

MCQOPTIONS
Saved Bookmarks
This section includes 1361 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
1301. |
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area |
A. | Accounting Management |
B. | Compliance |
C. | Data Privacy |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
1302. |
________ captive requires that the cloud accommodate multiple compliance regimes. |
A. | Licensed |
B. | Policy-based |
C. | Variable |
D. | All of the mentioned |
Answer» C. Variable | |
1303. |
Which of the following subject area deals with pay-as-you-go usage model? |
A. | Accounting Management |
B. | Compliance |
C. | Data Privacy |
D. | All of the mentioned |
Answer» B. Compliance | |
1304. |
The peak of the sum is never ________ than the sum of the peaks. |
A. | smaller |
B. | greater |
C. | equal to |
D. | none of the mentioned |
Answer» C. equal to | |
1305. |
A __________ site is one that is environmentally friendly: locations that are on a network backbone. |
A. | greenfield |
B. | redfield |
C. | greenful |
D. | none of the mentioned |
Answer» B. redfield | |
1306. |
The reliability of a system with n redundant components and a reliability of r is : |
A. | 1-(1-r)n |
B. | 1-(1+r)n |
C. | 1+(1-r)n |
D. | All of the mentioned |
Answer» B. 1-(1+r)n | |
1307. |
Weinman argues that a large cloud’s size has the ability to repel ______ and DDoS attacks better than smaller systems do. |
A. | sniffers |
B. | botnets |
C. | trojan horse |
D. | all of the mentioned |
Answer» C. trojan horse | |
1308. |
Cutting latency in half requires ______ times the number of nodes in a system. |
A. | two |
B. | three |
C. | three |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
1309. |
How many laws exist for Cloudonomics by Weinman? |
A. | 4 |
B. | 5 |
C. | 10 |
D. | 15 |
Answer» D. 15 | |
1310. |
A _____ is a facility that is a self-contained semiconductor assembly line. |
A. | fab |
B. | touch |
C. | rep |
D. | all of the mentioned |
Answer» B. touch | |
1311. |
_______ blurs the differences between a small deployment and a large one because scale becomes tied only to demand. |
A. | Leading |
B. | Pooling |
C. | Virtualization |
D. | All of the mentioned |
Answer» C. Virtualization | |
1312. |
_______ enables batch processing, which greatly speeds up high-processing applications. |
A. | Scalability |
B. | Reliability |
C. | Elasticity |
D. | Utility |
Answer» B. Reliability | |
1313. |
_______ feature allows you to optimize your system and capture all possible transactions. |
A. | scalability |
B. | reliability |
C. | elasticity |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
1314. |
_______ is a pay-as-you-go model matches resources to need on an ongoing basis. |
A. | Utility |
B. | Elasticity |
C. | Low barrier to entry |
D. | All of the mentioned |
Answer» B. Elasticity | |
1315. |
Which of the following is most refined and restrictive service model ? |
A. | IaaS |
B. | CaaS |
C. | PaaS |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
1316. |
When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. |
A. | SaaS |
B. | PaaS |
C. | IaaS |
D. | All of the mentioned |
Answer» B. PaaS | |
1317. |
A service that concentrates on hardware follows the _________ as a Service model. |
A. | IaaS |
B. | CaaS |
C. | PaaS |
D. | All of the mentioned |
Answer» B. CaaS | |
1318. |
Applications that work with cloud computing that have low margins and usually low risk are : |
A. | high touch |
B. | low touch |
C. | moderate touch |
D. | all of the mentioned |
Answer» C. moderate touch | |
1319. |
Which of the following is one of the unique attribute of Cloud Computing ? |
A. | utility type of delivery |
B. | elasticity |
C. | low barrier to entry |
D. | all of the mentioned |
Answer» E. | |
1320. |
Which of the following architectural standards is working with cloud computing industry ? |
A. | Service-oriented architecture |
B. | Standardized Web services |
C. | Web-application frameworks |
D. | All of the mentioned |
Answer» B. Standardized Web services | |
1321. |
You can’t count on a cloud provider maintaining your _____ in the face of government actions. |
A. | scalability |
B. | reliability |
C. | privacy |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
1322. |
Which of the following is most important area of concern in cloud computing ? |
A. | Security |
B. | Storage |
C. | Scalability |
D. | All of the mentioned |
Answer» B. Storage | |
1323. |
Cloud computing is a _______ system and it is necessarily unidirectional in nature. |
A. | stateless |
B. | stateful |
C. | reliable |
D. | all of the mentioned |
Answer» B. stateful | |
1324. |
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. |
A. | propagation |
B. | latency |
C. | noise |
D. | all of the mentioned |
Answer» C. noise | |
1325. |
The _____ is something that you can obtain under contract from your vendor. |
A. | PoS |
B. | QoS |
C. | SoS |
D. | All of the mentioned |
Answer» C. SoS | |
1326. |
Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage ? |
A. | On-demand self-service |
B. | Broad network access |
C. | Resource pooling: |
D. | All of the mentioned |
Answer» B. Broad network access | |
1327. |
Which of the following was one of the top 5 cloud applications in 2010 ? |
A. | Cloud backup |
B. | Web applications |
C. | Business applications |
D. | All of the mentioned |
Answer» E. | |
1328. |
Which of the following is IaaS service provider ? |
A. | EC2 |
B. | EC1 |
C. | EC10 |
D. | Hybrid |
Answer» B. EC1 | |
1329. |
CaaS stands for _____________ as service. |
A. | Compliance |
B. | Computer |
C. | Community |
D. | Communication |
Answer» E. | |
1330. |
The three different service models is together known as the _____ model of cloud computing. |
A. | SPI |
B. | SIP |
C. | CPI |
D. | All of the mentioned |
Answer» B. SIP | |
1331. |
How many types of service model are mainly present in Cloud ? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
1332. |
_______ is a complete operating environment with applications, management, and the user interface. |
A. | IaaS |
B. | SaaS |
C. | SaaS |
D. | All of the mentioned |
Answer» C. SaaS | |
1333. |
Which of the following provides development frameworks and control structures ? |
A. | IaaS |
B. | SaaS |
C. | PaaS |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
1334. |
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets |
A. | IaaS |
B. | SaaS |
C. | PaaS |
D. | All of the mentioned |
Answer» B. SaaS | |
1335. |
Which of the following is owned by an organization selling cloud services ? |
A. | Public |
B. | Private |
C. | Community |
D. | Hybrid |
Answer» B. Private | |
1336. |
A hybrid cloud combines multiple clouds where those clouds retain their unique identities, but are bound together as a unit. |
A. | Public |
B. | Private |
C. | Community |
D. | Hybrid |
Answer» E. | |
1337. |
__________ cloud is one where the cloud has been organized to serve a common function or purpose. |
A. | Public |
B. | Private |
C. | Community |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
1338. |
The ________ cloud infrastructure is operated for the exclusive use of an organization. |
A. | Public |
B. | Private |
C. | Community |
D. | All of the mentioned |
Answer» C. Community | |
1339. |
________ dimension corresponds to two different states in the eight possible cloud forms. |
A. | Physical location of data |
B. | Ownership |
C. | Security boundary |
D. | None of the mentioned |
Answer» E. | |
1340. |
Which of the following is related to service provided by Cloud ? |
A. | Sourcing |
B. | Ownership |
C. | Reliability |
D. | AaaS |
Answer» B. Ownership | |
1341. |
__________is a measure of whether the operation is inside or outside the security boundary or network firewall. |
A. | Per |
B. | P |
C. | Pre |
D. | All of the mentioned |
Answer» E. | |
1342. |
Which of the following is provided by ownership dimension of Cloud Cube Model ? |
A. | Proprietary |
B. | Owner |
C. | P |
D. | All of the mentioned |
Answer» C. P | |
1343. |
How many types of security boundary values exist in Cloud Cube model ? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | None of the mentioned |
Answer» C. 3 | |
1344. |
Which of the following dimension is related to organization’s boundaries ? |
A. | Physical location of data |
B. | Ownership |
C. | Security boundary |
D. | All of the mentioned |
Answer» B. Ownership | |
1345. |
How many types of dimensions exists in Cloud Cube Model ? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» E. | |
1346. |
_______ model attempts to categorize a cloud network based on four dimensional factors. |
A. | Cloud Square |
B. | Cloud Service |
C. | Cloud Cube |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
1347. |
The __________ model originally did not require a cloud to use virtualization to pool resources. |
A. | NEFT |
B. | NIST |
C. | NIT |
D. | All of the mentioned |
Answer» C. NIT | |
1348. |
Which of the following is best known service model ? |
A. | SaaS |
B. | IaaS |
C. | PaaS |
D. | All of the mentioned |
Answer» E. | |
1349. |
Which of the following is deployment model ? |
A. | public |
B. | private |
C. | hybrid |
D. | all of the mentioned |
Answer» E. | |
1350. |
________ refers to the location and management of the cloud’s infrastructure. |
A. | Service |
B. | Deployment |
C. | Application |
D. | None of the mentioned |
Answer» C. Application | |