Deck 6: Cloud Computing, Virtualization, Search Engines, and Instant Messaging

Full screen (f)
exit full mode
Question
The output of the reduce task is typically written to the FileSystem via __________    

A)outputcollector.collect
B)outputcollector.get
C)outputcollector.receive
D)outputcollector.put
Use Space or
up arrow
down arrow
to flip the card.
Question
Which type of Hypervisor is shown in the following figure?

A)type 1
B)type 2
C)type 3
D)all of the mentioned
Question
Point out the wrong statement.

A)load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)multiple instances of various google applications are running on different hosts
C)google uses hardware virtualization
D)all of the mentioned
Question
Which of the following is another name for the system virtual machine?

A)hardware virtual machine
B)software virtual machine
C)real machine
D)none of the mentioned
Question
Which of the following provide system resource access to virtual machines?

A)vmm
B)vmc
C)vnm
D)all of the mentioned
Question
An operating system running on a Type              VM is full virtualization.

A)1
B)2
C)3
D)all of the mentioned
Question
Which of the following is Type 1 Hypervisor?

A)wind river simics
B)virtual server 2005 r2
C)kvm
D)lynxsecure
Question
Which of the following is Type 2 VM?

A)virtuallogix vlx
B)vmware esx
C)xen
D)lynxsecure
Question
Which of the following will be the host operating system for Windows Server?

A)virtuallogix vlx
B)microsoft hyper-v
C)xen
D)all of the mentioned
Question
Which of the following should be placed in second lowermost layer for the following figure?

A)host operating system
B)software
C)vm
D)none of the mentioned
Question
Which of the following algorithm is used by Google to determine the importance of a particular page?

A)svd
B)pagerank
C)fastmap
D)all of the mentioned
Question
Point out the correct statement.

A)with paas, the goal is to create hosted scalable applications that are used in a software as a service model
B)applications built using paas tools need to be standards-based
C)in wolf, the data and transaction management conforms to the business rules you create
D)all of the mentioned
Question
Based on PageRank algorithm, Google returns ___________    for a query that is parsed for its keywords.

A)sep
B)sap
C)serp
D)business objects build
Question
Point out the wrong statement.

A)wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
B)applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
C)google applications are cloud-based applications
D)none of the mentioned
Question
Which of the following protocol lets a Web site list in an XML file information?

A)sitemaps
B)mashups
C)hashups
D)all of the mentioned
Question
Which of the following is not provided by "Deep Web"?

A)database generated web pages
B)private or limited access web pages
C)pages without links
D)all of the mentioned
Question
Dynamic content presented in Google _____________ crawling isn't normally indexed.

A)ajax
B)java
C)javascript
D)all of the mentioned
Question
Which of the following google product sends you periodic email alerts based on your search term?

A)alerts
B)blogger
C)calendar
D)all of the mentioned
Question
Which of the following is a payment processing system by Google?

A)paytm
B)checkout
C)code
D)all of the mentioned
Question
How many types of protocols are important for instant messaging?

A)2
B)3
C)4
D)all of the mentioned
Question
Point out the correct statement.

A)every third-party im clients aim to allow their users to connect to the different major im services
B)sip stands for secure initiation protocol
C)xmpp stands for extensible messaging and presence protocol
D)all of the mentioned
Question
Which of the following protocol is adopted for interoperability by top three IM service providers?

A)sip
B)simple
C)xmpp
D)imps
Question
Which of the following protocol is not an Internet Engineering Task Force standard?

A)sip
B)simple
C)xmpp
D)imps
Question
Point out the wrong statement.

A)all im clients use peer-to-peer messaging
B)im software aimed at businesses such as xmpp, lotus sametime, and microsoft office communicator use a client/server architecture
C)instant messaging is as popular in business as it is in personal communications
D)none of the mentioned
Question
Which of the following IM client allow their users to connect to the different major IM services?

A)pidgin
B)miranda im
C)trillian
D)all of the mentioned
Question
Which of the architectural layer is used as a front end in cloud computing?

A)client
B)cloud
C)soft
D)all of the mentioned
Question
Which of the following benefit is provided by the PaaS service provider

A)A larger pool of qualified developers
B)More reliable operation
C)A logical design methodology
D)All of the mentioned
Question
Communication between services is done widely using _______ protocol

A)REST
B)SOAP
C)RESTful
D)None of the mentioned
Question
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
Question
Which of the following component is called hypervisor?

A)VGM
B)VMc
C)VMM
D)All of the mentioned
Question
Applications such as a Web server or database server that can run on a virtual machine image are referred to as __

A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
Question
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.

A)Ben
B)Xen
C)Ken
D)Zen
Question
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
Question
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
Question
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
Question
The source of HDFS architecture in Hadoop originated as

A)Google distributed filesystem
B)Yahoo distributed filesystem
C)Facebook distributed filesystem
D)Amazon S3 storage
Question
What is default replication factor?

A)1
B)2
C)3
D)5
Question
What is HDFS Block in Hadoop?

A)It is the logical representation of data
B)It is the physical representation of data
C)Both the above
D)None of the above
Question
The need for data replication can arise in various scenarios like

A)DataNode is the slave/worker node and holds the user data in the form of Data Blocks
B)DataNode goes down
C)Data Blocks get corrupted
D)All of the above
Question
If the IP address or hostname of a data node changes

A)The namenode updates the mapping between file name and block name
B)The data in that data node is lost forever
C)The namenode need not update mapping between file name and block name
D)There namenode has to be restarted
Question
For the frequently accessed HDFS files the blocks are cached in

A)The memory of the data node
B)In the memory of the namenode
C)Both the above
D)None of the above
Question
In HDFS the files cannot be

A)Read
B)Deleted
C)Executed
D)Archived
Question
Which of the following is not the feature of Network management systems?

A)Accounting
B)Security
C)Performance
D)None of the mentioned
Question
Which of the following service provider provides the least amount of built in security?

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
Question
Point out the correct statement.

A)Different types of cloud computing service models provide different levels of security services
B)Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required
C)Data should be transferred and stored in an encrypted format for security purpose
D)All of the mentioned
Question
Point out the wrong statement.

A)You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
C)Cloud computing doesn't have vulnerabilities associated with Internet applications
D)All of the mentioned
Question
Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A)Scalability
B)Portability and interoperability
C)Flexibility
D)None of the mentioned
Question
Which of the following is considered an essential element in cloud computing by CSA?

A)Multi-tenancy
B)Identity and access management
C)Virtualization
D)All of the mentioned
Question
Which of the following is used for Web performance management and load testing?

A)VMware Hyperic
B)Webmetrics
C)Univa UD
D)Tapinsystems
Question
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)CAS
B)CSA
C)SAC
D)All of the mentioned
Question
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
Question
Which of the following cloud does not require mapping?

A)Public
B)Private
C)Hybrid
D)None of the mentioned
Question
Point out the wrong statement.

A)Each different type of cloud service delivery model creates a security boundary
B)Any security mechanism below the security boundary must be built into the system
C)Any security mechanism above the security boundary must be maintained by the customer
D)All of the mentioned
Question
Amazon EC2 provides virtual computing environments, known as :

A)chunks
B)instances
C)messages
D)None of the mentioned
Question
Data stored in __________ domains doesn't require maintenance of a schema.

A)SimpleDB
B)SQL Server
C)Oracle
D)RDS
Question
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

A)CloudWatch
B)Amazon Elastic Block Store
C)AWS Import/Export
D)All of the mentioned
Question
Which of the following is most important feature of cloud storage listed below ?

A)Logon authentication
B)Bare file
C)Multiplatform support
D)Adequate bandwidth
Question
Which of the following is open cloud storage management standard by SNIA ?

A)CDMI
B)OCCI
C)CEA
D)Adequate bandwidth
Question
Which of the following service is provided by Google for online storage ?

A)Drive
B) SkyDrive
C)Dropbox
D)All of the mentioned
Question
Which of the following backup create a cloned copy of your current data or drive ?

A)Continuous Data Protection
B)Open file backup
C)Reverse Delta backup
D)None of the mentioned
Question
Point out the correct statement.

A)Amazon Elastic Cloud is a system for creating virtual disks(volume)
B)SimpleDB interoperates with both Amazon EC2 and Amazon S3
C)EC3 is an Analytics as a Service provider
D)None of the mentioned
Question
Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?

A)CloudWatch
B)Amazon SimpleDB
C)Amazon Cloudfront
D)All of the mentioned
Question
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?

A)Amazon Elastic Compute Cloud
B)Amazon Associates Web Services
C)Alexa Web Information Service
D)All of the mentioned
Question
Which of the following is a billing and account management service?

A)Amazon Elastic MapReduce
B)Amazon Mechanical Turk
C)Amazon DevPay
D)Multi-Factor Authentication
Question
___________ is an application for collecting messages sent in RSS and Atom format from information providers.

A)Google Reader
B)Yahoo Mail
C)EmailRackspace
D)All of the mentioned
Question
The advantages of Ajax is _______________

A)Bandwidth utilization
B)More interactive
C)Speeder retrieval of data
D)All of these
Question
Virtual Machines (VMs) are offered in cloud by

A)SaaS
B)PaaS
C)IaaS
D)None of these
Question
The technology used to distribute service requests to resources is referred to as _____________

A)load performing
B)load scheduling
C)load balancing
D)all of the mentioned
Question
_________ computing refers to applications and services that run on a distributed network using virtualized resources.

A)Distributed
B)Cloud
C)Soft
D)Parallel
Question
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.

A)real
B)virtual
C)cloud
D)none of the mentioned
Question
Amazon's Elastic Compute Cloud (EC2) is a well known ______.

A)Virtual machine
B)Cloud Storage
C)PaaS
D)SoA
Question
________ virtualization abstracts networking hardware and software into a virtual network that can be managed.

A)Storage
B)Network
C)Software
D)None of the mentioned
Question
_________ is used by Amazon Web Services to store copies of a virtual machine.

A)AMI
B)EMI
C)IMI
D)Application services
Question
In para-virtualization, VMs run on hypervisor that interacts with the hardware.
Question
An operating system running on a Type __ VM is a full virtualization.

A)1
B)2
C)3
D)All of the mentioned
Question
_____________________where a VM can be moved from one physical machine to another even as it continues to execute.

A)Load Balancing
B)Migration
C)Live Migration
D)Server consolidation
Question
Point out the wrong statement :

A)Load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)Multiple instances of various Google applications are running on different hosts
C)Google uses hardware virtualization
D)All of the mentioned
Question
Point out the wrong statement :

A)Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM
B)All CPUs support virtual machines
C)On a Type 2 VM, a software interface is created that emulates the devices with which a system would normally interact
D)All of the mentioned
Question
Which of the following type of virtualization is found in hypervisor such as Microsoft's Hyper-V ?

A)paravirtualization
B)full virtualization
C)emulation
D)none of the mentioned
Question
Point out the wrong statement :

A)Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
B)Guest operating systems in full virtualization systems are generally faster than other virtualization schemes
C)A process virtual machine instantiates when a command begins a process
D)All of the mentioned
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/125
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Cloud Computing, Virtualization, Search Engines, and Instant Messaging
1
The output of the reduce task is typically written to the FileSystem via __________    

A)outputcollector.collect
B)outputcollector.get
C)outputcollector.receive
D)outputcollector.put
outputcollector.collect
2
Which type of Hypervisor is shown in the following figure?

A)type 1
B)type 2
C)type 3
D)all of the mentioned
type 1
3
Point out the wrong statement.

A)load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)multiple instances of various google applications are running on different hosts
C)google uses hardware virtualization
D)all of the mentioned
google uses hardware virtualization
4
Which of the following is another name for the system virtual machine?

A)hardware virtual machine
B)software virtual machine
C)real machine
D)none of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following provide system resource access to virtual machines?

A)vmm
B)vmc
C)vnm
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
6
An operating system running on a Type              VM is full virtualization.

A)1
B)2
C)3
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is Type 1 Hypervisor?

A)wind river simics
B)virtual server 2005 r2
C)kvm
D)lynxsecure
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is Type 2 VM?

A)virtuallogix vlx
B)vmware esx
C)xen
D)lynxsecure
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following will be the host operating system for Windows Server?

A)virtuallogix vlx
B)microsoft hyper-v
C)xen
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following should be placed in second lowermost layer for the following figure?

A)host operating system
B)software
C)vm
D)none of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following algorithm is used by Google to determine the importance of a particular page?

A)svd
B)pagerank
C)fastmap
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
12
Point out the correct statement.

A)with paas, the goal is to create hosted scalable applications that are used in a software as a service model
B)applications built using paas tools need to be standards-based
C)in wolf, the data and transaction management conforms to the business rules you create
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
13
Based on PageRank algorithm, Google returns ___________    for a query that is parsed for its keywords.

A)sep
B)sap
C)serp
D)business objects build
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
14
Point out the wrong statement.

A)wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
B)applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
C)google applications are cloud-based applications
D)none of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following protocol lets a Web site list in an XML file information?

A)sitemaps
B)mashups
C)hashups
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not provided by "Deep Web"?

A)database generated web pages
B)private or limited access web pages
C)pages without links
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
17
Dynamic content presented in Google _____________ crawling isn't normally indexed.

A)ajax
B)java
C)javascript
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following google product sends you periodic email alerts based on your search term?

A)alerts
B)blogger
C)calendar
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is a payment processing system by Google?

A)paytm
B)checkout
C)code
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
20
How many types of protocols are important for instant messaging?

A)2
B)3
C)4
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
21
Point out the correct statement.

A)every third-party im clients aim to allow their users to connect to the different major im services
B)sip stands for secure initiation protocol
C)xmpp stands for extensible messaging and presence protocol
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following protocol is adopted for interoperability by top three IM service providers?

A)sip
B)simple
C)xmpp
D)imps
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following protocol is not an Internet Engineering Task Force standard?

A)sip
B)simple
C)xmpp
D)imps
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
24
Point out the wrong statement.

A)all im clients use peer-to-peer messaging
B)im software aimed at businesses such as xmpp, lotus sametime, and microsoft office communicator use a client/server architecture
C)instant messaging is as popular in business as it is in personal communications
D)none of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following IM client allow their users to connect to the different major IM services?

A)pidgin
B)miranda im
C)trillian
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the architectural layer is used as a front end in cloud computing?

A)client
B)cloud
C)soft
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following benefit is provided by the PaaS service provider

A)A larger pool of qualified developers
B)More reliable operation
C)A logical design methodology
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
28
Communication between services is done widely using _______ protocol

A)REST
B)SOAP
C)RESTful
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following component is called hypervisor?

A)VGM
B)VMc
C)VMM
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
31
Applications such as a Web server or database server that can run on a virtual machine image are referred to as __

A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
32
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.

A)Ben
B)Xen
C)Ken
D)Zen
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
33
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
35
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
36
The source of HDFS architecture in Hadoop originated as

A)Google distributed filesystem
B)Yahoo distributed filesystem
C)Facebook distributed filesystem
D)Amazon S3 storage
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
37
What is default replication factor?

A)1
B)2
C)3
D)5
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
38
What is HDFS Block in Hadoop?

A)It is the logical representation of data
B)It is the physical representation of data
C)Both the above
D)None of the above
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
39
The need for data replication can arise in various scenarios like

A)DataNode is the slave/worker node and holds the user data in the form of Data Blocks
B)DataNode goes down
C)Data Blocks get corrupted
D)All of the above
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
40
If the IP address or hostname of a data node changes

A)The namenode updates the mapping between file name and block name
B)The data in that data node is lost forever
C)The namenode need not update mapping between file name and block name
D)There namenode has to be restarted
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
41
For the frequently accessed HDFS files the blocks are cached in

A)The memory of the data node
B)In the memory of the namenode
C)Both the above
D)None of the above
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
42
In HDFS the files cannot be

A)Read
B)Deleted
C)Executed
D)Archived
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not the feature of Network management systems?

A)Accounting
B)Security
C)Performance
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following service provider provides the least amount of built in security?

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
45
Point out the correct statement.

A)Different types of cloud computing service models provide different levels of security services
B)Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required
C)Data should be transferred and stored in an encrypted format for security purpose
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
46
Point out the wrong statement.

A)You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
C)Cloud computing doesn't have vulnerabilities associated with Internet applications
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A)Scalability
B)Portability and interoperability
C)Flexibility
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is considered an essential element in cloud computing by CSA?

A)Multi-tenancy
B)Identity and access management
C)Virtualization
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is used for Web performance management and load testing?

A)VMware Hyperic
B)Webmetrics
C)Univa UD
D)Tapinsystems
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)CAS
B)CSA
C)SAC
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
51
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following cloud does not require mapping?

A)Public
B)Private
C)Hybrid
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
53
Point out the wrong statement.

A)Each different type of cloud service delivery model creates a security boundary
B)Any security mechanism below the security boundary must be built into the system
C)Any security mechanism above the security boundary must be maintained by the customer
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
54
Amazon EC2 provides virtual computing environments, known as :

A)chunks
B)instances
C)messages
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
55
Data stored in __________ domains doesn't require maintenance of a schema.

A)SimpleDB
B)SQL Server
C)Oracle
D)RDS
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

A)CloudWatch
B)Amazon Elastic Block Store
C)AWS Import/Export
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is most important feature of cloud storage listed below ?

A)Logon authentication
B)Bare file
C)Multiplatform support
D)Adequate bandwidth
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is open cloud storage management standard by SNIA ?

A)CDMI
B)OCCI
C)CEA
D)Adequate bandwidth
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following service is provided by Google for online storage ?

A)Drive
B) SkyDrive
C)Dropbox
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following backup create a cloned copy of your current data or drive ?

A)Continuous Data Protection
B)Open file backup
C)Reverse Delta backup
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
61
Point out the correct statement.

A)Amazon Elastic Cloud is a system for creating virtual disks(volume)
B)SimpleDB interoperates with both Amazon EC2 and Amazon S3
C)EC3 is an Analytics as a Service provider
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?

A)CloudWatch
B)Amazon SimpleDB
C)Amazon Cloudfront
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?

A)Amazon Elastic Compute Cloud
B)Amazon Associates Web Services
C)Alexa Web Information Service
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following is a billing and account management service?

A)Amazon Elastic MapReduce
B)Amazon Mechanical Turk
C)Amazon DevPay
D)Multi-Factor Authentication
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
65
___________ is an application for collecting messages sent in RSS and Atom format from information providers.

A)Google Reader
B)Yahoo Mail
C)EmailRackspace
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
66
The advantages of Ajax is _______________

A)Bandwidth utilization
B)More interactive
C)Speeder retrieval of data
D)All of these
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
67
Virtual Machines (VMs) are offered in cloud by

A)SaaS
B)PaaS
C)IaaS
D)None of these
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
68
The technology used to distribute service requests to resources is referred to as _____________

A)load performing
B)load scheduling
C)load balancing
D)all of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
69
_________ computing refers to applications and services that run on a distributed network using virtualized resources.

A)Distributed
B)Cloud
C)Soft
D)Parallel
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
70
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.

A)real
B)virtual
C)cloud
D)none of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
71
Amazon's Elastic Compute Cloud (EC2) is a well known ______.

A)Virtual machine
B)Cloud Storage
C)PaaS
D)SoA
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
72
________ virtualization abstracts networking hardware and software into a virtual network that can be managed.

A)Storage
B)Network
C)Software
D)None of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
73
_________ is used by Amazon Web Services to store copies of a virtual machine.

A)AMI
B)EMI
C)IMI
D)Application services
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
74
In para-virtualization, VMs run on hypervisor that interacts with the hardware.
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
75
An operating system running on a Type __ VM is a full virtualization.

A)1
B)2
C)3
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
76
_____________________where a VM can be moved from one physical machine to another even as it continues to execute.

A)Load Balancing
B)Migration
C)Live Migration
D)Server consolidation
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
77
Point out the wrong statement :

A)Load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)Multiple instances of various Google applications are running on different hosts
C)Google uses hardware virtualization
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
78
Point out the wrong statement :

A)Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM
B)All CPUs support virtual machines
C)On a Type 2 VM, a software interface is created that emulates the devices with which a system would normally interact
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following type of virtualization is found in hypervisor such as Microsoft's Hyper-V ?

A)paravirtualization
B)full virtualization
C)emulation
D)none of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
80
Point out the wrong statement :

A)Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
B)Guest operating systems in full virtualization systems are generally faster than other virtualization schemes
C)A process virtual machine instantiates when a command begins a process
D)All of the mentioned
Unlock Deck
Unlock for access to all 125 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 125 flashcards in this deck.