MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area |
| A. | Accounting Management |
| B. | Compliance |
| C. | Data Privacy |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 2. |
________ captive requires that the cloud accommodate multiple compliance regimes. |
| A. | Licensed |
| B. | Policy-based |
| C. | Variable |
| D. | All of the mentioned |
| Answer» C. Variable | |
| 3. |
Which of the following subject area deals with pay-as-you-go usage model? |
| A. | Accounting Management |
| B. | Compliance |
| C. | Data Privacy |
| D. | All of the mentioned |
| Answer» B. Compliance | |
| 4. |
The peak of the sum is never ________ than the sum of the peaks. |
| A. | smaller |
| B. | greater |
| C. | equal to |
| D. | none of the mentioned |
| Answer» C. equal to | |
| 5. |
A __________ site is one that is environmentally friendly: locations that are on a network backbone. |
| A. | greenfield |
| B. | redfield |
| C. | greenful |
| D. | none of the mentioned |
| Answer» B. redfield | |
| 6. |
The reliability of a system with n redundant components and a reliability of r is : |
| A. | 1-(1-r)n |
| B. | 1-(1+r)n |
| C. | 1+(1-r)n |
| D. | All of the mentioned |
| Answer» B. 1-(1+r)n | |
| 7. |
Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems do. |
| A. | sniffers |
| B. | botnets |
| C. | trojan horse |
| D. | all of the mentioned |
| Answer» C. trojan horse | |
| 8. |
Cutting latency in half requires ______ times the number of nodes in a system. |
| A. | two |
| B. | three |
| C. | three |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 9. |
How many laws exist for Cloudonomics by Weinman? |
| A. | 4 |
| B. | 5 |
| C. | 10 |
| D. | 15 |
| Answer» D. 15 | |
| 10. |
A _____ is a facility that is a self-contained semiconductor assembly line. |
| A. | fab |
| B. | touch |
| C. | rep |
| D. | all of the mentioned |
| Answer» B. touch | |
| 11. |
_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand. |
| A. | Leading |
| B. | Pooling |
| C. | Virtualization |
| D. | All of the mentioned |
| Answer» C. Virtualization | |
| 12. |
_______ enables batch processing, which greatly speeds up high-processing applications. |
| A. | Scalability |
| B. | Reliability |
| C. | Elasticity |
| D. | Utility |
| Answer» B. Reliability | |
| 13. |
_______ feature allows you to optimize your system and capture all possible transactions. |
| A. | scalability |
| B. | reliability |
| C. | elasticity |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 14. |
_______ is a pay-as-you-go model matches resources to need on an ongoing basis. |
| A. | Utility |
| B. | Elasticity |
| C. | Low barrier to entry |
| D. | All of the mentioned |
| Answer» B. Elasticity | |
| 15. |
Which of the following is most refined and restrictive service model ? |
| A. | IaaS |
| B. | CaaS |
| C. | PaaS |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 16. |
When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. |
| A. | SaaS |
| B. | PaaS |
| C. | IaaS |
| D. | All of the mentioned |
| Answer» B. PaaS | |
| 17. |
A service that concentrates on hardware follows the _________ as a Service model. |
| A. | IaaS |
| B. | CaaS |
| C. | PaaS |
| D. | All of the mentioned |
| Answer» B. CaaS | |
| 18. |
Applications that work with cloud computing that have low margins and usually low risk are : |
| A. | high touch |
| B. | low touch |
| C. | moderate touch |
| D. | all of the mentioned |
| Answer» C. moderate touch | |
| 19. |
Which of the following is one of the unique attribute of Cloud Computing ? |
| A. | utility type of delivery |
| B. | elasticity |
| C. | low barrier to entry |
| D. | all of the mentioned |
| Answer» E. | |
| 20. |
Which of the following architectural standards is working with cloud computing industry ? |
| A. | Service-oriented architecture |
| B. | Standardized Web services |
| C. | Web-application frameworks |
| D. | All of the mentioned |
| Answer» B. Standardized Web services | |
| 21. |
You can’t count on a cloud provider maintaining your _____ in the face of government actions. |
| A. | scalability |
| B. | reliability |
| C. | privacy |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 22. |
Which of the following is most important area of concern in cloud computing ? |
| A. | Security |
| B. | Storage |
| C. | Scalability |
| D. | All of the mentioned |
| Answer» B. Storage | |
| 23. |
Cloud computing is a _______ system and it is necessarily unidirectional in nature. |
| A. | stateless |
| B. | stateful |
| C. | reliable |
| D. | all of the mentioned |
| Answer» B. stateful | |
| 24. |
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. |
| A. | propagation |
| B. | latency |
| C. | noise |
| D. | all of the mentioned |
| Answer» C. noise | |
| 25. |
The _____ is something that you can obtain under contract from your vendor. |
| A. | PoS |
| B. | QoS |
| C. | SoS |
| D. | All of the mentioned |
| Answer» C. SoS | |
| 26. |
Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage ? |
| A. | On-demand self-service |
| B. | Broad network access |
| C. | Resource pooling: |
| D. | All of the mentioned |
| Answer» B. Broad network access | |
| 27. |
Which of the following was one of the top 5 cloud applications in 2010 ? |
| A. | Cloud backup |
| B. | Web applications |
| C. | Business applications |
| D. | All of the mentioned |
| Answer» E. | |
| 28. |
Which of the following is IaaS service provider ? |
| A. | EC2 |
| B. | EC1 |
| C. | EC10 |
| D. | Hybrid |
| Answer» B. EC1 | |
| 29. |
CaaS stands for _____________ as service. |
| A. | Compliance |
| B. | Computer |
| C. | Community |
| D. | Communication |
| Answer» E. | |
| 30. |
The three different service models is together known as the _____ model of cloud computing. |
| A. | SPI |
| B. | SIP |
| C. | CPI |
| D. | All of the mentioned |
| Answer» B. SIP | |
| 31. |
How many types of service model are mainly present in Cloud ? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» D. 4 | |
| 32. |
_______ is a complete operating environment with applications, management, and the user interface. |
| A. | IaaS |
| B. | SaaS |
| C. | SaaS |
| D. | All of the mentioned |
| Answer» C. SaaS | |
| 33. |
Which of the following provides development frameworks and control structures ? |
| A. | IaaS |
| B. | SaaS |
| C. | PaaS |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 34. |
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets |
| A. | IaaS |
| B. | SaaS |
| C. | PaaS |
| D. | All of the mentioned |
| Answer» B. SaaS | |
| 35. |
Which of the following is owned by an organization selling cloud services ? |
| A. | Public |
| B. | Private |
| C. | Community |
| D. | Hybrid |
| Answer» B. Private | |
| 36. |
A hybrid cloud combines multiple clouds where those clouds retain their unique identities, but are bound together as a unit. |
| A. | Public |
| B. | Private |
| C. | Community |
| D. | Hybrid |
| Answer» E. | |
| 37. |
__________ cloud is one where the cloud has been organized to serve a common function or purpose. |
| A. | Public |
| B. | Private |
| C. | Community |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 38. |
The ________ cloud infrastructure is operated for the exclusive use of an organization. |
| A. | Public |
| B. | Private |
| C. | Community |
| D. | All of the mentioned |
| Answer» C. Community | |
| 39. |
________ dimension corresponds to two different states in the eight possible cloud forms. |
| A. | Physical location of data |
| B. | Ownership |
| C. | Security boundary |
| D. | None of the mentioned |
| Answer» E. | |
| 40. |
Which of the following is related to service provided by Cloud ? |
| A. | Sourcing |
| B. | Ownership |
| C. | Reliability |
| D. | AaaS |
| Answer» B. Ownership | |
| 41. |
__________is a measure of whether the operation is inside or outside the security boundary or network firewall. |
| A. | Per |
| B. | P |
| C. | Pre |
| D. | All of the mentioned |
| Answer» E. | |
| 42. |
Which of the following is provided by ownership dimension of Cloud Cube Model ? |
| A. | Proprietary |
| B. | Owner |
| C. | P |
| D. | All of the mentioned |
| Answer» C. P | |
| 43. |
How many types of security boundary values exist in Cloud Cube model ? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | None of the mentioned |
| Answer» C. 3 | |
| 44. |
Which of the following dimension is related to organization’s boundaries ? |
| A. | Physical location of data |
| B. | Ownership |
| C. | Security boundary |
| D. | All of the mentioned |
| Answer» B. Ownership | |
| 45. |
How many types of dimensions exists in Cloud Cube Model ? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» E. | |
| 46. |
_______ model attempts to categorize a cloud network based on four dimensional factors. |
| A. | Cloud Square |
| B. | Cloud Service |
| C. | Cloud Cube |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 47. |
The __________ model originally did not require a cloud to use virtualization to pool resources. |
| A. | NEFT |
| B. | NIST |
| C. | NIT |
| D. | All of the mentioned |
| Answer» C. NIT | |
| 48. |
Which of the following is best known service model ? |
| A. | SaaS |
| B. | IaaS |
| C. | PaaS |
| D. | All of the mentioned |
| Answer» E. | |
| 49. |
Which of the following is deployment model ? |
| A. | public |
| B. | private |
| C. | hybrid |
| D. | all of the mentioned |
| Answer» E. | |
| 50. |
________ refers to the location and management of the cloud’s infrastructure. |
| A. | Service |
| B. | Deployment |
| C. | Application |
| D. | None of the mentioned |
| Answer» C. Application | |