Professional Documents
Culture Documents
1. _________ model consists of the particular types of services that you can access on a cloud
computing platform.
a) Service b) Deployment c) Application d) None of the mentioned
Answer:a- Service models describe the type of service that the service provider is offering.
7. The __________ model originally did not require a cloud to use virtualization to pool resources.
a) NEFT b) NIST c) NIT d) All of the mentioned
Answer:b NIST stands for National Institute of Standards and Technology.
8. _______ model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square b) Cloud Service c) Cloud Cube d) All of the mentioned
Answer:c Cloud Cube model is mainly used for secure collaboration.
13. Which of the following is provided by ownership dimension of Cloud Cube Model ?
a) Proprietary b) Owner c) P d) All of the mentioned
Answer:b:P stands for Proprietary ownership.
14. __________is a measure of whether the operation is inside or outside the security boundary or
network firewall.
a) Per b) P c) Pre d) All of the mentioned Answer:d :Per stands for Perimeterised.
17. ________ dimension corresponds to two different states in the eight possible cloud forms.
a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned
Answer:d:The sourcing dimension addresses the deliverer of the service.
18. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public b) Private c) Community d) All of the mentioned
Answer:b:The cloud may be managed by that organization or a third party.
19. __________ cloud is one where the cloud has been organized to serve a common function or
purpose. a) Public b) Private c) Community d) All of the mentioned
Answer:c :A community cloud may be managed by the constituent organization(s) or by a third party.
20. A hybrid cloud combines multiple clouds where those clouds retain their unique identities, but
are bound together as a unit.
a) Public b) Private c) Community d) Hybrid
Answer:d:A hybrid cloud may offer standardized or proprietary access to data and applications, as well as
application portability.
Benefits and Drawbacks of Cloud Computing
21. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup b) Web applications c) Business applications d) All of the mentioned
Answer:d:Cloud computing has shifted the economics of software delivery in a manner similar to the way
that music downloads have shifted the delivery of commercial music.
23. Which of the following benefit is related to creates resources that are pooled together
in a system that supports multi-tenant usage ?
a) On-demand self-service
b) Broad network access
c) Resource pooling:
d) All of the mentioned
Answer:a :A cloud service provider creates resources that are pooled together in a system that supports
multi-tenant usage.
24. The _____ is something that you can obtain under contract from your vendor.
a) PoS b) QoS c) SoS d) All of the mentioned
Answer:b:Depending upon the type of service being offered, you may find that you do not require
hardware or software licenses to implement your service.
26. All cloud computing applications suffer from the inherent _______ that is intrinsic in
their WAN connectivity.
a) propagation b) latency c) noise d) All of the mentioned
Answer:b While cloud computing applications excel at large-scale processing tasks, if your application
needs large amounts of data transfer, cloud computing may not be the best model for you.
28. Which of the following is most important area of concern in cloud computing ?
a) Security b) Storage c) Scalability d) All of the mentioned
Answer:a:When your data travels over and rests on systems that are no longer under your control, you
have increased risk due to the interception and malfeasance of others.
29. You cant count on a cloud provider maintaining your _____ in the face of government
actions.
a) scalability b) reliability c) privacy d) None of the mentioned
Answer:c:Cloud computing industry continues to address security concerns.
30. Which of the following architectural standards is working with cloud computing
industry ? a) Service-oriented architecture b) Standardized Web services
c) Web-application frameworks d) All of the mentioned
Answer:a:These standards help to enable different business models that cloud computing vendors can
support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility computing.
31. Which of the following is one of the unique attribute of Cloud Computing?
a) utility type of delivery b) elasticity c) low barrier to entry d) All of the mentioned
Answer:d:These attributes change how applications are created, priced, and delivered.
33. Applications that work with cloud computing that have low margins and usually low risk
are : a) high touch b) low touch c) moderate touch d) All of the mentioned
Answer:b:The high touch applications that come with high margins require committed resources and
pose more of a risk.
34. A service that concentrates on hardware follows the _________ as a Service model.
a) IaaS b) CaaS c) PaaS d) All of the mentioned Ans:a :Amazon web service follows PaaS model.
36. When you add a software stack, such as an operating system and applications to the
service, the model shifts to _____ model.
a) SaaS b) PaaS c) IaaS d) All of the mentioned
Answer:a :Microsofts Windows Azure Platform is best described as currently using SaaS model.
37. Which of the following is most refined and restrictive service model?
a) IaaS b) CaaS c) PaaS d) All of the mentioned
Answer:C:When the service requires the client to use a complete hardware/software/application
stack, it is using the most refined and restrictive service model.
39. _______ feature allows you to optimize your system and capture all possible transactions.
a) scalability b) reliability c) elasticity d) None of the mentioned
Answer:c You have the ability to right-size resources as required.
40. _______ enables batch processing, which greatly speeds up high-processing applications.
a) Scalability b) Reliability c) Elasticity d) Utility
Answer:a This feature obviates the need for planning and provisioning.
Laws of Cloudonomics
41. _______ blurs the differences between a small deployment and a large one because
scale becomes tied only to demand.
a) Leading b) Pooling c) Virtualization d) All of the mentioned
Answer:b The virtualization of pooled resourcesprocessors or compute engines, storage, and network
connectivityoptimizes these investments and allows the cloud provider to pass along these economies
to customers.
47. Weinman argues that a large clouds size has the ability to repel ______ and DDoS
attacks better than smaller systems do.
a) sniffers b) botnets c) trojan horse d) All of the mentioned
Answer:b Superiority in numbers is the most important factor in the result of a combat.
49. A __________ site is one that is environmentally friendly: locations that are on a
network backbone. a) Greenfield b) redfield c) greenful d) None of the mentioned
Answer:a Private datacenters tend to be located in places where the company or unit was founded or
acquired.
50. The peak of the sum is never ________ than the sum of the peaks.
a) smaller b) greater c) equal to d) None of the mentioned
Answer:b A cloud can deploy less capacity because the peaks of individual tenants in a shared system
are averaged over time by the group of tenants.
51. Which of the following is one of the property that differentiates cloud computing ?
a) scalability b) virtualization c) composability d) All of the mentioned
Answer:c:Composability is the ability to build applications from component parts.
53. A _________ is a cloud computing service that is both hardware and software.
a) service b) platform c) model d) All of the mentioned
Answer:b:Virtual appliances are an important example of a platform.
54. Cloud computing doesnt require that ________ and software be composable.
a) cloud b) database c) hardware d) All of the mentioned
Answer:c:It is a highly desirable characteristic from a developer or users standpoint.
56. The most commonly used set of protocols uses ______ as the messaging format.
a) XML b) JSON c) BSON d) All of the mentioned
Answer:a:Cloud computing builds on the architecture developed for staging large distributed network
applications on the Internet.
59. A ________ cloud requires virtualized storage to support the staging and storage of data.
a) soft b) compute c) local d) None of the mentioned
Answer:b :From a users perspective, it is important that the resources appear to be infinitely scalable, that
the service be measurable, and that the pricing be metered.
60. A _______ system uses components to assemble services that can be tailored for a specific
purpose using standard parts.
a) reliable b) scalable c) composable d) None of the mentioned
Answer:c:Applications built in the cloud often have the property of being built from a collection of
components, a feature referred to as composability.
61. A _______ service provider gets the same benefits from a composable system that a user does.
a) CaaS b) AaaS c) PaaS d) All of the mentioned
Answer:c :If you are a PaaS or SaaS service provider and your task is to create the platform or service
presented to the developer, reseller, or user, the notion of working with a composable system is still a very
powerful one.
66. A service provider reselling an ____ may have the option to offer one module to customize the
information.
a) CaaS b) AaaS c) PaaS d) SaaS Answer:d :Modifications are generally severely limited.
68. Which of the architectural layer is used as front end in cloud computing ?
a) client b) cloud c) soft d) All of the mentioned
Ans:a:Cloud computing may be differentiated from older models by describing an encapsulated
information technology service that is often controlled through an Application Programming Interface (API).
71. Which of the following provider rely on virtual machine technology to deliver servers ?
a) CaaS b) AaaS c) PaaS d) IaaS
Answer:d :Most large Infrastructure as a Service (IaaS) providers rely on virtual machine technology that
can run applications.
74. Applications such as a Web server or database server that can run on a virtual machine image
are referred to as :
a) virtual server b) virtual appliances c) machine imaging d) All of the mentioned
Answer:b:The name virtual appliance is a little misleading because it conjures up the image of a machine
that serves a narrow purpose.
76. _________ allows different operating systems to run in their own memory space.
a) VMM b) VMc c) VMM d) All of the mentioned
Answer:c VMM manages I/O for the virtual machines.
77. Amazon Machine Images are virtual appliances that have been packaged to run on the gird of
____ nodes. a) Ben b) Xen c) Ken d) Zen
Answer:b :You run across virtual appliances in IaaS systems such as Amazons Elastic Compute Cloud.
78. Which of the following offers virtual appliances, including ones based on Windows, all of which
run on VMware Player? a) Bagvapp b) Jcinacio c) HelpdeskLive d) All of the mentioned
Answer:a :Virtual appliances have begun to affect the PC industry in much the same way that
application stores have affected the cell phone industry.
79. ________ offers various Linux distributions upon which you can build a virtual machine.
a) Bagvapp b) Jcinacio c) HelpdeskLive d) All of the mentioned
Answer:b:Jcinacio has Ubuntu appliances.
83. Which of the following lets a Web service advertise itself in terms of a collection of endpoints ?
a) WSDL b) VMc c) SOAP d) All of the mentioned
Answer:a Explanation:The most commonly used model for discovery and description used with SOAP
messaging is the Web Services Description Language (WSDL).
87. _________ is a cloud computing service model in which hardware is virtualized in the cloud.
a) IaaS b) CaaS c) PaaS d) None of the mentioned
Answer:a :In this particular model, the service vendor owns the equipment: servers, storage, network
infrastructure, and so forth.
88. Which of the following is fundamental unit of virtualized client in an IaaS deployment ?
a) workunit b) workspace c) workload d) All of the mentioned
Ans:c:A workload simulates ability of a certain type of real or physical server to do an amount of work.
89. How many types of virtual private server instances are partitioned in an IaaS stack ?
a) one b) two c) three d) All of the mentioned
Answer:c The three workloads require three different sizes of computers: small, medium, and large.
90. Which of the following correctly represents cloud computing ecosystem ?
a) b)
c) d)
Answer:a You can broadly partition cloud computing into four layers that form a cloud computing
ecosystem.
IaaS.
91. Which of the following content is allowed as per virtual appliance block diagram shown below?
93. Which of the following is based on the IETF Session Initiation Protocol ?
a) WSDL b) SIMPLE c) SOAP d) All of the mentioned
Answer:b Explanation:SIMPLE is an open standard protocol.
94. Which of the following is a a third-party VPN based on Googles GoogleTalk ?
a) Hotspot VPN b) Gbridge c) AnchorFree Hotspot Shield d) All of the mentioned
Answer:b:Gbridge is an interesting solution that illustrates the use of VPN over a cloud connection.
97. _________ is designed specifically to run connected to the cloud as a dedicated cloud client.
a) Harvera Tablet OS b) Fedora Netbook OS c) Jolicloud Netbook OS d) None of the mentioned
Answer:c Explanation:Jolicloud concentrates on building a social platform with automatic software
updates and installs.
100. Pods are aggregated into pools within an IaaS region or site called an _________ zone.
a) restricted b) unavail c) availability d) None of the mentioned
Answer:c Explanation:In very large cloud computing networks, when systems fail, they fail on a pod-by-
pod basis, and often on a zone-by-zone basis.
PaaS Platform as a Service.
101. ______ offering provides the tools and development environment to deploy applications on
another vendors application.
a) PaaS b) IaaS c) CaaS d) All of the mentioned
Answer:b Explanation:PaaS tool is a fully integrated development environment.
104. _________ serves as a PaaS vendor within Google App Engine system.
a) Google b) Amazon c) Microsoft d) All of the mentioned
Answer:a Explanation:Google offers many of its Web service applications to customers as part of this
service model.
108. ____provides virtual machines, virtual storage, virtual infrastructure, and other hardware
assets.
a) IaaS b) SaaS c) PaaS d) All of the mentioned
Answer:a Explanation:The IaaS service provider manages all the infrastructure, while the client is
responsible for all other aspects of the deployment.
109. Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to :
a) IaaS b) SaaS c) PaaS d) All of the mentioned
Answer:c Explanation:In AWS, the CCS is the AWS Management Console.
114. Which of the following SaaS platform is with an exposed API (Application program
interface)? a) salesforce.com b) amazon.com c) flipkart.com d) All of the mentioned
Answer:a Explanation:SaaS does not necessarily mean that the software is static or monolithic.
117. _______ applications have a much lower barrier to entry than their locally installed
competitors. a) IaaS b) CaaS c) PaaS d) None of the mentioned
Answer:d Explanation:Such applications feature automated upgrades, updates, and patch management
and much faster rollout of changes.
118. SaaS supports multiple users and provides a shared data model through _________ model.
a) single-tenancy b) multi-tenancy c) multiple-instance d) All of the mentioned
Answer:b Explanation:The alternative of software virtualization of individual instances also exists, but is
less common.
120. The componentized nature of SaaS solutions enables many solutions to support a feature
called : a) workspace b) workloads c) mashups d) All of the mentioned
Answer:c Explanation:A mashup is an application that can display a Web page that shows data and
supports features from two or more sources.
121. Which of the following is example of vertical cloud that advertise CaaS capabilities?
a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned
Answer:d Explanation:Its much easier to envisage a CaaS system built inside a private cloud where
the data is under the control of a single entity.
123. Which of the following allows a distributed ID system to write and enforce custom policy
expressions ?
a) XACML b) XML c) SOAP d) None of the mentioned
Answer:a Explanation:This is a general-purpose authorization policy language.
127. ________ as a Service is a hosted application that is the cloud equivalent of a traditional
desktop application. a) Software b) Platform c) Analytics d) Compliance
Answer:a Explanation:Most of the cloud computing compliance systems to date have been built using
private clouds.
130. ________ as a Service is a development environment that builds upon an existing cloud
computing application infrastructure.
a) Software b) Platform c) Analytics d) Compliance
Answer:b Explanation:Service types are models upon which distributed applications are created and
hosted.
133. Which of the following group is dedicated to support technologies that implement enterprise
mashups ?
a) Open Alliance Apache b) Open Mashup Alliance c) Open Tech Alliance d) None of the mentioned
Answer:b Explanation:This group predicts that the use of mashups will grow by a factor of 10 within just
a few years.
136. __________ authentication requires the outside use of a network security or trust service
a) SSO b) Single factor c) Multi factor d) All of the mentioned
Answer:c Explanation:More secure authentication requires the use of at least two-factor authentication.
137. ________ is assignment of a network identity to a specific MAC address that allows systems
to be found on networks.
a) Internet Hardware Addresses b) Ethernet Software Addresses
c) Ethernet Hardware Addresses d) None of the mentioned
Answer:c Explanation: Network interfaces are identified uniquely by Media Access Control (MAC)
addresses, which alternatively are referred to as Ethernet Hardware Addresses.
138. _________ is one of the more expensive and complex areas of network computing.
a) Multifactor Authentication b) Fault tolerancy c) Identity protection d) All of the mentioned
Answer:c Explanation:Ticket or token providing services, certificate servers, and other trust
mechanisms all provide identity services that can be pushed out of private networks and into the cloud.
140. Which of the following figure fully represent standards needed by IDaaS applications for
interoperability ?
a) b)
c) d)
Answer:a Explanation:Cloud computing IDaaS applications must rely on a set of developing industry
standards to provide interoperability.
141. Any software application that complies with the standard accepts an _______ that is
authenticated by a trusted provider.
a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned
Answer:a Explanation:When an identity is created in an OpenID system, that information is stored in the
system of any OpenID service provider and translated into a unique identifier.
143. Which of the following allows a distributed ID system to write and enforce custom policy
expressions?
a) XACML b) XML c) SOAP d) None of the mentioned
Answer:a Explanation:This is a general-purpose authorization policy language.
144. _________ is a standard of OASISs PSTC that conforms to the SOA architecture.
a) XACML b) SPML c) SML d) All of the mentioned
Answer:b Explanation:SPML is an XML request/response language that is used to integrate and
interoperate service provisioning requests.
145. Point out the wrong statement :
a) Distributed transaction systems such as internetworks or cloud computing systems magnify the
difficulties faced by identity management systems
b) The Distributed Audit Service provides accountability for users accessing a system
c) The OpenID and CardSpace specifications support authentication type of data object
d) None of the mentioned
Answer:c Explanation:OpenID is a developing industry standard for authenticating end users by
storing their digital identity in a common format.
146. Which of the following standard is concerned with the exchange and control of identity
information ?
a) IGK b) IDF c) IGF d) All of the mentioned
Ans:c Expl:The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.
147. _______ is a Microsoft software client that is part of the companys Identity Meta-system and
built into the Web Services Protocol Stack.
a) IHA b) EHA c) CardSpace d) None of the mentioned
Answer:c Explanation:CardSpace was introduced with .NET Frameworks 3.0 and can be installed on
Windows XP, Server 2003, and later.
148. The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based
authentication service.
a) Higgins b) Hughes c) Hinges d) All of the mentioned
Answer:a Explanation:The Higgins Open Source Identity Framework uses an i-Card metaphor.
149. Which of the following is authorization markup language ?
a) eXtensible Access Control Markup Language b) intrinsic Access Control Markup Language
c) hypertext Access Control Markup Language d) All of the mentioned
Ans:a Expl:A policy in XACML describes a subject element that requests an action from a resource.
150. Which of the following should come in place of question mark for the following figure ?
151) Which standard is used by wireless products that utilize orthogonal frequency
division multiplexing (OFDM) technology?
a) 802.11a
b) 802.11b
c) 802.11c
d) 802.11d
152) When necessary, which type of MAC service data unit is given priority by the
802.11 MAC sublayer services?
a) Broadcast
b) Unicast
c) Multicast
d) Keep-alives
153) In the simplest wireless LAN configuration, all devices equipped with a client
adapter can communicate directly with one another. Which term describes this
configuration?
a) Infrastructure b) Ad hoc c) Roaming d) Microcellular
156) An access point has a data rate of 2.0 Mbps and only yields 1000 kbps of
throughput because of overhead. What is the efficiency of the access point?
a) 25% b) 50% c) 75% d) 85%
between products.
A. Acceptable cell
B. Barred Cell
C. Reserved Cell
D. Suitable Cell
177. Which UE categories support 64QAM on the uplink?
A. Only category 5
B. Categories 3, 4 and 5
C. None of them
D. All of them
178. What types of handover are supported in LTE?
A. Hard handover only
B. Hard and soft handovers
C. Hard, soft and softer handovers
D. Handover is not supported
179. Why is a Cyclic Prefix required in OFDMA?
A. FFT
B. IFFT
C. RF Combining
D. Channel Mapping
182. What is the minimum amount of RF spectrum needed for an FDD LTE radio
channel?
A. 1.4 MHz
B. 2.8 MHz
C. 5 MHz
D. 20 MHz
183. In MIMO, which factor has the greatest influence on data rates?
A. UMTS
B. 3GPP
C. 3GPP2
D. ISO
185. Which channel indicates the number of symbols used by the PDCCH?
A. PHICH
B. PDCCH
C. PBCH
D. PCFICH
186. How often can resources be allocated to a UE?
A. Every symbol
B. Every slot
C. Every subframe
D. Every frame
187. What property of OFDMA systems allows adjacent subcarriers to be used without
interference?
A. Orthogonality
B. Orthodoxy
C. Octagonality
D. Originality
188. With the normal Cyclic Prefix, how many symbols are contained in 1 frame?
A. 7
B. 12
C. 20
D. 140
189. What is the largest channel bandwidth a UE is required to support in LTE?
A. 20 MHz
B. 10 MHz
C. 5 MHz
D. 1.4 MHz
190. In OFDM, what is the relationship between the subcarrier spacing f and the
symbol time t?
A. 1/2
B. 1/4
C. 3/4
D. 1/6
195. If the UE detects primary synchronization sequence x and secondary
synchronization sequence y, what is the physical cell ID?
A. 1.4 MHz
B. 1.08 MHz
C. 930 kHz
D. up to 20 MHz
199. What is the length of the shortest possible PDCCH, in bits?
A. 72
B. 144
C. 288
D. 576
200. With PRACH configuration 14, what are the odds that two UE's will collide
during their random accesses?
A. 1 in 10
B. 1 in 64
C. 1 in 640
D. It is impossible to collide on the PRACH
204. Global Service for Mobile (GSM) uses two bands for duplex
205. In Global Service for Mobile (GSM), each band is divided into 124 channels of
206. In Global Service for Mobile (GSM), each voice channel is digitized and compressed to
a digital signal of
207. In Global Service for Mobile (GSM), each band is 25 MHz in width, shifted toward
211. The __________ cellular phone system will provide universal personal communication.
212. In a ______ handoff, a mobile station only communicates with one base station.
213. ________ is a second-generation cellular phone system based on CDMA and DSSS.
215. In a ______ handoff, a mobile station can communicate with two base stations at the
same time.
219. AMPS uses ______ to divide each 25-MHz band into channels.
220. D-AMPS uses ______ to divide each 25-MHz band into channels.
A) 1 B) 3 C) 5 D) 7
A) 1 B) 3 C) 5 D) 7