BIT6th Sem Cloud Computing Final - EXAMINATION PAPER - 1
BIT6th Sem Cloud Computing Final - EXAMINATION PAPER - 1
EXAMINATION PAPER
3. Which term describes the delivery of on-demand computing services over the
qinternet?
a. Mainframe computing
b. Distributed computing
c. Cloud computing
d. Parallel computing
1
Phoenix College Of Management
Maitidevi, kathmandu, Nepal
12. Which cloud service model provides fully integrated enterprise-class unified
communications?
a. Infrastructure as a Service (IaaS)
b. Platform as a Service (PaaS)
c. Communication as a Service (CaaS)
d. Software as a Service (SaaS)
2
Phoenix College Of Management
Maitidevi, kathmandu, Nepal
13. Which cloud service model offers protection against internal and external threats
through monitoring?
a. Infrastructure as a Service (IaaS)
b. Monitoring as a Service (MaaS)
c. Platform as a Service (PaaS)
d. Software as a Service (SaaS)
15. Which architectural shift characterizes the movement from single-purpose to multi-
purpose architectures in cloud networks?
a. Centralized control
b. Decentralized control
c. Monolithic design
d. Microservices architecture
16. What technology enables the virtualization of data centers in cloud computing?
a. Virtual Private Network (VPN)
b. Virtual Machine (VM)
c. Hypervisor
d. Load Balancer
17. Which software architecture facilitates the creation of flexible and scalable cloud
services?
a. Object-Oriented Programming (OOP)
b. Service-Oriented Architecture (SOA)
c. Model-View-Controller (MVC)
d. Event-Driven Architecture (EDA)
18. What is the first step in designing and implementing a cloud solution using SOA?
a. Deploy services in the cloud
b. Identify service boundaries
c. Implement service governance
d. Monitor and manage services
19. What role does open source software play in cloud data centers?
a. Increases proprietary software usage
b. Decreases flexibility and customization
c. Provides cost-effective solutions
3
Phoenix College Of Management
Maitidevi, kathmandu, Nepal
20. What does Disaster Recovery planning in cloud computing primarily involve?
a. Preventing all disasters from occurring
b. Identifying vulnerabilities in the system
c. Establishing protocols for restoring operations after a disaster
d. Ensuring continuous system uptime without any interruptions
21. In cloud computing, what does Host Intrusion Detection primarily aim to detect?
a. Unauthorized access to network infrastructure
b. Anomalies in network traffic patterns
c. Intrusions within the virtual machines
d. Failures in data backup mechanisms
22. What is the primary objective of implementing network detection in the cloud?
a. Ensuring physical security of data centers
b. Identifying and responding to security threats in real-time
c. Optimizing network performance
d. Reducing operational costs
23. Which cloud service model involves the delivery of software applications over the
internet?
a. Communication as a Service (CaaS)
b. Infrastructure as a Service (IaaS)
c. Platform as a Service (PaaS)
d. Software as a Service (SaaS)
24. What does the Jericho Cloud Cube Model categorize based on three dimensions?
a. Software applications
b. Deployment models
c. Data encryption methods
d. Network protocols
25. What aspect of cloud computing does security architecture design primarily focus on?
a. Data privacy and security
b. Application performance
c. Network scalability
d. Cost optimization
26. In which application domain does cloud computing offer tools like Moo, Vistaprint,
and Adobe Creative Cloud?
a. Business
4
Phoenix College Of Management
Maitidevi, kathmandu, Nepal
b. Arts
c. Education
d. Entertainment
29. Which cloud type has higher upfront and maintenance costs?
a. Public cloud
b. Private cloud
c. Both have the same costs
d. Neither has upfront costs
5
Phoenix College Of Management
Maitidevi, kathmandu, Nepal
6. How does data center virtualization contribute to the scalability and flexibility of
cloud computing infrastructure? Provide examples to support your explanation. [Unit
3]
7. Explain the concept of disaster recovery planning. What is vulnerability assessment in
cloud security? [Unit 4]
8. Discuss the importance of Data Privacy and Security in cloud computing and outline
strategies for ensuring robust data protection.[Unit 4]