0% found this document useful (0 votes)
59 views

CC Mid - 2 Objective Paper-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

CC Mid - 2 Objective Paper-1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Year/SEM: IV / I
Sub Name: CLOUD COMPUTING
Branch: ECE
Course Code: R204146G
MID-II
Maximum Marks: 10M Marks Obtained
H.T. No.

N T
Each question carries ½ mark

S.NO QUESTIONS ANSWERS


1 Which of the following type of virtualization is also characteristic of cloud
computing? ( )
a) Storage b) Application c) CPU d) All of the mentioned
2 The technology used to distribute service requests to resources is referred to as
a) load performing b) load scheduling ( )
c) load balancing d) all of the mentioned
3 Point out the correct statement.
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance
based on conditions ( )
c) Computers can be partitioned into a set of virtual machines with each machine
being assigned a workload
d) All of the mentioned
4 Which of the following network resources can be load balanced?
a) Connections through intelligent switches b) DNS ( )
c) Storage resources d) All of the mentioned
5 Creating more logical IT resources, within one physical system is called
(a) Load balancing (b) Hypervisor ( )
(c) Virtualization (d) None of these
6 In the Planning Phase, which of the following is the correct step for
performing the analysis?
a) Cloud Computing Value Proposition
b) Cloud Computing Strategy Planning
( )
c) Both a and b
d) Business Architecture Development
7 Which one of the following refers to the non-functional requirements like
disaster recovery, security, reliability, etc.
a) Service Development b) Quality of service
( )
c) Plan Development d) Technical Service
8 In Grid Computing, which types of computer resources are there?
a) heterogeneous dispersed. b) geographically dispersed. ( )
c) Both A and B d) None of the above
9 Which of the following is storage data interchange interface for stored data
objects? ( )
a) OCC b) OCCI c) OCMI d) All of the mentioned
10 ________ data represents more than 50 percent of the data created every day.
a) Shadow b) Light c) Dark d) All of the mentioned
( )
11 Which of the following system does not provision storage to most users?
a) PaaS b) IaaS c) CaaS d) SaaS
( )
12 The addition of a software package on top of a cloud storage volume makes
most cloud storage offerings conform to a ________ as a Service model. ( )
a) Software b) Platform c) Analytics d) None of the mentioned
13 How many categories of storage devices broadly exist in cloud?
a) 1 b) 2 c) 3 d) None of the mentioned
( )
14 Which of the following storage devices exposes its storage to clients as Raw
storage that can be partitioned to create volumes? ( )
a) block b) file c) disk d) all of the mentioned
15 Which of the following impose additional overhead on clients and offer faster
transfer?
a) Block storage b) File Storage
( )
c) File Server d) All of the mentioned
16 In cloud computing, the client is on which end.
a) Backend
b) Frontend ( )
c) Depends
d) Both a and b
17 In which year was Google Compute Engine released?
a) 2012
b) 2009 ( )
c) 2015
d) 2006
18 _____ happens when data is stolen while being stored or transferred.
a) Denial of service
b) Data leakage ( )
c) Customer manipulation
d) Account hijacking
19 This threat occurs when an attacker writes a script to consume all resources
on a cloud server
a) Denial of service
b) Data leakage
( )
c) Data scavenging
d) Account hijacking
20 Cloud providers must enable their customers to comply appropriately with
these regulations.
a) Payment Card Industry Data Security Standard (PCI)
b) Health Insurance Portability and Accountability Act (HIPAA)
( )
c) Sarbanes-Oxley Act (SOA)
d) All of the above

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy