Cloud Computing MCQs
1. Which of the following is not a type of cloud
a)Private
b)Protected
c)Public
d)Hybrid
2. In this type of cloud ,an organization rents cloud services from cloud providers on demand basis
a)Private
b)Protected
c)Public
d)Hybrid
3. In this type of cloud, cloud is composed of multiple internal or external cloud
a)Private
b)Protected
c)Public
d)Hybrid
4. Saas stands for
a)Software as service
b)System as service
c)stakeholders as service
d)system software and service
5. Iaas stands for a)income as a service
b) Infrastructure as a service
c) income as a software
d) image as a service
6. Which of the following is not a service models
a)Saas
b)Iaas
c)Paas
d)AaaS
7. Which of the following cloud concept is related to pooling and sharing of resources
a) Polymorphism
b)Abstraction
c)Virtualization
d)none of the above
8. Which of the following is a cloud platform for Amazon
a)Azure
b) AWS
c) Casendra
d) All of the above
9. Which of the following pricing model used for cloud computing
a)Free
b)Subscription
c)Pay per use
d)none of the above
b) modulation
c)virtualization
d)none of the above
11. Following statements defines
cloud computing vision
1.I can invest in infrastructure as I have just started my business
2.I have infrastructure and middleware and I can host applications
a)only statement 1 is
true
b)only
statement 2 is true
c)statements 1 and 2 are true
d)both statements are wrong
12.
Following statements defines cloud computing vision
1. I want to focus on application logic and not maintenance and scalability issues
2.I have a surplus of infrastructure that I want to make use of '
a)only statement 1 is true
b)only statement 2 is true
c)statements 1 and 2 are true
d)both statements are wrong
13. Following statements defines cloud computing vision
1.I want to access and edit my documents and photos from anywhere
2.I have infrastructure to provide application services
a)only statement 1 is true
b)only statement 2 is true
c)statements 1 and 2 are true
d)both statements are wrong
14.
Google documents, facebook are example of
a)Software as a service
b)Platform as a service
c)Infrastructure as a service
d)All of the above
15. Windows Azure and Hadoop are example of
a)Platform as a service
b)Infrastructure as a service
c)Software as a service
d)none
of the above
16. Amazon,EC2,S3 are examples of
a)Infrastructure as a service
b)Software as a service
c) Platform as a service
d) can not say
17. Cloud computing has some characteristics which are as follows
1.no upfront commitments
2. On demand access
3.nice pricing
a) All three statement are correct
b)
Only 1 statement is correct
c)
All three statements are false
d) Only statement 3 is true
18.
computing
proposed a new approach to access large computational power, variety of services.
a)cluster b)distributed c)grid
d)all the above
19.
allows the
abstraction of some of the fundamental elements for computing like hardware
a)virtualization b)cluster
c)network
d) none of the above
20. Virtualized environment contains following components
a)guest
b)host
c)Virtualization layer
d)All the above
21.
The component
represents the system component that interacts with the virtualization layer
a)host
b)Virtualization layer
c)guest
d)target
22. The component represents the original environment where the guest is supposed to be managed.
a)Virtualization layer
b)guest
c)target
d)host
23. The component is responsible for recreating the same or a different environment where the guest will operate.
a)target
b)host
c)Virtualization layer
d)guest
24. The virtualization layer is also called
a)host b)guest c)target
d)Virtual Machine manager
25.
Type I hypervisor is also called
a)bare metal
b)native
c) bare
metal or native d)hosted
26.
Type II hypervisor is also called
a) native
b)
bare metal or native
c)hosted
d)bare
metal
27. Consider the following statement
1. Virtual environment is
created by software programs
2. The ability
of emulate by a software creates a lot of opportunities . The above statement
defines the characteristics of virtualization
a)only statement 1 is true
b)only
statement 2 is true c)statement 1 and 2 are true d)both statements are false
85.Consider the following statement
1. The virtual
machine represents an emulated environment in which guest is executed
2. All the
operations of the guest are generally performed against the virtual machine
The above statement discusses the characteristic
of virtualization
a)Increased
Security b)Managed Execution c)sharing d)aggregation
86. Virtualization of the
execution environment
Allows increase security and
implementation of other features like ------------
------------------------
a)sharing
b)emulation c)isolation d)all the above
87. allows the
creation of separate computing environment
with the same host
a)virtualization
b)hardware c)inserting
d)none of the above
88. The feature of virtualization
helps to reduce the number of active servers and limit power consumption.
a)Managed
Execution b)sharing c)aggregation d)Emulation
89. When a
group of separate host can be tied together and represented to guests as a single virtual host is this feature is termed as ----------------
a)sharing
b)aggregation c)Emulation d)isolation
90. Guests are
executed within an environment that is controlled by virtualization layer is possible due to feature.
a)sharing
b)aggregation c)Emulation d)isolation
91. feature of
virtualization allows multiple guest to run on the same host without each of
them interfering with the other.
a)sharing
b)aggregation c)Emulation d)isolation
92. capability
is used to control the performance of the guest by finely tuning the properties
of the resources exposed through the virtual
environment
a)sharing
b)aggregation c)Emulation d)performance tuning
93. In case of hardware virtualization , the guest is
packaged into a virtual image that
can be safely moved and executed on top of different virtual machines is define feature
a)aggregation
b)Emulation c)performance tuning d)Portability
94.
The virtualization is used to emulate
a)Environment
execution b)storage
c) Network
d) All of the above
95. type of
virtualization is categorise into System level and process level
a)Environment
execution b)storage
c) Network
d) none of the above
96. level of
techniques are implemented on top of an existing operating system which has
full control of hardware.
a)
process level
b) System
level c)Library d)reference model
97. level of
technique are implemented directly on hardware and do not require or requite minimum
support from existing operating system
a) process level
b) System
level c)Library d)reference model
98. Process
level technique can be categorised into other levels which are as
a)Emulation
b)High-Level VM
c)Multiprogramming d)All of the above
99. System
level technique can be categorised into other levels which are as
a) Hardware assisted Virtualization
b) Full
virtualization c)Paravirtualization d)All
the above
100. Partial
Virtualization is a sub category of level
a)System level
b) Process level
c) user level
d) none of the above
101. virtualization
includes all those techniques whose aim is to emulate an execution environment
that is separate from the one hosting the virtualization layer.
a)storage
b)network c)Execution d)Application
102. Virtualizing
an execution environment at different levels of
the computing stack requires a model
which defines the interface.
a)reference
b)contact c)different d)parallel
103. 103.
In
the Machine reference model at the bottom layer the model for the hardware is expressed in terms of the
.
a) Instruction
Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
104.
defines
instruction set for the Processor,Registers,Memory and Interrupts management. a)Instruction Set Architecture
b) Application
Binary Interface c)Application Programming Interface
d)Instruction Set Area
105. ISA is the interface
between and
a)Hardware
,software b)processor,memory c)hardware,memory d)software,processor
106. separates
the operating system layer from the applications and libraries, which is
managed by the OS.
a)Instruction
Set Architecture b)Application Binary Interface c)Application Programming
Interface d)Instruction Set Area
107. covers
details such as low-level data types,alignment,call conventions and defines a
format for executable programs.
a) Instruction
Set Architecture b)Application Binary Interface c)Application Programming Interface d)Instruction Set Area
108. The highest
level of abstraction is represented by ,Which
interfaces applications to libraries and operating system. a)Instruction Set Architecture
b) Application
Binary Interface c)Application Programming Interface
d)Instruction Set Area
109. The
high-level abstraction is converted into instruction
to perform the actual operations
supported by the processor.
a)
Machine level
b) Binary level
c) Assembly level
d) Base level
110. Mention the
machine-level resources that are used to perform the operation in the hardware level of CPU.
a)
Processor,registers
b) main memory
c) a and b both
d) none of the above
111. JVM stands
for a)Java Virtual Machine
b)
Java very Machine
c) Just Virtual Machine
d) none of the above
112. instruction
can be used without interfering with other task because they do not access
shared resources.
a) non-privileged b)privileged c)assembly d)library
113. non-privileged
instruction contains following types of instructions a)all the floating instructions
b) fixed point
instruction c)arithmetic instruction
d)All of the above instruction
114. instructions
are those that are executed under specific restrictions and are mostly used for
sensitive operations.
a) non-privileged b)privileged c)assembly d)library
115. In the ring
based security ring is
in most privileged level a)1
b) 2
c) 3
d) 0
116. In the ring
based security ring is
in least privileged level a)1
b) 2
c)
3
d) 0
117. In the ring
based security ring is
used by the kernel of the OS a)2
b)
1
c)
3
d)
0
118..In
the ring based security ring and
are used by the OS level services.
a)
1 and 2
b) 0 and 1
c) 2 and 3
d) 1 and 4
119..In the ring based security ring is
used by the user. a)3
b) 2
c)
1
d) 0
120. Recent
systems support only two levels ring 0 for supervisor mode and ring 3 for mode.
a)student
b)customer c)user d)manager
121. In mode all the instructions can
be executed without any restriction.
a) user b)supervisor c)superuser d)manager
122. The supervisor
mode is also called mode
or kernel mode. a)user 1
b) high
c)master d)main
123. Kernel level mode is used by
the operating system to perform
operations on
hardware resources. a)sensitive
b)floating
c)arithmetic d)special
124. In mode there are restrictions to
control the machine level resources.
a)user b)high
c)master d)main
125. When code
running in user mode invokes the privileged instructions hardware occurs and trap the
potentially harmful execution of the instruction.
a)call
b)interrupts c)abort
d)none of the above
126. level
virtualization is a technique that provides an abstract execution environment
in terms of computer hardware.
a) software b)hardware c)network d)data
127. For Hardware level virtualization
1. Guest is
represented by the operating system, host is represented by physical computer hardware
2. Virtual
machine by its emulation, VMM by the hypervisor
a)both statements are wrong
b) both
statements are true c)statement 1 is
correct d)statement 2
is correct
128. Consider following statements
1.A fundamental element of
hardware virtualization is hypervisor
2.It creates a
hardware environment , where guest operating systems are installed
a)
both statements are true
b) statement 1
is true and statement 2 is false
c)statement 2 is true and statement 1 is false d)both statements are false
28.
Virtualization is possible due to
a)system
b)hypervisor
c) user
d)none of the above
29.
There are
major types of
hypervisors. a)one
b)two c)three
d)four
30.
hypervisor run directly on
top of the hardware a)Type I
b) Type II
c) Type 3
d) Type 4
31.
hypervisors
require the support of an operating system to provide virtualization services.
a) Type I
b) Type II
c)
Type a
d) Type b
135 hypervisors includes ESXI,
Microsoft Hyper -V,citrix xen server a)Type I
b)
Type II
c) Type a
d) Type b
136. Examples of
hypervisors are
parallel desktop. a)Type I
b)
Type II
c) Type a
d) Type b
137. property
says a guest running under the control of a virtual machine manager should
exhibit the same behavior as when executed directly on the physical host.
a)Equivalence
b)Resource Control c)Efficiency d)performance
138. property
says that virtual machine manager should be in complete control of virtualized resources.
a)Equivalence
b)Resource Control c)Efficiency d)performance
139. property
defines A statistically dominant fraction of the machine instruction should be
executed without intervention from the virtual
machine manager.
a)Equivalence
b)Resource Control c)Efficiency d)performance
140. virtualization
refers to a case where hardware provides architectural support for building a
virtual machine manager able to run a
guest operating system in complete isolation.
a) full
b) hardware assisted c)paravirtualization d)partial
141. virtualization
refers to the ability of running a program,
most likely an operating system ,on top of virtual machine and without any
modification as it is running on raw hardware
a) full
b) hardware assisted c)paravirtualization d)partial
142. The aim of virtualization is to provide the capability
to demand the execution of performance critical operation directly on
host,preventing performance losses due to managed execution.
a) full
b) hardware assisted c)paravirtualization d)partial
143. virtualization
provides a partial emulation of the underlying hardware, not allowing the
complete execution of the guest
operating system in complete isolation.
a) full
b) hardware assisted c)paravirtualization d)partial
144. level
virtualization offers the opportunity to create different and separated
execution environment for applications that are managed concurrently.
a) full
b) hardware assisted c)paravirtualization d)operating system
145. level
virtualization is used for achieving ease of deployment of applications,
managed execution and portability across
different platforms and operating system.
a) full
b) hardware assisted c)partial
d)Programming -Language
146. virtualization
allows application to run on runtime environments which do not natively support
all the features required by such
application.
a)
full
b) Application-Level c)partial
d)Programming
-Language
147. By using virtualization
users do not have to be worried about the specific location of their data,
which can be identified by using
logical path.
a) partial
b) hardware assisted c)Storage
d)Programming
-Language
148. virtualization
combines hardware appliances and specific software for the creation and
management of virtual network
a)Network
b)hardware assisted c)Storage
d)Programming -Language
149. virtualization
abstracts the desktop environment available on a personal computer in order to
provide access to it by using a
client-server approach
a)Desktop
b)hardware assisted c)Storage
d)Programming -Language
150. KVM stands for
a) kernel via machine
b) kernel based virtual machine
c) kernel based virus machine
d) kernel
based various machine 151.Identify
the logo
a)openstack
b)close stack c)virtualstack d)none of the above
152. Total
number of components available in openstack are in
number.
a) 5
b) 4
c)
9
d) 8
153. is the
primary computing engine behind openstack a)Nova
b)Swift
c)Neutron d)Cinder
154The openstack . provides
support for storing and retrieving data in cloud.
a)Swift
b)Neutron c)Cinder d)Horizon
155. The Openstack provides persistent block storage for compute instances
a)Swift b)Neutron c)Cinder d)Horizon
156. The Open
stack networking service provides various
networking services to cloud users.
a)Neutron b)swift c)Cinder d)Horizon
157. The Openstack
Dashboard provides
a web based interface for both cloud administrators and cloud tenants/
a)Swift
b)Neutron c)Cinder d)Horizon
158.
The Openstack Image service provides disk image management services, including
image discovery.
a)glance
b)Neutron c)Cinder d)Horizon
159. The
openstack Identity service is shared service that provides authentication
and authorization services throughout the entire
cloud infrastructure.
a)glance
b)Neutron c)Keystone d)Horizon
160. In openstack provides metering and monitoring openstack
components.
a)glance
b)Ceilometer c)Cinder d)Horizon
161. In openstack provides template based cloud application orchestration for openstack environment
a)glance
b)Neutron c)Cinder d)Heat
162 Openstack uses message queues based on the
a)AMQP b)IMPQ
c)AMPQ
d)none
of the above
163-165.Match the column for
project and code name
Part A |
Part B |
||
1 |
Compute |
a |
Swift |
2 |
Networking |
b |
Nova |
3 |
Object Storage |
c |
Neutron |
a)1-b,2-c,3-a
b)1-c,2-b,3-a
c)1-a,2-c,3-b
d)not a proper match available
166-168.Match the column for project
and code name
Part A |
Part B |
||
1 |
Block Storage |
a |
Keystone |
2 |
Identity |
b |
Cinder |
3 |
Image service |
c |
Glance |
a)1-a,2-b,3-c
b)1-b,2-a,3-c
c)1-c,2-c,3-b
d)1-b,2-c,3-a
169-171 Match the column for project and code name
Part A |
Part B |
||
1 |
Dashboard |
a |
Heat |
2 |
Telemetry |
b |
Horizon |
3 |
Orchestration |
c |
Ceilometer |
a)1-a,2-b,3-c
b)1-a,2-c,3-b
c)1-b,2-c,3-a
d)1-c,2-b,3-a
172. was created
to make the job of deploying openstack in
test and development environment
a) Devstack
b)bash c)Framework
.d)Dellstack
173.There are
following ways to interface with Openstack
a)Openstack Dashboard
b) Openstack
CLI c)Openstack API d)none of the above
174. means that
a single instance of the software and its supporting infrastructure serves
multiple customers
a) single tenancy
b) multi tenancy c)user
d)target
175.The Deployment models for
cloud are
a)public b)private
c)hybrid
d)All the above
176.The cloud is third party
multitenant cloud infrastructure and services and available on subscription
basis to all
a) public
b)private c)hybrid d)permanent
177. cloud model within company’s own datacenter for
internal use. a)public
b) private
c)hybrid d)permanent
178.Mixed type of cloud is
termed as
a)public
b)private c)hybrid d)permanent
179.
solutions
deliver infrastructure on demand in the form of virtual hardware, storage, networking
a) Software as a Service
b) Platform as
a Service c)Infrastructure as Service d)none
of the above
180.
solutions
deliver scalable and classic runtime environments on demand .
a) Software as a Service
b) Platform as
a Service c)Infrastructure as Service d)none
of the above
181 solutions
provide applications and services on demand. a)Software as a Service
b)Platform as a
Service c)Infrastructure as Service d)none of the above
182. Following
are the examples of Web2.0 applications
a)Google document, google maps
b)Facebook,
Twitter c)Blogger Wikipedia
d)All of the above
183. RSS indicates
a) Really simple syndication
b) Rare simple system
c) Rare Simple Syndication
d) Really Simple System
184. Service
Oriented computing introduces concepts Which are also fundamental to cloud computing
a)One b)Two
c)Three d)Four
185. identifies
a set of functional and non functional attributes that can be used to evaluate
the behavior of a service from different perspective
a)Quality of
Service b)SLA
c) Software as a Service
d)
quantity of service
186. QoS requirements are
established between the client and provide via
which identifies the minimum value. a)Service level agreement
b)
Software as a Service
c) quantity of service
d) none of the above
187. EC2 stands for
a) Elastic Compute Cloud
b) Elastic Cloud Compute
c) Elastic comute count
d) Electric Compute cloud
188. S3 stands
for a)Simple Storage service
b)
Single Storage Service
c) Simple Storage sector
d) Simple Storage System
189. is an
implementation of mapreduce. a)Hadoop
b)Azure
c)Force.com d)App engine
190. is a cloud
computing platform for developing social enterprise application.
a)Hadoop b)Azure
c)Force.com d)App engine
Study the diagram
191. Hosted Architecture is of
HyerVisor 192.Bar metal is of HyperVisor
a)
Type I
b) Type II
c) Type a
d) Type b
No comments: