Professional Documents
Culture Documents
D. EC2
D. Joyent
D. Rapid elasticity
11. ________ describes a cloud service that can only be accessed by a limited amount of people.
A. Data center
B. Private cloud
C. Virtualization
D. Public cloud
12. ________ describes a distribution model in which applications are hosted by a service
provider and made available to users.
A. Infrastructure-as-a-Service (IaaS)
B. Platform-as-a-Service (PaaS)
C. Software-as-a-Service (SaaS)
D. Cloud service
13. _________ is the feature of cloud computing that allows the service to change in size or
volume in order to meet a users needs.
A. Scalability
B. Virtualization
C. Security
D. Cost-savings
14. State whether the statements as True or False:
P) Access to a Cloud environment always costs more money compared to a traditional desktop
environment.
Q) A Cloud environment can be accessed from anywhere in the world as long as the user has
access to the Internet.
A. BOTH P & Q ARE TRUE
B. BOTH P & Q ARE FALSE
C. ONLY P IS TRUE
D. ONLY Q IS TRUE
15. What is there no need to do with cloud computing?
A. Download anything
C. Use a computer or hand-held device
B. Use a password
D. Look at a screen
B. Face-to-face
C. Asynchronous
D. Barrier-free
B. Skype
C. Twitter or RSS
18. on which part of the OSI reference model would application protocols like HTTP, FTP, SSH,
Telnet be mapped?
A. Frame Relay
B. Layer 7
C. Layer 10
D. Core protocols
19. Which of the following is NOT a benefit of virtualization?
A. Improved database performance
B. Fail-over between machines
C. Multiple guest operating systems running on the physical machine
D. Better hardware capacity usage
20. What could be the impact of network downtime when using Cloud computing?
A. Integrity of data can be compromised
B. Application available may be lower for the user
C. Service provider assumes responsibility for Service Level
D. Fail-over to a local network is required
21. Which is not one of the three main categories of cloud computing services?
A. Infrastructure-as-a-Service (IaaS)
B. Platform-as-a-Service (PaaS)
C. Communication-as-a-Service (CaaS)
D. Software-as-a-Service (SaaS)
22. Which model of cloud computing services provides the servers, storage devices, and networks
for a subscriber?
A. Infrastructure-as-a-Service (IaaS)
B. Platform-as-a-Service (PaaS)
c. Communication-as-a-Service (CaaS)
D. Software-as-a-Service (SaaS)
23. Which cloud deployment model is operated solely for a single organization and its authorized
users?
A. Community cloud
B. Hybrid cloud
C. Public cloud
D. Private cloud
24. Which cloud characteristic refers to the ability of a subscriber to increase or decrease its
computing requirements as needed without having to contact a human representative of the
cloud provider?
A. Rapid elasticity
B. On-demand self service C. Broad network access
D. Resource pooling
25. Which cloud deployment model is managed by a cloud provider, has an infrastructure that is
offsite, and is accessible to the general public?
A. Community cloud
B. Hybrid cloud
C. Public cloud
D. Private cloud
26. In which category of SaaS services does customer relationship management (CRM) software
fall?
A. Consumer services
B. Communication services
C. Infrastructure services
D. Business services
27. Which statistic correctly represents cloud computing?
A. In 2009, Western Europe received a majority of cloud computing revenue.
B. Global cloud computing revenue for 2009 exceeded $16 million.
C. Cloud computing growth is five times greater than any traditional IT product
D. In 2009, the main cloud computing service was PaaS.
28. Which is considered the most widely used cloud computing service?
A. Infrastructure-as-a-Service (IaaS)
B. Platform-as-a-Service (PaaS)
C. Communication-as-a-Service (CaaS)
D. Software-as-a-Service (SaaS)
29. Interoperability is enabled by _________.
A. a cloud operating system
B. middlewareC. a community cloud
D. a composite cloud
30. Which refers to the practice of a primary cloud provider offering services that are distributed
through another cloud provider?
A. Hybrid cloud
B. Composite cloud C. Virtualization
D. Grid computing
31. What is Cloud Computing replacing?
A. Corporate data centers
B. Expensive personal computer hardware
C. Expensive software upgrades
D. All of the above
32. What is the number one concern about cloud computing?
A. Too expensive
B. Security concerns
C. Too many platforms
33. Which of these companies is not a leader in cloud computing?
A. Google
B. Amazon
C. Blackboard
D. Microsoft
D. Accessibility
D.NONE
D. Amazon EC2
D. Internet
40. Which of these should a company consider before implementing cloud computing technology?
A. Employee satisfaction
B. Potential cost reduction
C. Information sensitivity
D. All of the above
41. Which of the following is the BEST definition for the Cloud?
A. A large pool of usable and accessible virtualized resources
B. A software package from Google for Office use
C. A series of interconnected Web sites
D. Ethernet based access to virtualized applications
42. What would be a typical use for the XMPP protocol?
A. Instant Messaging and Presence Service
B. Network Analyzer
C. Antivirus functionality for firewalls
D. Systems management of virtual servers
43. Which functionality is best suited to provide single sign-on on a cloud application using your
own Active Directory server?
A. Federation services
B. Virtual Private Network C. Hypertext Transfer Protocol
D. None of the above
44. Which of the following is most typical of a Local Cloud implementation?
A. It is not shared with other users
B. Servers are kept in-house
C. The application runs as a service
D. The Service Provider ensures end-to-end coverage
45. Which of the following may typically have a negative impact on the business case for Cloud
computing?
A. Costs of bandwidth and networking
B. Costs of operational staffing
C. Costs of new hardware investments
D. Technical knowledge of the Service Desk
46. When read access to data by unauthorized people from the Internet is a threat, which aspect
of security is at risk?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
47. What is the hypervisor used for?
A. Linking between applications
D. Virtualization
B. Strong authentication
C. Privacy regulations
D. distributed
50. Which statement best describes the relationship between application, server, and client in a
multitenancy environment?
A. Single instance of software running on a server and serves one client.
B. Single instance of software running on a server and serves multiple clients.
C. Multiple instances of software running on a server and serves multiple clients.
D. Multiple instances of software running on multiple servers and serves one client.