Thursday 22 October 2020

Cloud Computing Quiz

 

1.       How does Cloud computing change the relationship between provider and customer?

A. Increased focus on service level agreements (SLAs)

B. less compliance to standards

C. less focus on service level agreements (SLAs)

D. more focus on training

2.       Which cloud characteristic refers to the ability of a subscriber to increase or decrease its computing requirements as needed without having to contact a human representative of the cloud provider?

a.       Rapid elasticity

b. On-demand self service                                 

c. Broad network access

d. Resource pooling

3.       Which one of the following types of risks cannot be mitigated solely with cloud-specific security technologies?

a. Identity management

b. Virtual sprawl

c. Denial-of-service attacks

d. Intellectual property protection

e. Administrative access control

4.       Which of the following is not a true statement about using encryption with enterprise cloud computing implementations?

a. Encryption is required for regulatory compliance.

b. Encryption can be used to solve the data segregation issue.

c. Data being processed is always encrypted.

d. Encryption for data in transit has a speed/strength tradeoff.

5.       Which of the following is not true about cloud-based virtual server management platforms?

a. Cloud-based management platforms can support multiple cloud-virtual server vendors.

b. Cloud-based management platforms can support multiple cloud-virtual server operating systems.

c. Cloud-based management platforms cannot support internally hosted server platforms.

d. Cloud-based management platforms can support change management methodologies.

6.       Which of the following risks is actually increased by cloud-specific security technologies?

a.       Increased/shared attack surface

b.      Configuration and vulnerability management

c.       Identity management

d.      Administrative access control

e.      None of the above

7.       How can confidentiality of information be achieved?

a.       By ensuring enough resources to make information available for all users

b.      By preventing unauthorized changes

c.       By regularly backing up the information

d.      By restricting access to information

8.       What is a Virtual Private Network (VPN)?

a.       A secured connection for remote access to a local area network

b.      A secured private cloud for a single user

c.       A virtual network device for private purposes

d.      An operating system for private network systems

9.       What are different data types used in cloud computing?

Cloud computing is going all together for a different look as it now includes different data types like emails, contracts, images, blogs, etc. The amount of data increasing day by day and cloud computing is requiring new and efficient data types to store them. For example if you want to save video then you need a data type to save that. Latency requirements are increasing as the demand is increasing. Companies are going for lower latency for many applications.

10.   What is Simple multi-tenancy ?

In this each user has its own resources that are different from other users. It is an inefficient mode where the user has to put more time and money to add more infrastructure if the demand rises in less time to deliver. 

11.   What is Fine grain multi-tenancy ?

In this the functionality remains the same that the resources can be shared to many. But it is more efficient as the resources are shared not the data and permission within an application.

12.   What is Hadoop ?

Hadoop is a free, Java-based programming framework that supports the processing of large data sets in a distributed computing environment. It is part of the Apache project sponsored by the Apache Software Foundation.

13.   Map() procedure performs

a.       filtering and sorting

b.      performs a summary operation

c.       processing large data sets with a parallel and distributed algorithm on a cluster

d.      Both a and b

e.      All of the above

14.   Reduce() procedure performs

a.       filtering and sorting

b.      performs a summary operation

c.       processing large data sets with a parallel and distributed algorithm on a cluster

d.      Both a and b

e.      All of the above

15.   CRM is an example of

a.       SaaS

b.      PaaS

c.       IaaS

d.      Both a and B

e.      All of the above

 

16.   What is benefit of storage availability in the Cloud?

a.       Additional storage does not require budget for new large storage devices.

b.      B. Storage in the Cloud has a higher availability than storage devices in the local area network.

c.       C. Storage in the Cloud has shorter access times than storage in the local area network.

d.      D. Storage in the Cloud is easier to protect against intrusion

17.   Why is a trial period needed when considering to use Software-as-a-Service?

a.       To establish the required bandwidth for using the cloud services

b.      To evaluate whether the cloud services will be useful

c.       To find out whether the vendor will meet the Service agreement

d.      To have time to accommodate the local network to use of the new services

18.   Google App Engine (often referred to as GAE or simply App Engine) is

a.       Is a Platform as a Service

b.      Is a Software as a Service

c.       Is a Infrastructure as a Service

d.      All of the above

19.   What is Azure ? (2-3 lines)

Windows Azure is a cloud computing platform and infrastructure, created by Microsoft, for building, deploying and managing applications and services through a global network of Microsoft-managed datacenters.

20.   Heroku was acquired by

a.       Microsoft

b.      Salesforce.com

c.       Vmware

d.      Red Hat

21.   Which of the following is not cloud service provider ?

a.       Amazon

b.      Amazon EC2

c.       Hadoop

d.      GAE

e.      Azure

22.   What is Data Segregation ?

How vendors keep certain degree of separation between one customer data and another's.

23.   Define vulnerability

Vulnerabilities in Cloud can be defined as the loopholes in the security architecture of Cloud, which can be exploited by an adversary via sophisticated techniques to gain access to the network and other infrastructure resources.

 

24.   What is threat?

A threat in the Cloud is a potential (or actual adverse) event that may be malicious or incidental (i.e. failure of a storage device), compromising Cloud resources.

25.   In which attack an attacker tries to flood the victim by sending requests from innocent hosts in the network.

a.       Man – in – middle

b.      DOS

c.       DDOS

d.      Zombies

e.      Phishing

26.   The Cloud may be overloaded to serve a number of requests, and hence exhausted, which can cause

a.       Zombies

b.      DOS

c.       DDOS

d.      Backdoor channel attack

e.      Both b & c

f.        All of the above

27.   What are the uses of cloud storage ?

a.       Backup

b.      File sharing

c.       Data synchronization

d.      Media Distribution

e.      Data Archiving

28.   Which of the following is disadvantage of FADE?

a.       Time and Space are the major overhead of this scheme

b.      Unable to support both public verification and dynamic data correctness.

c.       In case user forgot where the data stored, it will become difficult for users.

d.      Both a and b

29.   Client Server system refers to accessing information, processing or storage on a typically more powerful separate system from a less powerful computer.

a.       TRUE

b.      FALSE

30.   What is Caas ?

a.       Communication as a service

b.      Client as a Service

c.       Computer as a Service

d.      Common platform as a Service

31.   Which of the following is an example of a cloud computing application?

a.       Facebook Apps

b.      Skype

c.       Twitter or RSS

d.      Salesforce.com

e.      Google Apps

f.        Sky drives

g.       None of the above.

32.   What is benefit of storage availability in the Cloud?

a.       Additional storage does not require budget for new large storage devices.

b.      Storage in the Cloud has a higher availability than storage devices in the local area network.

c.       Storage in the Cloud has shorter access times than storage in the local area network.

d.      Storage in the Cloud is easier to protect against intrusion

33.   Open source software is not free. There are maintenance costs and support costs

a.       TRUE

b.      FALSE

34.   How many types of deployment models are used in cloud?

a.       Public cloud

b.      Private cloud

c.       Community cloud

d.      Hybrid cloud

e.      Only A & B

f.        All of the above

g.       Only A,B & D

35.   Why is a trial period needed when considering to use Software-as-a-Service?

a.       To establish the required bandwidth for using the cloud services

b.      To evaluate whether the cloud services will be useful

c.       To find out whether the vendor will meet the Service agreement

d.      To have time to accommodate the local network to use of the new services

36.   Which service model allows the customer to choose more layers in the computing 
architecture?

a.       Infrastructure as a Service (IaaS)

b.      Platform as a Service (PaaS)

c.       Software as a Service (SaaS)

d.      There is no difference between the service models.

37.   How can confidentiality of information be achieved?

a.       By ensuring enough resources to make information available for all users

b.      By preventing unauthorized changes

c.       By regularly backing up the information

d.      By restricting access to information

38.   What is a Virtual Private Network (VPN)?

a.       A secured connection for remote access to a local area network

b.      B. A secured private cloud for a single user

c.       C. A virtual network device for private purposes

d.      D. An operating system for private network systems

39.   How does Cloud computing change the relationship between provider and customer?

a.       Increased focus on service level agreements (SLAs)

b.      B. less compliance to standards

c.       C. less focus on service level agreements (SLAs)

d.      D. more focus on training

40.   What is cloud computing replacing?

a.       Corporate data centers

b.      Expensive personal computer hardware

c.       Expensive software upgrades

d.      All of the above

41.   How can confidentiality of information be achieved?

a.       By ensuring enough resources to make information available for all users

b.      By preventing unauthorized changes

c.       By regularly backing up the information

d.      By restricting access to information

42.   What is a Virtual Private Network (VPN)?

a.       Secured connection for remote access to a local area network

b.      A secured private cloud for a single user

c.        A virtual network device for private purposes

d.       An operating system for private network systems

 

43.   How does Cloud computing change the relationship between provider and customer?

a.       Increased focus on service level agreements (SLAs)

b.      less compliance to standards

c.       less focus on service level agreements (SLAs)

d.      more focus on training

44.   What is cloud computing replacing?

a.       Corporate data centers

b.      Expensive personal computer hardware

c.        Expensive software upgrades

d.       All of the above

45.   What is the number one concern about cloud computing?

a.       Too expensive

b.      Security concerns

c.       Too many platforms

d.      Accessibility

46.   Which of these is not a major type of cloud computing usage ?

a.       Hardware as a Service

b.       Platform as a Service

c.        Software as a Service

d.       Infrastructure as a Service

47.   Which of these companies is not a leader in cloud computing?

a.       Google

b.      Amazon

c.        Blackboard

d.      Microsoft

48.   Which cloud deployment model is operated solely for a single organization and its authorized users?

a.       Community cloud

b.      Hybrid cloud

c.       Public cloud

d.      Private cloud

49.   Which cloud characteristic refers to the ability of a subscriber to increase or decrease its computing requirements as needed without having to contact a human representative of the cloud provider?

a.       Rapid elasticity

b.      On-demand self service                                      

c.       Broad network access

d.      Resource pooling

50.   Which cloud deployment model is managed by a cloud provider, has an infrastructure that is offsite, and is accessible to the general public?

 

a.       Community cloud

b.      Hybrid cloud

c.       Public cloud                                                                              

d.      Private cloud

51.   In which category of SaaS services does customer relationship management (CRM) software fall?

 

a.       Consumer services

b.      Communication services

c.       Infrastructure services

d.      Business services

52.   Which is considered the most widely used cloud computing service?

a.       Infrastructure-as-a-Service (IaaS)

b.      Platform-as-a-Service (PaaS)

c.       Communication-as-a-Service (CaaS)

d.      Software-as-a-Service (SaaS)