Google News
logo
Cloud Computing - Quiz(MCQ)
A)
Paul Baran
B)
Leonard Kleinrock
C)
Lawrence Roberts
D)
Joseph Carl Robnett Licklider

Correct Answer :   Joseph Carl Robnett Licklider


Explanation :

Cloud computing is believed to have been invented by Joseph Carl Robnett Licklider in the 1960s with his work on ARPANET to connect people and data from anywhere at any time.
 
In 1983, CompuServe offered its consumer users a small amount of disk space that could be used to store any files they chose to upload.
 
In 1994, AT&T launched PersonaLink Services, an online platform for personal and business communication and entrepreneurship. The storage was one of the first to be all web-based, and referenced in their commercials as, "you can think of our electronic meeting place as the cloud.

A)
Cloud Computing means storing data in a database
B)
Cloud Computing is a tool used to create an application
C)
Cloud Computing means providing services like storage, servers, database, networking, etc
D)
None of the Above

Correct Answer :   Cloud Computing means providing services like storage, servers, database, networking, etc


Explanation : Cloud computing means providing services like storage, servers, database, networking, etc. over the internet without the user managing it directly. The data stored can be accessed by an authorized user anywhere anytime provided the user must have an internet connection and a device.

A)
Corporate data centres
B)
Expensive software upgrades
C)
Expensive personal computer hardware
D)
All of the Above

Correct Answer :   All of the Above

A)
Merged Cloud Servers
B)
Public Cloud Servers
C)
Private Cloud Servers
D)
Dedicated Cloud Servers

Correct Answer :   Merged Cloud Servers


Explanation : In Public Servers the users share the hardware, storage, and networks. Private Servers provide high security to the data stored through firewalls and internal hosting. Also, in the private cloud, the user can customize their servers with add-ons. In Dedicated Servers, the server completely belongs to a particular organization or a company.

A)
CRM
B)
Cloud
C)
Computing
D)
Cloud Computing

Correct Answer :   Cloud


Explanation : The term Cloud refers to a Network or Internet.

A)
accessing the hardware
B)
configuring the hardware
C)
manipulating the hardware
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Cloud Computing refers to manipulating, configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application.

A)
Cloud computing is platform dependent
B)
Cloud Computing makes our business applications mobile and collaborative.
C)
Cloud Computing provides us means of accessing the applications as utilities over computer only.
D)
All of the Above

Correct Answer :   Cloud Computing makes our business applications mobile and collaborative.


Explanation : Cloud computing offers platform independency, as the software is not required to be installed locally on the PC. Hence, the Cloud Computing is making our business applications mobile and collaborative.

A)
Security
B)
Availability
C)
Large Network Access
D)
All of the Above

Correct Answer :   All of the Above


Explanation : One of the important features is security, the data stored is secured and cannot be accessed by unauthorized parties. In case the user exhausts the storage space allocated, the user can buy extra storage for a less amount. The data stored can be accessed by any authorized user anywhere anytime provided the user must have an internet connection and a device.

A)
Software-as-a-Server (SaaS)
B)
Software-and-a-Server (SaaS)
C)
Software-as-a-Service (SaaS)
D)
Service-as-a-Software (SaaS)

Correct Answer :   Software-as-a-Service (SaaS)


Explanation : Software as a Service, is the most widely used choice for enterprises. SaaS makes use of the internet to offer apps to consumers that are controlled by a third-party vendor.

A)
Adobe
B)
Paypal
C)
Google G Suite
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Adobe Creative Cloud is used in the art sector. Paypal is an online payment application. Google G Suite is the best storage and backup application used by google.

A)
Dropbox
B)
Cisco WebEx
C)
Amazon Web Services (AWS)
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Amazon Web Services (AWS), Dropbox, and Cisco WebEx are examples of cloud.

A)
Configuring Model
B)
Deployment Models
C)
Collaborative Model
D)
All of the Above

Correct Answer :   Deployment Models


Explanation : Following are the working models for cloud computing: Deployment Models and Service Models.

A)
4
B)
5
C)
6
D)
7

Correct Answer :   4


Explanation : Cloud can have any of the four types of access: Public, Private, Hybrid, and Community.

A)
Community cloud
B)
Public cloud
C)
Private cloud
D)
Hybrid cloud

Correct Answer :   Community cloud


Explanation : The community cloud allows systems and services to be accessible by a group of organizations.

A)
Public-as-a-Service
B)
Public-as-a-Service
C)
Platform-as-a-Service
D)
Community-as-a-Service

Correct Answer :   Platform-as-a-Service


Explanation : Cloud computing is based on service models. These are categorized into three basic service models which are : Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)

A)
XaaS
B)
IaaS
C)
SaaS
D)
PaaS

Correct Answer :   PaaS


Explanation : PaaS provides the runtime environment for applications, development and deployment tools, etc.

A)
IaaS
B)
XaaS
C)
SaaS
D)
PaaS

Correct Answer :   XaaS


Explanation : Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service.

A)
Cloud computing
B)
Soft computing
C)
Parallel computing
D)
Distributed computing

Correct Answer :   Cloud computing


Explanation : Cloud computing refers to the delivery of services such as storage, servers, databases, networking, and other functions through the internet without the need for the user to manage them directly. These applications are accessed by common Internet protocols and networking standards.

A)
Heroku
B)
Windows Azure
C)
AWS Elastic Beanstalk
D)
All of the Above

Correct Answer :   All of the Above


Explanation : PaaS stands for Platform-as-a-Service. In PaaS, the users receive hardware or software tools from the users on the internet. AWS Elastic Beanstalk, Windows Azure, Heroku are example of a PaaS service.

A)
Linode
B)
Rackspace
C)
DigitalOcean
D)
All of the Above

Correct Answer :   All of the Above


Explanation : IaaS stands for Infrastructure-as-a-Service. In IaaS, the users receive computing resources like software or hardware tools virtually over the internet. DigitalOcean, Linode, Rackspace are the example of an IaaS service.

A)
Cloud Square
B)
Cloud Service
C)
Cloud Cube
D)
All of the Above

Correct Answer :   Cloud Cube


Explanation : Cloud Cube model is mainly used for secure collaboration.

A)
Cloud Computing Value Proposition
B)
Cloud Computing Strategy Planning
C)
Both (A) and (B)
D)
Business Architecture Development

Correct Answer :   Both (A) and (B)


Explanation : In Strategy phase, we analyze the strategy problems that customer might face. There are two steps to perform this analysis: Cloud Computing Value Proposition Cloud Computing Strategy Planning

A)
Planning Phase
B)
Cloud Computing Strategy Planning
C)
Business Architecture Development
D)
Cloud Computing Value Proposition

Correct Answer :   Cloud Computing Strategy Planning


Explanation : Cloud Computing Strategy Planning : The strategy establishment is based on the analysis result of the above step. In this step, a strategy document is prepared according to the conditions a customer might face when applying cloud computing mode.

A)
Quality of service
B)
Technical Service
C)
Plan Development
D)
Service Development

Correct Answer :   Quality of service


Explanation : Quality of service refers to the non-functional requirements such as reliability, security, disaster recovery, etc.

A)
IT Architecture Development
B)
Selecting Cloud Computing Provider
C)
Transformation Plan Development
D)
Business Architecture Development

Correct Answer :   Selecting Cloud Computing Provider


Explanation : Deployment Phase : This phase focuses on both of the above two phases. It involves the following two steps: Selecting Cloud Computing Provider and Maintenance and Technical Service

A)
Latency
B)
Noise
C)
Propagation
D)
All of the Above

Correct Answer :   Latency


Explanation : While cloud computing applications excel at large-scale processing tasks, if your application needs large amounts of data transfer, it may not be the best model for you.

A)
Standardized Web services
B)
Web-application frameworks
C)
Service-oriented architecture
D)
All of the Above

Correct Answer :   Service-oriented architecture


Explanation : These standards help to enable different business models that cloud computing vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility computing.

A)
CostCLOUD = Σ(UnitCostCLOUD / (Revenue + CostCLOUD))
B)
CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
C)
CostCLOUD = Σ(UnitCostCLOUD – (Revenue – CostCLOUD))
D)
CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))

Correct Answer :   CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))


Explanation : Unit cost is usually defined as the cost of a machine instance per hour or another resource.

A)
That you establish an identity
B)
That the identity be authenticated
C)
That the authentication be portable
D)
All of the Above

Correct Answer :   All of the Above


Explanation : When applied to a number of users in a cloud computing system, these requirements describe systems that must provision identities.

A)
real
B)
virtual
C)
cloud
D)
None of the Above

Correct Answer :   virtual


Explanation : Cloud computing means providing services like storage, servers, database, networking, etc. over the internet. It is a new model for provisioning resources, for staging applications, and for platform-independent user access to services.

A)
Local
B)
Service
C)
Operating
D)
None of the Above

Correct Answer :   Operating


Explanation : The nature of the service provider and its connection with its client is changing as a result of cloud computing.

A)
Multi-tenancy
B)
Virtualization
C)
Identity and access management
D)
All of the Above

Correct Answer :   Multi-tenancy


Explanation : Multi-tenancy refers to hosting shared among multiple customers. Multi-tenancy introduces a variety of new security problems to cloud computing that must be addressed.

A)
Maintenance and Technical Service
B)
Selecting Cloud Computing Provider
C)
Both (A) and (B)
D)
None of the Above

Correct Answer :   Selecting Cloud Computing Provider


Explanation : Selecting Cloud Computing Provider :This step includes selecting a cloud provider on basis of Service Level Agreement (SLA), which defines the level of service the provider will meet.

A)
Planning Phase
B)
Strategy Phase
C)
Deployment Phase
D)
Development Phase

Correct Answer :   Planning Phase


Explanation : IT Architecture Development steps in Planning Phase.

A)
Planning
B)
Application
C)
Deployment
D)
Service

Correct Answer :   Service


Explanation : Service model consists of the particular types of services that you can access on a cloud computing platform..

A)
PaaS
B)
Sourcing
C)
Reliability
D)
Ownership

Correct Answer :   Sourcing


Explanation : Insourced or Outsourced means whether the service is provided by the customer or the service provider.

A)
5
B)
4
C)
3
D)
2

Correct Answer :   3


Explanation : There are total three phase :

* Strategy Phase
* Planning Phase
* Deployment Phase

A)
CloudWatch
B)
CloudMetrics
C)
CloudSensor
D)
All of the Above

Correct Answer :   CloudSensor


Explanation : The Cloud Commons is a new online community founded by CA to promote information exchange on cloud service and the SMI standard.

A)
SOA
B)
Virtualization
C)
Grid Computing
D)
All of the Above

Correct Answer :   All of the Above


Explanation : There are certain technologies working behind the cloud computing platforms making cloud computing flexible, reliable, and usable. These technologies are : Virtualization, Service-Oriented Architecture (SOA), Grid Computing and Utility Computing

A)
Virtualization
B)
Grid Computing
C)
Utility Computing
D)
Service-Oriented Architecture

Correct Answer :   Virtualization


Explanation :

Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)

A)
In Virtualization, it is necessary to have well-compiled Multitenant.
B)
In Virtualization, we analyze the strategy problems that customer might face.
C)
It assign a logical name to a physical resource and providing a pointer to that physical resource when demanded.
D)
All of the Above

Correct Answer :   It assign a logical name to a physical resource and providing a pointer to that physical resource when demanded.


Explanation : It assign a logical name to a physical resource and providing a pointer to that physical resource when demanded is true regarding Virtualization.

A)
Service
B)
Application
C)
Deployment
D)
None of the Above

Correct Answer :   Service


Explanation :

The sort of service that the service provider provides is described by the service model. Three types of service provided are:
* Platform-as-a-Service
* Software-as-a-Service
* Infrastructure-as-a-Service

A)
Storage
B)
Security
C)
Scalability
D)
All of the Above

Correct Answer :   Security


Explanation : When your data goes to and is stored on systems that are no longer under your control, you run the risk of it being intercepted or misused by outsiders. Only an authorized user can access the save data.

A)
Scalability
B)
Virtualization
C)
Composability
D)
All of the Above

Correct Answer :   Composability


Explanation : Virtualization is achieved by creating a virtual environment of storage devices and server operating systems. Composability is the ability to build applications from component parts.

A)
Dropbox
B)
Salesforce
C)
Google Workspace
D)
All of the Above

Correct Answer :   All of the Above


Explanation : SaaS stands for Software-as-a-Service. In SaaS, the provider hosts the application and is made available to the users. Google Workspace, Dropbox, Salesforce are examples of an IaaS service.

A)
Reliability
B)
Abstraction
C)
Productivity
D)
All of the Above

Correct Answer :   Abstraction


Explanation : The abstraction layer abstracts and controls resources using a reference object, making it easier for users to transfer programs to multiple clouds. The details of system implementation from users and developers are abstracted by Cloud computing.

A)
Multitenant
B)
Deployment
C)
IT Architecture
D)
Business Architecture

Correct Answer :   Multitenant


Explanation : The Multitenant architecture offers virtual isolation among the multiple tenants. Hence, the organizations can use and customize their application as though they each have their instances running.

A)
SOA Model
B)
Virtual isolation Model
C)
Pay-per-Use model
D)
Grid Computing Model

Correct Answer :   Pay-per-Use model


Explanation : Utility computing is based on Pay-per-Use model.

A)
It offers computational resources on demand as a metered service.
B)
It is possible to exchange the data between applications of different vendors without additional programming
C)
Service-Oriented Architecture helps to use applications as a service for other applications
D)
Both (B) and (C)

Correct Answer :   Both (B) and (C)


Explanation : Service-Oriented Architecture helps to use applications as a service for other applications regardless the type of vendor, product or technology. Therefore, it is possible to exchange the data between applications of different vendors without additional programming or making changes to services.

A)
heterogeneous dispersed.
B)
geographically dispersed.
C)
Both (A) and (B)
D)
None of the Above

Correct Answer :   Both (A) and (B)


Explanation : These computer resources are heterogeneous and geographically dispersed.

A)
AbiCloud
B)
BMC Cloud Computing Initiative
C)
Amazon CloudWatch
D)
None of the Above

Correct Answer :   BMC Cloud Computing Initiative


Explanation : BMC Cloud Computing Initiative is used for Cloud planning, lifecycle management, optimization, and guidance.

A)
CA Cloud Insight
B)
CA Cloud Optimize
C)
CA Cloud Compose
D)
CA Cloud Orchestrate

Correct Answer :   CA Cloud Orchestrate


Explanation : CA Cloud Insight is a cloud metrics measurement service.

A)
Utility Computing
B)
Virtualization
C)
SOA
D)
Grid Computing

Correct Answer :   Utility Computing


Explanation : Cloud computing, grid computing, and managed IT services are based on the concept of utility computing.

A)
SOA
B)
Grid Computing
C)
Virtualization
D)
Utility Computing

Correct Answer :   Grid Computing


Explanation : Grid Computing refers to distributed computing, in which a group of computers from multiple locations are connected with each other to achieve a common objective.

A)
combine smaller task into complex task
B)
subscription tier play vital role in Grid Computing
C)
breaks complex task into smaller pieces
D)
None of the Above

Correct Answer :   breaks complex task into smaller pieces


Explanation : Grid Computing breaks complex task into smaller pieces, which are distributed to CPUs that reside within the grid.

A)
Cloud Bursting
B)
Cloud Servicing
C)
Cloud Provisioning
D)
All of the Above

Correct Answer :   Cloud Bursting


Explanation : Most systems built to perform cloud bursting have a simple underlying design.

A)
Elasticity
B)
Low barrier to entry
C)
Utility type of delivery
D)
All of the Above

Correct Answer :   All of the Above


Explanation : These attributes change how applications are created, priced, and delivered.

A)
Low touch
B)
High touch
C)
Moderate touch
D)
All of the Above

Correct Answer :   Low touch


Explanation : The “high touch” applications that come with high margins require committed resources and pose more of a risk.

A)
IaaS
B)
PaaS
C)
CaaS
D)
All of the Above

Correct Answer :   PaaS


Explanation : When the service requires the client to use a complete hardware/software/application stack, it is using the most refined and restrictive service model.

A)
Reliability
B)
Scalability
C)
Elasticity
D)
None of the Above

Correct Answer :   Elasticity


Explanation : You have the ability to right-size resources as required.

A)
Pooling
B)
Leading
C)
Virtualization
D)
All of the Above

Correct Answer :   Pooling


Explanation : The virtualization of pooled resources—processors or compute engines, storage, and network connectivity—optimizes these investments and allows the cloud provider to pass along these economies to customers.

A)
fab
B)
rep
C)
touch
D)
All of the Above

Correct Answer :   fab


Explanation : Companies such as TSMC (Taiwan Semiconductor Manufacturing Company) have come along that provides fabrication based on customer designs, spreading their risk and optimizing their operation.

A)
2
B)
5
C)
7
D)
10

Correct Answer :   10


Explanation : Joe Weinman of AT&T Global Services has concisely stated the advantages that cloud computing offers over a private or captured system.

A)
sniffers
B)
botnets
C)
trojan horse
D)
All of the Above

Correct Answer :   botnets


Explanation : Superiority in numbers is the most important factor in the result of combat.

A)
1+(1-r)n
B)
1-(1+r)n
C)
1-(1-r)n
D)
All of the Above

Correct Answer :   1-(1-r)n


Explanation : Therefore, when a datacenter achieves a reliability of 99 percent, two redundant data centers have a reliability of 99.99 percent (four nines) and three redundant data centers can achieve a reliability of 99.9999 percent (six nines).

A)
Compliance
B)
Data Privacy
C)
Accounting Management
D)
All of the Above

Correct Answer :   Accounting Management


Explanation : For cloud computing, the pay-as-you-go usage model allows for costs to be applied to individual accounts directly.

A)
Data Privacy
B)
Compliance
C)
Accounting Management
D)
All of the Above

Correct Answer :   Data Privacy


Explanation : To ensure data privacy in the cloud, additional security methods such as private encryption, VLANs, firewalls, and local storage of sensitive data are necessary.

A)
Low
B)
High
C)
Licensed
D)
Variable but under control

Correct Answer :   Variable but under control


Explanation : For private systems, any monitoring system the organization wishes to deploy can be brought to bear.

A)
shards
B)
tenants
C)
replicas
D)
All of the Above

Correct Answer :   tenants


Explanation : Clouds often have higher reliability than private systems.

A)
CLOUD
B)
CCLOUD
C)
CostCLOUD
D)
All of the Above

Correct Answer :   CostCLOUD


Explanation : The CostDATACENTER consists of the summation of the cost of each of the individual systems with all the associated resources.

A)
CostDATACENTER = 1nΣ(UnitCostDATACENTER / (Revenue –(CostDATACENTER/Utilization))SYSTEMn
B)
CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue –(CostDATACENTER/Utilization))SYSTEMn
C)
CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue +(CostDATACENTER/Utilization))SYSTEMn
D)
All of the Above

Correct Answer :   CostDATACENTER = 1nΣ(UnitCostDATACENTER x (Revenue –(CostDATACENTER/Utilization))SYSTEMn


Explanation : Sum includes terms for System 1, System 2, System 3, and so on.

A)
IT
B)
Non IT
C)
Data Center
D)
All of the Above

Correct Answer :   IT


Explanation : It is not uncommon for the burden cost of a system in a datacenter to be 150 percent of the cost of the system itself.

A)
Dex
B)
Pex
C)
OpEx
D)
All of the Above

Correct Answer :   OpEx


Explanation : The conversion of real assets to virtual ones provides a measure of protection against too much or too little infrastructure.

A)
Capitalization
B)
Proposition
C)
Globalization
D)
None of the Above

Correct Answer :   Capitalization


Explanation : Capitalization may be the single largest reason that new businesses fail.

A)
COT
B)
TCO
C)
TOC
D)
All of the Above

Correct Answer :   TCO


Explanation : TCO stands for Total Cost of Ownership.

A)
EC
B)
EC2
C)
AWS
D)
Azure

Correct Answer :   Azure


Explanation : A better metric for enterprises is captured by a Return on Investment or ROI calculation.

A)
Service
B)
Application
C)
Deployment
D)
All of the Above

Correct Answer :   Service


Explanation : In the early days of cloud computing, all SLAs were negotiated between a client and the provider.

A)
5
B)
4
C)
3
D)
2

Correct Answer :   2


Explanation : We can broadly divide the cloud architecture into two parts : Front End and Back End

A)
virtualization and event-driven architecture.
B)
utility computing and event-driven architecture.
C)
service-oriented architecture and grid computing
D)
service-oriented architecture and event-driven architecture.

Correct Answer :   service-oriented architecture and event-driven architecture.


Explanation : Cloud computing architecture is a combination of service-oriented architecture and event-driven architecture.

A)
Back End
B)
Front End
C)
Infrastructure
D)
Management

Correct Answer :   Front End


Explanation : The front end refers to the client part of cloud computing system. It consists of interfaces and applications that are required to access the cloud computing platforms.

A)
Web Browser.
B)
Cisco Metapod
C)
Amazon Web Services
D)
Google Compute Engine

Correct Answer :   Web Browser.


Explanation : Web browser is the example of Front End.

A)
scalability
B)
virtualization
C)
composability
D)
all of the above

Correct Answer :   composability


Explanation : Composability is the ability to build applications from component parts.

A)
model
B)
service
C)
platform
D)
all of the above

Correct Answer :   platform


Explanation : Virtual appliances are an important example of a platform.

A)
cloud
B)
hardware
C)
database
D)
all of the above

Correct Answer :   hardware


Explanation : It is a highly desirable characteristic from a developer or user’s standpoint.

A)
XML
B)
JSON
C)
BSON
D)
All of the Above

Correct Answer :   XML


Explanation : Cloud computing builds on the architecture developed for staging large distributed network applications on the Internet.

A)
XML
B)
HTML
C)
SOAP
D)
WSDL

Correct Answer :   WSDL


Explanation : WSDL is an XML format for describing network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information.

A)
Soft
B)
Client
C)
Cloud
D)
All of the Above

Correct Answer :   cloud


Explanation : The cloud creates a system where resources can be pooled and partitioned as needed.

A)
Warranties
B)
Response times
C)
Responsibilities of each party
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Some SLAs are enforceable as contracts.

A)
EUL
B)
EULA
C)
ELA
D)
All of the Above

Correct Answer :   EULA


Explanation : EULA stands for End User License Agreement.

A)
Carbonite
B)
CarbonT
C)
Karbonite
D)
None of the Above

Correct Answer :   Carbonite


Explanation : Cloud computing applications rarely use machine licenses when the application is meant to be ubiquitous.

A)
User
B)
Client
C)
Stackholders
D)
Service provider

Correct Answer :   Service provider


Explanation : The back end is used by the service provider. It manages all the resources that are required to provide cloud computing services.

A)
Storage
B)
Service
C)
Security
D)
Application

Correct Answer :   Security


Explanation : Security is an in-built back end component of cloud computing. It implements a security mechanism in the back end.

A)
Client
B)
Server
C)
Application
D)
Client Infrastructure

Correct Answer :   Client Infrastructure


Explanation : Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with the cloud.

A)
Scalable
B)
Composable
C)
Reliable
D)
None of the Above

Correct Answer :   composable


Explanation : Applications built in the cloud often have the property of being built from a collection of components, a feature referred to as composability.

A)
stateless
B)
stateful
C)
symmetric
D)
all of the above

Correct Answer :   stateless


Explanation : A transaction is executed without regard to other transactions or requests.

A)
PaaS
B)
CaaS
C)
AaaS
D)
IaaS

Correct Answer :   IaaS


Explanation : Because those customers are almost certainly deploying applications built on standard operating systems such as Linux, Windows, Solaris, or some other well-known operating system.

A)
AaaS
B)
PaaS
C)
SaaS
D)
CaaS

Correct Answer :   SaaS


Explanation : Modifications are generally severely limited.

A)
AaaS
B)
CaaS
C)
PaaS
D)
IaaS

Correct Answer :   IaaS


Explanation : Most large Infrastructure as a Service (IaaS) providers rely on virtual machine technology that can run applications.

A)
VGM
B)
VMM
C)
VMC
D)
All of the Above

Correct Answer :   VMM


Explanation : VMM component is also called hypervisor.

A)
virtual appliances
B)
virtual server
C)
machine imaging
D)
all of the above

Correct Answer :   virtual appliances


Explanation : The name virtual appliance is a little misleading because it conjures up the image of a machine that serves a narrow purpose.

A)
Xen
B)
Ken
C)
Ben
D)
Zen

Correct Answer :   Xen


Explanation : You run across virtual appliances in IaaS systems such as Amazon’s Elastic Compute Cloud.

A)
Jcinacio
B)
HelpdeskLive
C)
Bagvapp
D)
All of the Above

Correct Answer :   Bagvapp


Explanation : Virtual appliances have begun to affect the PC industry in much the same way that application stores have affected the cell phone industry.

A)
Vmachines
B)
VirtualBox
C)
ThoughtPolice
D)
None of the Above

Correct Answer :   VirtualBox


Explanation : VirtualBox serves as a host for a variety of virtual appliances.

A)
WS-SOAP
B)
WS-Agent
C)
WS-Discovery
D)
All of the Above

Correct Answer :   WS-Discovery


Explanation : WS-Discovery stands for Web Services Dynamic Discovery specification.

A)
Workload
B)
Workunit
C)
Workspace
D)
All of the Above

Correct Answer :   Workload


Explanation : A workload simulates the ability of a certain type of real or physical server to do any amount of work.

A)
Hotspot
B)
Hotspot VPN
C)
AnchorFree Hotspot Shield
D)
Gbridge

Correct Answer :   Gbridge


Explanation : Gbridge is an interesting solution that illustrates the use of VPN over a cloud connection.

A)
AaaS
B)
CaaS
C)
PaaS
D)
SaaS

Correct Answer :   SaaS


Explanation : An SaaS vendor such as Quicken.com or Salesforce.com is delivering an application as a service to a customer.

A)
REST
B)
SOAP
C)
RESTful
D)
None of the Above

Correct Answer :   SOAP


Explanation : There are alternative sets of standards as well.

A)
Harvera Tablet OS
B)
Fedora Netbook OS
C)
Jolicloud Netbook OS
D)
None of the Above

Correct Answer :   Jolicloud Netbook OS


Explanation : Jolicloud concentrates on building a social platform with automatic software updates and installs.

A)
CCS
B)
CSC
C)
CSS
D)
All of the Above

Correct Answer :   CCS


Explanation : Pods are managed by a Cloud Control System (CCS).

A)
Availability
B)
Unavail
C)
Restricted
D)
None of the Above

Correct Answer :   Availability


Explanation : In very large cloud computing networks, when systems fail, they fail on a pod-by-pod basis, and often on a zone-by-zone basis.

A)
IaaS
B)
CaaS
C)
SaaS
D)
PaaS

Correct Answer :   PaaS


Explanation : The difficulty with PaaS is that it locks the developer (and the customer) into a solution that is dependent upon the platform vendor.

A)
Amazon
B)
Google
C)
Microsoft
D)
All of the Above

Correct Answer :   Google


Explanation : Google offers many of its Web service applications to customers as part of this service model.

A)
Gmail
B)
Google Earth
C)
Google Maps
D)
All of the Above

Correct Answer :   Google Maps


Explanation : The vendor of the PaaS solution is in most cases the developer, who is offering a complete solution to the customer.

A)
IaaS
B)
SaaS
C)
PaaS
D)
All of the Above

Correct Answer :   IaaS


Explanation : The IaaS service provider manages all the infrastructure, while the client is responsible for all other aspects of the deployment.

A)
IaaS
B)
PaaS
C)
SaaS
D)
All of the Above

Correct Answer :   IaaS


Explanation : Unlike other cloud providers, Rackspace only offers managed solutions.

A)
IaaS
B)
CaaS
C)
PaaS
D)
SaaS

Correct Answer :   SaaS


Explanation : The most complete cloud computing service model is one in which the computing hardware and software, as well as the solution itself, are provided by a vendor as a complete service offering.

A)
Data escrow
B)
User Interaction
C)
Adoption drivers
D)
None of the Above

Correct Answer :   User Interaction


Explanation : With the exception of the user interaction with the software, all other aspects of the service are abstracted away.

A)
IaaS
B)
CaaS
C)
SaaS
D)
PaaS

Correct Answer :   SaaS


Explanation : Salesforce.com extended its SaaS offering to allow developers to create add-on applications.

A)
Open Tech Alliance
B)
Open Mashup Alliance
C)
Open Alliance Apache
D)
None of the Above

Correct Answer :   Open Mashup Alliance


Explanation : This group predicts that the use of mashups will grow by a factor of 10 within just a few years.

A)
digital identity
B)
identity
C)
mashup
D)
all of the above

Correct Answer :   digital identity


Explanation : A digital identity is those attributes and metadata of an object along with a set of relationships with other objects that makes an object identifiable.

A)
Internet Hardware Addresses
B)
Internet Software Addresses
C)
Ethernet Software Addresses
D)
Ethernet Hardware Addresses

Correct Answer :   Ethernet Hardware Addresses


Explanation : Network interfaces are identified uniquely by Media Access Control (MAC) addresses, which alternatively are referred to as Ethernet Hardware Addresses.

A)
OpenID
B)
OpenSSD
C)
OpenUser
D)
None of the Above

Correct Answer :   OpenID


Explanation : When an identity is created in an OpenID system, that information is stored in the system of any OpenID service provider and translated into a unique identifier.

A)
SML
B)
XACML
C)
SPML
D)
All of the Above

Correct Answer :   SPML


Explanation : SPML is an XML request/response language that is used to integrate and interoperate service provisioning requests.

A)
IHA
B)
CardSpace
C)
EHA
D)
None of the Above

Correct Answer :   CardSpace


Explanation : CardSpace was introduced with .NET Frameworks 3.0 and can be installed on Windows XP, Server 2003, and later.

A)
FedCloud
B)
ClearPoint PCI
C)
Rackserve PCI
D)
All of the Above

Correct Answer :   All of the Above


Explanation : It’s much easier to envisage a CaaS system built inside a private cloud where the data is under the control of a single entity.

A)
IaaS
B)
AaaS
C)
SaaS
D)
CaaS

Correct Answer :   CaaS


Explanation : A CaaS would need to be able to manage cloud relationships, understand security policies and procedures.

A)
Software
B)
Platform
C)
Analytics
D)
Compliance

Correct Answer :   Software


Explanation : Most of the cloud computing compliance systems to date have been built using private clouds.

A)
FedCloud
B)
ClearSoln
C)
Rackserve PCI
D)
All of the Above

Correct Answer :   Rackserve PCI


Explanation : FedCloud is used for government.

A)
Platform
B)
Analytics
C)
Software
D)
Compliance

Correct Answer :   Platform


Explanation : Service types are models upon which distributed applications are created and hosted.

A)
CPU
B)
Storage
C)
Application
D)
All of the Above

Correct Answer :   All of the Above


Explanation : To enable these characteristics, resources must be highly configurable and flexible.

A)
load scheduling
B)
load balancing
C)
load performing
D)
all of the above

Correct Answer :   load balancing


Explanation : Load balancing is an optimization technique.

A)
F6’s BigIP
B)
Apache mod_balancer
C)
Apache mod_proxy_balancer
D)
All of the Above

Correct Answer :   Apache mod_proxy_balancer


Explanation : Load balancing can be used to increase utilization and throughput, lower latency, reduce response time, and avoid system overload.

A)
ADC
B)
ABC
C)
ACD
D)
All of the Above

Correct Answer :   ADC


Explanation : An Application Delivery Controller is assigned a virtual IP address (VIP) that maps to a pool of servers based on application specific criteria.

A)
Storage
B)
Software
C)
Network
D)
None of the Above

Correct Answer :   Network


Explanation : The key feature that makes virtual infrastructure so appealing for organizations implementing a cloud computing solution is flexibility.

A)
Network
B)
Software
C)
Hardware
D)
Storage

Correct Answer :   Storage


Explanation : Block-based storage such as those used in SANs use a feature called a Logical Unit Identifier (LUN) with specific addresses stored in the form of an offset called the Logical Block Address (LBA).

A)
IMI
B)
AMI
C)
EMI
D)
Application Services

Correct Answer :   AMI


Explanation : AMI stands for Amazon Machine Image.

A)
Certeon
B)
Replify
C)
Expand Networks
D)
None of the Above

Correct Answer :   Certeon


Explanation : Most virtual appliances are used to run a single application and are configurable from a Web page.

A)
PHP
B)
Scala
C)
HTML
D)
Python

Correct Answer :   PHP


Explanation : Other methods may be needed to make applications easily portable.

A)
client
B)
application
C)
virtualization
D)
none of the above

Correct Answer :   virtualization


Explanation : The running application in AppZero changes none of the registry entries or any of the files on the Windows Server.

A)
Amazon EC2
B)
Google EC
C)
Microsoft Hyper
D)
Microsoft App-V

Correct Answer :   Microsoft App-V


Explanation : Installations can be done over the network after the AppZero application appliance is installed.

A)
vCube
B)
vSphere
C)
HyperCube
D)
All of the Above

Correct Answer :   vSphere


Explanation : vSphere can create virtual machines, virtual datastores, and virtual networks, and move these resources about while the system is active.

A)
system hypervisor
B)
software hypervisor
C)
hardware hypervisor
D)
virtualization hypervisor

Correct Answer :   virtualization hypervisor


Explanation : The program which provide partitioning, isolation or abstraction is called virtualization hypervisor.

A)
VMM
B)
VMS
C)
VMA
D)
VMR

Correct Answer :   VMM


Explanation : A hypervisor is sometimes also called a virtual machine manager(VMM).

A)
4
B)
3
C)
2
D)
1

Correct Answer :   2


Explanation : TYPE-1 Hypervisor and TYPE-2 Hypervisor.

A)
Native Hypervisor
B)
Bare metal hypervisor
C)
Hosted Hypervisor
D)
Both (A) and (B)

Correct Answer :   Both (A) and (B)


Explanation : Hypervisor runs directly on underlying host system.It is also known as "Native Hypervisor" or "Bare metal hypervisor".

A)
DISPATCHER
B)
INTERPRETER
C)
TYPE-1 Hypervisor
D)
TYPE-2 Hypervisor

Correct Answer :   TYPE-2 Hypervisor


Explanation : Example of Type 2 hypervisor include VMware Player or Parallels Desktop. Hosted hypervisors are often found on endpoints like PCs.

A)
INTERPRETER
B)
DISPATCHER
C)
TYPE-2 Hypervisor
D)
None of the Above

Correct Answer :   DISPATCHER


Explanation : Whenever virtual machine tries to execute an instruction that results in changing the machine resources associated with the virtual machine, the allocator is invoked by the dispatcher.

A)
Dispatcher
B)
Allocator
C)
Interpreter
D)
None of the Above

Correct Answer :   Dispatcher


Explanation : The dispatcher behaves like the entry point of the monitor and reroutes the instructions of the virtual machine instance to one of the other two modules.

A)
VMware Player
B)
VMware ESXi
C)
Citrix XenServer
D)
Microsoft Hyper-V hypervisor

Correct Answer :   VMware Player


Explanation : VMware Player is and example of Type 2 hypervisor.

A)
same
B)
similar
C)
different
D)
none of the above

Correct Answer :   different


Explanation : With capacity, you are concerned about how much work a system can do, whereas with performance, you are concerned with the rate at which work gets done.

A)
WAMP
B)
LAMP
C)
XAMPP
D)
None of the Above

Correct Answer :   LAMP


Explanation : On Amazon Web Services, machine instances are offered for both Red Hat Linux and for Ubuntu.

A)
DB2
B)
BigData
C)
SQL Server
D)
MySQL

Correct Answer :   MySQL


Explanation : MySQL is the database server developed by the Swedish company MySQL AB, owned by Oracle Corporation through its acquisition of Sun Microsystems.

A)
Sar
B)
Sav
C)
Sep
D)
None of the Above

Correct Answer :   Sar


Explanation : sar is installed in Linux as part of the sysstat package.

A)
Ganglia
B)
Dstat
C)
GraphClick
D)
None of the Above

Correct Answer :   Ganglia


Explanation : GraphClick is a digitizer that can create a graph from an image.

A)
Zabbix
B)
ZenOSS
C)
SiteUpTime
D)
All of the above

Correct Answer :   ZenOSS


Explanation : ZenOSS is used to monitor operations.

A)
Small Instance
B)
Micro Instance
C)
High-Memory Quadruple Extra Large Instance
D)
High-CPU Extra Large Instance

Correct Answer :   High-Memory Quadruple Extra Large Instance


Explanation : I/O Performance is high and API name is m2.4xlarge.

A)
Small Instance
B)
Micro Instance
C)
High-CPU Extra Large Instance
D)
High-Memory Quadruple Extra Large Instance

Correct Answer :   Small Instance


Explanation : Small Instance has 1.7GB memory and 1 EC2 compute unit.

A)
Small Instance
B)
Micro Instance
C)
High-CPU Extra Large Instance
D)
High-Memory Quadruple Extra Large Instance

Correct Answer :   High-CPU Extra Large Instance


Explanation : High-CPU Extra Large Instance has 7GB of memory and 20 EC2 Compute Units.

A)
Contact
B)
Consistency
C)
Both (A) and (B)
D)
Configuration

Correct Answer :   Configuration


Explanation : Your management responsibilities depend on the particular service model for your cloud deployment.

A)
FrameIt
B)
RackStar
C)
Unicenter
D)
None of the Above

Correct Answer :   None of the Above


Explanation : No single package provides all five elements of FCAPS.

A)
Windows Live Hotmail
B)
IBM Tivoli Service Automation Manager
C)
Google Service Automation Manager
D)
Microsoft Tivoli Service Automation Manager

Correct Answer :   IBM Tivoli Service Automation Manager


Explanation : Tivoli Service Automation Manager lets you create and stage cloud-based servers.

A)
WMI
B)
SNMP
C)
CMDB
D)
All of the Above

Correct Answer :   All of the Above


Explanation : WMI stands for Windows Management Instrumentation (WMI).

A)
Intune
B)
Utunes
C)
Outtunes
D)
Windows Live Hotmail

Correct Answer :   Intune


Explanation : The management services include an Operations Manager, the Windows Service Update Service (WSUS), a Configuration Manager for asset management, a Data Protection Manager, and a Virtual Machine Manager, among other components.

A)
Hyperic
B)
RightScale
C)
Internetseer
D)
All of the Above

Correct Answer :   Hyperic


Explanation : Internetseer is a Web site monitoring service.

A)
EBS
B)
DMS
C)
DMTF
D)
All of the Above

Correct Answer :   DMTF


Explanation : DMTF stands for Distributed Management Task Force.

A)
Elastra
B)
Dell Scalent
C)
CloudKick
D)
All of the Above

Correct Answer :   Dell Scalent


Explanation : OVF is essentially a container and a file format.

A)
Auditing
B)
Logging
C)
Regulatory Compliance
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Logging, auditing, and regulatory compliance are all features that require planning in cloud computing systems.

A)
Multi-Tenancy
B)
Virtualization
C)
Identity and access management
D)
All of the Above

Correct Answer :   Multi-Tenancy


Explanation : Multi-tenancy adds a number of additional security concerns to cloud computing that need to be accounted for.

A)
Webmetrics
B)
Univa UD
C)
Tapinsystems
D)
VMware Hyperic

Correct Answer :   Univa UD


Explanation : Tapinsystems is provisioning and management service.

A)
IaaS
B)
SaaS
C)
PaaS
D)
All of the Above

Correct Answer :   PaaS


Explanation : In the PaaS model, the customer would be responsible for the security of the application and UI at the top of the stack.

A)
SaaS
B)
IaaS
C)
PaaS
D)
All of the Above

Correct Answer :   SaaS


Explanation : Compliance, governance, and liability levels are stipulated under the contract for the entire stack

A)
Computing Planning
B)
Cloud Computing Technologies
C)
Cloud infrastructure
D)
Cloud Computing Architecture

Correct Answer :   Cloud infrastructure


Explanation : Cloud infrastructure consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization.

A)
Server
B)
Storage
C)
Network
D)
Hypervisor

Correct Answer :   Hypervisor


Explanation : Hypervisor is a firmware that acts as a Virtual Machine Manager.

A)
simple program
B)
low-level program
C)
high-level program
D)
complex program

Correct Answer :   low-level program


Explanation : Hypervisor is a firmware or low-level program that acts as a Virtual Machine Manager. It allows to share the single physical instance of cloud resources between several tenants.

A)
It helps to deploy and integrate the application on the cloud.
B)
It helps to maintain and configure the infrastructure.
C)
Both (A) and (B)
D)
None of the Above

Correct Answer :   It helps to maintain and configure the infrastructure.


Explanation : Management Software : It helps to maintain and configure the infrastructure.

A)
lose the keys
B)
lose the account
C)
lose the encryption standard
D)
All of the Above

Correct Answer :   lose the keys


Explanation : Keys should have a defined life cycle.

A)
Logging
B)
Integrity checking
C)
Consistency checking
D)
None of the Above

Correct Answer :   Logging


Explanation : Cloud service providers often have proprietary log formats.

A)
Auditing
B)
Logging
C)
Regulatory compliance
D)
None of the Above

Correct Answer :   Regulatory compliance


Explanation : For any company with clients in multiple countries, the burden of regulatory compliance is onerous.

A)
Maintaining user roles
B)
Preventing unauthorized uses
C)
Controlling access to data in the cloud
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Identity management is a primary mechanism for controlling access to data in the cloud, preventing unauthorized uses, maintaining user roles, and complying with regulations.

A)
SMAL
B)
CHAP
C)
OpenID 2.0
D)
None of the Above

Correct Answer :   OpenID 2.0


Explanation : Some cloud service providers have adopted OpenID as a service.

A)
CHAP
B)
SMAL
C)
OpenSSL
D)
None of the Above

Correct Answer :   SMAL


Explanation : Taken as a unit, OpenID and SAML are being positioned to be the standard authentication mechanism for clients accessing cloud services.

A)
Windows Identity
B)
Windows Workflow
C)
Windows compliance
D)
None of the Above

Correct Answer :   Windows Identity


Explanation : ASP.NET Web applications created with WIF integrate the Windows Communication Foundation SOAP service (WCF-SOAP) into a unified object model.

A)
Server
B)
Storage
C)
Network
D)
Software

Correct Answer :   Server


Explanation : The server helps to compute the resource sharing and offers other services such as resource allocation and de-allocation, monitoring the resources, providing security etc.

A)
Utility
B)
Elasticity
C)
Reliability
D)
Scalability

Correct Answer :   Scalability


Explanation : This feature obviates the need for planning and provisioning.

A)
Compliance
B)
Windows NT
C)
Sun Solaris
D)
Windows XP

Correct Answer :   Sun Solaris


Explanation : This type of virtualization creates virtual servers at the operating system or kernel level.

A)
Public
B)
Hybrid
C)
Private/Community
D)
None of the Above

Correct Answer :   Private/Community


Explanation : Cloud computing has a tendency to blur the location of the defined security perimeter in such a way that the previous notions of network firewalls and edge defenses often no longer apply.

A)
OCP
B)
OCC
C)
OPC
D)
PCO

Correct Answer :   OCC


Explanation : OCC is comprised of several universities and interested companies.

A)
Provide testbeds that vendors can use to test their applications
B)
Develop benchmarks for measuring cloud computing performance
C)
Support the development of open-source reference implementations for cloud computing
D)
All of the Above

Correct Answer :   All of the Above


Explanation : The Working Group on Standards and Interoperability For Large Data Clouds extends the architecture for data storage with a distributed file system.

A)
OSCP
B)
OSCDP
C)
OSCD
D)
All of the Above

Correct Answer :   OSCDP


Explanation : OSCDP stands for Open Science Data Cloud.

A)
Carbonite backup
B)
Google’s Gmail email
C)
Twitter’s Instant Messaging
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Applications of those types have less of a need for the flexibility and loose coupling that SOA provides.

A)
Web 2.0
B)
Web 3.0
C)
Web 4.0
D)
Web 5.0

Correct Answer :   Web 2.0


Explanation : Web 2.0 is an acronym coined by Tim O’Reilly.

A)
DTD
B)
XSLT
C)
XMLHttpRequest
D)
None of the Above

Correct Answer :   XMLHttpRequest


Explanation : AJAX stands for Asynchronous JavaScipt and XML.

A)
orchestrator
B)
coordinator
C)
conductor
D)
all of the above

Correct Answer :   orchestrator


Explanation : orchestrator is the central controlling service element.

A)
1.0
B)
2.0
C)
3.0
D)
4.0

Correct Answer :   2.0


Explanation : SOA 2.0 can allow low-level events to trigger a business process, correlate events with the information contained in the SOA design.

A)
XML
B)
CEV
C)
HTML
D)
CVE

Correct Answer :   CVE


Explanation : The CVE application provides the same kind of heartbeat and correlation functionality that a stock trading application does.

A)
Causal Valuable Engine
B)
Continuous Vector Engine
C)
Causal Vector Engine
D)
None of the Above

Correct Answer :   Causal Vector Engine


Explanation : Many CVE systems display events in a console in different contexts so that an observer can analyze the display and take appropriate actions.

A)
1
B)
2
C)
3
D)
4

Correct Answer :   2


Explanation : Two main methods are used to combine Web services: orchestration and choreography.

A)
ACID
B)
ATOM
C)
BASE
D)
All of the Above

Correct Answer :   ACID


Explanation : In computer science, ACID (Atomicity, Consistency, Isolation, Durability) is a set of properties that guarantee that database transactions are processed reliably.

A)
Isolation
B)
Atomicity
C)
Consistency
D)
All of the Above

Correct Answer :   All of the Above


Explanation : The ACID principle is used today by any application that is reading and writing to a stored data set.

A)
Isolation
B)
Atomicity
C)
Durability
D)
Consistency

Correct Answer :   Consistency


Explanation : The ACID rules were developed by Jim Gray to apply to database technology in the late 1970s.

A)
Isolation
B)
Durability
C)
Atomicity
D)
Consistency

Correct Answer :   Atomicity


Explanation : The isolation property states that the system cannot have other transactions operate on data that is currently being processed by a transaction.

A)
Accounting
B)
Core Services
C)
Application support
D)
All of the Above

Correct Answer :   Core Services


Explanation : Accounting is second level attribute in accordance with Core services.

A)
Deployment technology
B)
Development environment
C)
Programming language support
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Testing and application attribute is also considered second level cloud attribute for platform features.

A)
Part of the application is on a local system, and part is in the cloud
B)
Complete part of the application is on local system
C)
Complete part of the application is on local system
D)
None of the Above

Correct Answer :   Part of the application is on a local system, and part is in the cloud


Explanation : Each cloud platform also has its own set of attributes that need to be mapped.

A)
Cloud bursting
B)
Cloud servicing
C)
Cloud provisioning
D)
All of the Above

Correct Answer :   Cloud bursting


Explanation : Most systems built to perform cloud bursting have a simple underlying design.

A)
Storage
B)
Applications
C)
Database
D)
Infrastructure

Correct Answer :   Database

A)
Cloud Attributes
B)
Application Attributes
C)
Service Attributes
D)
All of the Above

Correct Answer :   Application Attributes


Explanation : To support the application’s data access, you may also be faced with building a synchronization or replication feature, which adds more overhead to the application.

A)
Configuring
B)
Monitoring
C)
Screening
D)
Availability

Correct Answer :   Availability


Explanation : Availability defines the proportion of time that the system is functional and working.

A)
Caching
B)
Expertise
C)
Fault management
D)
Geographic location

Correct Answer :   Expertise


Explanation : Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth.

A)
Staging
B)
Index
C)
Portability
D)
Data exchange

Correct Answer :   Staging


Explanation : Staging is second level attribute in relation to scalability.

A)
Costs
B)
Application
C)
Maintenance
D)
User interface

Correct Answer :   Maintenance


Explanation : Deconstructing an application’s critical functionality is only half the process.

A)
Costs
B)
Uptime
C)
Reliability
D)
Resource access

Correct Answer :   Costs


Explanation : Cost is influenced by the development and resources attribute.

A)
Replication
B)
Abstraction
C)
Authentication
D)
All of the Above

Correct Answer :   Authentication


Explanation : The cloud API contains the authentication and authorization mechanisms needed to access cloud services.

A)
Deltacloud
B)
Design Cloud
C)
Simple Cloud API
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Efforts are underway to create more standardized cloud APIs.

A)
RimuHosting
B)
VMWare vCloud
C)
Racksapce Cloud Servers
D)
Racksapce Cloud Servers

Correct Answer :   Racksapce Cloud Servers


Explanation : Individual services such as Windows Azure SQL, Flickr, and Google Maps present a service cloud API.

A)
Unavailable
B)
Managed
C)
Unmanaged
D)
All of the Above

Correct Answer :   Managed


Explanation : Cloud storage can be either unmanaged or managed.

A)
Formatting
B)
Partitioning
C)
Replicating data
D)
All of the Above

Correct Answer :   Formatting


Explanation : Applications using unmanaged cloud storage are Software as a Service (SaaS) Web services.

A)
Managed
B)
UnAvailable
C)
Unmanaged
D)
All of the Above

Correct Answer :   Unmanaged


Explanation : Most user-oriented software such as file-sharing and backup consume unmanaged cloud storage.

A)
Platform independence
B)
Reduced maintenance costs
C)
Generally lower costs for users
D)
An Internet connection is required to access your documents

Correct Answer :   An Internet connection is required to access your documents


Explanation : Some cloud-based applications now offer what is called an “offline” mode so you can work on documents on your local system when an Internet connection is not available.

A)
Gpdf
B)
Openoffice
C)
Acrobat.com
D)
All of the Above

Correct Answer :   Acrobat.com


Explanation : Adobe’s offerings on Acrobat.com are centered around preparing documents, manipulating graphics, and publishing the results.

A)
ConnectNow
B)
Buzzword
C)
Create Sheet
D)
All of the Above

Correct Answer :   Buzzword


Explanation : Buzzword is strong in graphical capabilities.

A)
Pdf
B)
Audio
C)
Word
D)
All of the Above

Correct Answer :   Audio


Explanation : Workspaces do not support audio or video file types.

A)
Glide Digital
B)
Safari
C)
TransMedia
D)
All of the Above

Correct Answer :   Glide Digital


Explanation : Glide is compatible with Internet Explorer, Firefox, Chrome, and Safari.

A)
Gdrive
B)
GDocs
C)
Google Docs
D)
None of the Above

Correct Answer :   Google Docs


Explanation : Google Docs is supported on Linux, Macintosh OS X, and Microsoft Windows, as well as on Android and iPhone mobile phones.

A)
AJAX
B)
BASIC
C)
COBOL
D)
All of the Above

Correct Answer :   AJAX


Explanation : Microsoft’s Office Web Apps are online slimmed-down versions of the Microsoft Office suite.

A)
TransMedia
B)
Office Live Container
C)
Both (A) and (B)
D)
Office Live Workspace

Correct Answer :   Office Live Workspace


Explanation : The fundamental feature of the service is the ability to store and share documents online.

A)
Calc
B)
Note
C)
Write
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Through the use of the Power Edit applet for Write, Calc, and Show, a history of document versions is retained.

A)
ThinkFree Slide
B)
ThinkFree Docs
C)
ThinkFree Note
D)
All of the Above

Correct Answer :   ThinkFree Docs


Explanation : Other users can then view the documents, spreadsheets, or presentations that are made available to them.

A)
RTF
B)
ODT
C)
SXW
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Writer supports the following standard file formats: text (TXT), Microsoft Word (DOC), RTF, Office Open XML (DOCX), OpenDocument text (ODT), OpenOffice.org text (SXW), HTML, and image files.

A)
Software
B)
Platform
C)
Infrastructure
D)
All of the Above

Correct Answer :   Software


Explanation : Webmail is differentiated from hosted email primarily by the use of browser-based client access.

A)
TTP
B)
XML
C)
TLS
D)
HTTP

Correct Answer :   TLS


Explanation : TLS stands for Transport Layer Security.

A)
RSS
B)
AJAX
C)
Javascript
D)
All of the Above

Correct Answer :   RSS


Explanation : RSS stands for Really Simple Syndication.

A)
Atom Subscribe Protocol
B)
Atom Publishing Protocol
C)
Atom Subscribing Protocol
D)
None of the Above

Correct Answer :   Atom Publishing Protocol


Explanation : Atom has some structural differences with RSS, but is similar in approach and technology.

A)
Yahoo Mail
B)
EmailRackspace
C)
Microsoft Reader
D)
Google Reader

Correct Answer :   Google Reader


Explanation : These applications are sometimes referred to as newsreaders or aggregators.

A)
IMS
B)
SMS
C)
JVS
D)
All of the Above

Correct Answer :   SMS


Explanation : Twitter is described as the prototypical example of this type of service.

A)
SM
B)
VM
C)
IM
D)
None of the Above

Correct Answer :   IM


Explanation : IM stands for instant messaging.

A)
3
B)
4
C)
5
D)
6

Correct Answer :   3


Explanation : In an effort to create an interoperability standard between different IM clients, several instant messaging protocols have been created.

A)
SIP
B)
IMPS
C)
XMPP
D)
SIMPLE

Correct Answer :   SIMPLE


Explanation : They allow their users to connect with the other services’ public users for a fee.

A)
Twitter
B)
Instagram
C)
Facebook
D)
None of the Above

Correct Answer :   Twitter


Explanation : It is sometimes referred to as the SMS of the Internet or as a form of Internet Relay Chat (IRC).

A)
SIP
B)
IMS
C)
SDP
D)
None of the Above

Correct Answer :   IMS


Explanation : IMS stands for IP Multimedia Subsystem.

A)
C2C
B)
P2P
C)
RTCP
D)
None of the Above

Correct Answer :   P2P


Explanation : Skype uses the peer-to-peer model that was based on Kazaa.

A)
File transfers
B)
Message logging
C)
Instant messaging
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Skype is perhaps the most widely used telephony application in the world.

A)
Jaspersoft
B)
QuickTime
C)
Jabber
D)
None of the Above

Correct Answer :   Jabber


Explanation : Google Voice is Google’s telephony application, which is also a VoIP service.

A)
SIP
B)
Jabber
C)
Jingle
D)
None of the Above

Correct Answer :   Jingle


Explanation : It supports communication with mobile XMPP clients such as the Nokia N900 Smartphone, Blackberry, iPhone, and Android phones.

A)
Flickr
B)
Metacafe
C)
Dailymotion
D)
All of the Above

Correct Answer :   All of the Above


Explanation : Metacafe is an entertainment site with movie trailers, TV shows, video games, and more.

A)
Netflix
B)
AOL
C)
XBox
D)
None of the Above

Correct Answer :   Netflix


Explanation : Netflix also is expected to use the cloud deployment to expand the support of other devices.

A)
1
B)
2
C)
3
D)
4

Correct Answer :   2


Explanation : Streamed material can be live or on-demand.

A)
220 MB
B)
220 GB
C)
220 TB
D)
None of the Above

Correct Answer :   220 GB


Explanation : Formula for data transfer is: MB transferred = Bandwidth x Time x Number of Users.

A)
Scaling
B)
Gathering
C)
Streaming
D)
All of the Above

Correct Answer :   Streaming


Explanation : Even if delivery is always over a WAN connection, CDN (Content Delivery Network) still offers enormous inefficiencies.

A)
iPhone
B)
Symbian
C)
Windows Mobile Phone
D)
None of the Above

Correct Answer :   iPhone


Explanation : The five major smartphone operating systems to consider are Google’s Android, Apple’s iOS (iPhone OS), RIM BlackBerry, Symbian, and Windows Mobile Phone.

A)
aol.com
B)
MSI.com
C)
Google.com
D)
Salesforce.com

Correct Answer :   Salesforce.com


Explanation : Salesforce.com’s Mobile Lite illustrates an important trend in software to extend its products as cloud services for mobile access.

A)
A smartphone comes with a touchscreen
B)
A smartphone has a recognizable operating system
C)
A smartphone offers advanced calling features such as video calls or conferencing
D)
All of the Above

Correct Answer :   A smartphone has a recognizable operating system


Explanation : Smartphones are small computers on which you can make phone calls, send messages, and access Internet data in real time.

A)
Android
B)
Symbian
C)
Windows Phone
D)
All of the Above

Correct Answer :   Android


Explanation : The Android software is based on Java and runs in a Dalvik virtual machine.

A)
2
B)
3
C)
4
D)
5

Correct Answer :   4


Explanation : MCC includes four types of cloud resources: Distant mobile cloud, Distant immobile cloud, Proximate mobile computing entities and Proximate immobile computing entities

A)
Qualcomm virtual machine
B)
Quadrangle virtual machine
C)
Dalvik virtual machine
D)
Snapdragon virtual machine

Correct Answer :   Dalvik virtual machine


Explanation : The Android software is based on Java and runs in a Dalvik virtual machine.

A)
Architectural Issues
B)
Security and Privacy
C)
Mobile Communication Congestion
D)
Live VM Migration

Correct Answer :   Live VM Migration


Explanation : Live VM Migration : It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine.

A)
GAP
B)
WAP
C)
GPRS
D)
Bluetooth

Correct Answer :   WAP


Explanation : WAP is a push mechanism for publishing Web site data that is device-specific.

A)
Variable screen sizes and resolutions
B)
Slow transmission over the connection
C)
Different methods of navigation through the interface
D)
All of the above

Correct Answer :   All of the above


Explanation : All factor needs to be addressed while working with mobile applications in the cloud.

A)
Software
B)
Hardware
C)
Hardware and Software
D)
None of the Above

Correct Answer :   Hardware and Software


Explanation : Open-system hardware and software tends to evolve more quickly than proprietary systems.

A)
SMS
B)
RMS
C)
FMS
D)
All of the Above

Correct Answer :   SMS


Explanation : SMS stands for Short Message System.

A)
Solaris
B)
Symbian
C)
Android OS
D)
All of the Above

Correct Answer :   Android OS


Explanation : Open-system hardware and software tends to evolve more quickly than proprietary systems.

A)
Integrity
B)
Interoperability
C)
Scalability
D)
None of the Above

Correct Answer :   Interoperability


Explanation : One effort to make mobile devices more interoperable is the W3C Mobile Web Initiative.

A)
Create reliable websites for different devices
B)
Create individual sites within a Web site for different devices
C)
Create scalable websites for different devices
D)
None of the Above

Correct Answer :   Create individual sites within a Web site for different devices


Explanation : Content is served up to a device based on the device’s identity and content negotiation.

A)
Device Attributes
B)
Distributed Description
C)
Cloud Description
D)
Device Description

Correct Answer :   Device Description


Explanation : This repository would then be used in concert with the DDR Simple API to modify the content so screen size, markup language, and image format support are delivered to a device correctly.

A)
iDisk
B)
iWeb Publish
C)
Find My iPhone
D)
MobileMe Gallery

Correct Answer :   iDisk


Explanation : iDisk is an online storage drive that can browsed and from which items can be shared.

A)
SkyLook
B)
Skydrive
C)
Skyhook
D)
None of the Above

Correct Answer :   Skyhook


Explanation : The advantage of WPS is that there are hundreds of millions of Wi-Fi access points worldwide and they are closer to the mobile device.

A)
XPS
B)
GPS
C)
WPS
D)
All of the Above

Correct Answer :   XPS


Explanation : The system uses a large reference database of Wi-Fi access points and cell tower IDs, raw position data from each location source (a signal), and the company’s proprietary algorithm to locate the device.

A)
Pull-IMAP
B)
Push-IMAP
C)
Push-POP3
D)
All of the Above

Correct Answer :   Push-IMAP


Explanation : Push-IMAP stands for the Push extensions for Internet Message Access Protocol.

A)
B2B
B)
C2C
C)
P2P
D)
None of the Above

Correct Answer :   P2P


Explanation : The XMPP PubSub extension is how Apple creates a push service for MobileMe.