Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned
Last Answer : Security
Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned
Last Answer : All of the mentioned
Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned
Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users
Description : Which of the following is considered an essential element in cloud computing by CSA? a) Multi-tenancy b) Identity and access management c) Virtualization d) All of the mentioned
Last Answer : Virtualization
Description : What is the need for load balancing in cloud computing? a) Increased scalability b) Ability to handle sudden traffic spikes c) A and B both d) None of these
Last Answer : A and B both
Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability
Last Answer : Work Without Internet
Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system
Last Answer : Run on single operating system
Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing.
Last Answer : It adds extra load to the underlying physical infrastructure and has no role in cloud computing.
Description : What is the role of virtualization in cloud computing? A. It removes operating system inefficiencies. B. It improves the performance of web applications. C. It optimizes the utilization of ... . It adds extra load to the underlying physical infrastructure and has no role in cloud computing
Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture
Last Answer : Cloud infrastructure
Description : Cloud computing architecture is a combination of? A. service-oriented architecture and grid computing B. utility computing and event-driven architecture. C. service-oriented architecture and event-driven architecture. D. virtualization and event-driven architecture.
Last Answer : service-oriented architecture and event-driven architecture.
Description : Which of the following are correct technologies working behind the cloud computing platforms? A. Virtualization B. SOA C. Grid Computing D. All of the above
Last Answer : D. All of the above
Last Answer : All of the above
Description : Which of the following is considered an essential element in cloud computing? a) Multi-tenancy b) Identity and access management c) Virtualization d) None of the above
Last Answer : Multi-tenancy
Description : Which of the following are correct technologies working behind the cloud computing platforms? a) Virtualization b) SOA c) Grid Computing d) All of the above
Last Answer : ) All of the above
Description : The __________ model originally did not require a cloud to use virtualization to pool resources. a) NEFT b) NIST c) NIT d) All of the mentioned
Last Answer : NIST
Description : Which of the following cloud concept is related to pooling and sharing of resources? a) Polymorphism b) Abstraction c) Virtualization d) None of the mentioned
Description : Which model originally did not require a cloud to use virtualization to pool resources a) NEFT b) NIST c) NIT d) All of the mentioned
Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability
Last Answer : Privacy
Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned
Last Answer : elasticity
Description : Which of the following is the operational domain of CSA? a) Scalability b) Portability and interoperability c) Flexibility d) None of the mentioned
Last Answer : Portability and interoperability
Description : Which of the following factors might offset the cost of offline access in hybrid applications? a) scalability b) costs c) ubiquitous access d) all of the mentioned
Last Answer : all of the mentioned
Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned
Last Answer : scalability
Description : . ____________ refers to distributed computing, in which a group of computers from multiple locations are connected with each other to achieve a common objective. A. Virtualization B. SOA C. Grid Computing D. Utility Computing Ans : C
Last Answer : . Grid Computing
Description : Managed IT services are based on the concept of? A. Virtualization B. SOA C. Grid Computing D. Utility Computing
Last Answer : Utility Computing
Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing
Description : _______ allows servers and storage devices to increasingly share and utilize applications by easy migration from one server to another a) Grid Computing b) Artificial Intelligence c) Virtualization d) Web 3.0
Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned
Last Answer : A Compliance as a Service application would need to serve as a trusted third party
Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned
Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned
Last Answer : The OpenID and
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned
Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols
Description : Which of the architectural layer is used as a front end in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : client
Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned
Description : Which of the architectural layer is used as backend in cloud computing? a) client b) cloud c) soft d) all of the mentioned
Last Answer : cloud
Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned
Last Answer : None of the mentioned
Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned
Last Answer : platform
Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned
Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems
Description : Cloud computing shifts capital expenditures into ________ expenditures. a) operating b) service c) local d) none of the mentioned
Last Answer : operating
Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned
Last Answer : high