Cloud Computing
Cloud Computing
SUCCESS
CLOUD COMPUTING
BOOST YOUR KNOWLEDGE
1 + S
9 O N
S
19 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
1 CLOUD COMPUTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Cloud Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Cloud Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Cloud services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Cloud Workloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.5 Cloud Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.6 Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1.7 Autoscaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1.8 Database Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
1.9 Identity Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
1.10 Performance Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
1.11 Web Services and API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
1.12 Platform as a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
1.13 Software as a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
1.14 Cloud computing architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
1.15 Cloud security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
1.16 Cloud management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
1.17 Miscellenous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
1. CLOUD COMPUTING
NARAYAN CHANGDER
1.1 Cloud Migration
1. odd one in Approaches for cloud migration A. Support of different cloud types
A. Migrate Existing Applications B. Creation and provisioning of different
B. Start from Scratch types of cloud resources, such as machine
instances, storage, or staged applications
C. Seperate Company
C. Performance reporting including avail-
D. Evaluation
ability and uptime, response time, re-
2. In a typical WebApp development team, source quota usage, and other character-
which of the following role constructs the istics
entire user journey map and focuses in D. All of the mentioned
building the product wireframe?
A. Full-stack engineer 5. Which of the following SQL command can
be used to check the number of rows in the
B. UX designer table busroute?
C. Chaos engineer
A. select row count from busroute
D. Site reliability engineer
B. select count(*) from busroute
E. DevOps test engineer
C. select @@rowcount from busroute
3. How many Phases of Cloud Migration D. select sys.db stats number
A. 1 of row from busroute
B. 2
6. Point out the wrong statement.
C. 3
A. In theory, any application can run ei-
D. 5 ther completely or partially in the cloud
4. Which of the following is a core manage- B. The location of an application or ser-
ment feature offered by most cloud man- vice plays a fundamental role in how the
agement service products? application must be written
1. D 2. B 3. D 4. D 5. B 6. D
1.1 Cloud Migration 3
NARAYAN CHANGDER
D. d) All of the mentioned
B. Migrating Strategy
C. Prototyping
22. What is the most important outcome of
D. Provisioning and Testing adopting an agile methodology for soft-
E. Infrastructure ware development?
17. The technology used to distribute service A. We can accomplish more work with
requests to resources is referred to as fewer people
A. load performing B. We can forget about producing docu-
B. load scheduling mentation
C. load balancing
C. It can speed up our project execution
D. all of the mentioned time
18. What is not an important factor to consider D. We can build more generalists in the
in any cybersecurity protection frame- software development team
work?
E. We can create better transparency
A. Threats
with all stakeholders
B. Vulnerabilities
C. Mitigation of the cybersecurity risk 23. Which of the following is the first level ap-
D. Spending whatever it takes to protect plicable attribute?
the business
A. Availability
19. .Full form of SOA
B. Monitoring
A. Service Oriented Architecture
B. Service on going Architrcture C. Configuring
C. Both D. All of the mentioned
D. None
24. Full form of SLA
20. How many Approaches for Cloud Migra-
tion? A. Service Level Agreements
A. 1
B. Service Legacy Agreement
B. 4
C. 2 C. Service Line Agreement
16. E 17. C 18. D 19. A 20. B 21. D 22. E 23. A 24. A 25. B
1.2 Cloud Deployment 5
25. Application migration can be difficult be- E. network needs and dependencies.
cause
27. What are the Two Strategies in Migration
D. IT often doesn’t take time to fully 28. How does Cloud computing change the
understand applications before migrating relationship between provider and cus-
them. tomer?
26. Some applications should not be moved to A. Increased focus on service level
the cloud because of their agreements (SLAs)
A. network needs. B. Less compliance to standards
B. complexity. C. Less focus on service level agree-
C. lifespan. ments (SLAs)
D. dependencies. D. More focus on training
3. A cloud auditor can evaluate the services A. IBM Smart Cloud Entry
provided by a cloud provider in terms of B. IBM Smart Cloud Foundation
6. In which cloud infrastructure is shared be- 12. Dell Boomi, Cloudmore and Vendasta are
tween different organizations the examples of
A. Private Cloud A. Broker
B. Public Cloud B. Auditor
C. Carrier
NARAYAN CHANGDER
C. Hybrid Cloud
D. Community Cloud D. Provider
7. Number of actors defined in IBM CCRA 13. refers to both the applications deliv-
ered as services over the Internet
A. 4
A. Cloud Computing
B. 3
B. Cluster Computing
C. 5
C. utility Computing
D. 6
D. grid computing
8. BSS is
14. ISACA Cloud Security Certificate deals in
A. Business Support Service
B. BPaas Support Service A. Broker
C. Business System Service B. Carrier
D. Broker Support Service C. Provider
9. An intermediary that provides connectivity D. Auditor
and transport of cloud services from Cloud
15. A company is considering a cloud environ-
Providers to Cloud Consumers.
ment to improve the operating efficiency
A. Broker for their data and applications. The com-
B. Auditor pany is part of an industry where strict
security and data privacy issues are of the
C. Carrier
highest importance. Which type of cloud
D. Arbitrage would be a good choice?
10. Which is not the deployment model defined A. Public
by NIST? B. Private
A. Public C. Hybrid
B. Private D. Community
C. Multi-Cloud
16. The Collaboration of Private and Public
D. Community Cloud cloud is
11. Number of services defined in service layer A. Hybrid Cloud
of IBM CCRA? B. Community Cloud
A. 5 C. Cloud Engine
B. 3 D. Cloud Servers
NARAYAN CHANGDER
ISO standards?
7. Which of these is not essential for a Vir-
A. It is enforced by government depart- tual Machine to be created
ments
A. RAM
B. It always reduces the cost of recovery
from a disaster B. CPU
C. It demonstrates the procedures are in- C. Storage
ternationally accepted best practice
D. GPU
D. It means that testing of the proce-
dures is never required 8. Why should a company have a DRP?
4. A new server platform is being installed. A. Because it looks good
For the Type 1 hypervisors to use its full
capabilities, what must be configured? B. To prevent disasters happening
6. Which of the following does the NIST de- 10. What is Ubiquitous Access?
fine as “The cloud infrastructure is provi-
A. Anytime, anywhere, any device cloud
sioned for exclusive use by a specific com-
access
munity of consumers from organizations
that have shared concerns (e.g., mission, B. Sometime, somewhere, some devices
security requirements, policy, and compli- cloud access
ance considerations). It may be owned,
C. Anytime, some devices access
managed, and operated by one or more of
the organizations in the community, a third D. No access anytime
3. C 4. D 5. C 6. C 7. D 8. C 9. A 10. A 11. C
1.3 Cloud services 9
12. A 13. C 14. D 15. A 16. A 17. C 18. B 19. B 20. A 21. A
1.3 Cloud services 10
21. Where should a company keep their DRP? 25. What is a suitable ‘prevent’ step for a call
centre business with a high turnover of
A. In a file on the company network that
staff?
employees can access
A. Single point of authentication
B. In a restricted file only the board can
see B. Password change every 30 days
C. Two step authentication
C. On their website
D. Username change every week
D. In a filing cabinet at reception
NARAYAN CHANGDER
26. Which of the following is an essential fea-
22. Which backups save all data every time ture of virtualization?
they carry out a backup?
A. Security.
A. Differential B. Centralized logon.
B. Full C. Shared hardware.
C. Mirror D. High-speed networks.
D. Complete 27. Why do we perform test restores?
23. Which of the following is the MOST impor- A. To ensure data is saved and backup up
tant reason for creating separate users / correctly
identities in a Cloud environment? B. To ensure the computer network con-
nection is stable
A. You can see a list of users by name
C. To check the DNS server is working
B. You can associate activity with an indi-
vidual D. To ensure data saved is within the
Data Protections Act
C. You can let users see their actual
name 28. Which one of the following is the best ex-
planation of a Recovery Point Objective
D. You can use the list of users to organ-
(RPO) when applied to a service that relies
ise the company events
on regular access to a database system?
24. Which of the following is not an example A. It’s the maximum period of time that
of cloud computing? the business can afford for database
downtime
A. A company is going to activate hosted
servers automatically to handle extra pro- B. It’s the stage at which the recovery
cessing requirement as needed. and the database are checked for integrity
C. It’s the target time set to recoverthe
B. A company is going to consolidate 5
database in full after theincident
web servers on to a single physical server
based at it datacenter. D. It’s the plan to be activated when the
database has been fully recovered
C. The company’s staff will access its
hosted CRM application via their web 29. Which law may be broken if a cloud host-
browsers. ing provider choses to host personal data
D. A method for structuring data more ef- in a non-EU country?
ficiently at less cost to the user. A. Computer misuse law
31. What are the types of cloud services? 35. Which of the following is not a backup
A. Public, private and hybrid clouds type?
B. Personal area (PAN), Local area (LAN), A. Differential
Campus area networks (CAN) B. Incremental
C. Infrastructure as a service (IaaS),
C. Mirror
platform as a service (PaaS), software as
a service (SaaS) D. Segment
D. Mail server, collaboration server, web
36. Which one of the following is a viable con-
server, application server
tingency plan for coping with internet loss
32. A company’s IT department manages a due to connectivity failure?
database located on a server in its own A. An alternative ISP network
datacenter. After this server has been mi-
grated to the cloud, which of the following B. A faster connection
responsibilities of the IT department will C. An increase in local storage
remain most affected by the change?
D. A WiFi connection
A. Service Design.
B. Service Transition. 37. Windows Azure, Heroku, Force.com,
Google App Engine, Apache Stratos, Open-
C. Service Operation.
Shift are examples of ..
D. Service Strategy.
A. IaaS
33. Which of the following is a private cloud B. XaaS
application?
C. PaaS
A. An application for external use only, on
company-owned systems. D. SaaS
38. What is Mean Time Between Fails 42. How does cloud computing affect service
(MTBF)? operations? Choose the best answer.
A. It is a measure of how reliable a com- A. The launching servers is quicker.
ponent is B. The launching servers is slower.
B. It is a count of how many times a com-
C. Services are more cost-effective.
ponent has developed a fault
D. The level of security will increase.
C. It is a way of counting storage space
NARAYAN CHANGDER
D. It is a measure of return on investment 43. What is the process of using third party
servers to store data and run online appli-
39. What is the next ‘restore’ step for a soft- cations?
ware house to take when deleted data has
A. Data Center Processing
been restored and verified?
B. Cloud Computing
A. Report the data loss to the authorities
C. Networking
B. Inform the Chairman of the Board
D. Internet Usage
C. Review the cause of the incident plan
D. Change the key personnel 44. What is the correct format for the 3-2-1
Backup Policy
40. A new user has joined an organisation and
needs access to IT resources. To give them A. 3 Copies kept Off-Site, 2 Different
access, what would an infrastructure tech- Types of Backup Media, 1 Copy of Backup
nician need to do? B. 3 Copies of the Backup, 2 Different
A. Give the new user someone else’s ac- Types of Backup Media, 1 Copy kept Off-
count site
B. Give the new user an Admin account C. 3 Different Types of Backup Media, 2
Copies Made of Backup, 1 Copy kept Off-
C. Give the new user an account with site
their name
D. 3 Copies of the Backup, 2 Copies kept
D. Give the new user a temporary ac- Off-site, 1 Type of Backup Media
count
45. Which of the following is an early example
41. Why do business users sometimes prefer
of a cloud service?
to deal with cloud vendors rather than a
traditional internal IT department? A. Web e-mail.
A. Reduced financial risk to the business. B. Virtualization.
B. The fee is based on projected monthly C. Video streaming.
revenue of the client. D. Datacenters
C. They can measure the provider’s qual-
ity of service better. 46. Which one of the following is the most
important consideration when delivering a
D. They do can utilize cloud resources cloud based database application?
more tax-efficiently. It is quicker and eas-
ier to provision resources from a cloud A. The design of the command line Inter-
service provider than from the IT depart- face
ment. B. The latency of the system
48. Elastic computing is related to which of the 53. Which one of the following is a violation
following cloud characteristics? of the Computer Misuse Act (1990)?
A. Security. A. Authorised user logs on to a remote
computer
B. Scalability.
B. Data stored in a non EU country
C. Integrity.
C. Unauthorised access to a client’s lap-
D. Distribution. top
49. Infrastructure used by a single organiza- D. Client data transferred to a new host
tion.
54. Which of the following is not a reason to
A. Community Cloud test backups?
B. Public Cloud A. To check they work
C. Private Cloud B. To ensure they are still relevant
D. Hybrid Cloud C. To check the data restore is correct
50. Which of the following is NOT a reason to D. To check other people data in files
test a Disaster Recovery Plan
55. Which of these is an advantage of cloud
A. Helps to show if the business needs to storage?
adapt their Disaster Recovery Plan to in-
A. The user has no control over their data
clude/outline more details, roles or pro-
cesses. B. Many programs can be run at the same
time, regardless of the processing power
B. Can help to Identify the time it takes
of your device
business critical systems back online and
Recovery Point Objective C. Accessible anywhere with an internet
connection
C. Ensures the Backups can actually be
recovered from. D. Portability
D. Tests if people can stop a disaster 56. in Cloud, BPaaS stands for
51. All of these are types of cloud services ex- A. Business Productivity as a service
cept B. Business Process as a service
A. Public cloud C. Business Program as a service
B. Segregated cloud D. Business Policy as a service
57. Which type of cloud service is provided by D. Data as a service, storage as a service,
Office 365? platform as a service
A. PaaS 62. What do you have to provide for login?
B. IaaS A. E-mail, password, personal datas
C. NaaS B. E-mail and password
D. SaaS C. Email and personal datas
D. Personal datas and password
NARAYAN CHANGDER
58. Which one of the following best describes
the term ‘hybrid cloud’?
63. Place these in order from smallest to
A. When high speed processing is re- largest storage capacity:A) the cloud; B) a
quired in house thumb drive; C) a laptop; D) a data center.
B. When a mix of private, public and com- A. D, A, C, B
munity cloud models are used B. A, B, C, D
C. When the latest developments in cloud C. B, C, D, A
model storage are deployed
D. C, D, A, B
D. When a business wants to use only its
own dedicated cloud model 64. Which one of the following is a key techni-
cal consideration in choosing a tablet to be
59. Cloud computing allows you to consolidate used by field staff to access a cloud based
computing resources in a central database. web service?
What is a synonym for “consolidate? ”
A. The manufacturer’s warranty
A. Delete
B. The storage capacity
B. Combine
C. The provision of USB ports
C. Lock
D. The size and weight of the device
D. Split
65. Facilities that house large collections of
60. Which of the following are involved in set- servers are called
ting the objectives and expectations for a A. Data Centers
cloud computing solution?
B. Computer Processing Plants
A. Service Transition.
C. Internet Routing Facilities
B. Service Strategy.
D. Cloud Computing Centers
C. Service Operation.
66. Which of these is not a benefit to cloud
D. Service Design.
computing?
61. Type of cloud services: A. Saves storage space on your PC
A. Softwer as a service, data as a service, B. Gives you access to files from any com-
storage as a service, platform as a service puter
B. Softwer as a service, storage as a ser- C. Protects your files from being lost due
vice, platform as a service to PC failure
C. Softwer as a service, data as a service, D. Completely protects your information
storage as a service from cloud hackers
C. Private cloud services are dedicated 81. Which term best describes the hosting
for the use of one organization. model where the customer is only respon-
D. Private cloud services are more eco- sible for the applications it is developing?
nomical than public cloud services. A. SaaS
77. What is an essential requirement for a B. XaaS
provider offering multi-tenancy in a cloud C. IaaS
based service?
D. PasS
NARAYAN CHANGDER
A. Data is segregated between different
clients 82. A company has migrated its e-mail service
B. Clients enabled to raise requests to a cloud provider. Which of the following
C. User interface is customisable is most likely to affect all company staff?
86. Which of these is an example of remote 90. Which of the following is the MOST impor-
data storage (aka being in the cloud)? tant consideration for service management
arising from elasticity of capacity?
NARAYAN CHANGDER
line operations.
ing cloud infrastructure?
B. Shared resources on the cloud can be
A. SaaS
accessed by multiple users.
B. PaaS
C. Storing data on the cloud is safer than
C. IaaS storing it in local servers.
D. GaaS D. Some have concerns about security
and privacy in the cloud.
96. In cloud computing, how does a business
benefit by the ability to scale resources on 100. You want to deploy an application to the
demand. cloud but you want to ensure that the ac-
A. Having a 3rd party to manage ser- tual data is stored in-house. Which type
vice delivery allows the business to lower of cloud should be used?
staffing costs. A. dedicated public cloud
B. It is more cost effective to pay for re- B. private cloud
sources used rather than having to pay
for resources capable of meeting peak de- C. hosted private cloud
mand at all times. D. hybrid cloud
C. Fewer in-house servers reduce power
costs in the business’ data center. 101. Provides clients with the ability to use
software applications on a remote basis
D. Shorter contracts and less capital ex- via an internet web browser
pense reduce expenses of the IT depart-
ment. A. PaaS (Platform as a Service)
B. Saas (Software as a Service)
97. Which one of the following is typically
used as a measure of Quality of Service C. IaaS (Infrastructure as a Service)
in Cloud Services? D. FaaS (Function as a service)
A. Delay in traffic
102. A software development company wants
B. Scalability to move its application development to the
C. Ease of use cloud. Which type of service is most appro-
priate?
D. Security
A. IaaS
98. Which of the following involves offloading
B. PaaS
traffic to resources from a cloud provider
if your own servers become too busy? C. SaaS
A. Ballooning D. DBaaS
103. What is an example of PaaS? 108. What are the risks of cloud computing?
A. Google App Engine A. No troubleshooting issues
113. How does cloud computing improve busi- computing resource, such as hardware or
ness flexibility? software on a subscription basis
A. Easier access by users from external A. Private Cloud
locations. Faster deployment of applica- B. Hybrid Cloud
tions. Rapid response to changing capac-
ity. Rapid provisioning of resources. C. Community Cloud
B. Increase hardware efficiency.Improve D. Public Cloud
customer reliability
NARAYAN CHANGDER
118. All hardware and software is in house
C. It is cheaper compared to virtualiza- managed by the organisation.
tion.Decreased security.
A. Traditional on premises
D. Shorter contracts and less capital ex-
B. SaaS
pense reduce expenses of the IT depart-
ment C. PaaS
D. IaaS
114. A company decides to subscribe to a new
CRM service. Which service type is most 119. Which statement best describes one of
likely to be implemented? the responsibilities of an IT Manager in en-
A. SaaS suring that disaster recovery goes accord-
ing to plan?
B. PaaS
A. To maintain an accurate and up to date
C. IaaS
asset register of all hardware
D. XaaS
B. To keep a list of local first aiders on the
115. What can be offered as a part of IaaS? same floor as the server room
A. application software C. To ensure that adequate budget has
been set aside for IT upgrades
B. call-center services
D. To ensure that the emergency alarms
C. computing capacity
in the server room are working
D. consulting
120. Which one is not a factor required for a
116. Why is it important for the user to have secure password?
the ability to customise the User Interface
A. Number patterns (eg 12345 )
(UI) on a cloud service?
B. At least 8 characters
A. It ensures higher security as strict
passwords are enforced C. Two-factor authentication
B. It can provide appropriate user acces- D. Mixture of letters, numbers and sym-
sibility options bols
C. It allows more consistent monitoring 121. For a particular SaaS application, the
of users cloud provider is required to perform
D. It will allow a faster response time for scheduled maintenance. On which of the
any faults raised following does this have a direct impact?
131. What does the term ‘ubiquitous access’ C. instant updated and upgrades
mean when applied to cloud services? D. full control over data and software
A. The service can be accessed from any-
136. What is a disadvantage of cloud comput-
where and from any device
ing?
B. The service is provided on a fixed an- A. It is vulnerable to hacking
nual contract basis
B. The storage can be easily expanded
C. The service is un-interruptible under
C. Portability
NARAYAN CHANGDER
normal conditions
D. All of the above
D. The service can only be accessed using
the same device 137. Which one of the following combinations
is most likely to give the best user experi-
132. Which one of the following statements ence when connecting to cloud services?
is correct about Device ID when accessing
A. Smartphone connected via 4G
cloud services?
B. Laptop connected via Ethernet
A. It is the same as a MAC address
C. Tablet connected via WiFi
B. It is initially set by the manufacturer
D. Desktop connected via WiFi dongle
C. It is initially set by the user
138. Which one of the following statements is
D. It is the same as the IPv6 address
correct about a DHCP server?
133. Which term best describes the ability to A. It only works on a LAN
rapidly increase the user accounts for a B. It allocates the IP address of the de-
given cloud service vice
A. Viability C. It fails to work on a smartphone
B. Volatility D. It decreases risk of a security breach
C. Synchronicity 139. What makes self-service portals attrac-
D. Elasticity tive to the cloud service provider?
A. They allow consumers to configure the
134. What is the most appropriate ‘recovery’
latency
step for a software house when the latest
release has been accidently deleted? B. They are complicated to configure
A. Conduct a restore from the original C. They reduce the cost of service provi-
backup sion
D. They are complex for the customer to
B. Replace a disk in RAID array
use
C. Conduct a restore from the latest
tested backup 140. Which of the following is a definition of
how much data can be sent across a net-
D. Run a full malware scan work link in one second?
135. Which of the following is NOT a potential A. Network speed.
advantage of Cloud Computing? B. Network bandwidth.
A. utility-based payment C. Network latency.
B. scalability and flexibility D. QoS.
141. What is a hosted application? 146. Real time data processing in a cloud func-
A. A cloud network created and contained tion does not help in
151. What are the uses of cloud computing? D. Increased security of applications and
A. Create new apps and services, analyze data due to virtualization.
data, embed intelligence, test and build
156. What is an advantage of Cloud Comput-
applications
ing?
B. Collecting appropriate quantitative
A. Can access you files anywhere
data, helps in drawing valid inferences
C. Input, present and compare collected B. It is safer
NARAYAN CHANGDER
data C. Can access files anywhere you have in-
D. Estimate income data, indicate suc- ternet
cess or failure of planning D. Expensive
152. What is a suitable ‘detect’ mechanism for 157. If two users are accessing the same net-
a data centre with minimal staff? work through the cloud, they probably:
A. Issuing of ID cards A. Are using the same device
B. Irregular security patrols B. Are in the same location
C. Actively monitored CCTV
C. Can access the same shared re-
D. Steel reinforced doors sources
153. Why can Cloud Computing sometimes pro- D. Accessed the cloud at the same time
vide better performance?
158. What must be checked before setting up a
A. specialisation of the technology Virtual Machine (VM) on a Windows work-
B. less friction on the Internet station?
C. no need to worry about security A. The BIOS is the latest version
D. serving a single user B. The BIOS is password protected
154. What is the drawback of cloud computing C. Appropriate support is enabled in the
in education system? BIOS
A. The need for high speed internet ac- D. Ports are configured correctly in BIOS
cess
159. A simple example of SaaS is an online
B. The management of data and products
A. Email service
C. The absence of hardware
B. Server
D. The wide connection of networks
C. Infrastructure service
155. Which of the following is an advantage
D. Platform service
of cloud computing?
A. Decreased downtime due to increased 160. What does CMDB stand for?
control over hosted servers.
A. Customer management database.
B. Increased internal focus on IT when
B. Client management database.
hosting with proven providers.
C. Cloud management database.
C. Increased scalability to meet usage
demands. D. Configuration management database.
B. Easier monitoring of access and data 167. Which of the following DNS records
usage. would allow for a website to have more
C. Easier to give users access to data in than one FQDN? (alias)
the cloud. A. TXT
D. Easier to have redundant capacity. B. PTR
NARAYAN CHANGDER
1. The main internal storage device of a com- A. Expensive
puter is the B. Don’t need an advanced computer
A. USB flash drive
C. Can be hacked
B. Cloud storage
D. Login details are easily remembered
C. Computer hard drive
6. Which of these is a cloud storage service?
D. Computer file server
A. OneDrive
2. How does using Cloud Storage save
money? B. iCloud
10. How many types of permissions are 15. Storage attached directly to a workstation
there? is known as
A. local storage
A. Cloud computing
A. are using the same device.
B. File structuring B. are in the same location.
C. Folder tagging C. can access the same shared re-
D. File saving sources.
D. accessed the cloud at the same time.
14. What fully limits your read / write speeds
with cloud storage 20. According to research by Nasuni in 2013,
how much data is stored in the cloud?
A. Your IQ
A. 1 exabyte
B. Distance from server B. 1 petabyte
C. Humidity of the climate C. 500 petabytes
D. Internet connection speed D. 1 yottabyte
21. A folder within a folder is known as which B. most songs and movies are not on the
of the following? cloud yet.
A. Subfolder C. the cloud is not open to the public.
B. Main folder D. you can’t keep the media on your de-
C. File path vice.
NARAYAN CHANGDER
22. Joe needs to convert his Junior High puter’s hard drive is known as what?
Band Food Drive poster he created in Mi-
crosoft®Word®to a PDF file for his band A. Personal Computing
director. He will click on the box in the B. Modern Computing
Save As window to complete this task. C. Bubble Computing
A. Download D. Cloud Computing
B. Save as type
28. Apa nama apps utk sync terus dari
C. File name PC/Laptop/Mobile ke CLoud?
D. Details A. Synology Drive
23. Which of these is not a type of cloud stor- B. Drive Cloud
age C. Cloud Apps Synology
A. Cumulo Nimbus D. Synology Driving
B. iCloud
29. Mrs. Luke wants to buy a photo editing
C. One Drive program. Which of the following is the
D. none of above best argument against buying the cloud-
based program?
24. What do you need to access cloud stor-
age? A. The cloud based version of the pro-
gram is frequently updated.
A. Internet Connection
B. The software requires a huge amount
B. A digital device of storage space,
C. All of the above C. The full version costs hundreds of dol-
D. none of above lars.
25. What important danger must be consid- D. The internet connection is not the most
ered when using cloud storage? reliable.
D. Cloud-based backups are far more se- B. The user has full control over how their
cure than local backups. data is stored.
42. Your data is protected in the UK by GDPR. C. Accessible anywhere with an internet
What does it stand for? connection
A. General Digital Private Rules D. Portability
B. General Digital Protection Regulations
48. Which of the following service is provided
C. General Data Protection Regulations by Google for online storage?
D. General Data Private Rules A. Drive
43. Is cloud storage always free? B. SkyDrive
NARAYAN CHANGDER
A. Yes C. Dropbox
B. No D. All of the above
C. Why would I know? ? !? 1? 49. What is the maximum number of devices
D. none of above that can be synced with Cloud Storage?
A. Onedrive B. 5
B. Icloud C. 6
C. Google Drive D. Unlimited
D. All of them 50. Extenstion for Word processing files:
45. Back ups help a tech A. .xlsx
A. save time and effort B. .pdf
B. make money C. .jpg
C. create a new OS D. .docx
D. install apps E. .pptx
B. Many programs can be run at the same C. Storage of data without control over
time, regardless of the processing power the location of where the data is stored
of your device D. none of above
53. Using things like Google Docs are useful to 58. What is the primary purpose of perform-
because (choose two) ing an offsite backup or storing backups in
an offsite location?
A. When the system is least busy. 59. Select the disadvantages of cloud comput-
ing
B. At 2AM local time.
A. You can forget your login details
C. On boot up.
B. It means your home computer is upset
D. Any time before 6AM local time.
its not doing anything
55. What can you store on the cloud server? C. You lose control of your data
A. documents D. You require an internet connection
B. videos 60. Portable storage device
C. music A. storage of files in a central location to
D. all of the above serve multiple computers
B. global network of servers which oper-
56. *You don’t need a powerful computer with ate through the internet
a huge hard drive-everything is stored and
run on a remote computer. You can at- C. main internal storage device of a com-
tribute this advantage on ? puter
A. the Internet D. removable storage device located out-
side of the main computer tower
B. Local area networks
C. optical devices 61. What is cloud storage?
NARAYAN CHANGDER
A. Cloud Storage restored.
B. Solid State Drive
68. *You don’t need a powerful computer with
C. USB Memory Stick a huge hard drive-everything is stored and
D. Optical Media run on a remote computer. You can this ad-
vantage on?
64. are creating copies of digital files on a A. the Internet
secondary storage medium.
B. Local area networks
A. File conversions
C. optical devices
B. Cloud computing D. cloud storage
C. Backup procedures
69. The slowest way to back up data is to
D. File management
A. manually move each file to a destina-
65. Facilities that house large collections of tion
servers are called B. run a backup program
A. Data Centres C. copy and paste using the keyboard
B. Computer Processing Plants D. none of these
C. Internet Routing Facilities 70. Testing your backups ensure that
D. Cloud Computing Centres A. the backup will actually restore
66. Data stored in on cloud storage can be as- B. the backup with continue writing files
sessed by who? C. the backup with stop working
A. Anyone with an account on that cloud D. none of above
storage system
71. Does cloud storage have to be free
B. Only the owner of the stored data
A. Yes
C. The owner and anyone they have
B. No
shared it with
C. Why would I know? ? !? 1?
D. The owner and their friends
D. none of above
67. Which of the following is a best practice
when backing up data? 72. Advantages of cloud storage (2 answers)
C. Free to use most of the time 77. Select the best definition of Cloud Storage
D. Easy to share files A. A type of storage that can be remotely
75. Instead of storing files and folders on your C. Removed from the device
PC or Device, you can store them remotely. D. Removed from the cloud
This is known as
80. What is the greatest advantage of local
A. Bubble Storage backups?
B. Secondary Storage A. Speed
C. Cloud Storage B. Cost
D. Local Storage C. Safety
D. Geographic diversity
76. *You don’t need a powerful computer with
a huge hard drive-everything is stored and 81. If a laptop relies heavily on the cloud for
run on a remote computer is an advantage all of its storage needs, its hard drive must
of what? be:
A. the Internet A. Uncluttered
B. Local area networks B. Slow
C. optical devices C. Full
D. cloud storage D. none of above
82. Which type of backup medium protects you 86. The process of naming, storing and orga-
from a catastrophic natural event in your nizing digital files is known as
area? A. Cloud computing
A. An offsite backup B. File conversion
B. An external drive
C. File naming conventions
C. Digital media
D. File management
D. A local NAS device
NARAYAN CHANGDER
87. Online, digital storage space, capable of
83. Extension for image/photo files: large data storage.
A. .xlsx A. RAM
B. .pdf B. The Cloud
C. .jpg C. ROM
D. .docx D. Flash Drive
E. .pptx
88. Using locally attached storage is usually
84. A LOCAL data backup is stored for a home/small business
A. on site A. cost effective
B. off site B. safer
C. in the cloud C. more reliable
D. in file servers D. none of these
85. Extension for spreadsheet files: 89. Which of the following backup options are
A. .xlsx considered removable media?
B. .pdf A. USB flash drives
C. .jpg B. NAS devices
D. .docx C. Cloud storage
E. .pptx D. Local SATA drives
3. System A requires high availability. Sys- A. Back up all data to disk, and store the
tem B requires high security. Which fail disk in a safe in the building’s basement.
options should you choose for the two sys-
D. a facility whereby a computing sys- 9. Which of the following backup methods en-
tem can be installed to begin immediate ables daily backups, weekly full backups
backup operations. and monthly full backups?
A. Differential
5. When deciding which cloud service
provider to use, you should check: B. Incremental
A. their disaster recovery plan C. Grandfather-father-son
B. backup policies and procedures D. Towers of Hanoi
C. cyber security policy 10. Which of the following uses multiple com-
D. are their systems compatible with puters to share work?
yours A. Load balancing
E. what free gifts you would receive B. Switching
NARAYAN CHANGDER
D. A cold site
D. striping and mirroring
17. Which of the following is NOT considered
13. Which of the following are uses of cook- a natural disaster that can affect computer
ies? Choose two options. systems?
A. Storing data between website ses- A. flood
sions. B. falling water
B. Showing you where to find restaurants C. excessive heat
local to you.
D. fire
C. Identifying trends in product sales.
18. Which of the following drive configura-
D. Collecting analytics, like how long you
tions uses striping with parity for fault tol-
spend on a web page.
erance?
14. What can you use to manage large work- A. RAID 1
loads? B. RAID 0
A. Workload manager C. RAID 10
B. Launch plans D. RAID 5
C. Server migrator
19. Administrators in a business may back up
D. Recovery plans their network files
A. daily
15. A volume combines disk striping across
multiple disks with parity for data redun- B. weekly
dancy. Parity information is stored on C. monthly
each disk. If a single disk fails, its data
D. yearly
can be recovered using the parity informa-
tion stored on the remaining disks. This 20. Which of the following provides the best
provides fault tolerance for a single disk application availability and can be eas-
failure and provides an increase in perfor- ily expanded as an organization’s demand
mance. grow?
A. RAID 5 A. Load balancing
B. RAID 0 B. Server virtualization
C. RAID 10 C. Multi-CPU motherboards
D. RAID 1 D. RAID 6
25. What occurs after adding a machine to the C. Identifying potential risks
CloudEndure user console? D. What staff should and should not do.
A. immediate data migration
30. What action to take after an attack is de-
B. Failover scribed below? Establish the cause of the
C. Fallback attack and mistakes made and update poli-
cies and procedures.
D. Initial sync
A. Respond
26. You need to be up and running within hours
B. Manage
of a disaster. Which option should you
choose? C. Recover
A. Tape backup D. Investigate
B. Hot site E. Analyse
NARAYAN CHANGDER
C. An organized approach to addressing C. Analysis of the cause of the disaster
and managing the aftermath of a security D. Timeline for data recovery
breach or cyberattack
37. Which of the following can enable your net-
D. It is the ability to ensure recovery with- work to remain operational even if your
out compromise after a system failure. T-1 line fails?
32. Select Multiple:Which statements are true A. Redundant ISP
about Raid with Striping? B. RAID 5
A. It increases read and write perfor- C. Redundant network adapters
mance. D. UPS
B. Allows for read and writes to happen
38. RAID 1+0
at the same time.
A. Striping only
C. Stores identical data in multiple disks.
B. striping with parity
D. It is the act of splitting data and stor-
ing it randomly. C. mirroring only
D. striping and mirroring
33. Computer security incidents are catego-
rized into levels. 39. You arrive to work to find all of your
servers have been destroyed by a fire.
A. two
Which of the following is the MOST IM-
B. three PORTANT item to ensure your organiza-
C. four tion can recover?
D. five A. Disaster recovery plan
B. Offsite backup
34. What is the minimum number of hard disks
that can be used to configure RAID 10? C. Warm site
A. 2 D. Fault-tolerant servers
41. Why are recovery points important? 45. Identify the behaviours that would be con-
sidered acceptable in a AUP.
A. They allow you to quickly bypass repli-
C. Full C. Class C
D. System State D. Class D
NARAYAN CHANGDER
many tapes will you need to restore your
C. RAID 5
file server?
D. RAID 10
A. 1
51. You have an extension cord short and catch B. 2
on fire, what type of extinguisher can be
used? C. 3
A. Class A D. 4
B. Class B 56. Which of the following statement is NOT
C. Class C true?
D. Class D A. Disaster recovery deals with how to
cope when something goes wrong.
E. Class K
B. Physical security is the term used to
52. To prevent electrical damage to a computer describe protection provided outside a
and its peripherals, the computer should be computer system.
connected to what?
C. Contingency planning is not part of the
A. Power inverter disaster recovery process.
B. UPS D. Backing up data is a recovery method.
C. AC to DC converter
57. Which of the following is a good reason
D. Power strip
that RAID does not work for backup?
53. Of the following backup types, which A. Corruption; you end up with 2 corrupt
describes the backup of files that have copies
changed since the last full or incremental
B. RAID sets break and can be unrecov-
backup?
erable
A. Copy
C. Downtime to recover raid sets
B. Differential
D. All of these are good reasons
C. Full
D. Incremental 58. A log book is useful in:
A. preventing an incident.
54. Which class extinguisher would be used on
a grease fire? B. handling an incident.
A. Class A C. developing a contingency plan.
B. Class B D. All of the answers are correct.
59. Select Multiple:Which statements are true C. Computer Misuse Act (1990)
about RAID with Mirroring? D. Computer Misuse Act (1998)
NARAYAN CHANGDER
the support email address aster
D. No support is offered for CloudEndure 75. What do you need to do to install the
Disaster Recovery Cloudendure agent on a linux machine?
A. Run only the executable command
70. What does RAID stand for?
B. Run only the grep command
A. Redundant Array of Instant Disks
C. Run the grep and executable command
B. Redundant Array of Individual Disks
D. Run the download and executable com-
C. Redundant Array of Initial Disks mands
D. Redundant Array of Independent Disks
76. You are in charge of the disaster recov-
ery plan for your organization. What can
71. Which of the following versions of RAID
you do to make sure the DRP can be imple-
does not provide data redundancy?
mented quickly and correctly?
A. RAID 0
A. Send the plan to management for ap-
B. RAID 1 proval.
C. RAID 5 B. Store the recovery plan in a secure
area
D. RAID 1 + 0
C. Distribute copies of the plan to key per-
72. Which of the following defines a business sonnel.
goal for system restoration and acceptable D. Run a test of the recovery plan.
data loss?
77. What settings can you edit after perform-
A. Warm site
ing the Prepare for Failback action?
B. RPO
A. Network settings and Failover settings
C. MTTR B. Blueprint settings and Launch Settings
D. MTBF C. Failback settings and Back to Normal
Settings
73. What are the requirements of a cold site?
D. Agent installation settings and Data
A. A. Redundant servers and networking Replication settings
devices
78. Which type of extinguisher would be used
B. Close proximity to the data center
at an industrial site that made metals like
C. Patched and updated client computers magnesium and aluminum?
D. Power and connectivity A. Class A
87. What action to take after an attack is de- 91. Which of the following functions is not
scribed below? Isolate & contain the at- part of incident handling?
tack and use appropriate measures to re- A. design
sume services.
B. report
A. Respond
C. analysis
B. Manage
D. response
C. Recover
NARAYAN CHANGDER
D. Investigate 92. Which of the following are drawbacks of
E. Analyse using shared data? Choose two options.
A. Causes bad decisions to be made
88. What action to take after an attack is de-
scribed below? Implement the disaster re- B. Could be fined under the DPA.
covery policy. C. Could be stolen & misused by mali-
A. Respond cious users.
B. Manage D. Is more costly than gathering the data
C. Recover manually.
D. Investigate 93. Your company needs a backup plan in case
E. Analyse power is lost for more than a few hours.
Which of the following should you imple-
89. this ensures that files are copied to an- ment?
other medium and can be used to return
the files if necessary A. UPS
A. data backup B. Warm site
B. data image C. Redundant power supplies
C. data corruption D. Generator
D. data sync 94. The steps an organisation should take af-
90. What kind of threats can disaster recov- ter an attack include:Investigate, Respond,
ery policies help to protect us from being Manage, Recover. However one step is
impacted by? missing which is it?
A. Natural disasters A. Report
B. Malware B. Disconnect
C. Hardware failure C. Disinfect
D. All of the above. D. Analyse
1.7 Autoscaling
1. . A sys admin is maintaining an applica- servers proactively so that they get reg-
tion on AWS. The application is installed istered with ELB. How can the user add
on EC2 and user has configured ELB and these instances with Auto Scaling?
Auto Scaling. Considering future load in-
crease, the user is planning to launch new A. Increase the desired capacity of the
D. Cross-zone load balancer is not en- 12. . An organization has configured two sin-
abled gle availability zones. The Auto Scaling
groups are configured in separate zones.
8. What are the key features of ID Federa- The user wants to merge the groups
tion? (Choose all that apply) such that one group spans across multiple
A. allows others to access an AWS ac- zones. How can the user configure this?
count without having to create IAM Users A. Run the command as-join-auto-scaling-
B. grants an AWS account the ability to group to join the two groups
NARAYAN CHANGDER
store an external identity’s credentials B. Run the command as-update-auto-
C. provides identities from on-premises scaling-group to configure one group to
systems a way to access an AWS account span across zones and delete the other
group
D. provides existing identity providers
the freedom to manage their identities C. Run the command as-copy-auto-
while giving access to an AWS account scaling-group to join the two groups
9. . A user has configured the Auto Scaling D. Run the command as-merge-auto-
group with the minimum capacity as 3 and scaling-group to merge the groups
the maximum capacity as 5. When the 13. Which of the following statements defines
user configures the AS group, how many the concept of an Elastic Load Balancer?
instances will Auto Scaling launch?
A. Distribute traffic to multiple EC2 in-
A. 3 stances.
B. 0 B. Distribute traffic to AWS resources
C. 5 across multiple regions.
D. 2 C. Resize EC2 instances.
10. Which of these important Cloud concepts D. Increase EC2 instance size based on
will an ELB improve? (Choose two an- demand.
swers) 14. What combination of AWS services will
A. Fault Tolerance achieve high availability, fault-tolerance,
B. High Availability scalability, and elasticity?
22. . A user has setup an Auto Scaling group. C. Wait till end of November before
The group has failed to launch a single in- scheduling the activity
stance for more than 24 hours. What will D. It is not advisable to use scheduled
happen to Auto Scaling in this condition based scaling
A. Auto Scaling will keep trying to launch
26. When would you use the Database Migra-
the instance for 72 hours
tion Service (DMS)?
B. Auto Scaling will suspend the scaling A. When migrating a database from the
process
NARAYAN CHANGDER
AWS network to an on-premise network,
C. Auto Scaling will start an instance in a or within your AWS environment.
separate region B. When needing to scale a database
D. The Auto Scaling group will be termi- without downtime
nated automatically C. When migrating a database to and
from other platforms besides AWS
23. You need to expose your serverless appli-
cation implemented with AWS Lambda to D. When needing a full database schema
HTTP clients (using an HTTP proxy). Which conversion
of the following services can you use to E. All of these answers are correct.
complete this task? Select two.
27. Which of the AWS services below allows
A. AWS Elastic Load Balancer you to increase the number of on-demand
B. API Gateway application resources or users?
C. AWS Elastic BeanStalk A. AWS EC2
D. AWS Route 53 B. AWS ELB
E. AWS Lightsail C. AWS Auto Scaling
D. AWS Inspector
24. Which of the following services is re-
lated to the concept of “traffic distribution 28. Which of the following features can be in-
across EC2 instances”? tegrated into AWS WAF (Web Application
Firewall) to protect web applications from
A. Auto Scaling
common web security flaws? Select two.
B. VPC A. Amazon CloudFront
C. Elastic Load Balancer B. Web server hosted on an EC2 instance.
D. Subnets C. Static webpage hosted in an S3 bucket.
25. . A user is planning to setup infrastructure D. Internet Gateway
on AWS for the Christmas sales. The user E. Application Load Balancer
is planning to use Auto Scaling based on
the schedule for proactive scaling. What 29. Which of the following services relates to
advise would you give to the user? the concept of “scaling resources on de-
mand”?
A. It is good to schedule now because if
A. Auto Scaling
the user forgets later on it will not scale
up B. VPC
B. The scaling should be setup only one C. Elastic Load Balancer
week before Christmas D. Subnet
30. When designing a system, you use the terminate process only for a while. What
principle “design to fail and nothing will will happen to the availability zone rebal-
fail.” Which of the following AWS services ancing process (AZRebalance) during this
32. A user is planning to scale up an applica- A. The ELB instance has stopped working.
tion by 8 AM and scale down by 7 PM daily B. The URL for the app has passed its ex-
using Auto Scaling. What should the user piration date.
do in this case? C. The application running on the EC2 in-
A. Setup the scaling policy to scale up and stance is giving the 504 error because it
down based on the CloudWatch alarms has exceeded its response time limit.
B. User should increase the desired ca- D. The application is unresponsive, so the
pacity at 8 AM and decrease it by 7 PM ELB instance displays the 504 error.
manually
35. What are the types of Scaling Policies
C. User should setup a batch process
available within Auto Scaling groups?
which launches the EC2 instance at a spe-
(Multiple answers)
cific time
A. Step scaling policy
D. Setup scheduled actions to scale up or
down at a specific time B. Simple scaling policy
33. A user has configured ELB with Auto Scal- C. Manual scaling policy
ing. The user suspended the Auto Scaling D. Target tracking policy
2. It exists in their original state. 7. Here which of the following displays the
unique values of the column? SELECT
A. Semistructured data
dept name FROM instructor;
B. Unstructured data
A. All
C. Structured data
B. From
D. Unstructured dependence
C. Distinct
3. Internal schema is .. D. Name
NARAYAN CHANGDER
A. Representing database as seen by the
DBMS mapping conceptual model to the 8. Basis for the identification and high-level
DBMS description of the main data objects
12. Which language is used to request infor- End-User Productivity Tools(B). Comput-
mation from a Database? erized File Systems-Manual File Systems-
File System Redux:Modern End-User Pro-
15. Enforces user security and data privacy. C. Data have a little meaning unless they
have been organized in some logical man-
A. Data storage management ner
B. Security guard D. A character or group of characters (al-
C. Security management phanumeric) that has a specific meaning.
Used to define and store data
D. Data dictionary management
20. FIELD NAME CAN BE CHARACTERS
16. What is an advanage of a database? LONG
A. You can input information A. 1 TO 63
B. Its different to Excel B. 1 TO 64
C. It saves files C. 1 TO 65
D. Can search through and find informa- D. none of above
tion quickly
21. Supports OO features and complex data
17. Evolution of File System Data Processing representation
is(A). Manual File Systems-Computerized A. Object/Relational Database Manage-
File Systems-File System Redux:Modern ment System (O/R DBMS)
B. Extended relational data model 27. helps you retrieve information from ta-
(ERDM) ble as when required.
C. Entity relationship diagram (ERD) A. Report
D. Unified Modeling Language(UML) B. Database
C. Record
22. What does PHP stand for?
D. Query
A. PERSONAL HOME PAGE
28. Resembles an upside-down tree in which
NARAYAN CHANGDER
B. HYPER TEXT PREPROCESSOR each class has only one parent
C. PRE TEXT HYPER TEXT PROCESSOR A. Hierarchy
D. PRE-PROCESSOR HOME PAGE B. Class
C. Inheritance
23. Which of the following must be installed
D. Class hierarchy
on your computer so as to run PHP script?
A. ADOBE 29. Environment in which data can be managed
and is used to work with the data in the
B. WINDOWS database
C. APACHE A. Data manipulation language (DML)
D. IIS B. Schema data definition language (DDL)
C. XML
24. All of the following are data type except?
D. none of above
A. Name
30. Term used to label the relationship types
B. Memo
A. Connectivity
C. Short text
B. Connection
D. Number
C. Instance
25. In which of the following formats data is D. Occurrence
stored in the database management sys-
31. is a unique field by which records are
tem?
identified in a table.
A. Table A. Name
B. Image B. Field
C. Text C. Primary Key
D. Graph D. None
32. MySQL belongs to which category of
26. Operates at lowest level of abstraction
DBMS?
A. The Physical Model
A. OBJECT ORIENTED
B. The Network Model B. HIERARCHICAL
C. The Conceptual Model C. RELATIONAL
D. The External Model D. NETWORK
33. Which of the following in not a function of C. Presents the end user with an inte-
DBA? grated view of the data
NARAYAN CHANGDER
database as viewed by the database ad-
C. Ensures efficient performance of the
ministrator
database in terms of storage and access
A. Subschema speed
B. Data model D. Transforms entered data to conform to
C. Schema required data structures
D. none of above 49. It is a collection of data that is related to
a particular subject or purpose
45. Which of the following is NOT Advantages
A. Field
of DBMS
B. Row
A. Increased data consistency
C. Column
B. Reduced data redundancy
D. Database
C. Improved data security
50. Which of the following is not fully sup-
D. Increase data isolation
ported by all commercially available sys-
46. Which of the following is false regarding tems, but supports if religiously?
the reason why the function of system pro- A. Entity integrity
grammers should be separate from that of
B. Referential integrity
the database administrator?
C. Relational algebra
A. If one person has the authority to both
write programs and access data, then con- D. Relational calculus
trol issues become a concern. 51. WHAT IS THE FULL FORM OF DBMS
B. The potential to commit fraud or em- A. DATABASE MANAGEMENT SYSTEM
bezzlement or to destroy or alter the com-
B. DATA BASIC MANIPULATION SYSTEM
pany’s records increases.
C. DATA BASE MANIPULATION SYSTEM
C. The lack of proper segregation of du-
ties provides more opportunity for some- D. none of above
one to inject malicious code without being 52. Which is true about NoSQL Databases?
detected.
A. Not based on the relational model
D. All information is false.
B. Support large amounts of sparse data
47. is a set of one or more attributes taken C. Store data in key-value stores
collectively to uniquely identify a record.
D. Geared toward performance rather
A. Primary Key than transaction consistency
B. Foreign key E. none of the above
53. Using which language can a user request 58. Changes when data storage characteristics
information from a database? change
NARAYAN CHANGDER
A. Ms Excel
vide helps topics and topics on tasks per-
B. Ms Word form while working with Access.
C. Notepad A. Index
D. Ms Access B. Office Assistant
C. Query
65. What’s a field?
D. Report
A. a column
71. Which of the following PHPstatements
B. a table will output Hello Worldon the screen?
C. a row A. ECHO(”HELLO WORLD”);
D. a section B. PRINT(”HELLO WORLD”);
C. PRINTF(”HELLO WORLD”);
66. The linking of tables and files to share
records is known as a D. SPRINTF(”HELLO WORLD”);
75. The data dictionary is a system structure 81. Specific representation of an external
that stores view
NARAYAN CHANGDER
88. represents a “tuple” in a relational D. none of above
database? 94. How many fields are in the table?
A. TABLE A. 6;
B. ROW B. 7;
C. COLUMN C. 8;
D. OBJECT D. 9;
89. Implications of data redundancy 95. The record is a field unique identifies every
record in a table
A. Poor data security
A. Query
B. Data anomaly
B. Primary Key
C. Increased likelihood of data-entry er-
rors when complex entries are made in dif- C. Record
ferent files D. Secondary Field
D. Data inconsistency 96. Microsoft’s version of a Database Man-
agement System
90. A collection of programs required to store
and retrieve data from a database is called A. Excel
B. Access
A. RDBMS C. Word
B. DBMS D. PowerPoint
C. SQL 97. Proponent of Entry-Relationship (ER)
D. None Model
A. Ted Codd
91. A collection of related records
B. Bill Gates
A. Field
C. Peter Chen
B. Data
D. none of above
C. Record
98. Which of the following is considered as
D. File DBMS?
92. Which of the following is a software pack- A. Oracle
age of Database management System? B. FoxPro
A. Visual Fox Pro C. Access
B. Microsoft SQL-Server D. All of these
99. Which is the example of File Based Sys- 104. When a join is based on equality of value,
tem? it is known as a
110. Which of the following is not true about 116. What will be the output of thefollowing
the ALTER TABLE statement? PHP code? <? php$num = 1;$num1 =
A. It can add a new row. 2;print $num . “+”. $num1 ;? >
B. It can add a new column A. 3
C. It can modify existing columns B. 1+2
D. It can define a default value for the C. 1.+.2
new column D. ERROR
NARAYAN CHANGDER
111. Below are some of database approach ad- 117. Based on ERDM, focuses on better data
vantages, except 1 management
A. improved data integrity A. Extensible Markup Language (XML)
B. lesser development time B. Object/Relational Database Manage-
C. easier access ment System (O/R DBMS)
122. Data types to store field uses tables or A. descriptive of the objects in the busi-
values list to validate the content of a sin- ness environment
gle value per row B. descriptive of the data represented by
the attribute
A. OLE Object
C. Use terminology that is familiar to the
B. Lookup Wizard users
C. Attachment D. Facilitates communication between
D. Hyperlink parties
C. To store a particular collection of data 137. Each item of information within a record
. is called a
D. To store a particular audio A. form
NARAYAN CHANGDER
B. DDL 138. What program can we use to create a
database?
C. Schema
A. Microsoft PoverPoint
D. Source code
B. Microsoft Excel
133. Which of the following PHPstatement
will store 41 in variablenum? C. Microsoft Word
134. Fields hold , like first names of all of B. Data Manipulation Language
the students (FName). C. Query Language
A. Table D. All of the above
B. Record
140. Backup and recovery management
C. Field Contents
A. Multiuser access control
D. none of above
B. Sophisticated algorithms ensure that
135. What is the full form of DBMS? multiple users can access the database
A. Data of Binary Management System concurrently without compromising its in-
tegrity
B. Database Management System
C. Enables recovery of the database after
C. Database Management Service
a failure
D. Data Backup Management System
D. Minimizes redundancy and maximizes
What is the full form of DBMS?
consistency
136. For each attribute of a relation, there is
a set of permitted values, called the of 141. Where the database does not have any
that attribute. multivalued columns?
NARAYAN CHANGDER
B. Runs on PC D. All of the above
C. Supports a small number of users or a 158. Stores data in a format optimized for de-
specific department cision support
D. none of the above
A. Data warehouse
154. Which is ONE difference between the al- B. Enterprise data warehouse
phanumeric and numeric data types?
C. Pedestal
A. Alphanumeric represents quantities,
unlike numeric, which represents labels D. Online analytical processing (OLAP)
only.
B. Alphanumeric represents labels and 159. Set of rules to ensure data integrity
quantities, unlike numeric, which repre- A. Data integrity
sents labels only.
B. Constraint
C. Alphanumeric does not represent
quantities, unlike numeric, which repre- C. Attribute
sents quantities. D. Entity
D. Alphanumeric represents labels, un-
like numeric, which represents quantities 160. The database management system can be
only. considered as the collection of that
enables us to create and maintain the
155. Using different file organization should database.
not require change to conceptual or exter-
nal schemas. This is referring to A. Translators
A. Logical Data Independence B. Programs
B. Physical Data Independence C. Keys
C. Conceptual Data Independence D. Language
D. User Data Independence
161. is a type of database that stores data
156. Raw facts such as telephone number, physically.
birth date, cx name
A. Object database
A. Data
B. Field B. Electronic Database
162. In the normal form, a composite 167. Rows in the relational table
attribute is converted to individual at- A. Entity Relationship Model
tributes
NARAYAN CHANGDER
B. Record
ing the conceptual model
C. Forms
A. Logical independence
D. Database
B. Physical independence
174. Which of the following is NOT an exam- C. Logical dependence
ple of a database?
D. none of above
A. telephone book
179. Data dictionary management is ..
B. real estate listing
A. Stores definitions of the data elements
C. online library catalog and their relationships
D. DVD B. Data transformation and presentation
175. What is Cloud database? C. Ensures efficient performance of the
database in terms of storage and access
A. Created and maintained using cloud
speed
data services that provide defined perfor-
mance measures for the database D. Security management
B. Stores data in a format optimized for 180. can not be created in Microsoft access
decision support
A. Tables
C. Created and maintained using differ-
B. Queries
ent data services that provide defined per-
formance measures for the database C. Reports
D. Stores historical data and business D. Image
metrics used exclusively for tactical or 181. Each item from this list is classi-
strategic decision making fied as NameBirthdateSocial Security
176. Which one of the following keyword is No.StreetCity
used to find out the number of values in a A. table
column? B. record
A. Total C. field Name
B. Count D. Data Type
C. Sum
182. Simple representations of complex real-
D. Add world data structures
194. Data about data, which the end-user data 200. How many records are displayed in the
are integrated and managed table?
A. Information A. 6;
B. 7;
NARAYAN CHANGDER
B. Database Management System
C. Database C. 8;
D. Metadata D. 9;
205. A collection of field in a database is: A. select first name from students
A. Row where first name like ‘A%’;
NARAYAN CHANGDER
D. All of the above
222. Which of the following uses paper-based
216. Dbms stands for
databases?
A. Database management system
A. Phonebook
B. Database management storage
B. Smart Phone
C. Data base manipulation system
C. Computer
D. Database manipulation storage
D. none of above
217. What is INFORMATION?
223. All of the following are disadvantages of
A. Produced by processing data
manual database EXCEPT:
B. Reveals the meaning of data
A. Folders are easily misplaced.
C. Enables knowledge creation
B. Large amounts of storage space are
D. Building blocks of information required to store files.
218. The DBMS that most difficult to use is C. Cross-referencing information from
A. Microsofts SQL Server different files is difficult.
B. Oracle Corporation Oracle D. Retrieval of simple information is rela-
tively fast and easy
C. Microsoft Access
D. IBM DB2 224. Represented by an upside-down tree
which contains segments
219. Data Manipulation Language is used to
the DBMS. A. Hierarchical Models
A. create B. Network Models
B. define C. Relational Models
C. control access D. none of above
D. manage 225. Which of the following provides the abil-
220. The details about a particular entity are ity to query information from the database
called a A is represented by a and insert tuples into, delete tuples from,
record in a database. and modify tuples in the database?
A. Field Description A. DML
B. Tuple B. DDL
C. Field type C. Query
D. Attribute D. Relational schema
226. Which is not true about DATA? 231. File structure is changed without affect-
A. Raw facts ing the application’s ability to access the
data
236. The number of columns in a table is called 241. Select the advantage of Object-Oriented
Model
A. Domain A. Learning curve is steep
B. Relation B. Inheritance promotes data integrity
C. Degree C. Visual representation includes seman-
D. Metadata tic content
237. Select all that applies for the problems D. Semantic content is added
NARAYAN CHANGDER
with file system data processing. 242. offer you the ability to present your
A. Lengthy development times data in print.
B. Complex system administration A. Report
C. Lack of security and limited data shar- B. MS Word
ing
C. Form
D. Difficulty of getting quick answers
D. MS Access
E. Extensive programming
243. what is a database?
238. a group of related data organized in
columns and rows in a datasheet. A. organized graph
A. Record B. organized table
B. Fields C. organized collection of data
C. Tables D. collection of notes Show answers Ex-
D. Report planation PreviousNext
239. What is the use of DBMS in the telecom- 244. What is Analytical database?
munication sector? A. Stores historical data and business
A. For reservations and schedule infor- metrics used exclusively for tactical or
mation strategic decision making
B. Keep call records, monthly bills, main- B. Enable retrieving, processing, and
taining balances modeling data from the data warehouse
C. For storing customer, product and C. Stores sari-sari stores for business
sales information metric and strategic decision making
D. none of above D. Captures and processes business data
to generate information that support deci-
240. What is the End-user interface? sion making
A. Each table is independent from an-
other 245. What is Discipline-specific database?
B. Allows end user to interact with the A. Contains a wide variety of data used in
data multiple disciplines
C. Executes all queries B. Contains data focused on specific sub-
D. Rows in different tables are related ject areas
based on common values in common at- C. Stores data in a format optimized for
tributes decision support
250. It contains multiple tabs, each with sev- A. The Relational Model
eral groups of commands. B. The Network Model
NARAYAN CHANGDER
B. Support end-users who use English C. Table
like commands
D. none of above
C. Support in the development of the com-
plex applications software
262. A column in a table that contains particu-
D. All of the above lar information about a record
257. Logical design is .. A. Record
A. Uses the database constructs sup- B. Primary Key
ported by the chosen database
C. Table
B. Task of creating a conceptual data
model D. Field
C. Is software and hardware indepen-
263. Relationships in Translating Business
dent
Rules into Data Model Components is/are
D. none of above
A. one-directional
258. Consider attributes ID, CITY and NAME.
which one of these can be considered as a B. bidirectional
primary key? C. multi-directional
A. NAME D. none of the above
B. ID
C. CITY 264. Which of the following is not a Storage
Manager Component?
D. ID, NAME
A. Transaction Manager
259. Data types where we can store files like
digital photos B. Logical Manager
266. What are the advantages of the DBMS B. Reduced data redundancy
A. Better data integration and less data C. Improved data security
D. Presents the end user with an inte- A. Data Bypass Management System
grated view of the data B. Database Management System
267. Unique and distinct object used to collect C. Digital Base Management System
and store data D. All of the above
A. Data
273. The best data type to choose for date of
B. Entity
birth would be
C. Relationship
A. Number
D. Contraint
B. Text
268. Which of the following is the disadvan-
C. Date/Time
tages of DBMS?
D. Currency
A. Cost of setup of DBMS is relatively
cheap 274. is a database that supports data dis-
B. Database systems are complex tributed across several different sites
C. Database will not be corrupted A. Centralized database
D. Database systems are fast to be de- B. Distributed database
signed
C. Enterprise database
269. Which of the following is a Data Model? D. Discipline specific database
A. Entity-Relationship model
275. Database management system is
B. Relational data model
software
C. Object-Based data model
A. System
D. All of the above
B. Relational
270. A Database Management System is a
C. Application
type of
D. Game
A. It is a type of system software
B. It is a kind of application software 276. An is an item in the real world that is
C. It is a kind of general software represented in a database.
277. Types of Database System where sup- 282. The term is used to refer a row
ports data located at single site. A. Record
A. Centralized Database B. Primary key
B. Enterprise Database C. Foreign key
C. Workgroup Database D. Field
D. none of above 283. It support many users across many de-
partments.
NARAYAN CHANGDER
278. What is Data inconsistency?
A. Workgroup database
A. Different versions of the same data ap- B. Cloud Database
pear in different places
C. Desktop database
B. Promoting accuracy, validity, and time-
D. Enterprise database
liness of data
C. Enables data to be shared 284. The type of datatype which allows al-
phanumeric characters and special symbols
D. Supports multiple users at the same but can store up to 255 characters.
time
A. Auto number
279. What does PHP files have a default file B. Text
extension? C. OLE Object
A. .HTML D. Memo
B. .PHP 285. Columns in a database are called
C. .XML A. Rows
D. .PH B. Fields
C. Tables
280. Collection of similar objects with shared
structure and behavior organized in a class D. none of above
hierarchy 286. What does the database consist of? ?
A. Connectivity A. from a set of tables with data records
B. Class B. from the fields
C. Object C. from data records
D. Inheritance D. from indexing information
287. What is the difference between an entity
281. Data type used to store currency value
and an attribute?
and numeric data used in mathematic cal-
culations involving data with one to four A. An attribute is a table in a database
decimal places and an entity is a field
A. Numeric B. An attribute is a record in a database
and an entity is a table
B. Currency
C. An attribute is a field in a database and
C. Short text an entity is a table
D. Long text D. none of above
NARAYAN CHANGDER
C. DBMS is a programming languages
C. Database Designers (Logical & Physi-
D. DBMS stores, modifies and retrieves cal)
data
D. Application Programmers
300. Tables have that are contain field con-
tents. 305. Describe the properties of an object
A. Columns A. Information
B. Record B. Object
C. Field C. Subject
D. none of above D. Attributes
301. Attribute name-Required to be ..
306. An entity set that does not have enough
A. Promotes self-documentation attributes to form primary key is known
B. descriptive of the objects in the busi- as
ness environment A. STRONG ENTITY SET
C. descriptive of the data represented by
B. WEAK ENTITY SET
the attribute
C. IDENTITY SET
D. Facilitates communication between
parties D. OWNER SET
302. Which is true about “Translating Business 307. Data is located at a single site.
Rules into Data Model Components”
A. Single-site database
A. Nouns translate into entities
B. Centralized database
B. Nouns translate into relationships
among entities C. Distributed database
C. Verbs translate into relationships D. Workgroup database
among entities
308. Disadvantages of File systems to store
D. Verbs translate into entities
data is:
303. Features in MS access build to provide A. Data redundancy and inconsistency
help topics and topics on tasks performed
working with Access B. Difficulty in accessing data
A. Index C. Data isolation
B. Office Assistant D. All of the above
309. Portion of the database seen by the ap- E. Improves implementation and man-
plication programs that produce the de- agement simplicity
sired information from the data within the
319. Data integrity management 324. is the bridge between machine and
human in a DBMS environment
A. Minimizes redundancy and maximizes
consistency A. People
B. Accept end-user requests via multiple, B. Hardware
different network environments C. Software
C. Sophisticated algorithms ensure that D. Data
multiple users can access the database E. Procedure
NARAYAN CHANGDER
concurrently without compromising its in-
tegrity 325. In an ER model, what are objects also
known as
D. Enables recovery of the database after
a failure A. Entity
B. Relationship
320. The phases in database design wherein
C. Bond
one gathers and list all the necessary
fields for database projects. D. Joint
A. Data control 326. We can use to comment a single line?
B. Data Definition i) /? ii) // iii) # iv) /* */
A. ONLY (II)
C. Data relationship
B. (I), (iii), AND (iv)
D. Data refinement
C. (ii), (iii) AND (iv)
321. Sets of related data D. BOTH (ii) AND (iV)
A. Table 327. The attribute refers to a of a table
B. Form A. Record
C. Report B. Foreign key
D. Field C. Primary key
D. Field
322. Uses graphic representations to model
database components 328. Types of Database System designed to
A. Entity instance or entity occurrence support companies day-to-day operations
330. . A relational database consists of a col- 335. Graphical representation of entities and
lection of their relationships in a database structure
331. which one of the following cannot be 336. Performs basic functions provided by the
taken as a primary key? hierarchical and network DBMS systems
A. ID A. Relational Database Management Sys-
tem(RDBMS)
B. RegistrationNo
B. Database Management System
C. DepartmentID
(DBMS)
D. Street
C. Entity relationship diagram (ERD)
332. The following are Characteristics of Early D. Object-Oriented Data Model (OODM)
days database application EXCEPT.
337. Database management so important be-
A. Contain Table Entity Relatinship
cause of the following reasons except
B. Data build direct on the top of File sys-
A. It allows better updates
tem
B. It helps increase organisational acces-
C. Multiple formats and duplications are
sibility to data
implemented
C. It helps people to be promoted as man-
D. none of above
ager
333. Which of the following is not the type of D. It increases efficiency
the data model?
338. Formatted summaries suitable for print-
A. Relational data model
ing
B. Semi-structured data model
A. Table
C. Entity-relationship model
B. Form
D. Process-based data model
C. Report
334. Which type of application should you use D. Field
if you need to store a large quantity of
data in an organized format that you can 339. allow you to enter, store, analyze,
easily query? and compile your data however you want.
A. Database A. DBMS
B. Presentation B. Forms
C. Spreadsheet C. DBMS Objects
D. Word Processor D. Tables
340. The reports are generally created after B. Data processing (DP) specialist
making on the database. C. Computerized File Systems
A. Record
D. File System Redux:Modern End-User
B. Statements Productivity Tools
C. Tables
346. A describes what is in the field. This
D. Queries description is displayed in the status bar
when you select this field on the form.
NARAYAN CHANGDER
341. A is a computerized filing system that
is used to organize and maintain a collec- A. Field type
tion of information for future use. B. Field size
A. Query C. Field Description
B. Report
D. All of the above
C. Database
347. is a collection of related fields.
D. Spreadsheet
A. Table
342. The term attribute refers to a of a
table B. Record
A. Record C. Field
351. Which of the following is not a type of 356. It is the use sophisticated statistical anal-
MS Access database object? ysis, including artificial intelligence tech-
niques such as neural networks, to “dis-
NARAYAN CHANGDER
362. Which of the following is not an example D. Form
of a data type?
368. How many different field types are used
A. Number to store the data?
B. Yes/No A. 2;
C. Entity B. 3;
D. Date/ Time C. 4;
363. Representing database as seen by the D. 5;
DBMS mapping conceptual model to the 369. Which of the following levels is consid-
DBMS ered as the level closed to the end-users?
A. The External Model A. Internal level
B. Object-Oriented Model B. External level
C. The Conceptual Model C. Physical level
D. The Internal Model D. Conceptual level
364. Describes an association among entities 370. Rows in a database tables are called
A. Attribute A. Fields
B. Data model B. Records
C. Constraint C. Tables
D. Relationship D. none of above
365. One or more very large databases con- 371. Each of these objects interacts with the
taining both detailed and summarized data records stored in your database’s
for a number of years that is used for anal- A. Table, Form, Query, Report
ysis rather than transaction processing. B. Table, Query, Form
A. Data warehouse C. Form, Report, Query
B. Data Sharing D. Report, Query, Table
C. Database
372. is a database management package
D. Data Mining
A. MS Excel
366. EXTENSION OF MS ACCESS FILE B. MS Word
A. .accdb C. Ms Access
B. .acdb D. MS Paint
373. Contains a wide variety of data used in 379. A Primary Key is a code that uniquely
multiple disciplines. identifies a in a Database.
378. What type of datatypes your going to 383. decides how the logical DB design is
used if you wanted to store information if to be physically realised
the student is CURRENTLY ENROLLED OR
NOT? A. Data Administrator (DA)
A. Auto number B. Database Administrator (DBA)
B. Date / Time C. Database Designers (Logical & Physi-
C. Numeric cal)
D. Yes/No D. Application Programmers
NARAYAN CHANGDER
A. Specialization
385. Data types to store text or alphanumeric
and used the link or URL B. Generalization
A. OLE Object C. Aggregation
B. Lookup Wizard D. None of the above
C. Attachment 389. Data is distributed across different sites.
D. Hyperlink A. Distribution database
386. The following shows the functionalities B. Centralized database
of DBMS except C. Cloud database
A. Manipulate D. Distributed database
B. Multiply
390. Logically related data consists of these
C. Share EXCEPT
D. Construct A. attributes
NARAYAN CHANGDER
C. Kerberos
A. It can be used only when there is a sep-
D. Diameter arate policy called Trusted Policy.
13. Which of the following features does AWS B. It can also be used in applications or
provide information about services that AWS services.
each IAM user or IAM role has not recently C. A Token is issued along with a fixedly
accessed? used Access Key and Secret Key.
A. IAM Access Analyzer D. If necessary, it is possible to switch to
another role according to the authority.
B. IAM Access Advisor
C. Credential Report 18. Which of the following types of security
services are used to support authentica-
D. Trusted Advisor
tion for remote users and devices?
14. If you need to allow a user full control over A. Biometrics
EC2 instance resources, which two of the B. HSM
following must be include in the policy you
create? (select 3) C. RADIUS
A. “Target”:“ec2:*” D. TACACS
21. Which one of the followings is not a way C. Allow all permissions except for all
by which Microsoft protect and secure permissions in IAM.
identity
NARAYAN CHANGDER
A. IAM User
administrator. You notice that some for-
B. IAM Role mer accounts used by temporary employ-
C. IAM Group ees are currently enabled. Which of the
following choices is BEST response?
D. AWS Account
A. Disable all the temporary accounts.
E. AWS Service
B. Disable the temporary accounts you’ve
31. Which of the following types of authenti- noticed are enabled.
cation solutions use tickets to provide ac-
C. Craft a script to identify inactive ac-
cess to various resources from a central
counts based on the last time they logged
location?
on.
A. Biometrics
D. Set account expiration dates for all ac-
B. PKI counts when creating them.
C. ACLs
36. An employee with access to the root user
D. Kerberos on your AWS account has just left your
company. Since you can’t be 100 percent
32. Which one is not one of Microsoft user au-
sure that the former employee won’t try
thentication methods?
to harm your company, which of the fol-
A. Microsoft Authenticator lowing steps should you take? (Choose
B. Windows Hello two)
C. Multifactor Authentication A. Change the password and MFA set-
tings for the root account
D. Multifactor Authentication
B. Delete and re-create all existing IAM
33. Which of the following elements will not policies
play any role in crafting an IAM policy?
C. Change he passwords for all your IAM
A. Action users
B. Region D. Delete the former employee’s own
C. Effect IAM user (within the company account)
D. Resource 37. A network includes a ticket-granting ticket
34. What is the function of Amazon Cognito server used for authentication. Which
user pools? authentication service does this network
use?
A. Give your application users temporary,
controlled access to other services in your A. Shibboleth
AWS account B. SAML
39. Why using Mutlfactor Authentication? 44. Your organization is implementing a SDN.
Management wants to use an access con-
A. MFA is more secure than passwords trol model that controls access based on
B. Protect your identities attributes. Which of the following is the
BEST solution?
C. Very easy to use
A. DAC
D. Provide users secure, seamless ac-
cess to all their apps with single sign-on B. MAC
C. Role-BAC
40. Users require access to a certain server de-
pending on their job function. Which of the D. ABAC
following would be the MOST appropriate
strategy for securing the server? 45. Which of the following services is not pro-
vided by Identity & Access Management
A. Common Access Card
A. Condition Access
B. Role based access control
B. Secure Authentication
C. Discretionary access control
C. Malware Verification
D. Mandatory access control
D. Identity Protection
41. Select all non-reusable policy types from
the following policies. 46. Which statement is wrong? Remeber MFA
is Multi Factor Authentication?
A. Inline Policy
A. MFA works by requiring 2 or more au-
B. AWS Managed Policy thentication methods
C. Customer Managed Policy B. MFA works by requiring any 2 authen-
D. Bucket Policy tications
C. Sign-in process may include enter a
42. What IAM permissions are required for an
code cellphone, fingerprint, smartcard
IAM user to assume an IAM role?
D. delivers strong authentication through
A. PassRole
easy to use authentication methods
B. CreateRole
47. Using the same complex password on all
C. TransferRole devices and applications leads to (Choose
D. AssumeRole security best answer)
NARAYAN CHANGDER
48. What is the function of Amazon Cognito connecting to routers and switches?
identity pools? A. Diameter
A. Give your application users temporary,
B. Radius
controlled access to other services in your
AWS account C. TACACS+
B. Add user sign-up and sign-in to your D. Kerberos
applications
C. Incorporate encryption infrastructure 53. Your organization is planning to implement
into your application lifecycle remote access capabilities. Management
wants strong authentication and wants to
D. Deliver up-to-date credentials to au-
ensure passwords expire after a prede-
thenticate RDS database requests
fined time interval. Which of the following
49. Which of the following is the greatest ben- best meets this need?
efit of organizing your users into groups? A. HOTP
A. It enhances security by consolidating
B. TOTP
resources
B. It simplifies the management of user C. CAC
permissions D. Kerberos
C. It allows for quicker response times to
service interruptions 54. In Kerberos, the Ticket Granting Ticket
D. It simplifies locking down the root user (TGT) is used for which of the following?
A. Identification
50. A Chief Information Security Officer (CISO)
wants to implement two-factor authenti- B. Authorization
cation within the company. Which of the
C. Authentication
following would fulfill the CISO’s require-
ments? D. Multifactor authentication
A. Username and password
55. What is the maximum valid time of tokens
B. Retina scan and fingerprint scan issued by STS (Simple Token Service)?
C. USB token and PIN
A. 1 hours
D. Proximity badge and token
B. 3 hours
51. Which of the following is not what Mi-
C. 6 hours
crosoft 365 uses to identify who is access-
ing which resources D. 12 hours
5. Some more specific reasons for conducting 10. Check below the different types of perfor-
performance testing include mance testing.
A. Assessing release readiness A. Stress Testing
B. Assessing infrastructure adequacy B. Load Testing
C. Assessing adequacy of developed soft- C. Black Box Testing
ware performance D. Scalability Testing
D. Improving the efficiency of perfor- E. Functional Regression
NARAYAN CHANGDER
mance tuning
11. Performance testing
E. All of above
A. Compatibility Testing
6. How many phases does the performance
B. Load testing
framework contemplate?
C. Interface testing
A. 2
D. stress testing
B. 6
C. 7 12. test if many users are accessing or request-
ing the same page
D. 5
A. Functionality testing
E. 4
B. Usability testing
7. Which of the following can be used C. Stress testing
to configure a CloudFormation template?
(Choose three) D. Securitytesting
26. The designed performance test scenarios 31. Which of the following are valid reasons
must be developed with Gherkin. The test why manual processes are risky? (Choose
scenarios created must be uploaded to Jira- all that apply)
Xray
A. Does not scale
A. In folder called Performance
B. No version control
B. In the test general repository
C. Lack of audit trails
C. In the folder that corresponds to the
D. Inconsistent data management
NARAYAN CHANGDER
functionality
D. Unassigned in test repository 32. What is performance testing?
E. In a subfolder of the functionality A. performance of an application
27. A performance test script is composed of B. load
three blocks: initialization, X and termina- C. durability
tion
D. blackbox
A. scripts
E. regression
B. code
C. activities 33. Which of the following is not a stand alone
D. actions application but a web-based, globally ac-
cessible platform
28. Where would you look to find pre-built A. VUGen
templates for common AWS solutions?
B. LRE
A. CodeDepot
C. Controller
B. AWS Quick Start
D. Analysis
C. Git
D. Local Sharepoint repository 34. Which of the following is not true about
parameterization?
29. is a general term used to describe
a new class of network based computing A. It is a process to capture the dynamic
that takes place over the Internet values returned from the server
A. Cloud Computing B. It is a process used to store the static
values which the user enters.
B. Network Computing
C. Its works on the predefined rules.
C. Storage Computing
D. None of the choices D. more number of values are stored in
the parameter files and picks up data.
30. AWS CloudFormation templates can be
written in which two text formats? 35. Who is the odd one out?
A. Plain text and RTF A. JMeter
B. YAML and RTF B. Ksh
C. Plain Text and JSON C. Lighthouse
D. YAML and JSON D. Artillery
38. Testing whether communication is done C. Load, stress, peaks, resistance, vol-
properly umetry, scalability
NARAYAN CHANGDER
who share thoughts, pictures, interests,
A. Root
and interactions.
B. Definition
A. web blog
C. Envelope B. commercial
D. WSL-Root C. social network
20. Root tag in SOAP 26. The syntax for parameter entity is
A. Envelop A. <! ENTITY $ NAME DEFINITION>
B. Header B. A. <! ENTITY % NAME DEFINITION>
C. body C. < ENTITY % NAME DEFINITION>
D. none D. < ENTITY % NAME DEFINITION>
21. In Instant Messaging, words get short-
27. What does SOAP define?
NARAYAN CHANGDER
ened and new slang is invented because
IM users- A. The overall structure of the XML mes-
sage
A. are poor spellers
B. make mistakes as they type B. The conventions representing the re-
mote procedure call in the XML message
C. type very fast
C. A binding to HTTP
D. want to keep their messages secret
D. The type of client to be used
22. http://portalkmkt.matrik.edu.my/register.htmlregister.html
E. The conventions to wrap and send an
refers to
error back to the sender
A. protocol
B. host name 28. Which of the following is a components of
a Web Service architecture?
C. webpage name
A. SOAP
D. path
B. UDDI
23. E-MAIL STANDS FOR
C. WSDL
A. ELECTRICITY MAIL
D. All of above
B. ELECTRONIC MAIL
C. ELECTION MAIL 29. List three (3) examples of Internet Mes-
saging (IM)
D. none of above
A. Telegram
24. What does a pop-up blocker block?
B. Yahoo Messenger
A. Spam
C. Google Talk
B. Virus
D. Instagram
C. Spyware
E. FIleZilla
D. Adware
25. Amazon Elastic Block Storage, or Amazon 30. Which of these programming languages is
EBS is used in used to create web pages?
35. SOAP is a lightweight based protocol 40. A real-time Internet service that notifies
. youwhen one or more people are online
andallows you to exchange messages or
A. XHTML files orjoin a private chat room with those
B. XML people.This description refers to
41. Which of the following three kinds of data 46. An Internet standard that permits file up-
NARAYAN CHANGDER
that web services have? loading and downloading with other com-
puters on the Internet.This description
A. shared data, processed data, form refers to
data
A. WWW
B. shared data, pre-session data and
B. Email
temporary data
C. Internet Messaging (IM)
C. shared data, post-session data and
temporary data D. Voice Over Internet Protocol (VOIP)
D. shared data, pre-session data and per- E. File Transfer Protocol (FTP)
manent data
47. Which of the following layer in Web Ser-
42. What UDDI means? vice Protocol Stack is responsible for de-
scribing the public interface to a specific
A. Universal Definition Discovery and In- web service?
tegration
A. Service Transport
B. Universal Definition Display and Inte-
B. XML Messaging
gration
C. Service Description
C. Universal Description Discovery and
Integration D. Service Discovery
D. Universal Discovery Description and E. Service Registry
Integration
48. What is SOAP:
43. helps you find the website or the in- A. Simplified Object Access Protocol
formation you are looking for. B. Specified Simple Object Access Proto-
A. Bloggers col
B. Search engine C. Simple Object Access Protocol
C. News Group D. None of these
D. Web Feed 49. Services break big problems into little
problems.(Choose one principle of SOA de-
44. Messaging Protocol in a webservice sign).
A. HTTP A. Service Discoverability
B. MTP B. Standardized Service Contract
C. SMP C. Service Composability
D. SOAP D. Service Statelessness
50. Services minimize dependencies on each 55. The part of a network address which iden-
other. (Choose one principle of SOA de- tifies it as belonging to a particular domain
sign).
51. Web services enables 56. Which component of Web Services does
not acts as a directory?
A. data can be exchanged between vari-
ous applications and different platforms A. UDDI
B. to resolve interoperability issues B. SOAP
C. applications to function between two C. WSDL
different operating systems server
D. XML
D. All the above
57. Which technology is used to transform
52. At which two points in SOA communication XML into HTML?
are registries used?
A. XHTML
A. During discovery
B. XSLT
B. During publication
C. During message validation C. DOM
53. Service Transport, XML Messaging, Ser- 58. Why SOAP is used as a protocol for access-
vice Description and Service Discovery are ing a web service?
four layers of
A. SOAP platform and language indepen-
A. web service implementing client com- dent, allows to get around firewalls
ponents
B. SOAP is based on HTML
B. web service supporting repository
C. SOAP is designed to communicate
C. web service protocol stack through LAN
D. web service supporting request and re- D. All of the above
sponse components
59. Live communication between two or more
54. Which of these options would you suggest
people at two or more geographically dis-
to store the data along with the flexibility
tant places via audio & video transmission.
to pay only for the used storage or data?
A. Cloud Drive A. E-Mail
60. Check off all the benefits of dynamic web- 64. Check off all the reasons for having a web-
sites. (There’s more than one possible an- site. (There’s more than one answer)
swer) A. You save money in advertisements.
A. It’s quick and easy to make changes. B. You can reach a bigger geographical
B. It looks unprofessional. scope.
C. It’s easy to navigate from one page to C. It is cool for your business.
another. D. It has 24/7 availability.
NARAYAN CHANGDER
D. Users can customize it according to E. You can educate customers.
their interests, needs, etc.
65. What is the correct symtax of for-each in
E. They’re the most common type of web- XSLT?
site in the WWW.
A. <for-each> code </for-each>
61. Which of the following are similarities of B. <xsl:for-each> code <xsl:for-
Email and Internet Messaging (IM). each/>
A. Internet Messaging (IM) is a real time C. <xsl:for-each> code </xsl:for-
messaging while Email is a non-real time each>
messaging.
D. <xsl:foreach> code </xsl:foreach>
B. Integrated in many email service and
socialnetwork such as Yahoo Messenger 66. List three (3) types of Website.
andFacebook Messenger. A. Email
C. Can be used to send attachments, B. Business
such as documents, graphics, or au- C. Portal
dio/video clips.
D. Social Networking
D. Provide free online storage.
E. Internet Messaging (IM)
62. List three (3) internet services.
67. Services can be discovered (usually in a
A. Business service registry).(Choose one principle of
B. Email SOA design).
C. World Wide Web (WWW) A. Service Discoverability
D. Portal B. Standardized Service Contract
E. File Transfer Protocol (FTP) C. Service Reusability
D. Service Statelessness
63. Which statements are not related to the
API? 68. Identify internet services based on the fol-
lowing situation:Rozie wants to send her
A. The API acts as a door that people with
assignment to her lecturer electronically.
the right locks can walk through
A. Internet Messaging
B. The API acts as a filter.
B. Email
C. There is more to private than public
APIs. C. Voice Over Internet Protocol (VOIP)
D. The API cannot allow you to build one D. File Transfer Protocol (FTP)
application from another E. World Wide Web (WWW)
69. Which of the following is a security issue 74. A site generally used to post online diaries,
with web services? which may include discussion forums.
A. web blog
D. HEAD B. cacheable
C. layer system
73. You need to send an email to your friend D. code on demand
but failed. Here are the possible thing that
might happen except, 79. Which of the following is used to perform
remote procedure calls in web services?
A. without TTL domain
A. HTTP-RPC
B. without mail address B. XML-HTTP
C. without fail C. SOAP-XML
D. without subject D. XML-RPC
NARAYAN CHANGDER
81. A type of communication service that
is suitable for sharing documents or an- C. The server has not found anything
nouncement usually at work place. matching the Request-URI
A. Internet Messaging D. The request requires user authentica-
tion
B. Email
C. File Transfer Protocol (FTP) 86. Main advantage of REST Based web ser-
vice
D. Voice Over Internet Protocol (VOIP)
A. Security
82. Which of the following description refers B. Light weight
to Webpage?
C. Prortocol
A. An electronic document on theWeb,
which can contain text, graphics, anima- D. Architecture
tion, audio, and video. 87. Which of the following protocols are used
B. A worldwide collection of electronic- by web services as a medium of communi-
documents. cation between client and server?
C. A collection of related Web pagesand A. HTTP
associated items such as documents and- B. FTP
pictures, stored on a Web server.
C. Gopher
D. none of above
D. HTTPS
83. The transmission of messages and files via
88. Identify internet services based on the fol-
computer networkis definition of
lowing situation:Madam Salina wants to
A. electronic mail inform her students that lecture on Mon-
B. world wide web day will be held at Computer Lab
C. electronic news A. Internet Messaging
D. internet messaging B. Email
C. Voice Over Internet Protocol (VOIP)
84. Which of the following layers in the Web
Service Protocol Stack is responsible for D. File Transfer Protocol (FTP)
describing the public interface to a particu- E. World Wide Web (WWW)
lar web service?
89. Which of the following role of web ser-
A. Service Transport vice architecture implements the service
B. XML Messaging and makes it available on the Internet?
C. Service Description A. Service Provider
100. is not a part of the Uniform Interface 104. Which of the following language UDDI
constraint of REST? uses?
A. Resource A. Xml
B. HTTP B. wsdl
C. URI C. soap
D. none
D. XML
105. HTTP response “200” means?
NARAYAN CHANGDER
101. Subject name:
A. Forbidden
A. Service-Oriented Architecture B. OK
B. Service-Oriented Web Development C. Internal Error
C. The 9 Principles Of Soa Design D. none of above
D. Introduction to service-oriented web 106. Which of the following attribute is used
development to declare how the contents of a header
block were created?
102. Which of the description below refers to
Email? A. role attribute
B. mustUnderstand attribute
A. A real-time Internet service that noti-
fies youwhen one or more people are on- C. envelope attribute
line andallows you to exchange messages D. encodingStyle attribute
or files orjoin a private chat room with
those people. 107. Tag used to define custom tag in WSDL
A. Interface
B. An internet service that allows
thetransmission of messages and files B. Type
via acomputer network. C. Binding
C. Enable user to speak to other users via D. none
Internet connection.
108. Why has web scraping been used for so
D. Consists of worldwide collection of long?
electronic documents. A. Easy to implement
E. An Internet standard that permits file B. This is a secure way to access data
uploading and downloading with other
C. There is no other solution to access
computers on the Internet.
the data
103. Which of the following role of web ser- D. API is difficult to implement
vice architecture provides a central place
109. Which of these is not the major element
where developers can publish new ser-
of WSDL document which describes the de-
vices or find existing ones?
scribes a web service?
A. Service Provider A. <portType>
B. Service Requester B. <message>
C. Service Registry C. <binding>
D. Service Description D. <attribute>
110. Use of <binding> element in WSDL 115. Which of the following component of
A. to communicate protocols used by web Web service describes interfaces to web
services?
NARAYAN CHANGDER
121. One of the design goals for XSLT is to en-
B. A worldwide collection of electronic-
able the transformation of data from one
documents.
format to another on
C. A collection of related Web pagesand
A. Internet
associated items such as documents and-
B. Server pictures, stored on a Web server.
C. Webpages D. none of above
D. Network
127. A website that uses any combination of
E. Client games, articles, videos and images to edu-
cate their audience.
122. Which of the following is a directory ser-
vice where enterprises register and search A. Personal
for web services? B. Web Portal
A. Supporting protocols of SOAP C. Community Forum
B. UDDI D. Educational
C. WSDL 128. Web Service Features are
D. None of the above A. Course grained
123. Applications that are accessed through B. Loosely coupled
browsers are C. Low Cost Communication
A. Desktop Applications D. Exposing the Existing Function on the
B. Web Applications network
C. Web Services 129. The full form of W.W.W is
D. SOA A. wide web worry
124. What is RPC? B. work wide web
A. Regional Procedure Calls. C. World Wide Web
B. Remote Procedure Calls D. online work web
C. Registered Procedure Counselor 130. Which of the following statements are
D. Regional Protection Control TRUE about Email.
A. Can be used to sendattachments, such
125. Name the web services? as documents, graphics, oraudio/video
A. SOAP clips together with email.
B. UDDI B. It provide free online storage.
C. A private chat that allow registered 136. Which method of HTTP is used to update
users tocommunicate in real time. the data?
B. Email B. Email
C. Voice Over Internet Protocol (VOIP) C. Voice Over Internet Protocol (VOIP)
D. File Transfer Protocol (FTP) D. File Transfer Protocol (FTP)
E. World Wide Web (WWW) E. World Wide Web (WWW)
141. Which of the following statements are 146. A site on which users can upload and
TRUE about Internet Messaging (IM). share media.
NARAYAN CHANGDER
A. Can be used to sendattachments, such A. wiki
as documents, graphics, oraudio/video
B. social networking
clips together with email.
C. video media sharing
B. It provide free online storage.
D. entertainment
C. A private chat that allow registered
users tocommunicate in real time. 147. Which of the following is correct about
D. Users and people they are conversing SOAP?
are online at thesame time. A. SOAP is an XML-based protocol for
E. It is a real time messaging. exchanging information between comput-
ers.
142. What is NOT a part of a SOAP Message?
B. SOAP is a communication protocol.
A. SOAP Body
C. SOAP is for communication between
B. SOAP Envelop applications
C. SOAP Headers D. All of the above.
D. SOAP Footer
148. Which of the following is correct about
143. List three (3) examples of VOIP soft- XML Messaging layer in Web Service Pro-
ware. tocol Stack?
A. Viber A. This layer is responsible for encoding
messages in a common XML format so
B. Google Talk
that messages can be understood at ei-
C. Facebook ther end.
D. Skye B. Currently, this layer includes XML-RPC
E. Twitter and SOAP.
144. What does mean the acronym “SOA”? C. both the statements are correct
160. A site that contains content that is in- D. Voice Over Internet Protocol (VOIP)
tended to inform visitors, but not nec- E. File Transfer Protocol (FTP)
essarily for commercial purposes, such
as http://www.irs.gov/. Most govern- 165. Which of the following are differences of
ment, educational, and nonprofit institu- Email and Internet Messaging (IM).
tions have an informational site. A. Internet Messaging (IM) is a real time
A. search engine messaging while Email is a non-real time
messaging.
B. commercial
NARAYAN CHANGDER
B. Integrated in many email service and
C. informational
socialnetwork such as Yahoo Messenger
D. news andFacebook Messenger.
161. This web site offers a variety of internet C. Can be used to send attachments,
services. Most of it offers free services. such as documents, graphics, or au-
dio/video clips.
A. Entertainment
D. Email provide free online storage, but
B. News Internet Messaging (IM) does not provide
C. Portal online storage.
D. none of above 166. Which of the following HTTP Status code
means NOT FOUND, states that method is
162. What is the full form of VPC?
not available?
A. Virtual Potential Cloud A. 400
B. Virtual Private Cloud B. 401
C. Virtual Potential Component C. 404
D. Virtual Private Component D. 409
163. Which is a disadvantages of a client- 167. What does a comprehensive data policy
server network? include?
A. When server isn’t on, clients don’t A. Wiping, disposing, retention, and stor-
power up age
B. Clients can’t connect wirelessly to the B. Disposing, patching, retention, and
server storage
C. Dependent on server-if it goes down, C. Retention, storage, disposing, and vir-
clients stop working tualization
D. Clients are more expensive than D. Storage, virtualization, wiping, and
servers elasticity
164. Allow the transmission of messages and 168. What do you under stand by compose in
files via a computer network.This descrip- E-mail
tion refers to A. reply a mail
A. WWW B. forward a mail
B. Email C. write a mail
C. Internet Messaging (IM) D. return a mail
169. A link from a hypertext document to an- 174. Architecture Based web service
other location, activated by clicking on a A. SOAP
highlighted word or image.
172. Main advantage of SOAP Based web ser- 178. attribute controls the targeting of
vice header blocks to particular SOAP nodes.
A. Security A. mustUnderstand
B. Light weight B. role
C. Prortocol C. encodingStyle
D. Architecture D. none of the above
173. AXIS framework is provided by which 179. Which of the following protocols is used
company by REST web services as a means of com-
A. IBM munication between client and server?
B. Apache Foundation A. HTTP
C. Redhat B. FTP
D. JBOSS C. SMTP
180. Services hide the logic they encapsulate 185. What is the response code to delete a re-
from the outside world.(Choose one princi- source?
ple of SOA design). A. 205
NARAYAN CHANGDER
A. Loose Coupling B. 204
B. Service Abstraction C. 206
C. Service Reusability
D. 203
D. Service Autonomy
186. Is the underlying protocol used by the
181. Google Hangouts, Viber and Line are ex- World Wide Web and this protocol defines
amples of how messages are formatted and trans-
A. Internet Messaging (IM) mitted, and what actions Web servers and
browsers should take in response to vari-
B. File Transfer Protocol (FTP)
ous commands.
C. World Wide Web (WWW)
A. WWW
D. Voice Over Internet Protocol (VOIP)
B. Domain Type
E. Email
C. HTTP
182. Which of the following is true about D. Domain Name
NoSQL and SQL?
A. NoSQL and SQL support ACID proper- 187. GET method of HTTP is used for
ties. A. Create
B. NoSQL and SQL are relational B. Delete
databases.
C. Read
C. NoSQL and SQL handle transactions.
D. Update
D. NoSQL and SQL implement dynamic
schemas. 188. A site that amuses, pleases, or diverts.
183. Is the text that you type into your inter- A. commercial
net browser when you want to go to a B. entertainment
website
C. advocacy
A. URL
D. news
B. RPM
C. PPM 189. What SOAP stands for?
D. RUL A. State Access Object Protocol
B. State Allied Object Protocol
184. method of HTTP is used to erase the
data. C. Simple Access Object Protocol
A. POST D. Simple Allied Object Protocol
190. DNS maps human, readable domain 195. In contrast, the contract-first approach
names into actual encourages you to think of the service con-
tract first in terms of
D. caches. C. WSDL
D. Only First and Second
191. Which of the following HTTP Status code
means CREATED, when a resource is suc- E. All of the mentioned
cessful created using POST or PUT re-
196. List two (2) examples of FTP
quest?
A. 200 A. FileZila
C. 204 C. SmartFTP
193. Which of the following HTTP methods are 198. A service provider will publish the web
idempotent operations? service through
A. OPTIONS A. WSDL
B. DELETE B. SOAP
C. POST C. STUB
D. HEAD D. SKELETON
194. The software used to search for infor- 199. Logic is divided into services with the in-
mation or document with the help of key- tent of maximizing reuse.(Choose one prin-
words is ciple of SOA design).
A. Browser A. Loose Coupling
B. Search engine B. Service Abstraction
C. OS C. Service Reusability
D. Application Software D. Service Autonomy
200. Here are three types of Ownership Web 205. Identify internet services based on the
API namely? following situation:David transfer file and
A. Public/Open rename his experiment data file from his
personal computer to the main laboratory
B. Free computer.
C. Private A. Internet Messaging
D. Internal
B. Email
E. Partner
NARAYAN CHANGDER
C. Voice Over Internet Protocol (VOIP)
201. Which search engine is ranked as the D. File Transfer Protocol (FTP)
number one for web search worldwide?
E. World Wide Web (WWW)
A. Yahoo
B. Bing 206. MySpace and Facebook, with Facebook
C. Google are examples of?
C. Voice Over Internet Protocol (VOIP) C. Voice Over Internet Protocol (VOIP)
D. File Transfer Protocol (FTP) D. File Transfer Protocol (FTP)
E. World Wide Web (WWW) E. World Wide Web (WWW)
209. Which of the following roles for the web 214. What is a snowball?
services architecture provides a central A. Snowball is a data transport solution
place where developers can publish new
C. Optimization A. Google
D. Directory B. Hotmail
C. Yahoo!
211. What can you do if you need to send to a
large file size through email? D. Excite
E. Internet Explorer
A. sent separate fail
B. sent fail using flash drive 216. is a real-time internet communication
services that enables users to speak to
C. compress that fail
other users via the Internet connection.
D. scan anti virus A. E-mail
212. Which of the following are the proto- B. Instant Messaging
cols? C. VoIP
A. HTTP D. FTP
B. XML
217. A SCRIPT is
C. SOAP
A. A program or sequence of instructions
D. HTML that is interpreted or executed by the pro-
cessor directly
213. The core components, registry and repos-
itory, business processes, trading partner B. A program or sequence of instructions
agreements are defined in standards that is interpreted or executed by another
of web services program
C. A program or sequence of instructions
A. UDDI
that is interpreted or executed by a web
B. WSDL server only
C. ebXML D. All True
D. SOAP E. All wrong
218. components of web services are B. Reflects the interest, opinions andper-
A. WSDL sonalities of the author and sometimes
sitevisitors.
B. HTTP
C. consists time-stamped articles in a di-
C. XML ary or journalformat, listed in reverse
D. UDDI chronologicalorder.
219. What are the web service platform ele- D. Contents can be modified by anyone.
NARAYAN CHANGDER
ments?
224. REST is an approach to building web ser-
A. SOAP, UDDI, XML vices that revolves around HTTP Methods
B. HTTP, WSDL and Endpoints. REST stands for?
C. UDDI, XML, SOAP A. REST stands for “REpetition State Ter-
D. SOAP, UDDI, WSDL minal.”
B. REST stands for “REpresentational
220. An API is a service or library that allows State Transfer.”
you to use certain services. What does API
stand for? C. REST stands for “REcursive State
Transaction.”
A. Async Protocol Interfaces
D. none of above
B. Application Partner Integration
C. Application Programming Interfaces 225. is the basis for Web services.
D. none of above A. XML
228. The basic Web Services platform is com- B. Launch the replacement compute ca-
bination of and pacity
A. SaaS D. Virtualization
NARAYAN CHANGDER
B. PaaS 9. Cloud business models determine the own-
C. IaaS ership of the computing resources offered
withina cloud and the responsibilities of
D. GaaS
the cloud consumer and service provider.
7. What is grid computing? Under whichtype of cloud service does the
client have control over deployed appli-
A. It is distributed computing where au- cations and possiblyconfiguration settings
tonomous computers perform indepen- for the application hosting environment?
dent tasks.
A. IaaS
B. It is interconnected computing where
a computing platform is delivered to con- B. PaaS
sumers. C. SaaS
C. It is parallel and distributed computing D. none of above
where computer infrastructure is offered
as a service. 10. What is one benefit of cloud computing?
D. It is parallel computing where au- A. Computer resources can be quickly
tonomous computers act together to per- provisioned.
form very large tasks.
B. A workload can quickly move to a cloud
8. A company currently experiences 7 to 10 computing environment.
percent utilization of its development and
C. There is no operational cost for a cloud
test computing resources. The company
computing environment.
would like to consolidate to reduce the
number of total resources in their data cen- D. The resources can quickly move from
ter and decrease energy costs. Which fea- one cloud environment to another.
B. Cloud B. IaaS
C. Software C. CaaS
D. Hardware D. SaaS
3. A Party that can conduct independent as- 8. Process the job to single computation unit
sessment of cloud services, information with high resources comes under the cate-
system operations, performance and secu- gory of
rity of the cloud implementation
NARAYAN CHANGDER
A. horizontal scale up
A. Cloud Consumer
B. vertical scale up
B. Cloud Auditor
C. green computing
C. Cloud Provider
D. none
D. Cloud Carrier
9. Cloud Services have a relationship
4. Below is a list of cloud infrastructure com- with their customers
ponents except
A. Many-to-many
A. Storage components
B. One-to-many
B. Physical server
C. One-to-one
C. Private cloud
D. Many-to-one
D. Network components
10. Which of these is not a major type of cloud
5. Choose two example of third-party cloud
computing usage?
storage providers that can manage and
maintain data along with remote back- A. Hardware as a Service
ups. B. Platform as a Service
A. amazon simple storage service (s3) C. Software as a Service
B. mozilla firefox D. Infrastructure as a Service
C. microsoft word
11. provides virtual machines, virtual stor-
D. microsoft azure age, virtual infrastructure, and other hard-
6. can evaluate the services provided by a ware assets.
cloud provider in terms of security controls, A. IaaS
privacy impact, performance B. SaaS
A. Cloud auditor
C. PaaS
B. cloud broker
D. CaaS
C. cloud consumer
12. Which is not a characteristic of SaaS.
D. cloud provider
A. Multi device support
7. Which one of the following can be consid-
B. Web access
ered as the most complete cloud computing
service model? C. One-to-many
A. PaaS D. Offline access
13. An Entity that manages the use, perfor- C. A logical design methodology
mance and delivery of cloud services and D. All of the above
negotiates relationships between Cloud
NARAYAN CHANGDER
1. Holds the complete runtime environment C. CASB
including an application, its dependencies, D. Resource policies
libraries, other binaries, and configuration
files, all in one unit 5. Which of the following services can be pro-
A. Security groups tected by the Alibaba Cloud Security Cen-
ter’s anti-brute force password cracking
B. Container security function?
C. Root account security A. Windows remote desktop service
D. Secrets management (RDP) Linux remote control service (SSH)
NARAYAN CHANGDER
VPC) cle lasts for 5 minutes, during which the
average disk usage is measured If the av-
19. REFERS TO DIGITALLY SPECIFY THE AC- erage disk usage exceeds 80% for five
CESS RIGHTS TO PROTECTED RESOURCES consecutive measurement cycles, an alert
USING ACCESS POLICIES will be reported.After your average disk
A. AUTHORIZATION usage exceeds 80%, how long will it take
to receive an alert with the best case sce-
B. AUTHENTICATION
nario?
C. SECURITY OF DATA
A. 30 minutes
D. AUDITING
B. 0 minutes
20. To secure the root account
C. 40 minutes
A. Security groups
D. 20 minutes
B. Container security
C. Root account security 24. Who Are the Webinar Speakers This
Time?
D. Secrets management
A. Asrar Abu Khair
21. Which security property is enhanced by
B. Rizky Aditya Wijayanto
distributing an application fleet across two
availability zones? C. Abu Bakr
A. Confidentiality D. Answers A & B Correct
B. Integrity
25. Currently your organization has an oper-
C. Availability ational team that takes care of ID man-
D. Non repudiation agement in their on-premise data center.
E. Authenticity They now also need to manage users and
groups created in AWS. Which of the fol-
22. You have bought an ECS instance on Al- lowing AWS tools would they need to use
ibaba Cloud After deploying a Python en- for performing this management function.
vironment on it, which of the following is A. AWS Config
the easiest and quickest way to monitor
whether the Python process is running nor- B. AWS Cloud Trail
mally and report an alert if the process is C. AWS Key Management Service (AWS
accidentally terminated? KMS)
A. Use site monitoring D. AWS Identity and Access Management
B. Log on to the ECS instance console (IAM)
31. Who’s Hosting Tonight’s Webinar? 36. The method for managing authentication
credentials which can include passwords,
A. Wowrack Indonesia encryption keys, usernames, email ad-
B. Wowkece Indonesia dresses, and private certificates.
NARAYAN CHANGDER
of correct answers:5) 42. Alibaba Cloud WAF currently supports
A. Data leakage prevention web security protection for HTTP and
HTTPS.Which of the following ports are
B. Defense against website trojans and usually used for HTTP and HTTPS proto-
tampering cols? (Number of correct answers:2)
C. Virtual vulnerability patches
A. 80
D. Protection against malicious CC at-
tacks B. 443
55. CaaS vendors offer guaranteed QOS in SLA 60. What is the maximum number of users for
to their clients .What does QOS stands the Eagle Eye VMS?
for?
A. As many as you need
A. Quality in service
B. 150
B. Quality operating system service
C. Quality of service C. 1500
D. Quality object oriented service D. 280
NARAYAN CHANGDER
56. of resources results in losses by both
61. Alibaba Cloud CloudMonitor is a service
user and provider in that paid demand by
that monitors Alibaba Cloud resources and
the users is not served.
Internet applicationsWhich of the follow-
A. Static provisioning ing functions are currently provided by
B. Dynamic provisioning CloudMonitor?
C. Over provisioning A. Custom firewall
D. Under provisioning
B. Alerting
57. NaaS refers to C. Site monitoring
A. Network as a service
D. Cloud service monitoring
B. Node as a service
E. Custom monitoring
C. Neighbor as a service
D. None of the above 62. Alibaba Cloud Security Center can record
58. Which cloud resource can detect and pre- source IP addresses that remotely access a
vent SQL injection attacks? server, and shield suspicious IP addresses
that frequently connect to the server. Dur-
A. VPC Flow Inspection ing routine O & M.Which of the following
B. Web Application Firewall functions can be used to set the IP address
C. VPC Port Filtering that are commonly used by the system ad-
ministrator’?
D. Load Balancer
E. Cloud Logging A. Security group
B. Valid Login IP list
59. During an organisation’s information sys-
tems audit, the administrator is requested C. Frequent logon location management
to provide a dossier of security and com-
pliance reports as well as online service D. Webshell detection
agreements that exist between the organ-
isation and AWS. Which service can they 63. What is CASB?
utilize to acquire this information?
A. Cloud Security Access Broker
A. AWS Artifact
B. Cloud Access Security Broker
B. AWS Resource Center
C. AWS Service Catalog C. Conditional Access Security Broker
D. AWS Directory Service D. Container Access Security Broker
64. End user xy has 12 analog cameras at his 68. Choose the two options which are USER
company in Berlin and 23 IP cameras at responsibilities in the cloud
his second location in Rotterdam.Can he
65. What is discussed in the Case Study Ses- A. Security group membership
sion? B. Application layer
A. Wordpress CMS C. Instance awareness
B. Java Plugin D. API inspection
C. Canva 70. Who is responsible for SECURITY in the
D. YouTube cloud?
A. Customer availing cloud services
66. Which components make Brivo Onair So-
lution innovative compared to traditional B. Shared responsibility between cloud
physical security solutions? service provider and customer
A. The components of SaaS & digital C. Internet Service Provider
cloud. D. Cloud Service Provider
B. The components of SaaS, digital cloud,
71. In how many countries is Brivo operat-
hosted server and remote access.
ing?
C. The components of SaaS, hosted
A. 35
server and remote access.
B. 12
D. The components of SaaS, digital cloud
and remote access. C. 105
D. 42
67. Which of the following is the responsibil-
ity of AWS according to the Shared Secu- 72. Alibaba Cloud Data Risk Control utilizes
rity Model? Choose 3 answers from the Alibaba Group’s Big Data computing capa-
options given below bilities and industry-leading, risk decision
A. Managing AWS Identity and Access making engine to address fraud threats in
Management (IAM) key service processes (such as account log
on, online activity, payment) and avoid fi-
B. Securing edge locations
nancial lossWhich of the following is NOT
C. Monitoring physical device security an application scenario of Data Risk Con-
D. Implementing service organization trol?
Control (SOC) standards A. Account registration
NARAYAN CHANGDER
C. Secrets management
78. Which of the following methods can be
D. Permission management used to download the metric data of Al-
ibaba Cloud CloudMonitor?
74. Cloud service providers replicate data in
multiple zones and within zones to provide A. Download the data through Open APIs
high availability. Replication:Helps elimi-
B. You can download the data through
nate downtime (the time your data is un-
both the console and Open APIs
available).Redirects to another availabil-
ity zone, when a zone fails. C. You can only view the reports, but can-
A. High availability across zones not download them.
82. The security pillar of the Well Architected prompted.Which of the followings are the
Framework refers to: possible causes of the error? (Number of
correct answers 3)
3. Your company wants to default the pre- 6. You are implementing Oracle Cloud Pricing
ferred fulfillment warehouse and sched- for a Fortune 500 hi-tech components dis-
uled ship date as order requested date dur- tributor who operates on wafer thin mar-
ing order import and skip the scheduling gins.Identify a pricing rule associated with
task for a particular order type.What are a pricing strategy that can be used for eval-
the two business rules that must be config- uating the margin.
ured to achieve this requirement? (Choose
NARAYAN CHANGDER
A. Currency conversion lists
two.)
B. Cost Lists
A. Define a branching condition rule
C. Discount Lists
B. Define a lead time expression rule.
C. Define a line selection criteria rule for D. Price Lists
the scheduling task. E. Shipping charge lists
D. Define a compensation pattern rule
7. Which four order entities are global en-
E. Define a pre-transformation defaulting tities for which only one record for each
rule instance of the entity is stored in the or-
der orchestration and planning data repos-
4. Which step must be performed before en- itory? (Choose four.)
abling a new inventory organization in
SCM cloud for collection from Manage Up- A. Payment terms
stream and Downstream Source System B. Unit of Measure
Task?
C. Currency
A. Add the Organization against the OPS
destination system. D. Warehouse
11. Which two attributes can you use to group C. when you require one orchestration
shipment lines into a single shipment? process for sales order lines
(Choose two.) D. when you require one orchestration
A. Carrier process for multiple fulfillment lines
B. FOB 15. Your customer would like automatic e-mail
C. Item notifications to be sent for specific busi-
D. Sales Order ness events. On the Manage Business
Event Trigger Points page, which business
E. Ship-to location event trigger points can be used to enable
12. What are the three future types of sup- e-mail notifications?
ply planned orders that GOP can consider? A. Order header status update and order
(Choose three.) attribute update
A. Transfer Planned Orders B. Order header status update and hold
B. Buy Planned Orders C. Order attribute update and hold
C. Scrap Planned Orders
D. Change order compensation complete
D. Rework Planned Orders and hold
E. Make Planned Order E. Hold and split
13. You want to perform Internal Material
16. Which cloud offers service of moving cloud
Transfer across Business Units and want to
security features into the cloud itself?
capture internal margin as part of revenue
for the selling Business Unit.Which manda- A. Communication as a Service (CaaS)
tory task would you perform for this re-
B. Security as a Service (SECaaS)
quirement?
C. Identity as a Service (IDaaS)
A. Configure Oracle Fusion Global Order
Promising D. Data as a Service (DaaS)
NARAYAN CHANGDER
Management Oracle Transactional Busi-
18. In which fulfillment process does a specific ness Intelligence (OTBI) dashboard that
sales order demand trigger a supply cre- can be used to get all possible root causes
ation, and a firm link is established be- for orders that are not fulfilled on time.
tween the sales order and the supply?
A. Fulfillment line in Jeopardy
A. Consignment order B. Orders on Backorder
B. Internal Transfer C. Orders on Past Due
C. Configure to order D. Orders in Jeopardy
D. Back-to-back E. Orders on Hold
E. Drop Ship 22. Your customer has requested that sales or-
19. The orchestration process fulfillment task der details are sent to his e-mail address.
is performed by an external system and How will Order Management Cloud format
you need to register the connector to in- the order details in the e-mail?
tegrate the non-Fusion system.Which two A. Order Management will include the or-
steps would you perform to invoke the der details in an attached Word document
external connector service endpoint URL? B. Order Management will include the or-
(Choose two.) der details in an attached PDF (Portable
A. Create a new web service connector to Document Format)
register the endpoint URL C. You cannot send order details through
B. Create a new fulfillment task service an e-mail
to register the endpoint UR D. Order Management will include a link
C. Create a new routing rule for the ful- to a webpage with order details in the
fillment task to call the endpoint URL. body of the e-mail
E. Order Management will include the or-
D. Create a new routing rule for the fulfill-
der details in the body of the e-mail
ment task to call the connector.
23. Your company is importing orders from an
20. Your company is implementing Order Man- e-commerce system where a sales order
agement Cloud to manage the sales orders is created for a laptop. The ship-to-site
but fulfillment happens through third party of the customer determines the type of
logistics (3PL).What process should be ex- power cord to be shipped along with the
ecuted to communicate to the 3PL system laptop.How will you enrich the sales or-
that the sales orders are ready to pick re- der during import to append the item num-
lease and ship? ber corresponding to the particular model
A. Manage Shipments Interface of the power cord?
A. Create an External Interface Routing 27. Your customer is in the business of sell-
Rule ing laptops.Which three seeded pricing at-
tributes are available when you set up Cus-
B. The Oracle Fusion order capture and D. It collects only changed data to the
fulfillment system is defined as Fusion planning data repository
C. All external order capture systems are E. It collects data only incrementally to
defined as Spoke systems and the Fusion the planning data repository
fulfillment system is defined as Fusion
D. All external order capture systems are 34. You are creating a sales order and would
defined as Spoke systems and external ful- like to see the sales order as a document.
fillment systems are defined as purchased From the actions drop down menu what
NARAYAN CHANGDER
should you select?
31. Which process requires the Process Sup- A. Create Document
ply Chain Orchestration Interface process
to be executed manually so that a supply B. Order documents are not supported
order gets created? C. Create PDF (Portable Document For-
A. Planned Order Releases mat)
B. Drop Shipment D. Edit Additional Information
C. Back-to-Back Procurement E. Manage Attachments
D. Back-to-Back Contract Manufacturing
35. What is the configuration required to auto-
E. Min-Max planning replenishing a pur- matically calculate the Jeopardy Score and
chase request priority when an orchestration process is
32. How does Order Management interact planned or re-planned?
with multiple fulfillment systems to fulfill A. Schedule the process refresh and start
sales order lines? the order promising server
A. It has a web service broker that routes B. Check the change mode parameter to
requests from the Fulfillment Task Layer Advanced on the orchestration process
B. It has a web service broker that C. Schedule the process plan orchestra-
routes requests from the External Inter- tion processes
face Layer
D. Check the Replan Instantly parameter
C. The Fulfillment system routing is de- in the orchestration process
fined in the orchestration
D. The sales order lines are converted to 36. Your company has a cost of change policy
Fulfillment Lines and fed to the Fulfillment that changes a customer when the order is
systems allocated, with no changes allowed after
the goods are staged.Which fulfillment sta-
33. Which two statements describe Net tus will trigger compensation and impose
Change Collection? (Choose two.) charges on the customer when the sales
A. Data for the selected entities is re- order quantity is changed?
placed in the planning data repository. A. Backordered
B. It completely refreshes the planning
B. Ready to Release
data repository
C. Released to Warehouse
C. Data for the selected entities is
deleted from the planning data repository D. Staged
37. Your customer uses an external order cap- A. Order Entry, Orchestration, Task Layer
ture system and wants to perform certain Services, External Interface Layer
actions without routing them through Or-
40. Identify the sequence of Oracle Manage- 43. Which cloud is characterized by offering its
ment Cloud components involved while service by way of offline access?
processing a sales order. A. IaaS
NARAYAN CHANGDER
A. Standard 48. Available to promise rules are
B. Model / Kit
A. Seeded using APICS conventions
C. Order Type
B. User defined in order management
D. Shipment Set module
E. Order Attribute
C. User defined using a matrix of se-
45. A manufacturer who ships perfumes lectable criteria
across countries requires a cost break- D. User defined in the global order
down associated with multiple shipping promising module
methods (air, land, and sea).Which four
charges would you need to use in the ocean E. System assigned base upon the item
freight shipping rules? (Choose four.) type, cumulative lead time and un con-
sumed forecast
A. Insurance
B. Recurring 49. Identify two tasks that are used to set up
C. Handling/Freight statuses in the orchestration process con-
figuration in the Functional Setup Manager.
D. Duty
(Choose two.)
E. GSA
A. Manage Orchestration Status Values
46. Which change mode takes a snapshot at
B. Manage Task Status Condition
the stages mentioned below-When the or-
chestration process starts-When a change C. Manage Status Values
order is received at an orchestration pro- D. Manage Orchestration Status
cess step
A. Incremental 50. Which action must be performed on the or-
B. Simple chestration process user interface to acti-
vate an orchestration process after the or-
C. None der orchestration configurations are com-
D. Advanced pleted?
47. A tax authority requires that you calculate A. Download the generated orchestra-
tax only on the selling price of an item that tion process
you are selling, and not on the shipping B. Validate the orchestration process
charge.How will you achieve this?
C. Release the orchestration process
A. by moving the “Compute Tax” step be-
fore the “Create Net Price Charge Compo- D. Release and deploy the orchestration
nent” step in the Pricing algorithm process
51. Which two activities can you perform B. Discount rules can be defined at multi-
by using Global Order Promising’s stand- ple levels:the root item, the components,
alone work area? (Choose two.) or the entire configuration
NARAYAN CHANGDER
ment system that does not allow any up- D. Define one rule of type CANCEL
date to the already interfaced fulfillment CREATE
1.17 Miscellenous
1. What is the Need of Cloud Computing? 5. A disadvantage of cloud computing is
A. Maintenance, Cost, Performance, Se- A. You need an internet connection to ac-
curity cess the data or software
B. Cost, Performance, Storage B. You need an internet connection to ac-
cess your LAN
C. Performance, Cost, Security, Storage
C. You cannot use a device that is con-
D. Performance, Storage, Security nected to the internet
2. Live & Regular migration are the tech- D. You need local storage to manage the
niques of data backups
A. Virtual Machine 6. Where is data from an application tem-
B. Virtual Machine Migration porarily stored?
A. ROM
C. Security Isolation
B. RAM
D. Resource Isolation
C. CPU
3. Google App Engine (often referred to as D. GPU
GAE or simply App Engine) is
7. What is the name of Apple’s cloud ser-
A. Is a Platform as a Service
vice?
B. Is a Software as a Service
A. The Cloud
C. Is a Infrastructure as a Service B. Drive
D. All of the above C. Dropbox
4. The abbrivation for central processing unit D. iCloud
is: 8. Identify an example of Gmail
A. MOG A. PaaS
B. CTP B. IaaS
C. CPU C. All of the listed
D. CPA D. SaaS
19. Which of these is not a component of com- 24. Which of the following belongs to the SaaS
putational thinking? mode of Apple CLOUD?
A. Abstraction A. Elastic Volume Service (EVS)
B. Memory B. Elastic cloud server (ECS)
C. Decomposition C. Object Storage Service (OBS)
D. Pattern Recognition D. Facial recognition
25. enables the migration of the virtual im-
NARAYAN CHANGDER
20. Cloud computing is a product of parallel
age from one physical machine to another.
computing, grid computing, and distributed
computing. Which of the following is true A. visualization
about their relationship? B. virtualization
A. Distributed computing completely re- C. migration
places grid computing. D. virtual transfer
B. Cloud computing is a type of dis-
26. Which one of the following types of risks
tributed computing.
cannot be mitigated solely with cloud-
C. Parallel computing, grid computing, specific security technologies?
and distributed computing all belong to
A. Identity management
cloud computing
B. Virtual sprawl
D. Grid computing completely replaces
parallel computing. C. Denial-of-service attacks
D. Intellectual property protection
21. Google drive is an example of
E. Administrative access control
A. cloud computing
27. Which computing feature is related to util-
B. cloud storage itycomputing?
C. don’t know A. metering
D. none of above B. security
22. What is cloud Computing replacing? C. multi-tenancy
29. What is a multi-tenant cloud model? 34. In , the first standard for Wi-Fi devices
A. Only one customer access to comput- was released
39. SaaS supports multiple users and provides 45. Managed IT services are based on the con-
a shared data model through model. cept of?
A. single-tenancy A. Virtualization
B. multi-tenancy B. SOA
C. Grid Computing
NARAYAN CHANGDER
C. multiple-instance
D. Utility Computing
D. all of the mentioned
46. Servicing multiple customers using the
40. Essential componets of cloud auditor same physical resources.
A. security, Privacy impact, performance A. Resource pooling
B. Privacy impact, performance B. Rapid elasticity
C. security, C. Resource elasticity
D. Privacy impact D. Rapid pooling
41. Which one of these is not Cloud Storage 47. This refers to applications and services
that run on a distributed network using vir-
A. OneDrive tual resources
B. IOS A. distributed computer
C. Icloud B. cloud computer
D. DropBox C. soft computer
42. Which of the following is the IaaS service D. parallel computer
provider? 48. In General, “Cloud” computing resources
A. EC2 are usually stored
B. EC1 A. In a data warehouse
C. EC10 B. In a complex network of data servers
D. EC20 C. In a Virtual Library
D. none of above
43. Which of these is not a negative to cloud
computing? 49. is a new process by which the router
and the client exchange information to
A. Uses storage space on your PC
determine the optimal path their signals
B. Can cost money should travel. Instead of broadcasting ev-
C. There is a risk of your information be- erywhere, the router and client focus and
ing hacked concentrate their signals. This makes the
signals stronger.
D. Requires an internet connection
A. Beam Excgange
44. The rest state and motion of body are B. Forging stream
A. non relative C. Beaming
B. not related D. Beamforming
C. Standard, advanced, and professional. B. HDFS is suitable for storing data re-
lated to applications requiring low latency
data access
D. none of above
C. HDFS is suitable for storing data re-
61. What is one benefit of a cloud computin- lated to applications requiring low latency
genvironment? data access
A. It improves server performance D. None of the mentioned
NARAYAN CHANGDER
B. It minimizes network traffic to the vir-
66. The addition of a software package on top
tual machines
of a cloud storage volume makes most
C. It automatically transforms physical cloud storage offerings conform to a
servers into virtualmachines as a Service model.
D. It maximizes server utilization by im- A. Software
plementingautomated provisioning
B. Platform
62. OpenStack provides C. Analytics
A. SaaS D. None of the mentioned
B. PaaS
67. Which of the following impose additional
C. IaaS overhead on clients and offer faster trans-
D. All the above fer?
A. Block storage
63. When files are held on two devices, are
updated to make sure they have the same B. File Storage
content C. File Server
A. Uploading D. All of the mentioned
B. Downloading
68. A cloud computing company (for example
C. Synchronising AWS and Microsoft Azure) usually pro-
D. Streaming vides
A. Storage as a service
64. Which of the following is related to service
provided by Cloud? B. Software as a service
B. Private C. Moderate
D. none of the mentioned
NARAYAN CHANGDER
C. Enterprise
D. Public
86. Gmail is a web-based email service pro-
81. You can’t count on a cloud provider main- vided by
taining your in the face of government ac- A. AWS
tions.
B. AZURE
A. scalability
B. reliability C. Google
C. privacy D. LINUX
D. none of the mentioned 87. Key requirement based on fact that server
82. Cloud Deployment Models workload in non-linear in nature
A. Public Cloud A. Auto Scale
B. Private Cloud B. Flexibility
C. Hybrid Cloud, Community Cloud C. Scale-ability
D. Hybrid Cloud, Community Cloud, Public D. none of above
Cloud, Private Cloud
88. Which resources are typically provided by
83. Nimbostratus and cumulonimbus clouds
anInfrastructure as a Service cloud comput-
can signal what type of upcoming
ing deliverymodel?
weather?
A. fair skies A. applications
B. hot, sunny weather B. virtual machines
C. windy weather C. virtual private networks
D. rainy weather D. middleware software stacks
84. Which of the following should be replaced
89. In a Classical Algorithm of Ring Election,
with the question mark in the following fig-
what will be the message complexity for
ure? cloud-computing-questions-answers-
N labelled processes?
virtualization-technologies-q10
A. (N-1) messages
A. Abstraction
B. Virtualization B. (2N-1) messages
C. Mobility Pattern C. (3N-1) messages
D. All of the mentioned D. (4N-1) messages
90. What are the four classes of clouds based 95. is a pay-as-you-go model matches re-
on altitude? sources to need on an ongoing basis.
A. Utility
101. For which businesses would cloud com- 106. The cloud infrastructure is operated
puting be best suited? (Choose two.) for the exclusive use of an organization.
A. Waterfront marketplace that thrives A. Public
during the summer tourist season B. Private
B. Rural medical practice with four em-
C. Community
ployees
D. All of the mentioned
C. Law enforcement agency
NARAYAN CHANGDER
D. A new company start-up that manufac- 107. HDFS works in a fashion.
tures watercraft A. master-worker
102. What is the back end of cloud comput- B. master-slave
ing? C. worker/slave
A. The third party company D. all of the mentioned
B. The personal computer user
108. Consider the following state-
C. The internet ments:Statement 1:The Job Tracker is
D. Your personal home server hosted inside the master and it re-
ceives the job execution request from
103. Which is responsible for the operation
the client.Statement 2:Task tracker is the
of a collection of computers that are c
MapReduce component on the slave ma-
connected via high speed local area net-
chine as there are multiple slave machines.
works?
A. Only statement 1 is true
A. Computer Manager
B. Only statement 2 is true
B. Cloud Manager
C. Both statements are true
C. Cluster Manager
D. Both statements are false
D. None of these
104. What is it called when a business uses its 109. where a VM can be moved from one
servers to store files for another organisa- physical machine to another even as it con-
tion? tinues to execute.
105. The functionality of the Availability zone 110. Which of the following is an edge-
storage or content-delivery system that
A. Define where the resources will be
caches data in different physical loca-
stored
tions?
B. Separate the resources in the differ-
A. Amazon Relational Database Service
ent regions
C. Protect your information and duplicate B. Amazon SimpleDB
in other zones C. Amazon Cloudfront
D. none of above D. Amazon Associates Web Services
111. NIST stands for 116. Usually methods like RAID strategies are
used in cloud computing to maintain in-
A. National Institute of Science and Tech-
tegrity. What RAID stands for?
114. enables batch processing, which greatly 119. What is Microsoft Azure?
speeds up high-processing applications A. A cloud computing platform offered by
A. Scalability Microsoft.
115. How is infrastructure as a service pro- 120. What are the security aspects provided
vided? with cloud?
A. Virtualization A. IAM
B. Virtual Realization B. Access Control
C. Cloud Services C. Authorization
D. Hardware service D. ALL OF THESE
121. is the process that allows video to 126. Which of the following has many features
be viewed straight away on a website, of that is now known as cloud computing?
without having to wait for the full video A. Web Service
to download. This technology is very im-
portant to platforms such as Netflix and B. Softwares
YouTube. C. All of the mentioned
A. Buffering D. Internet
B. Virtual Download
NARAYAN CHANGDER
127. Ransomware is
C. Streaming A. an attack by a remote computer
D. Upload B. a form of malware
141. Which of the following is commonly used 146. A computer that stores and shares infor-
to describe the service interface, how to mation with other computers on a network
bind information, and the nature of the is called a
component’s service or endpoint? A. Personal Computer (PC)
A. WSDL B. Network
B. SCDL C. Data Center
C. XML D. Server
NARAYAN CHANGDER
D. None of the mentioned 147. The term “IDaaS” stands for?
142. The networking layer which prepares a A. Interoperability-as-a-Service
message in a form that will be understood B. ID-as-a-Service
by the receiving application. C. Intranet-as-a-service
A. Application D. Identity-as-a-Service
B. Transport 148. “offer services through large-scale Inter-
C. Network net connectivity”this definition belongs to:
D. Data link A. Fast-ethernet
B. Disaster recovery
143. Broad network access
C. Cloud Computing
A. Cloud computing resources are acces-
sible over the network D. None of the above
B. Resource pooling 149. Cloud providers ensure that data files are
stored online.
C. Measured service
A. temporarily
D. Self-service
B. permanently
144. How can confidentiality of information be C. synchronized
achieved? D. duplicated
A. By ensuring enough resources to make
150. data represents more than 50 per-
information available for all users
cent of the data created every day.
B. By preventing unauthorized changes
A. Shadow
C. By regularly backing up the informa- B. Light
tion
C. Dark
D. By restricting access to information
D. All of the mentioned
145. Application frameworks provide a means 151. In Virtualization, which architecture pro-
for creating hosted applications using vides the virtual isolation between the
IDE several tenants?
A. PaaS A. IT architecture
B. SaaS B. Business architecture
C. CaaS C. Multitenant
D. All of the mentioned D. Deployment
152. You have been asked to design a 156. What does it mean when a public
“Open File System” which is derived from cloud provider has the availability of five
GFS / HDFS architecture with following nines?
D. Can work without Internet connection 165. refers to the location and manage-
E. You have to be in the office ment of the cloud’s infrastructure
A. service
161. What advantage is there for an enter-
prise to adopt a virtual private cloud B. deployment
model? C. Application
A. Reduce costs by adopting a flexible D. none of the mentioned
pricing model for the entire operation.
NARAYAN CHANGDER
B. Reduce infrastructure costs since all 166. Which of the following is the machinery
data centers will be managed in a third for interacting with Amazon’s vast prod-
party cloud. uct data and eCommerce catalog function?
C. Manage sensitive data in a compliant A. Amazon Elastic Compute Cloud
and secure manner and benefit from flex- B. Amazon Associates Web Services
ible pricing models for select services or
infrastructure. C. Alexa Web Information Service
D. Obtain maximum control over aspects D. All of the mentioned
such as security and performance since
the entire infrastructure will be managed 167. Messages whose ‘send’ is done but ‘re-
within the IT department. ceive’ is undone due to rollback are called
164. The user can scale, through a control 169. How many types of services are there
panel, the required infrastructure without those are offered by the Cloud Computing
disrupting operations. to the users?
A. On demand self service A. 2
B. Elasticity B. 4
C. Scalablility C. 5
D. Ubiquitous access D. 3
170. Virtual Machine Ware (VMware) is an D. The protection of people’s personal in-
example of formation.
174. What is Data Protection. 179. Which hash sizes are most popular to use
in SHA-2?
A. The protection of all
A. 128
B. The protection of a businesses sales
data. B. 160
C. How the government keeps our infor- C. 256
mation safe. D. 512
180. All cloud computing applications suffer 185. The service provider gives the capability
from the inherent that is intrinsic in to the consumer to deploy onto the cloud
their WAN connectivity. in
A. Propagation A. Platform as a Service
B. Latency B. Software as a Service
NARAYAN CHANGDER
186. Hospitals in a geographic area would
181. Which of the following is NOT a key char- like access to a shared medical database.
acteristic of Cloud Computing? Which cloud deployment model is most ap-
A. external provider propriate?
B. virtualization A. private cloud
C. scalability B. public cloud
192. .... as a utility is a dream that dates from 198. A secure version to transfer files.
the beginning of the computing industry it- A. IPsec
self.
B. SSL VPN
A. Model C. SSH
B. Computing D. SFTP
C. Software
199. Which command line tool is part of the
D. All of the mentioned Cloud SDK?
193. Which of the following is considered as A. gsutil
Web Service Platform Elements? B. Git
A. WSDL C. SSH
B. SOAP D. Bash
NARAYAN CHANGDER
201. means that when a user makes a B. CHAP
change to a file this change will appear in
C. RADIUS
the versions used by others
D. EAP
A. Synchronization
B. Upload 207. The set of hardware, networking, stor-
age, services, applications, and interfaces
C. Real time processing
owned and operated by a third party
D. none of above for use by other companies or individu-
als is the public cloud. These commercial
202. Which of the following is NOT a Cloud
providers create a highly scalable data cen-
computing challenge?
ter that hides the details of the underlying
A. security and legal risks infrastructure from the consumer
B. defining a contract A. Public Cloud
C. hiring IT-specialists B. Private Cloud
D. lock-in risks C. Genral Clound
203. .... model attempts to categorize a cloud D. none of above
network based on four dimensional fac-
208. is a utility which allows users to cre-
tors.
ate and run jobs with any executables as
A. Cloud Square the mapper and/or the reducer.
B. Cloud Service A. Hadoop Strdata
C. Cloud Cube B. Hadoop Streaming
D. All of the mentioned C. Hadoop Stream
204. Utility computing is based on? D. None of the mentioned
A. Grid Computing Model 209. Which of the following does not reflect
B. Pay-per-Use model the self-service feature of cloud comput-
C. virtual isolation Model ing?
C. Engineer C increases the number of 215. What are some open source cloud comput-
CPUs of the ECS purchased by him- ing platform databases
self/herself from 2 to 4.
NARAYAN CHANGDER
D. All of the mentioned
C. 3
221. What are the uses of cloud storage?
D. 1
A. Backup
B. File sharing 227. Fill in the blank describes a cloud ser-
vice that can only be accessed by a limited
C. Data synchronization amount of people.
D. Media Distribution A. Data Centre
E. Data Archiving
B. Public Cloud
222. Google docs, Google sheets are examples C. Vertulization
of
D. Private Cloud
A. Cloud storage
B. Cloud computing 228. WHICH OF THE FOLLOWING ARE MECHA-
NISMS USED FOR SECURING DATA IN MO-
C. don’t know
TION
D. none of above
A. TLS
223. A cloud requires virtualized storage B. SSL
to support the staging and storage of data.
C. SYMMETRIC ENCRYPTION
A. soft
D. ASYMMETRIC ENCRYPTION
B. compute
C. local 229. refers to the connectedness of big
D. none of the mentioned data.
A. Value
224. Which type of app generally provides the
most complete feature set? B. Veracity
A. Desktop apps C. Velocity
B. Browser apps D. Valence
C. Tablet apps
230. Working as a group is a concept of
D. Smartphone apps
A. Client server computing
225. Which of the following does the most
B. Distributed Computing
commonly used set of protocols uses as the
messaging format? C. Collaborative Computing
A. JSON D. P2P computing
231. hides the limitations of Java behind a 236. Which of the following is not a phase of
powerful and concise Clojure API for Cas- cloud lifecycle management?
cading.
233. Technically, what is the drawback of 238. These cloud services are of the form of
cloud computing in industry or other envi- utility computing i.e. the uses these
ronment? services pay-as-you-go model.
A. The absence of hardware A. Cloud providers
B. The need for high speed internet ac- B. Clients
cess
C. End users
C. The management of data and products
D. Cloud users
D. The wide connection of networks
239. Which of the following describe Cloud
234. . cloud is one where the cloud has been Computing from the user view?
organized to serve a common function or
purpose by many organisation . A. providing scalable infrastructure
A. Public B. ubiquitous access to IT-infrastructure
B. Private C. selling IT on pay-per-use basis
C. Community D. virtualizing IT infrastrcture
D. All of the mentioned
240. Software as a Service is considered to be
235. How can data be secured in a database? included in whichcloud computing layer?
A. Decryption A. Data
B. With a key B. Client
C. Encryption C. Application
D. A padlock D. Infrastructure
241. Under which of the following cloud 245. Hive also support custom extensions
hosted service available only to a specific written in
organization A. C#
A. Private B. Java
B. Public C. C
C. Community D. C++
D. All of the above listed 246. What are the benefits of cloud comput-
NARAYAN CHANGDER
ing?
242. A company wants to build a test envi-
ronment to test softwareupdates and new A. Scalability and flexibility.
solutions. The environment should mirror B. Security and privacy.
theproduction environment and be secure C. Total control over computing re-
and inaccessible fromoutside the company sources.
network. The company does not want
toinvest in infrastructure that may be idle D. none of above
for a significant amount oftime. Which 247. Two examples of Software as a service
cloud computing model will satisfy all the- (SaaS)
serequirements?
A. Microsoft Office and 365Google Docs
A. Public Cloud
B. Google Drive and Shutterfly
B. Private Cloud
C. Salesforce.com and iCloud
C. External Cloud D. none of above
D. Virtual Private Cloud
248. which of the following can be considered
243. Which of the following is an example of an advantage of cloud storage
the cloud? A. the user has no control over their data
A. Amazon Web Services (AWS) B. accessible anywhere with an internet
connection
B. Dropbox
C. portability
C. Cisco WebEx
D. many programs can be run at the same
D. All of the above time
244. Consider the following state- 249. . Which of the following is a billing and
ments:Statement 1:Volatility refers to the account management service?
data velocity relative to timescale of event
A. Amazon Elastic MapReduce
being studiedStatement 2:Viscosity refers
to the rate of data loss and stable lifetime B. Amazon Mechanical Turk
of data C. Amazon DevPay
A. Only statement 1 is true D. Multi-Factor Authentication
B. Only statement 2 is true 250. Cloud Computing refers to
C. Both statements are true A. Accessing the Hardware
D. Both statements are false B. Configuring the Hardware
253. The is something that you can obtain 258. Graphical information that is stored in a
under contract from your vendor. way that it can be used by devices such as
smartphones and tablets to provide data
A. PoS about your location
B. QoS
A. Geo-data
C. SoS
B. G-data
D. All of the mentioned
C. Glob-data
254. Which option describes the benefit of vir-
D. Global-data
tualized servers?
A. Shared hardware 259. .... model consists of the particular types
B. Individual hardware per virtual server of services that you can access on a cloud
computing platform.
C. Physical servers taking less room
space than virtual servers A. Service
D. Virtual servers taking less disk space B. Deployment
than physical servers
C. Application
255. Which of the following risks is actually in-
D. None of the mentioned
creased by cloud-specific security technolo-
gies?
260. WSDL Stands for
A. Increased/shared attack surface
A. None of these
B. Configuration and vulnerability man-
agement B. Web Services Description Language
C. Identity management C. Web Services Design Language
D. Administrative access control D. Web Services Development Language
261. One way third party companies that pro- 265. The wider the bandwidth the
vide cloud services protect your informa- A. larger amount of data that can be
tion from being lost because of server fail- trensfered
ure is to use a method called
B. lesser amount of data that can be
A. Cloud Computing transferred
B. Networking C. No effect on data transfer
C. Redundancy D. none of above
NARAYAN CHANGDER
D. Security Protocols
266. The ability to continue to function at a
262. Your company is running Microsoft Ex- high level of performance as workflow vol-
change Server 2007 and your employees ume increases.
use Microsoft Office 2007. You need to A. Scalability
update your systems, but you want to min- B. Self service
imize your CapEx impact. Which of the fol-
lowing is the best solution? C. Elasticity
A. Purchase Exchange Server 2016 and D. Measured service
Office 2016 267. What does syncing do?
B. Purchase Exchange Server 2010 and A. Moves your old files to a new place in
Office 2010 the cloud
C. Subscribe to Microsoft 365 B. Downloads the latest files from your
D. none of above computer and stores it in a new part of
the cloud
263. Define the role of virtualization in cloud
C. Updates all of the files on the cloud to
computing?
the latest ones and deletes the old files
A. It removes operating system ineffi-
D. Deletes the files from your computer
ciencies
and the cloud
B. It improves the performance of web
applications. 268. What are the components of a cloud com-
puting environment?
C. It optimizes the utilization of comput-
ing resources. A. application, platform, infrastructure
280. Which of the following is not the feature 285. SaaS does not necessarily mean that the
of Network management systems? software is?
A. Accounting A. dynamic
B. Security B. static
C. sololithic
C. Performance
D. diolithic
D. None of the mentioned
286. Supplying two or more pieces of informa-
NARAYAN CHANGDER
281. In how many parts we can broadly divide tion to verify identity.
the architecture of the Cloud? A. single sign-on
A. 4 B. two-factor authentication
B. 3 C. security token
C. 2 D. password
D. 5 287. What is an example of an input device?
A. USB Drive
282. what widely used services is built on
cloud computing technology? B. USB Port
A. Twitter C. Motherboard
D. Power button
B. Gmail
288. A period of time when a computer or ser-
C. YouTube
vice is unavailable is called
D. Skype A. Geo-Data
E. All of the above B. Downtime
283. The allows systems and services to C. Synchronising
be accessible within an organization. D. Downloading
A. Public Cloud 289. Which App Engine environment is based
B. Private Cloud on preconfigured container instances?
A. Standard environment
C. Community Cloud
B. Both standard and flexible environ-
D. Hybrid Cloud ments
284. What is true about Virtualization? C. Flexible environment
291. A system uses components to assem- 296. .... is a cloud computing service model in
ble services that can be tailored for a spe- which hardware is virtualized in the cloud.
cific purpose using standard parts.
294. is the default Partitioner for parti- 299. I have an application to host in cloud
tioning key space. provider. But i don’t want to take any un-
derlying computing burden.
A. HashPar
A. IAAS
B. Partitioner
B. PAAS
C. HashPartitioner
C. SAAS
D. None of the mentioned
D. FAAS
295. With Network as a service (STaaS)
300. Which of these is a managed compute
A. Users can back up data and hard
platform that lets you run stateless con-
drives.
tainers through web requests or Pub/Sub
B. Programmers use cloud-based devel- events?
opment tools to develop online applica-
A. Cloud Run
tions that run on many platforms.
B. App Engine
C. Interconnections link private net-
works. C. Google Kubernetes Engine
D. none of above D. Cloud Functions
301. Which of the following is not true about 305. is the most popular high-level Java
cloud-based virtual server management API in Hadoop Ecosystem
platforms? A. Scalding
A. Cloud-based management platforms B. HCatalog
can support multiple cloud-virtual server
vendors. C. Cascalog
D. Cascading
B. Cloud-based management platforms
can support multiple cloud-virtual server 306. Which of these is a managed environment
NARAYAN CHANGDER
operating systems. for deploying containerized apps?
C. Cloud-based management platforms A. Cloud Run
cannot support internally hosted server
B. App Engine
platforms.
C. Google Kubernetes Engine
D. Cloud-based management platforms
can support change management method- D. Cloud Functions
ologies.
307. A service provider reselling a may
302. Chose the most appropriate an- have the option to offer one module to cus-
swer:Cloud technology allows users to tomize the information
and from anywhere in the world. A. CaaS
A. Download music (and) movies B. AaaS
B. Collaborate (and) share files C. PaaS
C. Hack (and) plant viruses D. SaaS
D. Commit cyber crimes (and) break laws 308. Long form of SOAP is
303. Which cloud is deployed when there is a A. Secure Object Access Protocol
budget constraint but business autonomy B. Simplified Object Arbitary Protocol
is most essential? C. Simple Object Access Protocol
A. Private cloud D. None of these
B. Public cloud
309. Which of the following describes
C. Hybrid cloud a message-passing taxonomy for a
D. Community cloud component-based architecture that pro-
vides services to clients upon demand?
304. Point out the correct statement in context A. SOA
of YARN:
B. EBS
A. YARN extends the power of Hadoop
C. GEC
to incumbent and new technologies found
within the data center D. All of the mentioned
B. YARN is highly scalable 310. Who provide GUI (Graphical User Inter-
C. YARN enhances a Hadoop compute face) to interact with the cloud?
cluster in many ways A. Client
D. All of the mentioned B. Application
321. .... computing refers to applications and 326. A cloud computing service where enter-
services that run on a distributed network prises rent or lease servers for computing
using virtualized resources and storage in the cloud
A. Distributed A. PaaS
B. Cloud B. SaaS
C. Soft C. IaaS
D. Parallel D. FaaS
NARAYAN CHANGDER
322. From the standpoint of a it makes
327. You want to leverage the cloud to host
no sense to offer non-standard machine in-
virtual machines (VMs). Which type of
stances to customers
cloud service is this?
A. CaaS
A. Infrastructure as a Service (IaaS)
B. AaaS
B. Platform as a Service (PaaS)
C. PaaS
C. Software as a Service (SaaS)
D. IaaS
D. none of above
323. In order to participate in cloud-computing,
you can use the following OS 328. Which billing model is based on the pack-
A. Windows aging of computingresources (i.e. compu-
tation andstorage)and the amount ofthose
B. Linux resources used?
C. MAC
A. metered
D. All of the above
B. recurring
324. SWIGGY.IN formed a cloud for its all C. Subscription
branches but due to its limited resources it
obtained theservices of AWS for extended D. per user based
provisioning and thus modified its cloud ;
329. Web services use to code and to de-
The cloud so formed is the example of
code data
A. Private cloud
A. UDDI
B. Public cloud
B. XML
C. Hybrid cloud
C. SOAP
D. community cloud
D. None of the mentioned
325. Which of the following regulations apply
to cloud computing? (Select four) 330. Which of the following is considered an
A. Cloud Compliance Act essential element in cloud computing by
CSA?
B. Health Insurance Portability and Ac-
countability Act (HIPPA) A. Multi-tenancy
C. Sarbanes-Oxley Act B. Identity and access management
D. Gramm-Leach-Bliley Act (GLBA) C. Virtualization
E. General Data Protection Regulation D. All of the mentioned
331. A key mechanism for protecting data? 337. Which of the following is a means for ac-
A. Access control cessing human researchers or consultants
to help solve problems on a contractual or
336. method is completely OS and appli- 341. Which of the following google product
cation agnostic method access to OS sends you periodic email alerts based on
stats and application logs your search term?
A. Black-box, Gray-Box A. Alerts
B. Gray-Box, Black-box B. Blogger
C. Black-box, White-Box C. Calendar
D. Gray-box, White-Box D. All of the mentioned
342. Which of the following is NOT a sug- C. It allows people to sniff out packets
gested tip for making/keeping passwords D. Any data being sent is exposed in plain-
secure? text, including passwords
A. Do not use any word that might appear
in a dictionary. 347. With cloud computing, companies can
scale up or scale down the need of com-
B. Make the password longer than 8 char- puting resources.This is which feature of
acters. cloud computing?
NARAYAN CHANGDER
C. Write down your password and store A. Pay per use
it in a secure physical location.
B. One demand self service
D. Do not reuse passwords after they
C. Elasticity
have expired.
D. Resource Pooling
343. PKI stands for
348. Which of the following is the most impor-
A. Private Key Infrastructure
tant area of concern in cloud computing?
B. Public Key Infrastructure
A. Security
C. Private Key Information
B. Storage
D. Public Key Information C. Scalability
344. Choose among the following which al- D. All of the mentioned
lows the different OS to run in their mem-
ory space. 349. The most important area of concern in
cloud computing?
A. VMS
A. Storage
B. VMC
B. Scalability
C. VMM
C. Security
D. none of above
D. All of them
345. Cloud computing architecture is a combi-
350. This is a software distribution model in
nation of?
which applications are hosted by a vendor
A. a) service-oriented architecture and or service provider and made available to
grid computing customers over a network, typically the In-
B. b) service-oriented architecture and ternet.
event-driven architecture. A. Software as a Service (SaaS).
C. c) virtualization and event-driven archi- B. Infrastructure as a Service (IaaS)
tecture.
C. Platform as a Service (PaaS)
D. utility computing and event-driven ar-
D. none of above
chitecture.
351. Interoperability is enabled by
346. What is the main security issue with us-
ing HTTP (un-encrypted internet connec- A. Cloud operating system
tions) B. Middleware
A. The data sent will be slower C. a community cloud
B. Sometimes websites don’t allow it D. A composite cloud
352. is the slave/worker node and holds 357. What is the fully automated, elastic third-
the user data in the form of Data Blocks. wave cloud that consists of a combination
of automated services and scalable data?
D. Replication C. Colocation
D. Virtualized data center
353. Consumer doesn’t require to manage in-
dividual application capabilities in 358. What is external hosting?
A. SaaS A. Data is saved onto your local computer
B. PaaS for people to access externally
362. IaaS offer non-standard machine to cus- 368. A company is considering a cloud environ-
tomers ment to improve theoperating efficiency
A. true for their data and applications. The com-
pany ispart of an industry where strict se-
B. false curity and data privacy issues areof the
C. it depends upon use highest importance. Which type of cloud
D. none of the mentioned would be a goodchoice?
A. hybrid cloud
363. What is a possible disadvantage of cloud
NARAYAN CHANGDER
computing? B. public cloud
A. It is vulnerable to hacking C. private cloud
B. The storage can be easily expanded D. governed cloud
C. Portability 369. Choose the correct statement
D. All of the above A. With a pay-as-you-go, endlessly ex-
pandable, and universally available sys-
364. Why cloud computing more essential? tem, cloud computing realise the long-
A. Keep the files as organised in cloud held goal of utility computing
B. Extend your network on cloud B. use of the Internet enables the huge
C. Reduce the company expenditure size of cloud computing systems
D. Secure your application local storage C. identity must be authenticated
D. All of them
365. Putting copies of the same data on multi-
ple servers is a process called 370. Which of the following refers to the client
A. Cloning part of cloud computing system?
B. Redundancy A. Front end
C. Data Processing B. Back end
D. Cloud Computing C. Infrastructure
D. Management
366. cloud is one where the cloud has been
organized to serve a common function or 371. Encryption provides which of the follow-
purpose. ing assurances?
A. Public A. confidentiality
B. Private B. integrity
C. Community C. availability
D. All of the mentioned D. accessibility
367. How many service models in cloud com- 372. Putting copies of data on multiple servers
puting? is a process called
A. 3 A. Cloning
B. 2 B. Redundancy
C. 4 C. Data Processing
D. 5 D. Cloud Computing
373. We can access our applications and data needed without having to contact a human
anywhere in the world, on any system. representative of the cloud provider?
This is which advantage of cloud comput-
384. The executes the Mapper/ Reducer 389. Which of the following is owned by an
task as a child process in a separate jvm. organization selling cloud services?
A. JobTracker A. Public
B. TaskTracker B. Private
C. TaskScheduler C. Community
D. None of the mentioned D. Hybrid
390. How many types of Cloud are there in De-
NARAYAN CHANGDER
385. What is the main feature of a private
cloud? ployment Models?
A. 3
A. Customers, or tenants, maybe differ-
ent individuals or groups within a single B. 2
company C. 4
B. Customers, or tenants, maybe differ- D. 5
ent individuals or groups from different
companies. 391. Which of the following provides com-
mands for defining logic using conditional
C. Customers, or tenants within a single statements?
company on a PC
A. XML
D. none of above
B. WS-BPEL
386. Through which one of the following mod- C. JSON
els, SaaS supports multiple users and of- D. None of the mentioned
fers a shared data model?
A. Single tenancy 392. How much storage does Google give a
student user for free in Google Drive?
B. Multi tenancy
A. 1GB
C. Multi instance
B. 5GB
D. Single instance
C. UNLIMITED
387. What is the difference between HTTP and D. 50GB
HTTPS
393. Most recognizable model of cloud comput-
A. HTTP is new ing
B. Websites don’t allow HTTP A. Private
C. HTTPs uses encryption B. Public
D. SSL Certificates are required for HTTP C. Hybrid
388. What happens when you delete a file in D. Community
Google Drive? 394. The allows systems and services to
A. Nothing, you cannot delete files be accessible by a group of organizations.
B. It is gone forever A. Public Cloud
C. It goes to the Trash B. Private Cloud
D. It just hides it from your view, but you C. Community Cloud
can still search for it D. Hybrid Cloud
395. A Person, organization, or entity respon- 400. What hardware component is responsible
sible for making a service available to in- for managing running processes
terest parties.
399. An advantage of cloud software is that 404. Which delivery model is an example of a
cloud computingenvironment that provides
users access tovirtual machines?
A. It is always free
A. Platform as a Service
B. It cannot be hacked
B. Software as a Service
C. It is updated automatically
C. Application as a Service
D. It is only ever stored locally on your
computer D. Infrastructure as a Service
405. What is true about Service-Oriented Ar- 410. What is a federation Cloud?
chitecture? A. Cloud from a particular country
A. Service-Oriented Architecture helps to B. collaboration between Clouds
use applications as a service for other ap-
plications C. military Cloud
D. international Cloud
B. It is possible to exchange the data be-
tween applications of different vendors 411. Which of the following is one of the
without additional programming unique attributes of Cloud Computing?
NARAYAN CHANGDER
C. It offers computational resources on A. utility type of delivery
demand as a metered service.
B. elasticity
D. Both a and b
C. low barrier to entry
406. Which of the following components re- D. All of the mentioned
side on a NameNode?
412. Which of the following acronyms refers
A. Filenames, blocks and checksums to a software distribution model in which
B. Blocks and heartbeat messages a cloud provider manages and hosts an app
that users access via the internet?
C. Filenames, block locations
A. IaaS
D. Blocks and block locations
B. PaaS
407. Cloud services are relationships with
C. SaaS
their customers.
D. FaaS
A. One to One
B. One to Many 413. What is the main reason that companies
turn to using the Cloud?
C. Many to One
A. cost saving
D. Many to Many Cloud services are
B. better performance
relationships with their customers.
C. ubiquitous computing
408. The need for data replication can arise in
D. flebility
various scenarios like
A. Replication Factor is changed 414. Windows Azure and Force.com are exam-
ple of?
B. DataNode goes down
A. PaaS
C. Data Blocks get corrupted
B. SaaS
D. All of the mentioned
C. IaaS
409. A serves as the master and there is D. All of the above
only one NameNode per cluster.
415. Benefits of cloud computing include
A. Data Node
(choose two)
B. NameNode
A. Everyone has the same version of the
C. Data block software
D. Replication B. It can be used offline
425. In private cloud customer control 430. Web services communicate using
A. Applications, data, OS, Virtualization, A. None of these
Servers, Stroage, Networking B. Open protocols
B. Applications, data, OS C. Close protocols
C. Virtualization, Servers, D. Open-Close protocols
D. Networking
431. Google Drive was launched in what
NARAYAN CHANGDER
426. . Which of the following is built on top year?
of a Hadoop framework using the Elastic A. 1992
Compute Cloud? B. 2004
A. Amazon Elastic MapReduce C. 2008
B. Amazon Mechanical Turk D. 2012
C. Amazon DevPay
432. Cloud computing services such as storage
D. Multi-Factor Authentication and software
427. Consider the pseudo-code for MapRe- A. Can be accessed on any device
duce’s WordCount example (not shown B. Are always free
here). Let’s now assume that you want to C. Can be accessed by any device that is
determine the average amount of words connected to a LAN
per sentence. Which part of the (pseudo-
)code do you need to adapt? D. Can be accessed on any device that is
connected to the internet
A. Only map()
433. When you add a software stack, such as
B. Only reduce()
an operating system and applications, it is
C. map() and reduce() called the model.
D. The code does not have to be changed. A. Iaas
438. Google’s cloud service is called 443. Which of the following entity is responsi-
ble for making a service available to inter-
A. Google Cloud ested parties?
B. Google Mail A. Cloud Monitor
C. Google Dropbox B. Cloud Broker
D. Google Drive C. Cloud Provider
D. Cloud Auditor
439. What is benefit of storage availability in
the Cloud? 444. What model do most public cloud
A. Additional storage does not require providers use for their customers?
budget for new large storage devices. A. Single-tenancy
B. Storage in the Cloud has a higher avail- B. Multi-tenancy
ability than storage devices in the local C. Distributed-tenancy
area network.
D. none of above
C. Storage in the Cloud has shorter ac-
cess times than storage in the local area 445. All of these are types of cloud deploy-
network. ment except:
NARAYAN CHANGDER
B. Private B. SOA
C. Community
C. Grid Computing
D. Hybrid
D. All of the above
447. Which of the following is a more sophis-
452. All cloud computing applications suffer
ticated load balancer?
from the inherent that is intrinsic in their
A. workload managers WAN connectivity.
B. workspace managers A. propagation
C. rackserve managers B. latency
D. all of the mentioned C. noise
448. Cloud Computing provides D. None of the mentioned
A. Resource Pooling 453. How can you upload content to Google
B. Measured Service Drive?
C. Broad Network Access A. Click New, File upload
D. None B. Click New, Folder upload
C. Drag files into the Drive window
449. Which of the following is not a true state-
ment about using encryption with enter- D. You can use any of these methods to
prise cloud computing implementations? upload files to Google Drive
A. Encryption is required for regulatory 454. Which of the following is the best-known
compliance. service model?
B. Encryption can be used to solve the A. IaaS
data segregation issue.
B. PaaS
C. Data being processed is always en-
crypted. C. SaaS
NARAYAN CHANGDER
467. is a platform for constructing data D. none of above
flows for extract, transform, and load
(ETL) processing and analysis of large 472. Which of the following are true about the
datasets. cloud computing deployment modes?
A. Pig Latin A. The industry cloud generally has at-
B. Oozie tributes of a certain industry, which is
a large private cloud” or “small public
C. Pig cloud”.
D. Hive B. The public cloud is generally con-
structed by carriers or cloud service
468. A hybrid cloud combines multiple clouds
providers. It sells or leases services to
where those clouds retain their unique
the public.
identities but are bound together as a unit.
C. The private cloud is deployed on the
A. Public
premises of enterprises and used by inter-
B. Private nal employees.
C. Community D. all of the aboves
D. Hybrid
473. Which of the following is the most widely
469. Which of the following tool is designed used technique for abstraction?
for efficiently transferring bulk data be- A. Load balancing
tween Apache Hadoop and structured
B. Load schedulin
datastores such as relational databases.
C. Load scaling
A. Apache Sqoop
D. All of the mentioned
B. Pig
C. Mahout 474. How much monthly is a extra 200Gb for
icloud?
D. Flume
A. 2.49
470. Which of the following behaves like the
entry point of the monitor and reroutes the B. 0.79
instructions of the virtual machine? C. 1.49
A. Dispatcher D. 3.00
B. Allocator 475. Definition of the SaaS concept
C. Interpreter A. Provide the services like Containers,
D. Both A and B Databases.
B. Provide the applications like Microsoft 480. A type of wireless network that does not
365 rely on fixed hardware such as routers
479. A company would like to leverage cloud 484. Which of the following cloud concept is re-
computing to provideadvanced collabora- lated to pooling and sharing of resources?
tion services (i.e. video, chat, and webcon- A. Polymorphism
ferences) for its employees but does not
B. Abstraction
have the ITresources to deploy such an in-
frastructure. Which cloudcomputing model C. Virtualization
would best fit the company needs? D. None of the mentioned
A. Hybrid Cloud
485. Broadly divide the cloud architecture
B. Public Cloud into?
C. Private Cloud A. 1
D. Virtual Private Cloud B. 2
NARAYAN CHANGDER
C. Docs purposes
D. An operating system for private net-
D. My Stuff
work systems
487. Which of the following things you will
492. The model originally did not require
need if you wish to setup an IT company?
a cloud to use virtualization to pool re-
A. Office space sources.
B. computers servers A. NEFT
C. cafeteria B. NIST
D. all of the above C. NIT
D. All of the mentioned
488. For every additional symbol added to the
length of your password what happens? 493. Which of these options is not a PaaS of-
A. Makes password difficult to remember fering?
B. Makes password more complex and A. IBM App Mix
harder to break B. Azure App Service
C. Makes password more confusing C. AWS Elastic Beanstalk
D. none of above D. Google App Engine
489. Which project identifier does not need to 494. which is not an advantage of grid
be globally unique?
A. scalable
A. Project ID
B. uses unused computing power
B. Project name
C. provide standard and high cpu
C. Project number
D. multi-tenancy
D. none of above
495. GHZ radio frequency has than 2 GHZ
490. Which of the following is a classic exam- radio frequency because there are fewer
ple of an IaaS service model? devices that operate at 5 GHZ
A. AWS A. less signal interference
B. Azure B. More signal interference
C. Cloudera C. Same amount of signal interference
D. All of the mentioned D. none of above
496. An example of a file-sharing platform 501. Cloud computing embraces many concepts
that uses the cloud is: that were previously touted as the next
big thing in information technology. Which
506. With Storage as a service (STaaS) 511. What are 3 disadvantage of cloud com-
puting?
A. Centralized online storage of
databases can be accessed from any loca- A. It is vulnerable to hacking
tion on many platforms. B. The storage can be expanded accross
B. Players with different OS platforms platforms
can compete in the same online game. C. You must be connected to the Internet
C. Users access online software applica- to use applications and data stored in the
cloud.
NARAYAN CHANGDER
tions through a browser
D. Subscription costs over several years
D. Users upload and store files, videos, or
may exceed the one-time cost of purchas-
photos for sharing.
ing and maintaining a local copy
507. Select an example of an output device E. Can be accessed remotely
A. Keyboard 512. Select the NIST Cloud Agents? (Give in
B. Mouse check box)
NARAYAN CHANGDER
C. Eff = T/(P*M)
C. Parallel
D. Eff = T*P*M
D. Scale Up and Down
533. The cloud services purchased by a user in-
528. What is the biggest disadvantage of com- clude an application running environment,
munity cloud? but do not contain any application or re-
A. Collaboration has to be maintained lated data. This mode is
with other participants A. IaaS
B. Less security features B. PaaS
C. Cloud is used by many organisation for C. SaaS
different purposes
D. NaaS
D. Organisation losses business auton-
omy 534. Which of the following is best known ser-
vice model?
529. What is the use of Certification Authority
A. SaaS
(CA) in PKI?
B. IaaS
A. Issues the certificate
C. PaaS
B. Requests a certificate
D. All of the mentioned
C. Registration Authority
D. None of the above 535. Which of the following statements could
be used to describe a private cloud deploy-
530. Cloud computing is an extension of what ment?
type of computing arrangement? A. A cloud environment maintained within
A. Star an enterprise’s own data center
B. Mesh B. A private environment within a third-
party or public cloud provider’s architec-
C. Client-server
ture
D. Peer to peer
C. A cloud service inaccessible to anyone
531. Which of the following is not a NoSQL but the cultural elite
database? D. Both 1 and 2
A. HBase
536. .... refers to the location and manage-
B. SQL Server ment of the cloud’s infrastructure.
C. Cassandra A. Service
D. None of the mentioned B. Deployment
546. What facet of cloud computing helps to C. Both Mapper and Reducer
guard against downtime and determines
D. None of the mentioned
costs?
A. Service-level agreements 552. In cloud computing, which term is used to
B. Application programming interfaces describe the natureof IT infrastructure and
allowsdynamic scaling depending onthe de-
C. Bandwidth fees mand for resources?
D. Virtual private networks A. elasticity
NARAYAN CHANGDER
547. What is the most important concern of B. clustering
cloud computing?
C. consolidation
A. Cost
D. virtualization
B. Space
C. Security 553. Which of the following system does not
provision storage to most users?
D. Platform
A. PaaS
548. what do cloud services provide to help
with privacy and security concerns B. IaaS
A. collaboration C. CaaS
B. accessibility D. SaaS
C. encryption 554. Which of the following are valid reasons
D. backups for a firm’s not adopting a cloud solution?
(Choose two.)
549. In cloud computing, your resources ae
measured, and you only pay for the re- A. Local hardware is being fully utilized
sources and workload you use. This is for unchanging IT workloads.
which feature of cloud computing? B. The number of employees rarely
A. Pay per use changes.
B. on demand self service C. The number of employees changes of-
C. elasticity ten.
D. resource pooling D. The firm experiences unpredictable
project spikes throughout the year.
550. A hypervisor is sometimes also called a?
A. VMA 555. Which concept aligns business and IT as-
sets, helpsprovide flexible IT capacity, and
B. VMM provides realtimeallocation of IT resources
C. VMR in line with demand frombusiness pro-
D. VMN cesses?
A. elasticity
551. maps input key/value pairs to a set
of intermediate key/value pairs. B. virtualization
A. Mapper C. dynamic infrastructure
B. Reducer D. automated management of resources
556. The most utilized. The software is hosted 561. What part of the computer are all hard-
on the providers’ servers and accessed by ware components connected to?
the customer through the web browser.
NARAYAN CHANGDER
cloud accounts. A. Development of applications that can
567. Which one of the following offers the manage several clients at a time.
control structures and development frame- B. Access and management of the com-
works? mercial software.
A. IaaS C. Centralization of software will elimi-
B. SaaS nate the need of downloading the updated
versions.
C. PaaS
D. All the above mentioned D. All of them
568. What is commonly meant for losing en- 573. If your laptop uses the cloud for every-
crypted data? thing, your hard drive must be
A. lose the encryption standard A. empty
B. lose the keys B. high tech
C. lose of account C. fast
D. all of them D. full
569. What does IP-Address stand for?
574. Which of the following is about the on-
A. Interweb-protocol address demand self-service feature of cloud com-
B. Internet-protocol address puting?
C. Internet-probable address A. Users do not need to communicate the
service providers at all when using cloud
D. Intranet-protocol address
computing resources.
570. What is a system of interconnected B. After determining the required cloud
computers and other electronic devices computing service, users can apply for
called? cloud computing resources by them-
A. Server selves.
B. Network C. The cloud computing service providers
C. Data Link only need to prepare the cloud services
and users will complete remaining pro-
D. Cloud Computing cess all by themselves.
571. Which of the following dynamically grow D. When using cloud computing re-
and shrink the load-balancing capacity to sources, the users need to solve all by
adjust to traffic demands problems by themselves.
575. Which is not an advantage of Grid? 581. Which service provides raw compute,
A. Scalable storage, and network capabilities, orga-
nized virtually into resources that are sim-
579. ensures the ability to exchange/ ob- 585. Which of the following can be considered
tain the information to be consumed PaaS offering?
A. Google Maps
A. Data Level Interoperability
B. Gmail
B. Service Level Interoperability
C. Google Earth
C. Security Level Interoperability
D. All of the mentioned
D. Machine Level Interoperability
586. Choose the issues relates to cloud com-
580. Amazon Web Services is an example of puting.
A. Infrastructure as a Service A. Legal and compliance
B. Software as a Service B. Security Issues
C. Platform as a Service C. Data Management Issue
D. None of these D. All of them
587. Which of the following statements are 591. Cloud computing is an abstraction based
true about key/value pairs in Hadoop? on the notion of pooling physical resources
and presenting them as a resource.
A. A map() function can emit up to a max-
imum number of key/value pairs (depend- A. real
ing on the Hadoop environment). B. virtual
B. A map() function can emit anything be- C. cloud
tween zero and an unlimited number of
D. none of the mentioned
key/value pairs.
NARAYAN CHANGDER
C. A reduce() function can iterate over 592. Tim is worried about losing his files
key/value pairs multiple times. stored on his personal computer. Tim
should use to eliminate that problem.
D. A call to reduce() is guaranteed to re-
ceive key/value pairs from only one key. A. Cloud Computing
B. Networking
588. Which of the following storage devices
exposes its storage to clients as Raw stor- C. Storage Space
age that can be partitioned to create vol- D. A newer computer
umes?
593. CRM is an example of
A. block
A. SaaS
B. file
B. PaaS
C. disk
C. IaaS
D. all of the mentioned
D. Both 1 and 2
589. Resource usage is monitored, measured, E. All of the above
reported and billed based on use.
594. Cloud computing is a system and it is
A. Measured service necessarily unidirectional in nature.
B. Measured outcomes A. Stateless
C. Pay as you grow B. Stateful
D. Pay as you measure C. Reliable
D. All of the above
590. Identify which statement is TRUE about
a bare metal hypervisor? 595. How many deployment models in cloud
A. It can only be hosted on an existing op- computing?
erating system. A. 4
B. It requires a separate license for the B. 3
native operating system
C. 2
C. It has minimum functionality to sup- D. 7
port only one type of operating system
D. It runs directly on server hardware to 596. Cloud Computing has below layers
provide virtual machines with timesharing A. User, Software, Platform, Infrastruc-
resources. ture, Server
B. Client, Application, Platform, Infras- 601. Which of the following is not an exam-
tructure, Server ples of Type 1 hypervisors?
606. A single instance of a software applica- A. hardware settings such as how much
tion serves multiple customers. memory the VM should have.
A. Multi-tenancy B. what hard disks should be virtualized
B. Tenancy scaling through which container files and what
CDs are mounted,
C. Elastic tenancy
C. devide the operating system into mul-
D. Multi-scalable
tiple versions based on latest update.
NARAYAN CHANGDER
607. Which of the following is not an actor in D. state information whether the Virtual
cloud computing? Machine is currently running and saved its
A. cloud consumer snapshots.
B. cloud provider
612. In the case of a private cloud, the connec-
C. cloud carrier tivity may be provided by
D. cloud monitor A. LAN
608. Cloud computing is a concept that in- B. MAN
volves pooling physical resources and of-
C. WAN
fering them as which sort of resource?
A. cloud D. None
616. What is a benefit of Cloud Computing? 621. Which of the following network re-
A. Use your computers in any weather sources can be load balanced?
626. which of the following could be consid- D. APIs provide monthly pricing dis-
ered a drawback of cloud computing espe- counts.
cially in OUR SCHOOL
A. the need for high speed internet 631. IaaS stands for?
NARAYAN CHANGDER
627. What is an example of a WAN network? D. Interoperability-as-a-service
A. Personal Hotspot
632. Name of the Cloud provided by Microsoft
B. Bluetooth
A. AWS
C. The Internet
D. Router B. App Engine
C. Azure
628. One of the disadvantages of the hybrid
cloud is: D. Cloudera
A. a) Your security depends on the public
cloud service provider. 633. Which billing tool is designed to prevent
the over-consumption of resources due to
B. B) none, it is perfect. an error or a malicious attack?
C. C) Hybrid cloud management makes
A. Budgets
the company dependent on the provider’s
services B. Alerts
D. the A and C C. Quotas
629. Which of the following is a cloud com- D. Reports
puting feature that allows computing re-
sources to be automatically allocated in re- 634. WHICH OF THE FOLLOWING IS NOT AN
sponse to demand? AUTHENTICATION MECHANISM
A. Rapid Elasticity A. OTP
B. On-demand B. OAuth
C. Resource Pooling
C. SSO
D. Measured Service
D. SAML-TOKEN
630. What is the purpose of APIs offered by
various Google Cloud services? 635. You can’t count on a cloud provider main-
A. APIs allow physical access to data cen- taining your in the face of government
ters. actions.
B. APIs provide Cloud Console access A. scalability
through a simple web-based graphical B. reliability
user interface.
C. privacy
C. APIs allow code to be written to con-
trol Google Cloud services. D. None of the mentioned