Cloud Computing MCQ Quiz 4

cloud computing mcq

Question 1. Which of the following is a billing and account management service?

(A) Multi-Factor Authentication

(B) Amazon DevPay

(C) Amazon Mechanical Turk

(D) Amazon Elastic MapReduce

View Answer
(B) Amazon DevPay

Question 2. Which of the following area of cloud computing is uniquely troublesome?

(A) e-Discovery for legal compliance

(B) Data integrity

(C) Auditing

(D) All of the mentioned

View Answer
(D) All of the mentioned

Question 3. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

(A) SAC

(B) CSA

(C) CAS

(D) All of the mentioned

View Answer
(C) CAS

Question 4. Which of the following has infrastructure security managed and owned by the vendor?

(A) Public

(B) Private/Community

(C) Hybrid

(D) None of the mentioned

View Answer
(B) Private/Community

Question 5. Which of the following is the machinery for interacting with Amazon’s vast product data and eCommerce catalog function?

(A) Alexa Web Information Service

(B) Amazon Associates Web Services

(C) Amazon Elastic Compute Cloud

(D) All of the mentioned

View Answer
(B) Amazon Associates Web Services

Question 6. Which of the following is not the feature of Network management systems?

(A) Performance

(B) Security

(C) Accounting

(D) None of the mentioned

View Answer
(D) None of the mentioned

Question 7. Which of the following is the operational domain of CSA(Cloud Security Alliance)?

(A) Flexibility

(B) Portability and interoperability

(C) Scalability

(D) None of the mentioned

View Answer
(B) Portability and interoperability

Question 8. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

(A) IaaS

(B) PaaS

(C) SaaS

(D) All of the mentioned

View Answer
(B) PaaS

Question 9. Point out the wrong statement.

(A) Any security mechanism above the security boundary must be maintained by the custome

(B) Any security mechanism below the security boundary must be built into the system

(C) Each different type of cloud service delivery model creates a security boundary

(D) All of the mentioned

View Answer
(D) All of the mentioned

Question 10. Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?

(A) Amazon Cloudfront

(B) Amazon SimpleDB

(C) CloudWatch

(D) All of the mentioned

View Answer
(B) Amazon SimpleDB

Question 11. Which of the following service provider provides the least amount of built in security?

(A) IaaS

(B) PaaS

(C) SaaS

(D) All of the mentioned

View Answer
(A) IaaS

Question 12. Which of the following is considered an essential element in cloud computing by CSA?

(A) Virtualization

(B) Identity and access management

(C) Multi-tenancy

(D) All of the mentioned

View Answer
(C) Multi-tenancy

Question 13. Which of the following model allows vendor to provide security as part of the Service Level Agreement?

(A) IaaS

(B) PaaS

(C) SaaS

(D) All of the mentioned

View Answer
(C) SaaS

Question 14. Point out the wrong statement.

(A) Amazon Machine Instances are sized at various levels and rented on a computing/hour basis

(B) A number of tools are used to support EC2 services

(C) The metrics obtained by CloudWatch may be used to enable a feature called Auto Scaling

(D) None of the mentioned

View Answer
(D) None of the mentioned

Question 15. Point out the correct statement.

(A) EC3 is an Analytics as a Service provider

(B) SimpleDB interoperates with both Amazon EC2 and Amazon S3

(C) Amazon Elastic Cloud is a system for creating virtual disks(volume)

(D) None of the mentioned

View Answer
(B) SimpleDB interoperates with both Amazon EC2 and Amazon S3 

Question 16. Point out the correct statement.

(A) Data should be transferred and stored in an encrypted format for security purpose

(B) Adapting your onpremises systems to a cloud model requires that you determine what security mechanisms are required

(C) Different types of cloud computing service models provide different levels of security services

(D) All of the mentioned

View Answer
(D) All of the mentioned

Question 17. Which of the following is used for Web performance management and load testing?

(A) Tapinsystems

(B) Univa UD

(C) Webmetrics

(D) VMware Hyperi

View Answer
(C) Webmetrics

Question 18. Which of the following cloud does not require mapping?

(A) Hybrid

(B) Private

(C) Public

(D) None of the mentioned

View Answer
(C) Public

Question 19. Which of the following model type is not trusted in terms of security?

(A) Hybrid

(B) Private

(C) Public

(D) None of the mentioned

View Answer
(C) Public

Question 20. Which of the following allows you to create instances of the MySQL database to support your Web sites?

(A) Amazon Simple Storage System

(B) Amazon Relational Database Service

(C) Amazon Simple Queue Service

(D) Amazon Elastic Compute Cloud

View Answer
(B) Amazon Relational Database Service

Question 21. Which of the following services that need to be negotiated in Service Level Agreements? 

(A) Regulatory compliance

(B) Auditing

(C) Logging

(D) All of the mentioned

View Answer
(D) All of the mentioned

Question 22. Which of the following service provider provides the highest level of service?

(A) IaaS

(B) PaaS

(C) SaaS

(D) All of the mentioned

View Answer
(C) SaaS

Question 23. Which of the following service model is owned in terms of infrastructure by both vendor and customer? 

(A) Hybrid

(B) Private

(C) Public

(D) None of the mentioned

View Answer
(A) Hybrid

Question 24. Point out the correct statement. 

(A) SaaS is an operating environment with applications, management, and the user interface

(B) IaaS adds application development frameworks, transactions, and control structures

(C) PaaS supplies the infrastructure

(D) All of the mentioned

View Answer
(A) SaaS is an operating environment with applications, management, and the user interface

Question 25. Which of the following is an edge-storage or content-delivery system that caches data in different physical locations? 

(A) Amazon Associates Web Services

(B) Amazon Cloudfront

(C) Amazon SimpleDB

(D) Amazon Relational Database Service

View Answer
(B) Amazon Cloudfront

Question 26. Point out the wrong statement.

(A) Cloud computing doesn’t have vulnerabilities associated with Internet applications

(B) Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network

(C) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage

(D) All of the mentioned

View Answer
(A) Cloud computing doesn’t have vulnerabilities associated with Internet applications