Cloud Computing Questions and Answers - Virtualization Technologies
Cloud Computing Questions and Answers - Virtualization Technologies
Virtualization Technologies
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on
“Virtualization Technologies”.
a)
b)
c)
d) All of the mentioned
View Answer
Answer: a
Explanation: You can define the features in software and hardware that enables flexibility as
conforming to one or more of the mobility patterns.
Answer: c
Explanation: Several important cloud computing approaches use a strictly hardware-based
approach to abstraction.
Answer: d
Explanation: To enable these characteristics, resources must be highly configurable and flexible.
advertisement
ADVERTISEMENT
Answer: c
Explanation: Load balancing is an optimization technique.
Answer: d
Explanation: Alternatively, systems can be virtualized through load-balancing technologies.
Note: Join free Sanfoundry classes at Telegram or Youtube
Answer: b
Explanation: Load balancing can be used to increase utilization and throughput, lower latency,
reduce response time, and avoid system overload.
Answer: d
Explanation: Load balancing provides the necessary redundancy to make an intrinsically
unreliable system reliable through managed redirection.
Answer: a
Explanation: They determine the current utilization of the resources in their pool.
9. A ______ is a combination load balancer and application server that is a server placed
between a firewall or router.
a) ABC
b) ACD
c) ADC
d) All of the mentioned
View Answer
Answer: c
Explanation: An Application Delivery Controller is assigned a virtual IP address (VIP) that maps
to a pool of servers based on application specific criteria.
10. Which of the following should be replaced with the question mark in the following figure?
a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
View Answer
Answer: b
Explanation: Virtualization is a key enabler of the first four of five key attributes of cloud
computing.
Answer: a
Explanation: Cloud computing means providing services like storage, servers, database,
networking, etc. over the internet without the user managing it directly. The data stored can be
accessed by an authorized user anywhere anytime provided the user must have an internet
connection and a device.
Answer: d
Explanation: In Public Servers the users share the hardware, storage, and networks. Private
Servers provide high security to the data stored through firewalls and internal hosting. Also, in
the private cloud, the user can customize their servers with add-ons. In Dedicated Servers, the
server completely belongs to a particular organization or a company.
Answer: d
Explanation: One of the important features is security, the data stored is secured and cannot be
accessed by unauthorized parties. In case the user exhausts the storage space allocated, the user
can buy extra storage for a less amount. The data stored can be accessed by any authorized user
anywhere anytime provided the user must have an internet connection and a device.
Answer: c
Explanation: Software as a Service, is the most widely used choice for enterprises. SaaS makes
use of the internet to offer apps to consumers that are controlled by a third-party vendor.
advertisement
ADVERTISEMENT
Answer: d
Explanation: Adobe Creative Cloud is used in the art sector. Paypal is an online payment
application. Google G Suite is the best storage and backup application used by google.
Answer: d
Explanation: Amazon Web Services (AWS), Dropbox, and Cisco WebEx are examples of cloud.
8. Applications and services that run on a distributed network using virtualized resources is
known as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
View Answer
Answer: d
Explanation: Cloud computing refers to the delivery of services such as storage, servers,
databases, networking, and other functions through the internet without the need for the user to
manage them directly. These applications are accessed by common Internet protocols and
networking standards.
Answer: d
Explanation: PaaS stands for Platform-as-a-Service. In PaaS, the users receive hardware or
software tools from the users on the internet. AWS Elastic Beanstalk, Windows Azure, Heroku
are example of a PaaS service.
Answer: d
Explanation: IaaS stands for Infrastructure-as-a-Service. In IaaS, the users receive computing
resources like software or hardware tools virtually over the internet. DigitalOcean, Linode,
Rackspace are the example of an IaaS service.
11. Which of the following is the correct statement about cloud computing?
a) Cloud computing abstracts systems by pooling and sharing resources
b) Cloud computing is nothing more than the Internet
c) The use of the word “cloud” makes reference to the two essential concepts
d) All of the mentioned
View Answer
Answer: a
Explanation: Abstraction and Virtualization are the two essential concepts.
Answer: c
Explanation: Google has built mega data centres for its search engine.
13. Which of the following model attempts to categorize a cloud network based on four
dimensional factors?
a) Cloud Cube
b) Cloud Square
c) Cloud Service
d) All of the mentioned
View Answer
Answer: a
Explanation: Cloud Cube model is mainly used for secure collaboration.
14. Which of the following is the correct statement about cloud types?
a) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
b) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
View Answer
Answer: b
Explanation: Four types of deployment models exist.
Answer: a
Explanation: The cloud creates a system where resources can be pooled and partitioned as
needed.
16. All cloud computing applications suffer from the inherent _______ that is intrinsic in their
WAN connectivity.
a) noise
b) propagation
c) latency
d) all of the mentioned
View Answer
Answer: c
Explanation: While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, it may not be the best model for you.
17. Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
View Answer
Answer: b
Explanation: These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and
utility computing.
Answer: a
Explanation: Because it is based on the paradigm of a shared multi-tenant utility.
19. What is the correct formula to calculate the cost of a cloud computing deployment?
a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue + CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) None of the mentioned
View Answer
Answer: b
Explanation: Unit cost is usually defined as the cost of a machine instance per hour or another
resource.
20. Which of the following is the wrong statement about cloud computing?
a) Private cloud doesn’t employ the same level of virtualization
b) Data center operates under average loads
c) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
d) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
View Answer
Answer: a
Explanation: Capacity of the datacenter is fixed by the assets it has.
Answer: d
Explanation: Many of these protocols are standard Internet protocols.
Answer: b
Explanation: Microsoft’s ADO.NET Data Services Framework is another system for transferring
data using a RESTful transaction and standard HTTP commands.
Answer: d
Explanation: When applied to a number of users in a cloud computing system, these
requirements describe systems that must provision identities.
25. Cloud computing is a concept that involves pooling physical resources and offering them as
which sort of resource?
a) cloud
b) real
c) virtual
d) none of the mentioned
View Answer
Answer: c
Explanation: Cloud computing means providing services like storage, servers, database,
networking, etc. over the internet. It is a new model for provisioning resources, for staging
applications, and for platform-independent user access to services.
Answer: a
Explanation: Amazon Web Services (AWS), an Infrastructure as a Service (IaaS) offering that
allows users to rent virtual machines on Amazon’s own infrastructure, is one of the most
successful cloud-based enterprises.
27. Into which expenditures does Cloud computing shifts capital expenditures?
a) local
b) operating
c) service
d) none of the mentioned
View Answer
Answer: b
Explanation: The nature of the service provider and its connection with its client is changing as a
result of cloud computing.
Answer: c
Explanation: Cloud computing is differentiated by the idea that resources are virtual and infinite,
and that the user is shielded from the specifics of the actual infrastructure on which software
operates.
29. Which of the following is the most essential element in cloud computing by CSA?
a) Virtualization
b) Multi-tenancy
c) Identity and access management
d) All of the mentioned
View Answer
Answer: b
Explanation: Multi-tenancy refers to hosting shared among multiple customers. Multi-tenancy
introduces a variety of new security problems to cloud computing that must be addressed.
30. Which of the following monitors the performance of the major cloud-based services in real
time in Cloud Commons?
a) CloudWatch
b) CloudSensor
c) CloudMetrics
d) All of the mentioned
View Answer
Answer: b
Explanation: The Cloud Commons is a new online community founded by CA to promote
information exchange on cloud service and the SMI standard.
31. Which of the following model consists of the service that you can access on a cloud
computing platform?
a) Deployment
b) Service
c) Application
d) None of the mentioned
View Answer
Answer: b
Explanation: The sort of service that the service provider provides is described by the service
model. Three types of service provided are:
1) Platform-as-a-Service
2) Software-as-a-Service
3) Infrastructure-as-a-Service
32. Which of the following is the most important area of concern in cloud computing?
a) Scalability
b) Storage
c) Security
d) All of the mentioned
View Answer
Answer: c
Explanation: When your data goes to and is stored on systems that are no longer under your
control, you run the risk of it being intercepted or misused by outsiders. Only an authorized user
can access the save data.
33. Which of the following is the most refined and restrictive cloud service model?
a) PaaS
b) IaaS
c) SaaS
d) CaaS
View Answer
Answer: a
Explanation: The most refined and restrictive service model is when a service needs the client to
use the entire hardware/software/application stack.
34. Which of the following is not a property of cloud computing?
a) virtualization
b) composability
c) scalability
d) all of the mentioned
View Answer
Answer: b
Explanation: Virtualization is achieved by creating a virtual environment of storage devices and
server operating systems. Composability is the ability to build applications from component
parts.
Answer: c
Explanation: Strategy Phase, Planning Phase, and Deployment Phase are the three phases of
Cloud Planning.
Answer: d
Explanation: SaaS stands for Software-as-a-Service. In SaaS, the provider hosts the application
and is made available to the users. Google Workspace, Dropbox, Salesforce are examples of an
IaaS service.
Answer: a
Explanation: The abstraction layer abstracts and controls resources using a reference object,
making it easier for users to transfer programs to multiple clouds. The details of system
implementation from users and developers are abstracted by Cloud computing.
38. In which of the following service models the hardware is virtualized in the cloud?
a) NaaS
b) PaaS
c) CaaS
d) IaaS
View Answer
Answer: d
Explanation: Infrastructure-as-a-Service (IaaS) is an acronym for Infrastructure-as-a-Service.
Users of IaaS get computer resources such as software or hardware tools through the internet. In
this model, the service vendor owns the equipment: servers, storage, network infrastructure, and
so forth.
Answer: c
Explanation: BMC Cloud Computing Initiative is used for Cloud planning, lifecycle
management, optimization, and guidance.
40. Which of the following is a workflow control and policy based automation service by CA?
a) CA Cloud Compose
b) CA Cloud Insight
c) CA Cloud Optimize
d) CA Cloud Orchestrate
View Answer
Answer: d
Explanation: CA Cloud Orchestrate service is workflow control and policy-based automation
tool. It automates IT processes for cloud deployments, including provisioning and configuration
of infrastructure and applications, management of cloud resources, orchestration of workflows
across hybrid and multi-cloud environments, and compliance enforcement through policy-based
automation..
41. An application that provides for transaction overflow in a reservation system is an example
of ____________
a) cloud bursting
b) cloud provisioning
c) cloud servicing
d) all of the mentioned
View Answer
Answer: a
Explanation: Most systems built to perform cloud bursting have a simple underlying design
1. Distributed Computing
2. Cloud Computing
3. Soft Computing
4. Parallel Computing
1. Hadoop
2. Intranet
3. Web Applications
4. All of the mentioned
3) Cloud computing is a kind of abstraction which is based on the notion of combining physical
resources and represents them as _______resources to users.
1. Real
2. Cloud
3. Virtual
4. none of the mentioned
4) Which of the following has many features of that is now known as cloud computing?
ADVERTISEMENT
1. Web Service
2. Softwares
3. All of the mentioned
4. Internet
5) Which one of the following cloud concepts is related to sharing and pooling the resources?
1. Polymorphism
2. Virtualization
3. Abstraction
4. None of the mentioned
1. The popularization of the Internet actually enabled most cloud computing systems.
2. Cloud computing makes the long-held dream of utility as a payment possible for you,
with an infinitely scalable, universally available system, pay what you use.
3. Soft computing addresses a real paradigm in the way in which the system is deployed.
4. All of the mentioned
7) Which one of the following can be considered as a utility is a dream that dates from the
beginning of the computing industry itself?
1. Computing
2. Model
3. Software
4. All of the mentioned
1. Reliability
2. Abstraction
3. Productivity
4. All of the mentioned
ADVERTISEMENT
ADVERTISEMENT
1. Through cloud computing, one can begin with very small and become big in a rapid
manner.
2. All applications benefit from deployment in the Cloud.
3. Cloud computing is revolutionary, even though the technology it is built on is
evolutionary.
4. None of the mentioned
12) In which one of the following, a strategy record or Document is created respectively to the
events, conditions a user may face while applying cloud computing mode.
1. We recognize the risks that might be caused by cloud computing application from a
business perspective.
2. We identify the applications that support the business processes and the technologies
required to support enterprise applications and data systems.
3. We formulate all kinds of plans that are required to transform the current business to
cloud computing modes.
4. None of the above
4) Which one of the following refers to the non-functional requirements like disaster recovery,
security, reliability, etc.
1. Service Development
2. Quality of service
3. Plan Development
4. Technical Service
6) This phase involves selecting a cloud provider based on the Service Level Agreement (SLA),
which defines the level of service the provider receives.
ADVERTISEMENT
ADVERTISEMENT
1. Strategy Phase
2. Planning Phase
3. Deployment Phase
4. Development Phase
8) Which of the model involves the special types of services that users can access on a Cloud
Computing platform?
1. Service
2. Planning
3. Deployment
4. Application
1. Sourcing
2. Ownership
3. Reliability
4. PaaS
ADVERTISEMENT
ADVERTISEMENT
1. 2
2. 3
3. 4
4. 5
1. 4
2. 3
3. 2
4. 5
ADVERTISEMENT
ADVERTISEMENT
3) Which one of the following refers to the user's part of the Cloud Computing system?
1. back End
2. Management
3. Infrastructure
4. Front End
4) Which one of the following can be considered as the example of the Front-end?
1. Web Browser
2. Google Compute Engine
3. Cisco Metapod
4. Amazon Web Services
1. Client
2. User
3. Stockholders
4. service provider
6) Through which, the backend and front-end are connected with each other?
1. Browser
2. Database
3. Network
4. Both A and B
7) How many types of services are there those are offered by the Cloud Computing to the users?
1. 2
2. 4
3. 3
4. 5
8) The Foce.com and windows Azure are examples of which of the following?
1. IaaS
2. PaaS
3. SaaS
4. Both A and B
ADVERTISEMENT
ADVERTISEMENT
9) Which of the following is one of the backend's built-in components of cloud computing?
1. Security
2. Application
3. Storage
4. Service
10) Which of the following provides the Graphic User Interface (GUI) for interaction with the
cloud?
1. Client
2. Client Infrastructure
3. Application
4. Server
1. Virtualization
2. SOA
3. Grid Computing
4. All of the above
2) Which one of the following is a kind of technique that allows sharing the single physical
instance of an application or the resources among multiple organizations/customers?
1. Virtualization
2. Service-Oriented Architecture
3. Grid Computing
4. Utility Computing
1. It provides a logical name for a physical resource, and on-demand provides an indicator
of that physical resource.
2. In Virtualization, we analyze the strategy related problems that customers may face.
3. In Virtualization, it is necessary to compile the Multitenant properly.
4. All of the above
4) In Virtualization, which architecture provides the virtual isolation between the several
tenants?
1. IT Architecture
2. Multitenant
3. Deployment
4. Business Architecture
ADVERTISEMENT
ADVERTISEMENT
1. It is possible to exchange data between applications from different vendors without using
additional programming.
2. It provides computational resources on-demand as a metered service.
3. Service-Oriented Architecture allows using the application as a service for other
applications.
4. Both A and C
1. heterogeneous dispersed.
2. geographically dispersed.
3. Both A and B
4. None of the above
8) Managed IT services are based on the concept of which one of the following?
1. Virtualization
2. Utility Computing
3. Grid Computing
4. SOA
9) Which one of the following refers to the Distributed Computing, in which several sets of
computers distributed on multiple geographical locations and are connected with each other to
achieve a common goal?
1. Virtualization
2. SOA
3. Grid Computing
4. Utility Computing
10) Which one of the following statement is true about Grid Computing?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
1. System hypervisor
2. Software hypervisor
3. Hardware hypervisor
4. Virtualization hypervisor
2) On which one of the following hypervisor runs directly on the underlying host system, it is
also known as________?
3) Which of the following behaves like the monitor's entry point and reroutes the instructions of
the virtual machine?
1. Dispatcher
2. Allocator
3. Interpreter
4. Both A and B
1. VMA
2. VMM
3. VMS
4. VMR
1. 4
2. 3
3. 2
4. 5
1. VMware ESXi
2. Citrix XenServer
3. Microsoft Hyper-V hypervisor
4. VMware Player
7) How many main modules are needed to coordinate in order to emulate the underlying
hardware?
1. 3
2. 2
3. 4
4. 5
1. INTERPRETER
2. TYPE-2 Hypervisor
3. Both A and B
4. DISPATCHER
9) The Parallels Desktop can be considered as the example of which of the following?
1. TYPE-2 Hypervisor
2. DISPATCHER
3. TYPE-1 Hypervisor
4. INTERPRETER
1. Whenever a command begins a process, immediately the process virtual machine gets
instantiated.
2. Usually, the guest operating systems are mores faster in full virtualization as compared to
other virtualization schemes.
3. It is necessary for the full virtualization that the host OS (Operating System ) offers a
Virtual Machine Interface for the guest operating system by which the guest operating
system can access the hardware through the host VM.
4. All of the above
12) Which one of the following can be considered as the example of the Type2 Virtual Machine
monitors?
1. KVM
2. Microsoft Hyper V
3. Parallels Desktop
4. All of the above
13) Which one of the following is a type of software that supports the virtual machine?
1. Kernel
2. Hypervisor
3. VMM
4. Both B and C
14) Which one of the following runs on Xen Hypervisor?
1. Azure
2. AWS EC2
3. C AWS EC3
4. All of the above
15) Which one of the following is the type of a service that manages and creates virtual network
interfaces?
ADVERTISEMENT
1. VMware vStorage
2. Application services
3. VMware vCompute
4. VMware vNetwork
16) In which one of the following, the virtual machine simulates hardware, through which it can
be independent of the underlying system hardware?
1. Para-virtualization
2. Full virtualization
3. Emulation
4. None of the above
17) Which one of the following will be the host operating system for Windows Server?
1. VirtualLogix VLX
2. Microsoft Hyper-V
3. Xen
4. All of the above
1. Type4
2. Type2
3. Type3
4. Type1
19) Which one of the following can be considered as another name of Virtual Machine?
ADVERTISEMENT
1. Storage-as-a-Service
2. Server-as-a-Software
3. Software-as-a-Service
4. None of the above
2) Through which one of the following models, SaaS supports multiple users and offers a shared
data model?
1. single-tenancy
2. multiple-instance
3. multi-tenancy
4. None of the above
6) Which one of the following statements can be considered as the true characteristics of
software as a Service (SaaS) model?
1. Software applications are generally maintained by the service provider (or vendor)
2. SaaS provides the best cost-effective applications because they do not need any
maintenance at the customer side.
3. They can easily scale up or scale down according to the conditions.
4. All of the above
8) Which one of the following can be considered as the most complete cloud computing service
model?
1. PaaS
2. IaaS
3. CaaS
4. SaaS
1. Closed
2. Free
3. Open
4. all of the mentioned
10) Which one of the following statements is not true about SaaS?
ADVERTISEMENT
1. DaaS
2. SaaS
3. IaaS
4. PaaS
3) Which one of the following is a type of PaaS that usually allows customizing the existing
SaaS platform?
ADVERTISEMENT
4) Which one of the following of PaaS type that involves on-demand scaling and application
security?
1. 4
2. 3
3. 2
4. 5
1. CAS
2. CDSS
3. CCS
4. CDA
8) Which of the following can be considered PaaS offering?
1. Youtube
2. Google Earth
3. Google Adsense
4. Google Maps
1. The customer assumes no responsibility for maintaining the hardware, software or the
development of applications.
2. Google's App Engine platform is one of the IaaS offerings.
3. The vendor is usually responsible for all operational aspects of the services.
4. All of the above
10) Which one of the following statements is correct about the PaaS?
1. The platform as a service (or PaaS) systems usually support standards like JavaScript,
HTML, and several other rich media technologies.
2. Platform as a service provides the runtime environment for the applications.
3. The platform as a service is a completely integrated development environment.
4. All of the above
ADVERTISEMENT
1. IT-as-a-Service
2. Infrastructure-as-a-Service
3. Internet-as-a-Service
4. Interoperability-as-a-Service
2) The resources like IP addresses and VLANs are provided to the end-users by which of the
following?
1. Server virtualization.
2. Client virtualization.
3. End-user virtualization.
4. IaaS
1. SOAP
2. WSDL
3. DHML
4. SIMPLE
1. structured
2. unstructured
3. Both A and B
4. None of the above
5) How many kinds of virtual private server instances are there partitioned in the IaaS stack?
1. 3
2. 2
3. 4
4. 5
6) Which of the following forms the basis for almost all web services stacks?
1. WSDL
2. SOAP
3. UDDI
4. VMCC. SOA
7) Which of the following is the most commonly used model for description and discovery and is
also used with SOAP messaging?
1. DHML
2. VMC
3. WSDL
4. SOA
1. renting
2. virtual machine sprawl
3. security vulnerabilities
4. hypervisor
1. PaaS
2. SaaS
3. Both A and B
4. None of the above
ADVERTISEMENT
1. The Distributed Audit Service offers accountability for users accessing a system.
2. The CardSpace and OpenID specifications support the authentication type of data object.
3. Distributed transaction systems like as Cloud Computing Systems, Internetworks and
several others usually increases the obstacles faced by identity management systems.
4. All of the above
2) Which one of the following frameworks uses i-Card metaphor?
1. Higgins
2. Hughes
3. Hinges
4. XACML
3) Which of the following is a type of XML request or response language commonly used to
integrate and interrupt services that handle requests?
1. XACML
2. FIDM
3. SSP
4. SPML
4) In order to provide more secure authentication, which of the following is required at least?
1. three-factor authentication.
2. two -factor authentication.
3. four-factor authentication.
4. None of the above
5) Which one of the following groups is usually dedicated to supporting technologies that
implement enterprise mashups?
7) Which of the following allows the users to login into a several different websites with the
same single account ?
1. OpenID
2. FIDM
3. SSO
4. Identity
9) Among the following, which one has the single authentication server and manages multiple
accesses to the other systems?
1. SOAP
2. IDaaS
3. SSO
4. SOA
1. ID-as-a-Service
2. Interoperability-as-a-Service
3. Intranet-as-a-service
4. Identity-as-a-Service
2) _________ model consists of the particular types of services that you can access on a cloud
computing platform.
1. Service
2. Deployment
3. Application
4. None of the mentioned
1. The use of the word "cloud" makes reference to the two essential concepts.
2. Cloud computing abstracts systems by pooling and sharing resources
3. Cloud computing is nothing more than the Internet.
4. All of the mentioned
1. Public
2. Private
3. Hybrid
4. All of the mentioned
7) The __________ model originally did not require a cloud to use virtualization to pool
resources.
1. NEFT
2. NIST
3. NIT
4. All of the mentioned
1. One
2. Two
3. Three
4. Four
10) _______ model attempts to categorize a cloud network based on four-dimensional factors.
1. Cloud Square
2. Cloud Service
3. Cloud Cube
4. All of the mentioned
1. Public
2. Private
3. Community
4. Hybrid
1. A deployment model defines the purpose of the cloud and the nature of how the cloud is
located.
2. The service model defines the purpose of the cloud and the nature of how the cloud is
located.
3. Cloud Square Model is meant to show us that the traditional notion of a network
boundary being the network's firewall no longer applies in cloud computing.
4. All of the mentioned
4) How many types of security threshold values are actually present in the cloud cube model?
1. 1
2. 2
3. 3
4. None of the mentioned
5) Which of the following is offered by the ownership dimension of the Cloud Cube Model?
1. Proprietary
2. Owner
3. P
4. All of the mentioned
6) Which of the following is a measure of knowing whether the operation is inside or outside the
security limits?
1. Per
2. P
3. Pre
4. All of the mentioned
7) Which one of the following is related to the services offered by the Cloud?
1. Sourcing
2. Ownership
3. Reliability
4. AaaS
8) Which one of the following dimensions corresponds to two different states in the possible
eight cloud forms?
9) Which one of the following options is correct cloud infrastructure operated for the exclusive
use of an organization?
1. Public
2. Private
3. Community
4. All of the mentioned
10) Which one of the following is a type of the Cloud that is organized in such a way to serve the
common purpose or the functions?
1. Public
2. Private
3. Community
4. All of the mentioned
Answer: B
Explanation: It is the Paas (the Platform As A Services) that provides several sources or
services such as the applications, development frameworks, operating systems, virtual machines,
control structures, and transactions etc. not the AaaS (or the Application As A Service).
2) Which one of the following provides the resources or services such as the virtual
infrastructure, virtual machines, virtual storage, and several other hardware assets?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: A
Explanation: The IaaS (or Infrastructure As A Service) service provider maintains all
infrastructure, while on the other hand client is responsible for several other deployment aspects.
3) Which one of the following offers the control structures and development frameworks?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: A
Explanation: The correct answer is the IaaS (the infrastructure As a Service) because it is a kind
of cloud computing that uniquely provides resources such as the virtualized computing over the
internet.
1. The Platform as a service includes the integration features, middleware, and several other
orchestrations choreography services to the IaaS model.
2. Hybrid Cloud Computing offers xaas or "anything as a service" as the delivery of IT as a
service.
3. MaaS (or the Monitoring as a Service) is currently still an emerging piece of Cloud
Jigsaw.
4. None of the mentioned
Answer: C
Explanation: Monitoring as a service (or MaaS) provides the option of unloading a large portion
of those costs from running as a service as opposed to a complete investment in-home tool.
5) Which one of the following was owned by an organization that sells cloud services?
1. Hybrid
2. Private
3. Community
4. Public
Answer: D
Explanation: The public Cloud is one of the cloud infrastructures that are available for public
use as the alternative for the large industry group.
6) Find out which one can be considered the complete operating environment with applications,
management?
1. IaaS
2. SaaS
3. PaaS
4. All of the mentioned
Answer: B
Explanation: In the Software as a Service model (the SAAS), the application is usually provided
to the users through a thin client interface.
7) Which one of the following is considered a type of cloud computing model involving the three
different service models together?
1. CPI
2. SIP
3. SPI
4. All of the mentioned
Answer: A
Explanation: SPI is actually an acronym( or we can say the Short form of any words) for the
most standard cloud computing services models, such as the infrastructure as a Service, Platform
as a Service, and Software as a Service.
1. Compliance as a service
2. Computer as a service
3. Community as a service
4. Communication as a service
Answer: D
Explanation: The term "CAAS" stands for Communication as a service, which enables the
clients to utilize resources like the Unified Communications, and Enterprise Level PBX, VPNs,
VoIP without the expense of hosting, purchasing, and maintaining the infrastructure.
1. EC2
2. EC1
3. EC10
4. Hybrid
Answer: A
Explanation: Amazon EC2 stands for the Amazon Elastic Compute Cloud that offers the
scalable computing capacity in the AWS (or Amazon Web Services) cloud to its clients. One can
eliminate his investment in hardware upfront using the Amazon Elastic Compute Cloud and
boost the development and deployment application process.
1) Which one of the following was one of the top 5 cloud applications in late 2010?
1. Cloud backup
2. Web applications
3. Business applications
4. All of the mentioned
Answer: D
Explanation: The economics of software delivery has been shifted in a significant manner, just
like the music downloads has been shifted the delivery of the music.
1. Google's cloud involves approx ten data-centers in all over the world.
2. Data centers are sited in such a way that the overall system latency can be optimized.
3. The online shopping website, such as Flipkart.com, has the infrastructure built so that it
can support the elastic demand so the system will be capable of accommodating peak
traffic.
4. All of the above
Answer: B
Explanation: Data-centers can help lower land costs and reduce occupations.
3) Which of the following benefits is related to creating stored resources together in a system that
supports multi-tenant use?
1. On-demand self-service
2. Extensive network access
3. Resource pooling
4. All of the above
Answer: A
Explanation: The cloud service provider creates resources that support multi-tenant usage in a
system.
4) Which one of the following is something that a user can obtain it under the contract from
his/her vendor?
1. PoS
2. SoS
3. QoS
4. All of the mentioned
Answer: C
Explanation: Usually, it totally depends on the type of services being offered. One can find that
he/she does not require any software or hardware licensees in order to implement his/her
services.
5) All cloud computing applications suffer from the inherent _______ that is intrinsic in their
WAN connectivity.
1. Propagation
2. Latency
3. Noise
4. All of the mentioned
Answer: B
Explanation: While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, cloud computing may not be the best model for
you.
6) Which of the following architectural standards is working with the cloud computing industry?
1. Service-oriented architecture
2. Standardized Web services
3. Web-application frameworks
4. All of the mentioned
Answer: A
Explanation: These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and
utility computing. When your data travels over and rests on systems that are no longer under
your control, you have increased risk due to others' interception and malfeasance.
7) Which one of the following is the most important subject of concern in cloud computing?
1. Security
2. Storage
3. Scalability
4. All of the mentioned
Answer: A
Explanation: When your data travels over and rests on systems that are no longer under your
control, you have increased risk due to others' interception and malfeasance.
8) You cannot rely on a cloud provider for maintaining its _____ in the event of government
work.
1. Scalability
2. Reliability
3. Privacy
4. None of the mentioned
Answer: C
Answer: A
Explanation: This feature obviates the need for planning and provisioning.
10) _______ feature allows you to optimize your system and capture all possible transactions.
1. Scalability
2. Reliability
3. Elasticity
4. none of the mentioned
Answer: C
1. Utility
2. Elasticity
3. Low barrier to entry
4. All of the mentioned
Answer: A
Explanation: This eliminates waste and has the added benefit of shifting risk from the client.
12) Which of the following is the most refined and restrictive service model?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned
Answer: C
Explanation: When the service requires the client to use a complete
hardware/software/application stack, it is used the most refined and restrictive service model.
13) When you add a software stack, such as an operating system and applications to the service,
the model shifts to _____ model.
1. SaaS
2. PaaS
3. IaaS
4. All of the mentioned
Answer: A
Explanation: Microsoft's Windows Azure Platform is best described as currently using the SaaS
model.
Answer: C
Explanation: The Google App Engine follows PaaS (or Platform as a service).
15) Service that generally focuses on the hardware follows which one of the following service
models?
1. IaaS
2. CaaS
3. PaaS
4. All of the mentioned
Answer: A
1. High touch
2. Low touch
3. Moderate touch
4. All of the mentioned
Answer: B
Explanation: The "low touch" applications that come with low margins require committed
resources and pose less risk.
Answer: C
Explanation: The answer will be the C because it is based on the paradigm of a shared multi-
tenant utility.
Answer: C
Explanation: These attributes change how applications are created, priced, and delivered.
a) Type 1
b) Type 2
c) Type 3
d) All of the mentioned
View Answer
Answer: a
Explanation: A hypervisor running on bare metal is a Type 1 VM or native VM.
Answer: c
Explanation: Google performs server load balancing to distribute the processing load and to get
high utilization rates.
3. Which of the following is another name for the system virtual machine?
a) hardware virtual machine
b) software virtual machine
c) real machine
d) none of the mentioned
View Answer
Answer: a
Explanation: Some virtual machines are designed to run only a single application or process and
are referred to as process virtual machines.
advertisement
ADVERTISEMENT
Answer: a
Explanation: VMM is another name for Hypervisor.
Answer: d
Explanation: This makes virtual machine technology very useful for running old versions of
operating systems, testing applications in what amounts to a sandbox.
Note: Join free Sanfoundry classes at Telegram or Youtube
Answer: a
Explanation: Because it is a complete simulation of the hardware that it is running on.
Answer: d
Explanation: Type 1 VMs have no host operating system because they are installed on a bare
system.
Answer: c
Explanation: Xen is used by Amazon Web Services to provide Amazon Machine Instances
(AMIs).
9. Which of the following will be the host operating system for Windows Server?
a) VirtualLogix VLX
b) Microsoft Hyper-V
c) Xen
d) All of the mentioned
View Answer
Answer: b
Explanation: Type 2 virtual machines are installed over a host operating system.
10. Which of the following should be placed in second lowermost layer for the following figure?
Answer: a
Explanation: Examples of Type 2 Virtual Machine Monitors are Containers, KVM, Microsoft
Hyper V and Parallels Desktop for Mac.
Creating more logical IT resources, within one physical system is called ________.
(a) Load balancing
1. (b) Hypervisor
(c) Virtualization
(d) None of these
Answer:
Option (c)
What is most commonly used for managing the resources for every virtual system?
(a) Load balancer
2. (b) Hypervisor
(c) Router
(d) Cloud
Answer:
Option (b)
Which is not a benefit of virtualization?
(a) Flexible and efficient allocation of resources
3. (b) Lowers the cost of IT infrastructure
(c) Remote access and rapid scalability
(d) Run on single operating system
Answer:
Option (d)
Answer:
Option (a)
It is an array of servers that are managed by a virtual storage system.
(a) Application virtualization
5. (b) Network virtualization
(c) Desktop virtualization
(d) Storage virtualization
Answer:
Option (d)
It has the ability to run multiple virtual networks with each has a separate control and data
plan.
(a) Application virtualization
6.
(b) Network virtualization
(c) Desktop virtualization
(d) Storage virtualization
Answer:
Option (b)
Identify the correct option: The main benefits of it are user mobility, portability, and easy
management of software installation, updates, and patches.
(a) Application virtualization
7.
(b) Network virtualization
(c) Desktop virtualization
(d) Storage virtualization
Answer:
Option (c)
Which is the correct type of full virtualization?
(a) Software assisted
8. (b) IoT assisted
(c) Hardware-assisted
(d) Software assisted and Hardware-assisted both
Answer:
Option (d)
9. Identify virtualizations: It emulates the hardware using the software instruction sets.
(a) Software assisted full virtualizations
(b) IoT assisted full virtualizations
(c) Hardware-assisted full virtualizations
(d) None of these
Answer:
Option (a)
Identify virtualizations: Due to binary translation, it often criticized for performance issues.
(a) Software assisted full virtualizations
10. (b) IoT assisted full virtualizations
(c) Hardware-assisted full virtualizations
(d) None of these
Answer:
Option (a)
11. Identify
virtualizations: Guest OS’s instructions might allow a virtual context to execute
privileged instructions directly on the processor, even though it is virtualized.
(a) Software assisted full virtualizations
(b) IoT assisted full virtualizations
(c) Hardware-assisted full virtualizations
(d) None of these
Answer:
Option
(c)
________refers to the use of a remote computer from a local computer where the actual
computer user is located.
(a) Virtual machine
12.
(b) Virtual computing
(c) Virtual cloud
(d) Virtual OS
Answer:
Option (b)
________is an operating system or application environment that is installed on software,
13. which reproduces dedicated hardware virtually.
(a)
Virtual
machine
(b) Virtual computing
(c) Virtual
cloud
(d) None of these
Answer:
Option (a)
(c) Virtual
cloud
(d) Load balancer
Answer:
Option (d)
15. What is the need for load balancing in
cloud computing?
(a) Increased scalability
Ability to handle sudden traffic
(b)
spikes
(c) A and B both
(d) None of these
Answer:
Option (c)
16. Which of these network resources can be load
balanced?
(a) Servers
(b) Routing mechanism
(c) A and B both
(d) None of these
Answer:
Option (c)
The _________ is what controls and allocates what portion of hardware resources
each operating system should get, in order every one of them to get what they need
17. and not to disrupt each other.
(a) hypervisor
(b)
virtual
machine
(c) virtual
cloud
None of
(d)
these
Answer:
Option (a)
A ___________ makes a copy or a clone of the entire computer system
18. inside a single file.
(a)
virtualization
(b) machine imaging
(c) parallel processing
(d) None of these
Answer:
Option (b)
Full form of AMI
(a) Amazon Memory Image
19. (b) Amazon Memory Instance
(c) Amazon Machine Instance
(d) Amazon Machine Image
Answer:
Option (d)
20. Which of these is an example of a
cloud marketplace?
(a) AWS marketplace
(b) Oracle marketplace
(c) Microsoft Windows Azure marketplace
(d) All of these
Answer:
Option (d)
Option
(c)
Point out the correct statement.
A client can request access to a
22. (a)
cloud service from any location
(b) A
cloud has multiple application instances and directs
requests to an instance based on conditions
(c)
Computers can be partitioned into a set of
virtual
machines
with each
machine
being
assigned
a
workload
(d) All of the
mentioned
Answer:
Option (d)
Point out the wrong statement.
Load balancing virtualizes systems and resources by mapping a
(a)
logical address to a physical address
23.
Multiple instances of various Google applications are running
(b)
on different hosts
(c) Google uses hardware
virtualization
(d) All of these
Answer:
Option (c)
Answer:
Option (a)
25. An operating system running on a Type ______
VM is full virtualization.
(a) 1
(b) 2
(c) 3
(d) All of these
Answer:
Option (a)
26. In _______ the
virtual machine simulates hardware, so it can be independent of the underlying system
hardware.
(a) paravirtualization
(b) full
virtualization
(c) emulation
(d) None of these
Answer:
Option (c)
Which of the following operating system support operating system virtualization?
(a) Windows NT
27. (b) Sun Solaris
(c) Windows XP
(d) Compliance
Answer:
Option (b)
8) The Foce.com and windows Azure are examples of which of the following? 1. IaaS 2. PaaS 3.
SaaS 4.Both A and B Answer: B Explanation: Both Force.com and Windows Azure are
examples of the Platform as a service 9) Which of the following is one of the backend's built-in
components of cloud computing? 1. Security 2. Application 3. Storage 4. Service Answer: A
Explanation: Security is one of the back-end's built-in components of cloud computing. 10)
Which of the following provides the Graphic User Interface (GUI) for interaction with the cloud?
1. Client 2.Client Infrastructure 3. Application 4. Server Answer: B Explanation: The Client
Infrastructure is one of the front-end components that provide the way of communication in the
form of a Graphic User Interface to communicate with the Cloud.
Multiple Choice Questions (MCQ's) Based on the "Technologies" used in the Cloud Computing.
1) Which one of the following a technology works behind the cloud computing platform? 1.
Virtualization 2. SOA 3.Grid Computing
4.All of the above Answer: D Explanation: Several technologies work behind the Cloud
Computing platforms, which provide features like Flexibility, reliability, and usability to cloud
computing. 2) Which one of the following is a kind of technique that allows sharing the single
physical instance of an application or the resources among multiple organizations/customers? 1.
Virtualization 2.Service-Oriented Architecture 3.Grid Computing 4.Utility Computing Answer:
A Explanation: Virtualization is a kind of technique that allows us to share the single physical
instance of a resource or application between several organizations/users. 3) Which one of the
following statement is true about the Virtualization? 1.It provides a logical name for a physical
resource, and on-demand provides an indicator of that physical resource. 2.In Virtualization, we
analyze the strategy related problems that customers may face. 3.In Virtualization, it is necessary
to compile the Multitenant properly. 4.All of the above Answer: A Explanation: It provides a
logical name to the physical resource when the demand is correct regarding virtualization and
provides an indicator of that physical resource. 4) In Virtualization, which architecture provides
the virtual isolation between the several tenants? 1.IT Architecture 2. Multitenant 3. Deployment
4.Business Architecture Answer: B
4. SOA Answer: B 9) Which one of the following refers to the Distributed Computing, in which
several sets of computers distributed on multiple geographical locations and are connected with
each other to achieve a common goal?
1. Virtualization 2. SOA 3.Grid Computing 4.Utility Computing Answer: C 10) Which one of
the following statement is true about Grid Computing? 1.Pieces combine small tasks into
complex tasks 2.The subscription tier plays an important role in grid computing. 3.Breaks
complex tasks into small operations 4.Both A and C Answer: C Multiple Choice Questions
(MCQ's) based on the "Hypervisors" used in the Cloud Computing. 1) Which one of the
following given programs provides the isolation (abstraction) and partitioning? 1.System
hypervisor 2.Software hypervisor 3.Hardware hypervisor 4.Virtualization hypervisor Answer: D
2) On which one of the following hypervisor runs directly on the underlying host system, it is
also known as ? 1.Bare metal hypervisor 2.Hosted Hypervisor 3.Native Hypervisor 4.Both A and
C Answer: D 3) Which of the following behaves like the monitor's entry point and reroutes the
instructions of the virtual machine? 1. Dispatcher 2. Allocator 3. Interpreter 4.Both A and B
Answer: A 4) Which one of the following is also known as a Hypervisor? 1. VMA 2. VMM 3.
VMS 4. VMR Answer: B 5) How many kinds of Hypervisor are there? 1. 4 2. 3 3. 2 4. 5
Type 1 hypervisors directly access underlying machine resources. They can implement their own
custom resource allocation strategies to service their VMs. Type 2 hypervisors negotiate resource
allocation with the operating system, which makes the process slower and less efficient.
2 Virtualization modes
Virtualization is a technology that provides a way for a machine (VM Host Server) to run
another operating system (VM Guest) on top of the host operating system. There are two basic
modes of hosting VM Guests on virtual machines—full virtualization mode and paravirtual
mode.
Is Hyper-V type 1 or 2?
The Type 1 hypervisor itself effectively acts as the host OS. Where paravirtualization
attempts to implement a virtualization layer below a modified host OS, Type 2 (guest)
virtualization simply adds a hypervisor as an ordinary application installed above a standard
unmodified OS.Mar 11, 2024
Central processing unit (CPU) virtualization is the fundamental technology that makes
hypervisors, virtual machines, and operating systems possible. It allows a single CPU to be
divided into multiple virtual CPUs for use by multiple VMs.
Load balancing. Besides listing requirements, cloud providers maintain the VMs and
other resources, so users are not obliged to think of the hardware or the setup. ...
Resource Allotment. ...
Resource Isolation. ...
Load balancing. ...
Portability.