Select Category
All Categories
Accounting
Agriculture
Astrobiology
Banking & Finance
Business World
Civilizations
Commerce & Economics
Computer Science & IT
Current affairs
Earth Science
Education
Environment
Explore the Animal World
Food chain
General Knowledge
Geography Map
Green Life
History
Human Health
Journalism
Law
Science
Social Science
TAX
About Us
Contact Us
Login
Claud Computing - part 12
1
of
25
Q1. A disadvantage of Cloud Storage
A. Hackers can’t see your documents because they are too high up in the sky
B. Hackers will never be able to get hold of your documents
C. Your Coud Storage provider may be targetted by hackers
Q2. Identify the cloud application that can be used for sports teams schedule
A. Gmail
B. Calender Hub
C. eteemz
D. Google docs
Q3. Simple Cloud, jclouds and Libcloud are all examples of:
A. Vendor-specific cloud APIs
B. Cross-platform APIs
C. IaaS APIs
D. Apache APIs
Q4. Whichofthefollowinghasmanyfea- tures of that is now known as cloud computing?
A. Web Service
B. Softwares
C. Hardwares
D. Internet
Q5. Thisisasoftwaredistributionmodel in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet.
A. Software as a Service (SaaS).
B. Infrastructure as a Service (IaaS)
C. Platform as a Service (PaaS)
Q6. ___has many of the characteristics ofwhatisnowbeingcalledcloudcom- puting.
A. Internet
B. Softwares
C. Web Service
D. All of the mentioned
Q7. What is a Virtual Private Network (VPN)?
A. A secured connection for remote access to a local area network
B. Asecured private cloud for a single user
C. A virtual network device for pri vate purposes
D. An operating system for private network systems
Q8. Which of the following types of cloud computing would be MOST ap propriate if an organization required complete control of the environment?
A. Hybrid Cloud
B. Community cloud
C. Public cloud
D. B
Q9. 2___ serves as a PaaS vendor within Google App Engine system.
A. Google
B. Amazon
C. Microsoft
Q10. Cloud Deployment Model
A. Private
B. Public
C. Public, Private, Hybrid
D. Hybrid
Q11. Which refers to the practice of a pri- mary cloudprovider offering services that are distributedthrough another cloud provider?
A. Hybrid cloud
B. Composite cloud
C. Virtualization
D. Grid computing
Q12. Easy to share information: You can shareinformationwithcolleaguesand employees far more easily using the cloud.
A. True
B. False
Q13. ___is a method of problem solving, regularlyappliedtorepairfailedprod- ucts or procedures.
A. Upgrading
B. Troubleshooting
C. Calibration
D. Overhauling
Q14. Cloud computing offers addi- tional flexibility through the typical ___associated with data storage
A. software-as-you-go cost structure
B. hardware-as-you-go cost structure
C. cloud-based solutions
D. pay-as-you-go cost structure
Q15. Alternative to physical data centre can be realized using
A. SaaS
B. IaaS
C. PaaS
D. CaaS
Q16. ___model attempts to categorize a cloud network based on four dimensional factors.
A. Cloud cube
B. Cloud service
C. All
D. Base Camp
Q17. Which of these is are examples of a Microblog or a Vlog Community?
A. Twitter
B. Skype
C. YouTube
Q18. Runninga ___ programinvolvesrun- ning mapping tasksyon many or all of the nodes in our cluster.
A. MapReduce
B. Map
C. Reducer
D. All of the mentioned
Q19. Companies only have to pay a small fee (money) every month to use these a services.
A. Advantage of Cloud Computing
B. Disadvantage of Cloud Computing
Q20. Whichofthefollowingclouddeploy- ment methods typically offers no se- e curity?
A. Hybrid Cloud
B. Public Cloud
C. Community Cloud
D. Private Cloud
Q21. Which encryption benchmark en- sures data is not modified after it’s transmitted and before it’s received?
A. Confidentiality
B. Integrity
C. Availability
D. Symmetric
Q22. What is the slave daemon of Map reduce?
A. Data Node
B. NameNode
C. Task Tracker
D. Node Manager
Q23. Amazon Elastic Compute Cloud (EC2) is primarily considered which type of cloud computing model?
A. Software as a service (SaaS)
B. Platform as a service (PaaS)
C. Infrastructure as a service (IaaS)
Q24. Application related security issues are-
A. Cloud malware injection attack
B. Cookie poisoning
C. Hidden Field Manipulation
D. All of the above
Q25. Software as a Service is considered to be included in whichcloud comput- ing layer?
A. Data
B. Client
C. Application
D. Infrastructure
Submitting Your Quiz...
Please wait while we process your answers