Description : Point out the correct statement. a) Cloud storage may be broadly categorized into four major classes of storage b) In unmanaged storage, the storage service provider makes storage capacity available ... , the storage service provider makes storage capacity available to users d) All of the mentioned
Last Answer : In unmanaged storage, the storage service provider makes storage capacity available to users
Description : Point out the correct statement. a) Cloud storage may be broadly categorized into four major classes of storage b) In unmanaged storage, the storage service provider makes storage capacity ... storage, the storage service provider makes storage capacity available to usersd) All of the mentioned
Description : How many categories of storage devices broadly exist in cloud? a) 1 b) 2 c) 3 d) None of the mentioned
Last Answer : 2
Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned
Last Answer : All of the mentioned
Description : Which of the following architectural standards is working with cloud computing industry? a) Service-oriented architecture b) Standardized Web services c) Web-application frameworks d) All of the mentioned
Last Answer : Service-oriented architecture
Description : What is private cloud? A. A standard cloud service offered via the Internet B. A cloud architecture maintained within an enterprise data center. C. A cloud service inaccessible to anyone but the cultural elite
Last Answer : A cloud architecture maintained within an enterprise data center.
Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned
Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture
Last Answer : Cloud infrastructure
Description : Cloud computing architecture is a combination of? A. service-oriented architecture and grid computing B. utility computing and event-driven architecture. C. service-oriented architecture and event-driven architecture. D. virtualization and event-driven architecture.
Last Answer : service-oriented architecture and event-driven architecture.
Description : Which of the following is a step of Deployment Phase? A. Transformation Plan Development B. IT Architecture Development C. Business Architecture Development D. Selecting Cloud Computing Provider
Last Answer : D. Selecting Cloud Computing Provider
Description : What is Business Architecture Development? A. we recognize the risks that might be caused by cloud computing application from a business perspective. B. we identify the applications that support the ... are required to transform current business to cloud computing modes. D. None of the above
Last Answer : A. we recognize the risks that might be caused by cloud computing application from a business perspective.
Description : In ________, a strategy document is prepared according to the conditions a customer might face when applying cloud computing mode. A. Cloud Computing Value Proposition B. Cloud Computing Strategy Planning C. Planning Phase D. Business Architecture Development
Last Answer : B. Cloud Computing Strategy Planning
Description : . In Strategy Phase, Which of the following are correct step to perform this analysis? A. Cloud Computing Value Proposition B. Cloud Computing Strategy Planning C. Both A and B D. Business Architecture Development
Last Answer : C. Both A and B
Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned
Description : Most of the cloud architectures are built on this type of architecture. a) skeleton b) grid c) linear d) template
Last Answer : grid
Description : Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to ______________ a) IaaS b) SaaS c) PaaS d) All of the mentioned
Last Answer : PaaS
Description : The expansion of SOA is __________________. A. Software oriented architecture. B. System oriented architecture. C. Server oriented architecture. D. Service oriented architecture
Last Answer : Service oriented architecture
Description : Which of the following level of privilege of x86 architecture is used for user level applications? A. Ring 0. B. Ring 1. C. Ring 2. D. Ring 3.
Last Answer : Ring 3.
Description : Which of the following are reasons for deploying a multicloud architecture…. 1. reducing reliance on any single vendor 2. increasing flexibility through choice 3. mitigating against disasters A. All above B. 1 only C. 2 Only D. 2 and 3 only
Last Answer : All above
Description : In Virtualization, Which architecture offers virtual isolation among the multiple tenants? A. IT Architecture B. Multitenant C. Deployment D. Business Architecture
Last Answer : Multitenant
Description : What is true about Service-Oriented Architecture? A. Service-Oriented Architecture helps to use applications as a service for other applications B. It is possible to exchange the data between applications of ... C. It offers computational resources on demand as a metered service. D. Both A and B
Last Answer : Both A and B
Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing
Last Answer : Virtualization
Description : . In which phase, IT Architecture Development comes? A. Strategy Phase B. Planning Phase C. Deployment Phase D. Development Phase
Last Answer : B. Planning Phase
Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned
Last Answer : None of the mentioned
Description : Which of the following is open and both hypervisor and processor-architecture- agnostic? a) Dell Scalent b) CloudKick c) Elastra d) All of the mentioned
Last Answer : Dell Scalent
Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned
Description : In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices. a) False b) True
Last Answer : True
Description : To send objects across the wire, beans need to be encoded using the Java Architecture for XML Binding (JAXB). a) True b) False
Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned
Description : Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand? a) SOA b) EBS c) GEC d) All of the mentioned
Last Answer : SOA
Description : What are all the modular architecture for OpenStack are: a) OpenStack Compute: For overseeing extensive systems of the virtual machine. b) OpenStack Object Storage: The storage framework that offers help for both object storage ... to virtual disk pictures. d) A & B e) B & C f) All of the above
Last Answer : All of the above
Description : The building blocks of Google’s App Engine architecture comprises of a) GFS, MapReduce, Chubby, BigTable b) GFS, Scheduler, Chubby, BigTable c) GFS, MapReduce, Chunk Server, BigTable d) Scheduler, MapReduce, Chubby, Chunk Server
Last Answer : GFS, MapReduce, Chubby, BigTable
Description : The architecture for _______ is built on the concepts of shared-nothing and messaging-based information exchange. a) HDFS b) Chabby c) Nova d) BigTable
Last Answer : Nova
Description : . _________ is virtualization software for the x86 architecture. a)VMware b) GAE c) VM d) VirtualBox
Last Answer : VirtualBox
Description : MapReduce engine has a master/slave architecture consisting of a single ______ as the master and a number of _______ as the slaves a) Name Node, Data Node b) JobTracker, TaskTrackers c) TaskTrackers, JobTracker d) Data Node, Name Node
Last Answer : JobTracker, TaskTrackers
Description : The Master of the HDFS Architecture is a) Node Manager b) Data Node c) Name Node d) None of the above
Last Answer : Name Node
Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned
Last Answer : operating
Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned