Which of the following is storage data
interchange interface for stored data objects?
a) OCC
b) OCCI
c) OCMI
d) All of the mentioned

1 Answer

Answer :

OCCI

Related questions

Description : Which of the following is storage data interchange interface for stored data objects? a) OCC b) OCCI c) OCMI d) All of the mentioned

Last Answer : OCCI

Description : Which of the following protocol is used for discovering and retrieving objects from a cloud? a) OCCI b) SMTP c) HTTP d) All of the mentioned

Last Answer : OCCI

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost? a) CCE b) OCCI c) SMI d) All of the mentioned

Last Answer : SMI

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : _______ is a complete operating environment with applications, management, and user interface. a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : SaaS

Description : Point out the correct statement. a) PaaS supplies the infrastructure b) IaaS adds application development frameworks, transactions, and control structures c) SaaS is an operating environment with applications, management, and the user interface d) All of the mentioned

Last Answer : SaaS is an operating environment with applications, management, and the user interface

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM b) All CPUs support virtual machines c) On a Type 2 VM, ... is created that emulates the devices with which a system would normally interact d) All of the mentioned

Last Answer : All CPUs support virtual machines

Description : Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint? a) WSDL b) SCDL c) XML d) None of the mentioned

Last Answer : WSDL

Description : A ________ cloud requires virtualized storage to support the staging and storage of data. a) soft b) compute c) local d) none of the mentioned

Last Answer : compute

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : Cloud storage data usage in the year 2020 is estimated to be _____________ percent resident by IDC. a) 10 b) 15 c) 20 d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) The Mapper outputs are sorted and then partitioned per Reducer b) The total number of partitions is the same as the number of reduce tasks for the job c) The intermediate, ... always stored in a simple (key-len, key, value-len, value) format d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : _______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets. a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : Point out the correct statement. a) A standard machine instance (virtual computer) might cost $0.10 or less an hour b) A typical storage charge might be $0.10 per GB/month c) Outsourcing shifts the burden of capital expenditures onto the service provider d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : _______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets. a) IaaS b) SaaS c) PaaS d) All of the mentioned

Last Answer : IaaS

Description : Which of the following disk operation is performed When a tenant is granted access to a virtual storage container? a) CRUD b) File system modifications c) Partitioning d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following use LUNs to define a storage volume that appears to a connected computer as a device? a) SAN b) iSCSI c) Fibre Channel CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : All of the mentioned

Description : A ________ is a logical unit that serves as the target for storage operations, such as the SCSI protocol READs and WRITEs. a) GETs b) PUN c) LUN d) All of the mentioned

Last Answer : LUN

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online b) IBM is a major player in cloud ... managed storage, the storage service provider makes storage capacity available to users d) All of the mentioned

Last Answer : With Atmos, you can create your own cloud storage system or leverage a public cloud service with Atmos online

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : An application that needed _______ storage alone might not benefit from a cloud deployment at all. a) online b) offline c) virtual d) all of the mentioned

Last Answer : offline

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : Which of the following storage devices exposes its storage to clients as Raw storage that can be partitioned to create volumes? a) block b) file c) disk d) all of the mentioned

Last Answer : block

Description : How many categories of storage devices broadly exist in cloud? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following offers Storage size of 10GB free t0 100 GB paid? a) Adrive b) 4shared c) Badongo d) All of the mentioned

Last Answer : 4shared

Description : The service FreeDrive is storage that allows ________ users to view the content of others. a) Facebook b) Twitter c) Whatsapp d) None of the mentioned Answer: a Explanation: FreeDrive is a p

Last Answer : Facebook

Description : Which of the following is the simplest unmanaged cloud storage device? a) file transfer utility b) antivirus utility c) online image utility d) none of the mentioned

Last Answer : none of the mentioned