Cloud Computing MCQ Solved
Cloud Computing MCQ Solved
Cloud Computing
MCQ
By: Ahmed Samir
Ch1:
1. Which of the following is not a limitation of traditional
computing approach?
a) Huge initial investment
b) Hardware-system management responsibility
c) Partial utilization of resources
d) None of these
2. Which of the following is an advantage of cloud
computing approach?
a) It is ubiquitous
b) Enabled by pay-for-usage model
c) Responsiveness
d) All of these
3. Access to a Cloud environment it costs more money
compared to a traditional environment.
a) True
b) False
1
4. A Cloud environment can be accessed from anywhere in
the world if the user has access to the Internet.
a) True
b) False
5. Which one of the following is the standard cloud
computing pricing model?
a) Free
b) Pay-per-usage
c) Licensing basis
d) None of these
6. Cloud computing makes a business more
a) Dynamic
b) Strong
c) Profitable
d) Simple
7. Which among the following is a feature of utility service?
a) 24×7 availability
b) Unlimited access
c) Metering
d) None of these
2
8. A computing system is composed of three facility layers.
This statement is
a) True
b) False
9. Which among the following is not considered as a layer in
computing system?
a) Application
b) Server18
c) Infrastructure
d) Platform
10. Computing network facility falls under which layer of
computing?
a) Application
b) Platform
c) Infrastructure
d) Both b and c
11. Is the IT outsourcing model of traditional computing
similar to cloud computing?
a) Yes
b) Not at all
c) To some extent
d) Depends on the requirement
3
12. What is the main advantage of utility computing
compared to traditional computing?
a) Less difficulty
b) better security
c) Economical
d) Availability
4
Ch2:
1. The idea of cloud computing is entirely new and surfaced
at the beginning of the current century.
a) True
b) False, the idea was there from long back
c) False, it didn’t materialize earlier for technical constraints
d) Both b and c
2. The concept of computing as public utility was first
presented by John McCarthy in the year
a) 1960
b) 1970
c) 1961
d) 2000
3. Which of the following is an important facilitator for the
emergence of distributed computing?
a) The invention of personal computers
b) Emergence of distributed applications
c) Fast network communication
d) None of these
5
4. With which model of distributed computing, the idea of
resource pool appeared?
a) Cluster computing
b) Grid computing
c) Client-server computing
d) None of these
5. Which of the following is/are advantage(s) of grid
computing over cluster model?
a) Solution of the cluster head problem
b) Heterogeneous resource pool
c)Co-operation between multiple administrative domains
d) All of these
6. The difficulty of maintaining mobility of application over
heterogeneous resource pool was solved with
a) Uniform system management policy
b) Resource virtualization
c) Clustering
d) None of these
6
7. Web based system development has been benefited with
the emergence of
a) Web 2.0
b) Mashup
c) SOA
d) All of these
8. Autonomic computing is a mean for making the
management of computing infrastructure
a) Automatic and faster
b) Automatic and intelligent
c) Automatic and cheaper
d) None of these
9. Cloud computing is result of the convergence of
a) Grid computing and hardware virtualization
b) Web technology and SOA
c) High speed network and utility model
d) All of these
7
Ch3:
1. Utility model of computing is beneficial for
a) Users of computing
b) Vendors of computing
c) Both b and c
d) None
2. The term ‘cloud computing’ was first presented in its
current meaning in the year of
a) 1999
b) 2006
c) 2008
d) 2010
3. Which among the following is/are feature(s) of utility
service model?
a) Metering
b) Billing
c) On-demand service availability
d) All of these
8
4. Which among the following companies was first to
successfully adopt utility computing model for
enterprises?
a) Amazon
b) Salesforce.com
c) IBM
d) Google
5. Heterogeneous software applications communicate
over the internet using
a) HTML
b) Message passing
c) Web services
d) None of these
6. Presently, the web services are categorized as
a) SOAP & REST
b) SOAP & RPC
c) REST & RMI
d) REST & CORBA
9
7. REST is considered as the light-weight alternative of
SOAP since it can avoid
a) the use of global identifier for resources
b) the use of JSON for message passing
c) the use of XML for message passing
d) None of these
8. Use of REST-compliant web services results in longer
development time than use of SOAP-based web services in
cloud computing development. This statement is
a) True
b) False
9. REST is a/an
a) Message communication protocol
d) Architectural style
c) Web architecture
d) Cloud type
10. Which among the following is not a benefit of cloud
computing?
a) Low initial investment
b) Fixed cost of computing
c) Access through internet
d) High-performance computing
10
11. Which among the following is not considered as
an inherent nature of cloud computing?
a) Flexibility
b) Elasticity
c) Scalability
d) Portability
11
Ch4:
1. Which among the following is not an essential
characteristic of NIST cloud model?
a) Rapid elasticity
b) Multi-tenancy
c) Resource pooling
d) Broad network access
2. NIST definition of cloud computing was published in the
year of
a) 2007
b) 2009
c) 2011
d) 2013
3. According to NIST definition, cloud computing is a
a) Model
b) Technology
c) Paradigm
d) Revolution
12
4. Which among the following services can only be accessed
by a restricted number of people?
a) public cloud
b) Community cloud
c) Private cloud
d) Both a & b
5. Which among the essential characteristics of cloud
computing is not present in grid computing model?
a) Rapid elasticity
b) On-demand service
c) Measured service
d) Both a & b
6. Public cloud can’t be deployed on-premises.
a) False
b) True
7. Private cloud can be deployed on-premises. This
statement is
a) False
b) True
13
8. Users’ control over cloud environment is maximum in
a) public cloud
b) Community cloud
c) Private cloud
d) Hybrid cloud
9. Hybrid cloud is cheaper than private cloud. This
statement is
a) True b) False
10. Which among the following refers to the location and
management of the cloud’s infrastructure?
a) Application
b) Services
c) Deployment
d) All of these
11. Which cloud deployment is managed by provider who
resides offsite and is accessible to some restricted people?
a) Private cloud
b) Community cloud
c) public cloud
d) Hybrid cloud
14
12. The number of actors mentioned in the NIST cloud
computing reference architecture is
a) 4
b) 5
c) 6
d) 7
15
Ch5:
1. Which cloud service is considered the most widely used?
a) Infrastructure-as-a-Service
b) Platform-as-a-Service
c) Software-as-a-Service
d) All of these
2. Which cloud service is known as Hardware- as-a-Service
also?
a) Infrastructure-as-a-Service
b) Platform-as-a-Service
c) Software-as-a-Service
d) Desktop-as-a-Service
3. Which among the following describes a distribution model
in which applications are hosted by a service provider and
made available to users?
a) Infrastructure-as-a-Service
b) Platform-as-a-Service
c) Software-as-a-Service
d) All of these
16
4. Virtual machine in Rackspace cloud is called
a) Rackspace Server
b) Cloud Server
c) RackVM
d) None of these
5. Identify the odd one
a) Microsoft Azure
b) Google App Engine
c) Force.com
d) Amazon EC2
6. In IaaS, computing resources are delivered to the
consumers
a) Through remote access b) Through distribution
c) In virtualized form
d) None of these
7. Which is not considered as one of the three main
categories of cloud services?
a) Software-as-a-Service
b) Database-as-a-Service
c) Platform-as-a-Service
d) Infrastructure-as-a-Service
17
8. Which cloud computing service model delivers computers,
storage, and network to consumers?
a) Infrastructure-as-a-Service
b) Platform-as-a-Service
c) Software-as-a-Service
d) All of these
9. Retaining with traditional computing environment costs
more compared to using cloud computing.
a) True
b) False
10. Name of the Open-source cloud computing PaaS facility
originally developed by VMWare as
a) VMWare platform
b) Cloud foundry
c) VMW-PaaS
d) None of these
11. Eucalyptus, Nebula, Nimbus, CloudStack, VLC are few
examples of
a) Open-source cloud services
b) Closed source cloud services
c) Proprietary cloud services
d) Free cloud services
18
Ch6:
1. What is the name of the organization majorly helping to
foster security standards for cloud computing?
a) NIST
b) Cloud Security WatchDog
c) Cloud Security Alliance
d) Open Cloud Consortium
2. ‘Perimeter’ in the peremeterized computing environment
is represented by
a) Organization’s physical boundary
b) In-house data center boundary
c) IP addresses
d) Network firewalls
3. How many elements of cloud security model was it focused
on in Gartner’s report titled as ‘Assessing the Security Risks
of Cloud Computing’ published in 2008?
a) 6
b) 7
c) 8
d) None of these
19
4. Who proposed the globally-accepted model for cloud
security?
a) Cloud Security Alliance
b) Jericho Forum group
c) NIST
d) Object Management Group (OMG)
5. Into how many visible cubes, the model cube was divided
in Jericho Forum’s security model?
a) 8
b) 16
c) 4
d) 32
6. How many dimensions exist in Cloud Cube Model?
a) 1
b) 2
c) 3
d) 4
20
7. Which among of the following security policies demands
special attention in cloud computing?
a) Data security policy
b) Security management policy
c) Advisory policy
d) Regulatory policy
8. Which among of the four dimensions of the cloud cube
model is represented by the colour?
a) Data Boundary
b) Ownership
c) Security Boundary
d) Sourcing
9. De-perimeterization in computing promotes
a) Outsourcing
b) Use of open technology
c) Collaboration
d) All of these
10. The statement ‘Internal data source can be used in de-
perimeterized computing environment’ is
a) True
b) False
21
11. In traditional perimeterized computing environment,
collaboration with external systems are established through
a) Virtual private network technique
b) Virtual drive technique
c) De-perimeterization technique
d) None of these
22
Ch7:
1. Which of these attribute(s) in a system could be brought
by computing infrastructure virtualization?
a) Security
b) Dynamic behavior
c) Flexibility
d) All of these
2. The physical system on which virtual machines run is
called
a) Host machine
b) Guest machine
c) Primary machine
d) Non-virtual machine
3. The software layer implementing virtualization is known
as
a) Operating system
b) Hypervisor
c) Application layer
d) None of these
23
4. In server virtualization, the relationship between host
machine and guest machine is
a) Many-to-one
b) One-to-one
c) Many-to-many
d) One-to-many
5. Is it possible to install operating system in a virtual
machine?
a) Yes
b) No
c) Sometimes
d) OS is not required in virtual machine
6. Type 1 hypervisors are installed over
a) Physical resource
b) Host operating system
c) Virtual resource
d) Type 2 hypervisor
7. Type 2 hypervisors are installed over
a) Physical resource
b) Host operating system
c) Virtual resource
d) Type 1 hypervisor
24
8. Operating systems and applications made for one
computer architecture can be installed on some other
architecture in
a) Simple server virtualization
b) Simulation-based server virtualization
c) Complex server virtualization
d) Emulation-based server virtualization
9. Guest operating systems remain unaware about they are
running in virtual environment in
a) Full virtualization
b) Para-virtualization
c) Operating system-level virtualization
d) Hardware-assisted virtualization
10. Hypervisor dependent (modified) versions of guest
operating systems are required in
a) Full virtualization
b) Para-virtualization
c) Hardware-assisted virtualization
d) All of these
25
11. Virtualization overhead of hypervisor is maximum in
case of
a) Full virtualization
b) Para-virtualization
c) Hardware-assisted virtualization
d) Equal for all
12. Virtual machines running over a physical host do not
have different operating systems in
a) Full virtualization
b) Operating system-level virtualization
c) Para-virtualization
d) Hardware-assisted virtualization
13. The most popular open-source hypervisor available in
the market is
a) ESX
b) ESXi
c) Hyper-V
d) Xen
14. Process virtual machines are made to run
a) Operating system
b) Operating system and applications
c) Some specific application
d) Any application
26
15. Server virtualization creates scope for
a) Speeding up servers
b) Fast installation of servers
c) Server portability
d) Both b & c
16. Resource abstraction in cloud computing is implemented
through
a) Resource management
b) Resource virtualization
c) Object orientation
d) Remote access
17. Virtual machine monitor (VMM) is the other name of
a) Guest system
b) Host system
c) Host operating system
d) Hypervisor
18. In operating system level virtualization, different OS
distributions of the same kernel can be run in virtual
servers.
a) True
b) False
19. Cloud computing IaaS services can be developed without
implementing resource virtualization also.
27
a) True
b) False
20. Which among the following must be maintained to
ensure security of virtualization?
a) Hardening the hypervisor
b) Restricting physical access to host machine
c) Maintaining one function per VM
d) All of these
21. The ‘single point’ in the ‘single point of failure problem’
of virtualization is
a) Virtual machine
b) Guest OS
c) Host machine
d) VMM
22. In ‘VM escape’, which among the following happens?
a) Accessing guest OS by escaping VM
b) Evading security of VM to access VMM
c) Accessing host OS by escaping VM
d) Escaping security of VMM to access host
28
23. Inactive virtualization machines may cause security
threats to virtualization?
a) True
b) False
24. The benefits of infrastructure virtualization includes
a) better utilization of resources
b) Cost saving for computation
c) Easier capacity expansion
d) All of these
29
Ch8:
1. By which kind of hardware components make cloud
computing cost effective at the time of building resource
pools?
a) Commodity hardware
b) Specialized hardware
c) Both a and b
d) None of these
2. Resource pools are organized in
a) Heap structure
b) Hierarchical structure
c) Hash structure
d) None of these
3. The traditional approach of having discrete and
independent set of resources is known as
a) Warehouse
b) Data center
c) Silos
d) None of these
30
4. Resource pools at cloud data centers are created with
a) Specialized hardware components
b) Commodity hardware components
c) Costly hardware components
d) None of these
5. Multi-tenancy in cloud computing is powered by
a) Ownership of free resource sharing
b) Temporary resource allocation
c) Resource allocation in virtual mode
d) All of these
6. In cloud computing, resource provisioning to consumers
is made through
a) Physical servers
b) Virtual private network
c) Virtual machines
d) None of these
7. In static provisioning of resources, resource allocation
decision is taken
a) Before starting of application
b) Any time before and after starting of application
c) Only once
d) Both a and c
31
8. In dynamic provisioning of resources, the resource
allocation decision can be taken
a) After starting of application
b) On-demand
c) For number of times
d) All of these
9. Dynamic resource provisioning approach eliminates the
problem(s) of
a) Resource under-provisioning
b) Resource over-provisioning
c) Both a and b
d) System speed
10. Zero downtime system architecture is outcome of
a) Dynamic provisioning
b) Multi-tenancy
c) Resource sharing
d) Resource pooling
11. Standardization of cloud environment is done over the
a) Physical resource pool
b) Virtualized resource pool
c) Individual physical resources
d) None of these
32
Ch9:
1. Which of the following is the advantage of dynamic
scaling?
a) Resource capacity can be increased during run-time
b) Resource capacity can be reduced during run-time
c) No ‘system restart’ is required after resource capacity change
d) All of these
2. Dynamic scaling facility in cloud has been achieved based
on
a) Resource virtualization
b) Resource sharing
c) Dynamic resource provisioning
d) All of these
3. Can dynamic scaling approach be manual?
a) Yes
b) No
4. Which of the following is the most fascinating feature of
dynamic scaling in cloud computing?
a) It is prompt
b) It is automatic
c) It is reversible
d) It is infinite
33
5. Predictable load patterns in cloud computing are
managed through
a) Dynamic scaling strategy
b) Proactive scaling strategy
c) Reactive scaling strategy
d) Static scaling strategy
6. In cloud computing, auto-scaling boundaries are set for a
scalable system to
a) Make the scaling effective
b) Protect resources from external attack
c) Minimize cost
d) None of these
7. Distributed computing system architecture is apt to scale
a) Horizontally
b) Vertically
c) Both horizontally and vertically
d) None of these
34
8. Infinite scalability can be achieved through the
implementation of
a) Reactive scaling
b) Proactive scaling
c) Horizontal scaling
d) Vertical scaling
9. Better performance of a system indicates better
scalability.
a) True
b) False
10. Which of the following is the primary factor to limit
scalability?
a) Cost of system management
b) Resource bottleneck
c) Growing number of users
d) Cost of resource components
11. Which type of scaling is more apt for distributed
computing environment like cloud?
a) Horizontal scaling
b) Vertical scaling
c) A mixture of horizontal and vertical scaling
d) It depends on the distributed computing architecture
35
Ch10:
1. Cloud Computing concept of delivering infinite resource
is achieved by
a) Maintaining a huge pool of resources
b) Workload management
c) Proper capacity planning
d) None of these
2. Over-provisioning of resources in traditional way
of capacity planning causes
a) Performance degradation
b) Loss of reputation
c) Performance enhancement
d) Wastage of budget
3. Under-provisioning of resources in traditional way
of capacity planning may cause
a) Auto-scaling
b) Loss of reputation
c) Performance enhancement
d) Budget saving
36
4. Availability of infinite resource on-demand in cloud
computing is actually an illusion
a) True
b) False
5. Unlike following N + 1 rule of capacity maintenance,
cloud service consumers enjoy which among the following
facility in capacity maintenance
a) N + X rule
b) N rule
c) Infinite resource
d) Auto-scaling
6. Resource utilization curve represents
a) Average resource utilization
b) Total volume of system resources
c) Resource utilization under load
d) All of these
7. When resource utilization reaches ceiling, that limit is
called
a) Stress point
b) Limiting point
c) End point
d) None of these
37
8. Unlike traditional computing, capacity planning is no
more required to avail computing facility in cloud
a) True
b) Required, but much easier
c) Required, but less risky
d) Both b and c
9. Before capacity enhancement of an application, the
capacity planner should know about
a) Cost of the additional resources
b) Value of the added capacity in business
c) How much resource is required
d) Both a and c
10. IaaS consumers in cloud, do the capacity planning with
a) Virtual resources
b) Physical resources
c) Both physical and virtual resources
d) None of these
11. What is the relation of capacity of system with its
performance?
a) Proportional
b) Reverse
c) Similar
d) None of these
38
Ch11:
1. For which among the resource(s) is the load balancing in
computing done?
a) Processor
b) Storage
c) Memory
d) All of these
2. In distributed computing environment, the load
balancing is done for
a) Servers
b) Network Switches
c) Storage
d) All of these
3. Load balancing helps to implement the
a) System over-utilization
b) System under-utilization
c) System scaling
d) All of these
4. Static load balancing approach does not consider the
existing states of systems. This statement is
a) True
b) False
39
5. Requests from clients in cloud environment first appear
in
a) Front-end node
b) Back-end node
c) Depends on type of request
d) None of these
6. In load balancing, resource provisioning happens before
VM provisioning. This statement is
a) True b) False
7. In which kind of load balancing, the feedback about
existing load status is required?
a) Static
b) Automatic
c) Dynamic
d) All of these
8. Which among the following problem(s) may be caused by
centralized load balancing?
a) To many messages
b) Bottleneck
c) No feedback
d) None of these
40
9. Class-aware load balancing algorithms are more critical
in nature. This statement is
a) True
b) False
10. Session persistency in load balancing is maintained
through
a) In-memory session database b) Cookies
c) None of these d) Both a and b
11. Improving application server’s performance by
offloading compute- intensive tasks is known as
a) Task offloading
b) Performance tuning
c) Application acceleration
d) None of these
41
Ch12:
1. Which of the following design principles does SOA
promote?
a) Low coupling
b) High coupling
c) Low cohesion
d) None of these
2. Which element of a service remains hidden from the
consumers?
a) Contract
b) Interface
c) Implementation
d) None of these
3. Cloud computing and SOA can run separately but
together they empower one another.
a) True
b) False
4. Benefits of using SOA paradigm include
a) Easier maintenance
b) Increased flexibility
c) Reduced cost
d) All of these
42
5. Service registry in SOA paradigm is maintained by
a) Service provider
b) Service broker
c) Service consumer
d) Service designer
6. Connection between services in SOA paradigm is done
through
a) Message passing
b) Remote method invocation
c) Functional call
d) None of these
7. Use of variety of technologies for application
development across heterogeneous systems in cloud
computing makes the interoperation among the applications
quite challenging without properly
a) Designed system
b) Standardized communication
c) Open-source implementation
d) None of these
43
8. Technological inter-dependency of two communication
software agents in SOA paradigm has been eliminated by
a) Use of SOAP
b) Use of service registry
c) Standardized message communication technique
d) None of these
44
Ch13:
1. Cloud storage is built upon
a) Traditional file system
b) Cloud native file system
c) Both a and b
d) None of these
2. In comparison with traditional storage system, the
major difference(s) emerge while building cloud storage is
a) Supporting scalability
b) Metering usages
c) Supporting multi-tenancy
d) All of these
3. Cloud native storage file systems are actually virtual in
nature. Is this true?
a) Yes
b) No
4. MapReduce framework was built to efficiently
process unstructured data in parallel in
a) Cloud environment
b) Centralized environment
c) Distributed environment
d) Non-cloud environment
45
5. Which of the following is an open-source cloud file
system?
a) GFS
b) HDFS
c) GlusterFS
d) KFS
6. Unmanaged cloud storages are actually managed by
a) Storage provider
b) Storage consumer
c) None
d) Administrator
7. Managed cloud storages are generally used by
a) Managers
b) big enterprises
c) Application Developers
d) All of these
8. In unmanaged cloud storage user can install applications
of his/her choice.
a) Yes. Till space permits.
b) No. They can install only specific applications.
c) Yes. If the privilege is given.
d) No. It comes with pre-installed applications.
46
9. For file hosting purpose, the type of cloud storage used is
a) Managed storage
b) Unmanaged storage c) Both a and b
d) None of these
10. There are cloud storage systems which are used to build
cloud service and not offered to consumers as a service
a) True
b) False. Cloud storage systems are built to offer as a service to
consumers.
11. Mapreduce is a
a) Storage model
b) Programming model
c) File system model
d) None of these
12. Google Drive is a
a) General purpose cloud storage
b) Cloud storage to be used by developers
47