cloud c) Community cloud d) Hybrid cloud
Last Answer : Community cloud
Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned
Last Answer : XACML
Description : Point out the wrong statement. a) XML checks the ID request against its policies and either allows or denies the request b) SPML in most instances operates as a reply/request mechanism c) User centric authentication takes place usually in the form of knowledge cards d) All of the mentioned
Last Answer : SPML in most instances operates as a reply/request mechanism
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : Point out the wrong statement. a) Google App Engine allows a developer to scale an application immediately b) The customer relationship management provider SalesForce.com has a development platform called Force. ... become a hub master at the center of many ISVs offerings d) None of the mentioned
Last Answer : The customer relationship management provider SalesForce.com has a development platform called Force.com that is an IaaS offering
Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned
Last Answer : elasticity
Description : Which of the following model allows vendor to provide security as part of the Service Level Agreement? a) SaaS b) PaaS c) IaaS d) All of the mentioned
Last Answer : SaaS
Description : General-purpose class that allows a response to be rendered using a marshaller. a) MarshallingView b) Marshalling c) View d) All of the mentioned
Last Answer : MarshallingView
Description : The service FreeDrive is storage that allows ________ users to view the content of others. a) Facebook b) Twitter c) Whatsapp d) None of the mentioned Answer: a Explanation: FreeDrive is a p
Last Answer : Facebook
Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned
Last Answer : Google uses hardware virtualization
Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Description : Which of the following allows a virtual machine to run on two or more physical processors at the same time? a) Virtual SMP b) Distributed Resource Scheduler c) vNetwork Distributed Switch d) Storage VMotion
Last Answer : Virtual SMP
Description : _________ applications have a much lower barrier to entry than their locally installed competitors. a) IaaS b) CaaS c) PaaS d) None of the mentioned
Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned
Last Answer : C. Elastic application
Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned
Last Answer : ClearPoint PCI
Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned
Last Answer : Identity protection
Description : SaaS supports multiple users and provides a shared data model through _________ model. a) single-tenancy b) multi-tenancy c) multiple-instance d) all of the mentioned
Last Answer : multi-tenancy
Description : _________ serves as a PaaS vendor within Google App Engine system. a) Google b) Amazon c) Microsoft d) All of the mentioned
Last Answer : Google
Description : Pods are aggregated into pools within an IaaS region or site called an _________ zone. a) restricted b) unavail c) availability d) none of the mentioned
Last Answer : availability
Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned
Last Answer : platform