Chapter 1 Question 1, 2, 3 Mark Created by Atul a b c d Correct Answer SR.NO 1 Write down question Option a Option b Option c Option d a/b/c/d 2 Cloud model relies on communication API Middleware web documents embedded device a 3 What widely used service is built on cloud-computing technology? Twitter Skype Gmail All of the above d 4 HTTP is a ______protocol stateful unidirectional bidirectional full dulpex b websocket is a____ Protocol stateful bidirectional connection oriented all of the above d 5 6 Websocket protocol uses which communication model Publish-Subscribe Request Response Push-Pull Exclusive Pair a Which of these techniques is vital for creating cloud-computing centers Transubstantiation Cannibalization Insubordination a 7

The group of knowledge workers An overhanging A cloud that sits An internal cloud is… A career risk for a CIO who use a social d threat behind a corporate network for water- cooler gossip 8

Which of these is not an antecedent of the cloud? Software as a service Utility computing Grid computing Desktop computing d 9 Accounting Which of the following subject area deals with pay-as-you-go usage model? Compliance Data Privacy All of the mentioned a 10 Management The low barrier to Except for tightly Cloud computing entry cannot be Point out the correct statement managed SaaS cloud vendors run very accompanied by a All of the mentioned b providers reliable networks low barrier to 11 provisioning ______captive requires that the cloud accommodate multiple compliance Licensed Policy-based Variable All of the mentioned b 12 regimes. Security methods such as private encryption, VLANs and firewalls comes Accounting Compliance Data Privacy All of the mentioned c 13 under ______subject area. Management Variable but under Which of the following captive area deals with monitoring? Licensed Law All of the mentioned b 14 control Network bottlenecks occur when ______data sets must be transferred large small big all of the mentioned a 15 16 Amazon AWS Consists of following services Iaas Paas Saas all of above d 17 RDS is a_____ type of database SQL NonSQL Simple storage all of above a 18 Dynamodb is ____ type of storage NonSQL SQL Simple storage all of above a Cloud ______are standardized in order to appeal to the majority of its None of the SVAs SLAs SALs b 19 audience. mentioned The reputation for cloud computing services for the quality of those services is replicas shards tenants all of the mentioned c 20 shared by ______is a function of the particular enterprise and application in an on- None of the Vendor lock Vendor lock-in Vendor lock-ins b 21 premises deployment. mentioned Distributed ______computing refers to applications and services that run on a Cloud Soft Parallel b distributed network using virtualized resources. 22 . ______as a utility is a dream that dates from the beginning of the Model Computing Software All of the mentioned b 23 computing industry itself Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on Iaas Paas Saas All of the mentioned a 24

Which of the following is essential concept related to Cloud? Reliability Productivity Abstraction All of the mentioned c 25

applications benefit start very small and technology it is built None of the Point out the wrong statement from deployment in c become big very fast on is evolutionary mentioned the cloud 26 None of the Which of the cloud concept is related to pooling and sharing of resources Polymorphism Abstraction Virtualization c 27 mentioned ______has many of the characteristics of what is now being called cloud Internet Softwares Web Service All of the mentioned a 28 computing Which of the following can be identified as cloud Web Applications Intranet Hadoop All of the mentioned c 29 Azure Which of the following is Cloud Platform by Amazon? AWS Cloudera All of the mentioned b 30 public Which of the following is the deployment model? private hybrid all of the mentioned d 31 PaaS SaaS IaaS Which of the following is best known service model? All of the mentioned d 32 Which of the following is the highest degree of integration in cloud SaaS IaaS PaaS All of the mentioned a 33 computing? client cloud Which of the architectural layer is used as a front end in cloud computing? soft all of the mentioned a 34

A larger pool of More reliable A logical design Which of the following benefit is provided by the PaaS service provider All of the mentioned d qualified developers operation methodology 35 None of the Communication between services is done widely using ______protocol REST SOAP RESTful c 36 mentioned CaaS Which of the following provider rely on the technology to AaaS PaaS IaaS d deliver servers? 37 VGM All of the mentioned Which of the following component is called ? VMc VMM c 38 virtual server Applications such as a Web server or database server that can run on a virtual virtual appliances machine imaging all of the mentioned b machine image are referred to as __ 39 Ben Amazon Machine Images are virtual appliances that have been packaged to Ken Zen b run on the grid of ____ nodes. 40 Imaging Parallels QEMU None of the ______is a CPU emulator and virtual machine monitor c mentioned 41 Distributed ______computing refers to applications and services that run on a Cloud Soft Parallel b distributed network using virtualized resources. 42 . ______as a utility is a dream that dates from the beginning of the Model Computing Software All of the mentioned b 43 computing industry itself Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on Iaas Paas Saas All of the mentioned a 44

Which of the following is essential concept related to Cloud? Reliability Productivity Abstraction All of the mentioned c 45

applications benefit start very small and technology it is built None of the Point out the wrong statement from deployment in c become big very fast on is evolutionary mentioned the cloud 46 None of the Which of the cloud concept is related to pooling and sharing of resources Polymorphism Abstraction Virtualization c 47 mentioned ______has many of the characteristics of what is now being called cloud Internet Softwares Web Service All of the mentioned a 48 computing Which of the following can be identified as cloud Web Applications Intranet Hadoop All of the mentioned c 49 Azure Which of the following is Cloud Platform by Amazon? AWS Cloudera All of the mentioned b 50 public Which of the following is the deployment model? private hybrid all of the mentioned d 51 PaaS SaaS IaaS Which of the following is best known service model? All of the mentioned d 52 Which of the following is the highest degree of integration in cloud SaaS IaaS PaaS All of the mentioned a 53 computing? client cloud Which of the architectural layer is used as a front end in cloud computing? soft all of the mentioned a 54

A larger pool of More reliable A logical design Which of the following benefit is provided by the PaaS service provider All of the mentioned d qualified developers operation methodology 55 None of the Communication between services is done widely using ______protocol REST SOAP RESTful c 56 mentioned Which of the following provider rely on the virtual machine technology to CaaS AaaS PaaS IaaS d deliver servers? 57 VGM All of the mentioned Which of the following component is called hypervisor? VMc VMM c 58 virtual server Applications such as a Web server or database server that can run on a virtual virtual appliances machine imaging all of the mentioned b machine image are referred to as __ 59 Ben Amazon Machine Images are virtual appliances that have been packaged to Xen Ken Zen b run on the grid of ____ nodes. 60

Parallels QEMU None of the ______is a CPU emulator and virtual machine monitor Imaging c mentioned 61 62 63 64 Chapter 2 Question 1, 2, 3 Mark a b c d Correct Answer Google distributed Yahoo distributed Facebook distributed The source of HDFS architecture in Hadoop originated as Amazon S3 storage a filesystem filesystem filesystem 65 Batch processing Resource What is HDFS? Storage layer All of the above a 66 engine management layer Which among the following command is used to copy a directory from one rcp distcp dcp drcp b 67 node to another in HDFS? 68 Which utility is used for checking the health of an HDFS file system? fsck fchk fsch fcks a Datanode manage Namenode stores NameNode stores Which among the following is the correct statement file system All of the above b metadata actual data 69 namespace 70 What is default replication factor? 1 2 3 5 c The namenode knows that the data node is active using a mechanism known Active pulse Data pulse Heartbeats h-signal c 71 as 72 What is the default size of HDFS Data Block? 16MB 32MB 64MB 128MB d It is the logical It is the physical What is HDFS Block in Hadoop? representation of representation of Both the above None of the above b 73 data data DataNode is the slave/worker node Each incoming file is NameNode stores Which of the following is the correct statement? and holds the user broken into 32 MB by user data in the form None of the above a data in the form of defaul of Data Blocks 74 Data Blocks Replication Factor is Data Blocks get The need for data replication can arise in various scenarios like DataNode goes down All of the above d 75 changed corrupted Occupies only the size Cannot be stored in Occupies the full Can span over A file in HDFS that is smaller than a single block size it needs and not the d HDFS block's size. multiple blocks 76 full block Perform read-write Manage file system It is responsible for operation as per Which among the following are the duties of the NameNodes None of the above a namespace storing actual data request for the 77 clients The namenode The namenode need updates the mapping The data in that data not update mapping There namenode has If the IP address or hostname of a data node changes c between file name node is lost forever between file name to be restarted and block name and block name 78 The memory of the In the memory of the For the frequently accessed HDFS files the blocks are cached in Both the above None of the above a 79 data node namenode Nodes on different Different nodes on Nodes in different Data on the same Which scenario demands highest bandwidth for data transfer between nodes racks in the same c the same rack data centers node 80 data center. Block ID and When a client contacts the namenode for accessing a file, the namenode Size of the file hostname of all the Block ID of the file All of the above b responds with requested data nodes requested containing that block 81 82 In HDFS the files cannot be Read Deleted Executed Archived c Perform read-write Manage file system Regulates client’s operation as per Which among the following is the duties of the Data Nodes Stores meta-data d namespace access to files request for the 83 clients 84 NameNode and DataNode do communicate using Active pulse Heartbeats h-signal Data pulse b None of the Amazon EC2 provides virtual computing environments, known as : chunks instances messages b 85 mentioned Data stored in ______domains doesn’t require maintenance of a schema. SimpleDB SQL Server Oracle RDS a 86 Which of the following is a system for creating block level storage devices that Amazon Elastic Block CloudWatch AWS Import/Export All of the mentioned b 87 can be used for Amazon Machine Instances in EC2 ? Store Which of the following type of virtualization is also characteristic of cloud Storage Application CPU All of the mentioned d 88 computing Which of the following is most important feature of cloud storage listed below Multiplatform Logon authentication Bare file Adequate bandwidth a 89 ? support Which of the following is open cloud storage management standard by SNIA ? CDMI OCCI CEA Adequate bandwidth a 90

Which of the following system does not provision storage to most users ? Paas Iaas Caas Saas b 91

Which of the following service is provided by Google for online storage ? Drive SkyDrive Dropbox All of the mentioned a 92 Which of the following backup create a cloned copy of your current data or Continuous Data None of the Open file backup Reverse Delta backup a 93 drive ? Protection mentioned Which of the following storage devices exposes its storage to clients as Raw block file disk All of the mentioned a 94 storage that can be partitioned to create volumes ? Which of the following should be used considering factors shown in the figure?

SimpleDB RDS Amazon EC2 All of the mentioned b

95

The metrics obtained Amazon Machine by CloudWatch may A number of tools are Instances are sized at None of the Point out the wrong statement. be used to enable a used to support EC2 various levels and d mentioned feature called Auto services rented on a Scaling computing/hour basis 96 Which of the following is an edge-storage or content-delivery system that Amazon Relational Amazon Associates Amazon SimpleDB Amazon Cloudfront c 97 caches data in different physical locations? Database Service Web Services Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple c 98 to support your Web sites? Compute Cloud Queue Service Database Service Storage System Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple c 99 to support your Web sites? Compute Cloud Queue Service Database Service Storage System . Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple c 100 to support your Web sites? Compute Cloud Queue Service Database Service Storage System Amazon Elastic Cloud SimpleDB is a system for interoperates with EC3 is an Analytics as None of the Point out the correct statement. b creating virtual both Amazon EC2 and a Service provider mentioned 101 disks(volume) Amazon S3 Which of the following is a structured data store that supports indexing and CloudWatch Amazon SimpleDB Amazon Cloudfront All of the mentioned b 102 data queries to both EC2 and S3? Which of the following is the machinery for interacting with Amazon’s vast Amazon Elastic Amazon Associates Alexa Web All of the mentioned b product data and eCommerce catalog function? Compute Cloud Web Services Information Service 103 Amazon Elastic Amazon Mechanical Multi-Factor Which of the following is a billing and account management service? Amazon DevPay c 104 MapReduce Turk Authentication None of the Which of the following is not the feature of Network management systems? Accounting Security Performance d 105 mentioned Which of the following service provider provides the least amount of built in SaaS PaaS IaaS All of the mentioned c 106 security? Adapting your on- Different types of premises systems to Data should be cloud computing a cloud model transferred and service models Point out the correct statement. requires that you stored in an All of the mentioned d provide different determine what encrypted format for levels of security security mechanisms security purpose services are required 107 Which of the following services that need to be negotiated in Service Level Regulatory Logging Auditing All of the mentioned d 108 Agreements? compliance The following flowchart is intended to evaluate ______in any cloud.

none of the risk errors inconsistencies a mentioned

109 Any distributed You can use proxy application has a Cloud computing and brokerage much greater attack doesn’t have services to separate Point out the wrong statement. surface than an vulnerabilities All of the mentioned c clients from direct application that is associated with access to shared closely held on a Internet applications cloud storage 110 Local Area Network e-Discovery for legal Which of the following area of cloud computing is uniquely troublesome? Auditing Data integrity All of the mentioned d 111 compliance Which of the following is the operational domain of CSA(Cloud Security Portability and None of the Scalability Flexibility b 112 Alliance)? interoperability mentioned Which of the following is considered an essential element in cloud computing Identity and access Multi-tenancy Virtualization All of the mentioned a 113 by CSA? management Which of the following is used for Web performance management and load VMware Hyperic Webmetrics Univa UD Tapinsystems b 114 testing? Which of the following service provider provides the highest level of service? SaaS PaaS IaaS All of the mentioned a 115

IaaS adds application SaaS is an operating development environment with PaaS supplies the Point out the correct statement. frameworks, applications, All of the mentioned c infrastructure transactions, and management, and control structures the user interface 116 Which of the following functional cloud computing hardware/software stack CAS CSA SAC All of the mentioned a 117 is the Cloud Reference Model? For the ______model, the security boundary may be defined for the SaaS PaaS IaaS All of the mentioned b 118 vendor to include the software framework and middleware layer. Which of the following model allows vendor to provide security as part of the SaaS PaaS IaaS All of the mentioned a 119 Service Level Agreement? None of the Which of the following cloud does not require mapping? Public Private Hybrid a 120 mentioned Which of the following service model is owned in terms of infrastructure by None of the Public Private Hybrid c 121 both vendor and customer? mentioned None of the Which of the following model type is not trusted in terms of security? Public Private Hybrid a 122 mentioned Which of the following has infrastructure security managed and owned by None of the Hybrid Private/Community Public b 123 the vendor? mentioned Any security Any security Each different type of mechanism below mechanism above the cloud service delivery Point out the wrong statement. the security boundary security boundary All of the mentioned d model creates a must be built into the must be maintained security boundary system by the customer 124 125 126 Chapter 3,4,5,6 Question 1, 2, 3 Mark a b c d Correct Answer ______is an application for collecting messages sent in RSS and Atom Google Reader Yahoo Mail EmailRackspace All of the mentioned A 127 format from information providers. Which of the following application is a newsreader? Google Reader Bloglines Newsgator Online All of the mentioned D 128 Which of the following was developed an alternative to XML syndication by Atom Publishing Atom Subscribing Atom Subscribe None of the A 129 IETF? Protocol Protocol Protocol mentioned How many technologies are used for most of the syndicated content on the 1 2 3 4 B 130 Internet? Which of the following technology is used for syndicated content? AJAX RSS Javascript All of the mentioned B 131 Asynchronous Another Java and Abstract JSON and None of the The full form of AJAX is A 132 Javascript and XML XML Library XML mentioned Speeder retrieval of The advantages of Ajax is ______Bandwidth utilization More interactive All of these D 133 data which of the following are the controls of Ajax? ScriptManager ScriptManagerProxy UpdateProgress All of the mentioned D 134 Which of the following type of virtualization is also characteristic of cloud Storage Application CPU All of the mentioned D 135 computing? Virtualization assigns a logical name for a physical resource and then provides a pointer to TRUE FALSE A 136 that physical resource when a request is made 137 Virtual Machines (VMs) are offered in cloud by SaaS PaaS IaaS None of these C The technology used to distribute service requests to resources is referred to load performing load scheduling load balancing all of the mentioned C 138 as ______computing refers to applications and services that run on a distributed network Distributed Cloud Soft Parallel B 139 using virtualized resources. Cloud computing is an abstraction based on the notion of pooling physical none of the resources and real virtual cloud B mentioned 140 presenting them as a ______resource. 141 Amazon’s Elastic Compute Cloud (EC2) is a well known ______. Virtual machine Cloud Storage PaaS SoA A ______virtualization abstracts networking hardware and software into a None of the Storage Network Software B 142 virtual network that can be managed. mentioned ______is used by to store copies of a virtual AMI EMI IMI Application services A 143 machine. In para-virtualization, VMs run on hypervisor that interacts with the TRUE False B 144 hardware. Which of the following provide system resource access to virtual machines ? VMM VMC VNM All of the mentioned A 145

An running on a Type __ VM is a full virtualization. 1 2 3 All of the mentioned A 146

In Gmail, you can A typical RSS RSS and Atom are construct searches document or feed prototypes of a class with multiple contains text and None of the Point out the wrong statement. of XML specifications B operators using the metadata that can be mentioned called synchronized Advanced Search used to indicate markup languages feature publication dates 147

Which of the following file format is used by RSS module? XML SMIL JSON All of the mentioned A 148 It works as a stand- It works the same It uses C++ as its It makes data What makes Ajax unique? alone Web- with all Web programming requests D 149 development tool browsers language asynchronously 150 ______JavaScript is also called server-side JavaScript. Navigator LiveWire None C Which of the following visualization is most commonly achieved through a None of the mapping mechanism where a logical storage address is translated into a Storage Network Software A mentioned 151 physical storage address? You can make machine images of systems in the A virtual network can Instantiating a virtual configuration that Point out the wrong statement. create virtual machine is a very All of the mentioned B you want to deploy network interfaces slow process or take snapshots of working virtual 152 machines AMI(Amazon Machine Image) imaging service is provided by Amazon for private use public use pay-per-use all of the mentioned D 153 ______Which of the following runs on Xen Hypervisor? Azure AWS EC2 AWS EC3 All of the mentioned B 154

Virtualization allows sharing the resources of hardware across multiple a True FALSE A environments. 155 A virtual machine running on a server of a particular make cannot be relocated to b True FALSE B 156 the server of another make. Software as a service Infrastructure as a Platform as a Service None of the Amazon Web Services (AWS) is an example of______B 157 (SaaS) service (IaaS) (PaaS) mentioned Virtual Server 2005 Which of the following is Type 1 Hypervisor ? Wind River Simics KVM LynxSecure D 158 R2 159 Which of the following is Type 2 VM ? VirtualLogix VLX VMware ESX Xen LynxSecure C In ______the virtual machine simulates hardware, so it can be independent none of the paravirtualization full virtualization emulation C 160 of the underlying system hardware. mentioned In a ______scheme, the VM is installed as a Type 1 Hypervisor directly none of the paravirtualization full virtualization emulation B 161 onto the hardware. mentioned Full virtualization Simulates hardware Has VMs with the Clones images Alters the guest OS A Full virtualization within software same OS 162 163 What are the goals of Hypervisor design? Scalability Reliability Isolation All of the above D Bare metal hypervisor sits on top of Physical Hardware Virtualized hardware Operating System None of the above A 164 If virtualization occurs at application level, OS level and hardware level, then such service in cloud is IaaS SaaS PaaS no such service B 165 Order of Virtual Machine Life Cycle i) Release Ms ii) IT Service Request ii, i, iii, iv i, ii, iii & iv ii, iii, iv & i ii, iv, iii & i D 166 iii) VM in operation iv) VM Provision Which of the following should be replaced with the question mark in the following figure?

Abstraction Virtualization Mobility Pattern All of the mentioned B

167 Which type of Hypervisor is shown in the following figure ?

Type 1 Type 2 Type 3 All of the mentioned B

168 ______where a VM can be moved from one physical Load Balancing Migration Live Migration Server consolidation C 169 machine to another even as it continues to execute. Which type of Hypervisor is shown in the following figure ? Type 1 Type 2 Type 3 All of the mentioned A 170 Load balancing Multiple instances of virtualizes systems various Google Google uses and resources by Point out the wrong statement : applications are hardware All of the mentioned C mapping a logical running on different virtualization address to a physical hosts 171 address Which of the following should be placed in second lowermost layer for the following figure ?

Host Operating None of the Software VM A System mentioned

172 On a Type 2 VM, a Some are software interface is installed over an created that All CPUs support Point out the wrong statement : operating system and emulates the devices All of the mentioned B virtual machines are referred to as with which a system Type 2 or hosted VM would normally 173 interact Which of the following type of virtualization is found in hypervisor such as none of the paravirtualization full virtualization emulation A 174 Microsoft’s Hyper-V ? mentioned Full virtualization requires that the host Guest operating operating system systems in full provide a virtual A process virtual virtualization systems machine interface for machine instantiates Point out the wrong statement : are generally faster All of the mentioned A the guest operating when a command than other system and that the begins a process virtualization guest access schemes hardware through that host VM 175 Which of the following operating system support operating system Windows NT Sun Solaris Windows XP Compliance B 176 virtualization ? ______is a service that creates and manages virtual network interfaces. VMware vStorage VMware vNetwork VMware vCompute Application services B 177

Which of the following allows a virtual machine to run on two or more Distributed Resource vNetwork Distributed Virtual SMP Storage Vmotion A physical processors at the same time ? Scheduler Switch 178 179 VMM is A virtual machine Hardware Host OS A layer of software D VMM facilitates sharing of Memory & I/O CPU, memory & I/O CPU & memory I/O & CPU B 180

Virtualization enables Virtualization enables Virtualization enables Virtualization enables realization of emulating compute, simulating compute, abstracting compute, compute, network, network, and storage network, and storage network, and storage The BEST way to define Virtualization in cloud computing is and storage service service platforms B service platforms service platforms platforms from the from the underlying from the underlying from the underlying underlying virtual virtual hardware virtual hardware physical hardware hardware 181

Can manage OS and Hardware- Virtual machines can application as a single Software and independence of Which one is NOT generally a change after Virtualization? be provisioned to any unit by encapsulating hardware tightly D operating system and system them into virtual coupled applications machines. 182

Increase reliability Which one of the statement is generally NOT correct for Microkernelized Drivers run within Simple partitioning Contains its own and minimize lowest D Hypervisor? guests functionality drivers model level of the TCB 183 Different CPUs are Frequecy slices by the In multiple VM processing, CPU is alloted to the different processes in form of: Space slices by the OS allocated to different Time slices by the OS A OS 184 processes Appear IQ, Mendix, Amazon Web Services (AWS) Elastic Beanstalk, Google IaaS SaaS PaaS None C App Engine and Heroku, are some of the example of providing services for: 185

Service performance Service outage by Live migration of VM Service outage by Which one of the cases not impacting major system availability C degrade unplanned downtime for load balancing planned downtime 186 Which of the following is a structured data store that supports indexing and CloudWatch Amazon SimpleDB Amazon Cloudfront All of the mentioned B 187 data queries to both EC2 and S3? Which of the following is the machinery for interacting with Amazon’s vast Amazon Elastic Amazon Associates Alexa Web All of the mentioned B product data and eCommerce catalog function? Compute Cloud Web Services Information Service 188

Amazon Elastic Amazon Simple Amazon Simple Amazon Simple Which of the following is the central application in the AWS portfolio? A Compute Cloud Queue Service Notification Service Storage System 189

Which of the following is a message queue or transaction system for Amazon Elastic Amazon Simple Amazon Simple Amazon Simple B distributed Internet-based applications? Compute Cloud Queue Service Notification Service Storage System 190 Which of the following feature is used for scaling of EC2 sites? Auto Replica Auto Scaling Auto Ruling All of the mentioned B 191

Which of the following provides a bridge between a company’s existing Amazon Virtual AWS Premium Amazon Fulfillment All of the mentioned A network and the AWS cloud? Private Cloud Support Web Services 192

Amazon plans to FPS is exposed as an extend the Between FBA and API that sorts capabilities of VPC to FWS, you can create a transactions into None of the Point out the wrong statement. integrate with other B nearly virtual store packages called Quick mentioned systems in the on Amazon.com Starts that makes it Amazon cloud easy to implement computing portfolio 193

Which of the following is Amazon’s technical support and consulting Amazon Virtual AWS Premium Amazon Fulfillment All of the mentioned B business? Private Cloud Support Web Services 194 Which of the following is a method for bidding on unused EC2 capacity based On-Demand Instance Reserved Instances Spot Instance All of the mentioned C 195 on the current spot price? High memory instances are useful FPS is exposed as an for large data The standard API that sorts throughput instances are not transactions into None of the Point out the wrong statement. applications such as A suitable for standard packages called Quick mentioned SQL Server databases server applications Starts that makes it and data caching and easy to implement retrieval 196 Which of the following instance has an hourly rate with no long-term On-Demand Instance Reserved Instances Spot Instance All of the mentioned A 197 commitment? Which of the following tool is used for measuring I/O of your systems to EBS IOSTAT ESW All of the mentioned B 198 estimate these transaction costs? The cost of creating EBS boot partitions An EBS volume can an EBS volume is can be stopped and be used as an None of the Point out the wrong statement. lesser than creating a started, and they A instance boot mentioned similarly sized S3 offer fast AMI boot partition 199 bucket times Which of the following is also referred to edge computing? CloudWave CloudFront CloudSpot All of the mentioned B 200 Which of the following is a structured data store that supports indexing and CloudWatch Amazon SimpleDB Amazon Cloudfront All of the mentioned B 201 data queries to both EC2 and S3 ? Which of the following is a system for creating block level storage devices that Amazon Elastic Block CloudWatch AWS Import/Export All of the mentioned B 202 can be used for Amazon Machine Instances in EC2 ? Store None of the Amazon EC2 provides virtual computing environments, known as : chunks instances messages B 203 mentioned Amazon EMR uses Hadoop processing combined with several ______AWS ASQ AMR AWES A 204 products. What is a virtual server platform that allows users to create and run virtual None of the Azure EC2 EC5 B 205 machines on Amazon’s server farm. mentioned Amazon Simple Amazon Elastic Amazon Simple ______is the central application in the AWS portfolio. All of the above B Queue Service Compute Cloud Notification Service 206 Which of the following allows you to create instances of the MySQL database Amazon Elastic Amazon Simple Amazon Relational Amazon Simple C 207 to support your Web sites? Compute Cloud Queue Service Database Service Storage System Amazon Elastic Cloud SimpleDB is a system for interoperates with EC3 is an Analytics as None of the Point out the correct statement. B creating virtual both Amazon EC2 and a Service provider mentioned 208 disks(volume) Amazon S3 Amazon Elastic Amazon Mechanical Multi-Factor Which of the following is a billing and account management service? Amazon DevPay C 209 MapReduce Turk Authentication Which of the following is a means for accessing human researchers or Amazon Elastic Amazon Mechanical Multi-Factor Amazon DevPay B consultants to help solve problems on a contractual or temporary basis? MapReduce Turk Authentication 210

Virtual private Starting in 2012, servers can provision Amazon.com made Amazon Web virtual private clouds its Web service Point out the wrong statement. Services is based on All of the mentioned C connected through platform available to SOA standards virtual private developers on a networks usage-basis model 211 Amazon.com’s SQL Server is having services represent EC2 is a Platform as a None of the Point out the correct statement. enormous impact on the largest pure B Service (PaaS) market mentioned cloud computing Infrastructure as a 212 Service (IAAS) Which of the following is a system for creating block level storage devices that Amazon Elastic Block CloudWatch AWS Import/Export All of the mentioned B 213 can be used for Amazon Machine Instances in EC2? Store Which of the following allows merchants to fill orders through Amazon.com Amazon Elastic Amazon Fulfillment Amazon Relational Amazon Simple B fulfillment service? Compute Cloud Web Services Database Service Storage System 214 With EC2, you can launch and run server A machine image is instances called A machine image the software and Amazon Machine may be thought of as Point out the correct statement. operating system All of the mentioned D Images (AMIs) the contents of a running on top of the running different boot drive instance operating systems such as Red Hat 215 Which of the following provides access for developers to charge Amazon’s FWS FAS FPS All of the mentioned C 216 customers for their purchases? Amazon Elastic Amazon Mechanical Multi-Factor Which of the following uses an authentication device? Amazon DevPay D 217 MapReduce Turk Authentication IBM WebSphere Windows Media Which of the following is a batch processing application? IBM sMash Condor C 218 Application Server Server Secure access to your Most of the system Security can be set EC2 AMIs is image templates that through passwords, Point out the correct statement. controlled by Amazon AWS offers All of the mentioned D Kerberos tickets, or passwords, Kerberos, are based on Red Hat certificates and 509 Certificates Linux 219 220 How many EC2 service zones or regions exist? 1 2 3 4 D Amazon ______cloud-based storage system allows you to store data objects S1 S2 S3 S4 C 221 ranging in size from 1 byte up to 5GB. CloudFront supports ______data by performing static data transfers and windows Media table caching geocaching index caching B 222 streaming content from one CloudFront location to another. Server A volume is mounted The advantages of an on a particular You cannot mount EBS boot partition Point out the correct statement. instance and is multiple volumes on All of the mentioned B are that you can have available to all a single instance a volume up to 1TB 223 instances Data stored in ______domains doesn’t require maintenance of a schema.

SimpleDB SQL Server Oracle RDS A

224 Amazon Web Services falls into which of the following cloud-computing Infrastructure as a Platform as a Service Software as a Service Back-end as a Service C 225 category? Service AWS reaches customers in ______countries. 137 182 190 86 C 226 Which of the following should be used considering factors shown in the SimpleDB RDS Amazon EC2 All of the mentioned B 227 figure? Amazon Machine The metrics obtained Instances are sized at by CloudWatch may A number of tools are None of the Point out the wrong statement. various levels and be used to enable a used to support EC2 D mentioned rented on a feature called Auto services computing/hour basis Scaling 228 Which of the following is an edge-storage or content-delivery system that Amazon Relational Amazon Associates Amazon SimpleDB Amazon Cloudfront C 229 caches data in different physical locations? Database Service Web Services Which of the following is built on top of a Hadoop framework using the Elastic Amazon Elastic Amazon Mechanical Multi-Factor Compute Cloud? Amazon DevPay A MapReduce Turk Authentication 230 1. Amazon Elastic 1. Amazon Elastic 1. Amazon Simple Compute Cloud Block Store Storage System Which of the following correctly describes components roughly in their order 2. Amazon Simple 2. Amazon Elastic 2. Amazon Elastic None of the A of importance from top to down? Storage System Compute Cloud Block Store mentioned 3. Amazon Elastic 3. Amazon Simple 3. Amazon Elastic 231 Block Store Storage System Compute Cloud Which of the following is a Web service that can publish messages from an Amazon Elastic Amazon Simple Amazon Simple Amazon Simple C application and deliver them to other applications or to subscribers? Compute Cloud Queue Service Notification Service Storage System 232 Amazon Elastic Block Which of the following metrics are used to support Elastic Load Balancing? CloudWatch AWS Import/Export All of the mentioned A 233 Store Amazon Elastic Amazon Simple Amazon Simple Amazon Simple Which of the following is an online backup and storage system? D Compute Cloud Queue Service Notification Service Storage System 234 ______is a virtual server platform that allows users to create and run None of the EC2 Azure EC5 A 235 virtual machines on Amazon’s server farm. mentioned Multi-Factor AMIs are operating systems running on the _____ virtualization hypervisor. Yen Xen Ben B 236 Authentication Which of the following instance class is best used for applications that are High Memory None of the Standard Instances High CPU Instances C 237 processor or compute-intensive? Instances mentioned Upload new objects Specify where a Which of the following can be done with S3 buckets through the SOAP and Create, edit, or delete to a bucket and bucket should be All of the mentioned D REST APIs? existing buckets download them stored 238

Which of the following operation retrieves the newest version of the object? PUT GET POST COPY B 239 Amazon S3 provides Amazon S3 is highly large quantities of Amazon S3 is highly None of the Which of the following statement is wrong about Amazon S3? C reliable reliable storage that available mentioned is highly protected 240

Which of the following is relational database service provided by Amazon? SimpleDB SQL Server Oracle RDS D 241

Which of the following can be considered as a distributed caching system? CND CDN CWD All of the mentioned B 242 Amazon Relational Database Service is a variant of the ______5.1 database Oracle MySQL SQL Server All of the mentioned B 243 system. What are the different types of instances? General purpose Computer Optimized Storage Optimized All of the above D 244

The types of AMI provided by AWS are: Instance store backed EBS backed Both A & B None of the above C 245

Amazon S3 standard- Storage classes available with Amazon s3 are - Amazon S3 standard Amazon Glacier All of the above D infrequent Access 246

IBM’s Blue Cloud uses a special software for monitoring of virtual cluster Web Sphere Tivoli Nebula Altix B operations and acts as a provisioning manager is known as ______. 247 on-demand cloud on-demand cloud on-demand cloud Cloud system from SGI is functionally considered as an ______. on-demand A 248 computing service storage service accessing service 249 Cyclone is available in two service models as follows: Paas and Iaas Saas and Paas SaaS and Iaas All of the above C NASA created ______can be fifty percent more energy efficient as it turns Nebula Cloud Cyclone Cloud Force.com Cloud CERN Cloud A off the computers on the network to make cloud computing efficient. 250 To establish scalability for the analysis of huge research data, CERN uses LSF Load assigning i.e. a ______grid and workload management solution of cloud computing Load Setting Facility Load Sharing Facility Load Setting Faculty B Faculty 251 platform One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False. TRUE FALSE A

252 A mashup cloud can be designed by utilizing the Scalability of AWS and Accessibility Mobility Agility Scalability C 253 ______of GAE platforms The Cloudlets have a ______ownership unlike that of Clouds. centralized decentralized global None of the above B 254 The Data-Intensive Scalable Computing(DISC) utilizes a ______data-center HTC HPC HCC HAC A 255 clusters to gather and maintain data. Multitasking Performance metrics for HPC/HTC systems include : Security Index Cost Effectiveness All of the above D 256 Scalability [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equaon calculates the value of which Scalability Throughput Availability Effectiveness B 257 of the following? ______refers to an increase in the performance by the addition of more Horizontal Scalability Vertical Scalability Diagonal Scalability None of the above B 258 resources along the service layers The percentage of time the system is up and running smoothly is referred as system up time system scalability system availability system efficiency C 259 ______. ______is the technology used to search tagged objects and mobile devices GPS Cloud IoT RFID D with the help of browsing an IP address or using the database entry 260

Rangeable Frequency Radio Fragment Radio Frequency Rangeable Fragment RFID stand for ______. C Identification Identification Identification Identification 261 The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer i, ii, iv i, iii, iv ii, iii, iv ii, iii, iv A iii. Combination Layer iv. Network Layer 262 Battery-assisted ______tags contain battery and transmit signals autonomously Acitve RFID Passive RFID Battery-assisted RFID A 263 passive RFID ______tags needs an external source to wake up the battery. Battery-assisted Battery-assisted Acitve RFID Passive RFID C passive RFID active RFID 264 The three major components of RFID hardware based on functionality include RFID Reader Reader Antenna Reader All of the above D 265 : Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router i, ii, iii i, ii, iii, iv ii, iii, iv i, ii, iv A iii. ZigBee End Device iv. ZigBee Accessor 266 Even with two-factor authentication, users may still be vulnerable Scripting Cross attack Man-in-the-middle Radiant c 267 to______attacks. 268 Process of identifying any individual Auditing Authorisation Authentication Accounting c Process that prevents someone from denying that she accessed resource Accounting Non-repudiation Sniffing Authorisation b 269 Making infrastructure What security threats do employee-owned devices pose by storing corporate Potential for vulnerable to Data Loss All of the above d data and accessing corporate networks? noncompliance malware 270

Cloud initiated IPS(Intrusion Which of the following is not a correct way to secure communication layer TLS/SSL Firewalls a communication Prevention System) 271 Communication Which of the following is not the component of IoT Endpoint Sensor Gateway MCU b 272 Module Which of the following makes sure that data is not changed when it not Integrity Availability Confidentiality Accounting a 273 supposed to be? Which of the following terms indicates that information is to be read only by Availability Accounting Integrity Confidentiality d 274 those people for whom it is intended? Supervisory Control Supervisory Control Supervisory Column Supervisory Column What is the full form of SCADA? and Document b and Data Acquisition and Data Assessment and Data Assessment Acquisition 275 Distributed Control Distributed Column DCS is a ______Data Control System Data Column System a 276 System System 277 What is SCADA? Software Process System Hardware b 278 The control in SCADA is Online control Direct control Supervisory control Automatic control c 279 When did the SCADA start? 1980s 1990s 1970s 1960s b 280 Which of the following is not the component of a SCADA system? Database server I/O system PLC controller Sparger controller d 281 Which of the following is the heart of a SCADA system? PLC HMI Alarm task I/O task d Random frequency Radio frequency Random frequency Radio frequency RFID stands for? b 282 identification identification information information 283 Which of the following is not involved in working of IoT? RFID Sensor Nano tech Server d Fog computing Telecommunication M2M is a term introduced by IoT service providers None of these c 284 service providers service providers Sensors are input Sensors can be Sensors respond to devices. Which of these statements regarding sensors is TRUE? analog as well as some external All of these d

digital stimuli. 285 Temperature of the Heat inside a Strength of a solid Smart Dust can be used to measure the industrial lathe Chemical in the soil c computer’s CPU material 286 machine 287 In threat modeling, what methodology used to perform risk analysis DREAD OWASP STRIDE DAR a 288 Out of the following which is not element of threat modelling Asset Vulnerability Threat Time d Both request and Neither request nor Request field is present in which message format? Request message Response message a 289 response response CoAP is specialized for Internet applications Device applications Wireless applications Wired applications a 290 291 Which layer is CoAP? Control layer Transport layer Service layer Application layer c Multicast support, Multicast support Low overhead and Simplicity and low CoAP provides which of the following requirements? Low over head, and d and simplicity multicast support overhead 292 simplicity 293 CoAP is a specialized ______protocol. Web Transfer Power Application Resource a 294 URI and content type support is which protocol feature? Http UDP CoAP SPI c Wide Local Area Wireless Local Area Wireless Land Access Wireless Local Area What is the full form of WLAN? b 295 Network Network Network Node Which of the following specifies a set of media access control (MAC) and IEEE 802.16 IEEE 802.3 IEEE 802.11 IEEE 802.15 c 296 physical layer specifications for implementing WLANs? Low power Unlicensed radio Which of the following is not a characteristic of a ZigBee network? Easy installation. High data rates. c 297 consumption bands. Which of the following IEEE standards provides the lowest level of the ZigBee IEEE 802.11. IEEE 802.15.1. IEEE 802.15.3. IEEE 802.15.4. d 298 software stack? Application Support Which of the following layers are defined by the ZigBee stack? Transport layer Physical layer. Medium Access layer d 299 sub-layer. What is the typical range of transmission distance in a ZigBee network? 5 m. 50 m. 500 m. 5 km b 300 _ is an attack which forces an end user to execute unwanted actions on a Cross-site scoring Cross-site request Two-factor Cross-site scripting d 301 web application in which he/she is currently authenticated. scripting forgery authentication Two machines in a HTTP client and Representational State Transfer (REST) is the standard interface between HTTP client and user None of the above c 302 LAN servers Piggyback Which of the following is not a messaging mode in CoAP? Confirmable Separate Direct c 303 Extension Messaging Extensible Messaging Extension Messaging Extensible Messaging Which of the following is the full form of XMPP? and Presence and Presence b and Privacy Protocol and Privacy Protocol 304 Protocol Protocol 305 In 6LoWPAN address, how many bits are globally unique? 16 bits 32 bits 64 bits 128 bits c

Carrier sense multiple Carrier sense multiple Carrier sense multiple IEEE 802.15.4 uses which of the following for accessing the channel? access with collision access with collision None of these c access (CSMA) detection (CSMA-CD) avoidance (CSMA-CA) 306 307 Three parts of GPS include: space segment control segment user segment all of the above D 308 In case of ______, the GPS works as a receiver, not a transmitter. active tracking passive tracking assisted tracking receiver tracking B ______is an embedded system which meshes the computing process with Cloud-Physical Cyber-Physical Cyber-Space System None of the above C the physical world in the form of an interactive as well as intelligent system System System 309 The number of binding of a node to other actors of the graph in the graph node degree path length social circle bridge A 310 representation of a network is called as ______. ______is the degree to which nodes have a common set of connections to Structural Structural hole Structural cohesion None of the above C 311 other nodes equivalence The degree to which actors are directly linked to one another through closeness cohesion centralized path length B 312 cohesive bonds is called as ______. less The social circles are loosely coupled if there is ______stringency of direct more equal no A contact. 313 The measures of centrality include: Betweenness Closeness Degree All of the above D 314 Arrange the stages in supply chain management: i. Material and Equipment Supplies ii. Delivery of Products iii. After Sale Service and Returns iv, v, i, ii, iii iv, i, v, iii, ii iv, i, v, ii, iii i, ii, iv, v, ii C iv. Planning and Coordination v. Manufacturing and Testing 315 Nodes in the network analysis graph represent the ______and the edges actors represent the relationships between nodes. nodes users Both a and b D 316 317 Which is the latest Operating System? Real-time OS Desktop OS Mainframe OS Cloud OS D Just Expensive Joint Expensive Just Enough Operating System Joined Environmental JOES stands for ______Operating System Operating System C Operating System 318 More reliability Convenience and Responsibility of OS developers to add new feature in existing OS are Compatibility security All of the above D ______319 SaaS solution In future, companies wont worry about the capital for large data center PaaS solution IaaS solution None of the above B because of ______320 CometCloud ______is an autonomic cloud engine whose basic aim is to realize a AsteroidCloud StarCloud PlanetCloud A virtual component of cloud with computing capability 321

CloudBridging None CometCloud supports policy based autonomic __ and __ CloudBursting Both A and B D 322 Infrastructure, Development, Transport, Network, Programming, Dynamic, Static Which are the three conceptual layers in CometCloud? Application, Physical Programming Service, D Infrastructure 323

Python XML In Comet, a tuple is a simple ___ string Java HTML C 324

Which of the following policies is not mentioned in ‘not to violate’ regarding Deadline-based Budget-based Quality-based Workload-based C CloudBurst? 325 Experiencing multi- Image Processing All of the above The cloud media services are: Cloud gaming D 326 screens Key Practices in Key Performance Key Performance Industry Key Parameters in KPI stands for ______Index Indicators C Information 327

SEEP is used in ______Energy optimization Multimedia Information leakage Cost reduction A 328 System End to End Static Environmental Symbolic Execution Protocol State Execution And SEEP stands for ______Execution Process and Energy Profiles C Energy Profiles 329 Develop, ship, run Create, export Transport, cloud Keywords in are ______anywhere User, data, privacy A 330 Process, state Workflows, Docker can simplify both, ____ and ____ Behavior, aspect communication All of the above C 331 “batteries included “batteries included “batteries but but removable” “battery less Basic approach of Docker as a company is: but non-removable” chargeable” A execution” 332 Windows Android Which containers are used by Docker severs? Linux Mac C 333 Two main components in Docker are: Master, slave Client, server Client, master All of the above B 334 53378 Docker is generally configured to use TCP port ____ while executing 3306 2375 2376 C unencrypted traffic 335 Docker is generally configured to use TCP port ____ while managing encrypted 3306 traffic. 53378 2375 2376 D 336 True False Containers require less disk space as compared to virtual machine A 337 True There is no built-in framework in Docker for testing. False A 338 Docker provides simple one-line deployment strategy. True False A 339 The examples of deployment tools are: Docker’s storm New Relic’s Spotify’s Helios Centurion All of the above D 340 Consumption Near CNS stands for ______Continuous Network Compact Neural Sweet-Spot Compound Near System System A Sweet-Sp0T 341 geographical Wireless Application systems used to track and identify the location of objects in real time Geolocation information system Real-time location Protocol (WAP) D (GIS) system (RTLS) 342 Voice portal WiMax Mobile enterprise gateway to the Internet optimized for mobility Mobile Portal D 343 Voice portal Geolocation sensor network automatically identifying a Web user's location WiMax B 344

ubiquitous computing Context-aware Computing capabilities embedded into objects around us (mobile and pervasive computing (ubicom) computing Geolocation B stationary) 345 Context-aware Mobile Portal pervasive computing Computing capabilities embedded in the environment but typically not mobile computing Voice portal B 346 Typical Mobile Vehicle mount solutions Wireless wide area Mobile enterprise Devices Used in Interactive voice • Handheld solutions network (WWAN) C Warehouses response (IVR) • Hands-free and voice solutions 347

A collection of nodes capable of environmental sensing, local computation, Voice portal Mobile Portal Geolocation sensor network D and communication with its peers or with other higher performance nodes 348 short-range radio frequency communication technology for remotely storing Network-based Real-time location radio frequency Wireless wide area C and retrieving data using devices called ___ tags and ___ readers positioning system (RTLS) identification (RFID) network (WWAN) 349

Real-time location Wireless wide area Wireless Local Area Wireless Application a technology that offers Internet browsing from wireless devices D system (RTLS) network (WWAN) Network (WLAN) Protocol (WAP) 350 Location-based m- delivery of m-commerce transactions to individuals in a specific location, at a Context-aware ubiquitous computing Network-based commerce (l- A specific time computing (ubicom) positioning 351 commerce) Calculating the location of a mobile device from signals sent by the device to Personal Area terminal-based Network-based pervasive computing B 352 base stations Network (PAN) positioning positioning a wireless technology, designed to provide Internet access across metro areas Voice portal Mobile Portal WiMax Geolocation C to fixed (not moving) users. It is considered wireless broadband technology 353 a website with an audio interface that can be accessed through a telephone WiMax Geolocation Mobile Portal Voice portal D 354 call Wireless wide area Wireless Local Area Personal Area Wireless Application a wireless version of the Ethernet networking standard network (WWAN) Network (WLAN) Network (PAN) B Protocol (WAP) 355 Personal Area Interactive voice Real-time location geographical computer system capable of integrating, storing, editing, analyzing, sharing, Network (PAN) response (IVR) system (RTLS) information system D and displaying geographically referenced (spatial) information 356 (GIS) Real-time location Personal Area a voice system enables users to request/receive info, enter/change data pervasive computing Interactive voice system (RTLS) Network (PAN) D through a telephone to a computerized system response (IVR) 357

Personal Area Wireless Application Wireless wide area a telecommunications network that offers wireless coverage over a large Wireless Local Area Network (PAN) Protocol (WAP) network (WWAN) C geographical area, typically over a cellular phone network Network (WLAN) 358 application of mobile computing inside the enterprise (e.g., for improved sensor network Mobile enterprise Voice portal Mobile Portal B 359 communication among employees) Wireless wide area Personal Area Wireless Local Area a wireless telecommunications network for device-to-device connections network (WWAN) Network (PAN) Network (WLAN) sensor network B within a very short range 360 Context-aware ability to detect and react to a set of environmental variables that is described Mobile Portal pervasive computing Network-based computing B as context (which can be sensor info or users' attitudes) positioning 361

Which of the following is a specification for multicast discovery on a LAN? WS-Agent WS-Discovery WS-SOAP All of the mentioned B 362 363