Cloud Computing MCQ Questions and Answers pdf tutorial for preparation of MCA, BCA, IT competitive and academic examinations.
Cloud Computing MCQ Questions and Answers
1. Cloud computing is a natural evolution of the extensive adoption of ___, service-oriented architecture, autonomic, and utility computing.
A) virtualization
B) utility
C) non-virtualized
D) distributed
Answer: (A)
2. ___ is a system of networked machine aggregation hardware where information is stored on multiple virtual servers rather than being hosted on a single hard server.
A) Cloud
B) Cloud storage
C) Cloud Service
D) None of the above
Answer: (B)
3. Google Apps is a suite of cloud computing ___ applications that includes e-mail (Gmail),
Organizer (Google Calendar), Word Processing documents (Google Docs), and others.
A) IaaS
B) PaaS
C) SaaS
D) None of the Above
Answer: (C)
4. Which of the following is among the primary uses of cloud computing?
A) security
B) data storage
C) data privacy
D) operational cost
Answer: (B)
5. For businesses, the greatest value of IaaS is through a concept known as ___ which is a process of offloading tasks to the cloud during times when the most compute resources are needed.
A) cloud bursting
B) cloud enabler
C) cloud spanning
D) cloud portability
Answer: (A)
6. ___ allows you to leverage the seemingly infinite compute resources of cloud infrastructure.
A) IaaS
B) SaaS
C) CaaS
D) PaaS
Answer: (D)
7. Which of the following has three delivery models? Infrastructure as a Service, Platform as a
Service, and Software as a Service,
A) cloud provider
B) cloud service
C) cloud enabler
D) None of the Above
Answer: (B)
8. The main four metrics that could support cloud companies in assessing their service capabilities and developing them are quantity, performance, ___ and quality
A) assurance
B) empathy
C) value
D) responsiveness
Answer: (C)
9. ___ is responsible for evaluating their sourcing strategies to fully consider cloud computing solutions
A) The Office of Management and Budget (OMB)
B) Federal CIO Council
C) General Service Administration (GSA)
D) Agencies
Answer: (D)
10. ___ resources to cloud servers can be a costly mistake.
A) Over-allocating
B) under-allocating
C) Over-allocating or under-allocating
D) None of the Above
Answer: (C)
11. Which of the following is NOT among the building blocks of the best practices every successful cloud computing platform should follow?
A) World-class security
B) Complete disaster recovery
C) High availability
D) Resource Utilization
Answer: (D)
12. ___ refers to cloud users being able to take their tools, applications, virtual images, etc. and use them in another cloud environment without having to do any rework.
A) portability
B) Interoperability
C) Multitenancy
D) None of the Above
Answer: (C)
13. In computing, a ___ is a term used with respect to user interfaces to describe ways in which the virtual space of a computer’s desktop environment is expanded beyond the physical limits of the screen’s real estate through the use of the software.
A) virtual desktop
B) virtualization
C) Both of the Above
D) None of the Above
Answer: (A)
14. In which of the following, the user runs a session on a server that runs as a single instance of the Windows operating system with multiple sessions?
A) Operating-system streaming
B) Virtual Desktop Infrastructure (VDI)
C) session-based computing
D) PC blade
Answer: (C)
15. In ___, no matter what the client environment is, the activities within that container need to be registered, monitored, and tracked based on both the hardware itself, the software that runs on the platform, and how various groups use it.
A) Application monitoring
B) Service monitoring
C) Change management
D) Asset management
Answer: (D)
16. The ___ system reduces the risk of data loss and speeds up recovery times when failures occur.
A) online recovery
B) automated backup
C) software recovery
D) differential backup
Answer: (B)
17. ___ sets down what policies people are responsible for and puts in place means to determine whether the responsible person or group has, in fact, acted responsibly and done the right thing.
A) Administrator
B) Governance
C) Both (A) and (B)
D) None of the above
Answer: (B)
18. In cloud computing, you need to measure the impact of IT performance on the business, which, by definition, now includes the performance of the ___.
A) cloud provider
B) cloud service
C) cloud recovery
D) cloudware
Answer: (D)
19. ___ is a Flash-based desktop environment, mostly for users of Internet cafes. In this way, dragging a file onto the desktop uploads it to the cloud, giving you access to your files from any Internet-connected computer.
A) Evernote
B) Picknick
C) Jooce
D) Apple Mobile Me
Answer: (C)
20. ___ enables application development and test teams to provision lab infrastructure on demand and utilize a powerful virtual lab management application to automate the setup, testing, and tear-down of complex, multitier environments.
A) Skytap Virtual Lab
B) SnappCloud
C) Infinitely Virtual
D) Sun Cloud
Answer: (A)
21. ___ strives to eliminate the time-intensive process of configuring servers for build and test by managing those configurations as “profiles” across the application life cycle.
A) CollabNet’s CUBiT 2.0
B) Drizzle 7
C) Mango DB v.1.8.0:
D) None of the above
Answer: (A)
22. The Service Cloud is made up of ___ main components around the knowledge base to gather, distill, and disseminate the expert knowledge found in the cloud to customers, agents, and partners
A) seven
B) six
C) three
D) four
Answer: (B)
23. ___ is the first and only open-source RDBMS purpose-built entirely for data warehousing and business intelligence, developed by the Eigenbase Project.
A) CouchDB
B) Mango DB v.1.8.0:
C) LucidDB
D) Drizzle 7
Answer: (C)
24. ___ is a patented software framework introduced by Google to support distributed computing on large sets of data.
A) Apache Hadoop
B) MapReduce
C) Bigtable
D) MapReduce
Answer: (D)
25. ___ issues related to cloud computing fall into two broad categories, one faced by cloud providers and the other faced by customers.
A) Resource
B) Security
C) Availability
D) None of the Above
Answer: (B)
26. ___ is used to protect your sensitive data from hackers
A) Firewalls
B) Encryptions
C) Encoding
D) None of the Above
Answer: (B)
27. CSV stands for
A) Common security value
B) Comma separated value
C) Card security value
D) None of the Above
Answer: (D)
28. The ___ goal is to support the development of standards for cloud computing and frameworks for interoperating between clouds.
A) OCC
B) OGF
C) OMG
D) OMG
Answer: (A)
29. In a ___ cloud computing environment the organization itself provides and manages some resources locally, and the remaining other resources provided externally.
A) public
B) hybrid
C) private
D) All of the Above
Answer: (B)
30. Which of the following services is included in the Cloud Computing Suite offered by Accenture?
A) Accenture Cloud Computing Accelerator
B) Accenture Cloud Opportunity Assessment Tool
C) Accenture Cloud Computing Data Processing Solution
D) All of the Above
Answer: (D)
31. ___ is open-source and enables powerful web applications by adding new features to the web browser.
A) V8 javascript
B) Django
C) Google Gear
D) Chrome Cloud
Answer: (C)
32. Using the logic and workflow intelligence provided by Apex Code, ___ offers the flexibility to meet the requirements of applications that feature many different types of users on a variety of devices.
A) Visualforce
B) Django
C) LucidDB
D) Mapreduce
Answer: (A)
33. ___ provide unlimited online storage for media (examples include backups, video files, user content), which is served out via Limelight Networks’ Content Delivery Network.
A) Cloud Sites
B) Cloud servers
C) Cloud Files
D) Cloud Point
Answer: (C)
34. SLA stands for:
A) Standard Level Assignments
B) Service Level Agreements
C) Standard Level Agreements
D) Service Level Assignments
Answer: (B)
35. In-house applications rely on services like ___ to provide information about the users.
A) Virtualization
B) Active Directory
C) Application
D) Cloud Hosting
Answer: (B)
36. The term ___ describes a piece of hardware, a piece of software or both, that is specifically designed for a cloud service.
A) cloud client
B) DaaS
C) cloud service
D) None of the Above
Answer: (A)
37. ___ is a set of tools written in Java that you can run from the Linux/UNIX or Windows command line that closely mimics its functions.
A) BizTalk Services
B) Amazon Machine Image
C) Amazon Elastic Compute Cloud (EC2)
D) All of the Above
Answer: (C)
38. ___ is all about how your software services run effectively inside your own environment through the cloud
A) Provisioning
B) Service management
C) Resource management
D) Performance management
Answer: (D)
39. ___ provides technical expertise for the complete range of AWS services and obtains a detailed understanding of your use case and technology architecture.
A) Technical Account Manager (TAM)
B) Technical Associate Manager (TAM)
C) Technical Account Management (TAM)
D) Technical Associate Management (TAM)
Answer: (A)
40. In the case of ___, there are no new attacks, vulnerabilities, or changes in risk specific to this topology that information security employees need to consider.
A) public clouds
B) private clouds
C) Hybrid
D) None
Answer: (B)
41. Which of the following is NOT among the popular cloud applications?
A) Google Docs
B) Apple Mobile me
C) Adobe Photoshop Express
D) None of the above
Answer: (D)
42. State TRUE/FALSE for the following:
There are two primary flavors of conceptual-level relations namely CAUSE and BI-CAUSE.
A) TRUE
B) FALSE
Answer: (A)
43. Which of the following is NOT among the cloud performance Tool?
A) Cloud check
B) Cloud status
C) Cassatt
D) Hyperic HQ
Answer: (A)
44. ___ is a web service that provides resizable compute capacity in the cloud.
A) Mosso
B) Amazon Elastic Compute Cloud
C) Azure
D) Visualforce
Answer: (B)
45. Which of the following connection methods provides the “Fault-tolerant” feature?
A) Accelerated internet
B) Optimized overlay
C) Site-to-site VPN
D) Basic public internet
Answer: (D)
46. Which of the following organization does not provide OpenID authentication?
A) Google
B) Amazon
C) Yahoo!
D) IBM
Answer: (B)
47. KPI stands for:
A) Key parameterized indications
B) Key performance indicators
C) Key performance indications
D) Key parameterized indicators
Answer: (B)
48. ___ measures are the “vital signs” of an organization.
A) Security
B) Resourced
C) Performance
D) Connecting
Answer: (C)
49. DaaS Stands for
A) Desktop as a Service
B) Disk as a Service
C) Durability as a Service
D) Device as a Service
Answer: (A)
50. Which of the following is NOT among the key assurance issues considered by Cloud Governance?
A) Trans-border information flow:
B) Certification
C) Privacy
D) Authentication
Answer: (D)
Awesome post.