Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is cloud computing key enabling technologies?

Answer»

Which of the following is CLOUD computing key enabling technologies?
Choose the CORRECT option from below list
(1)Cloud APIS
(2)Cloud Storage
(3)All of the OPTIONS
(4)Cloud Data centers
(5)Virtualization

Answer:-(3)All of the options

2.

Which of the following options are virtualization characteristics?

Answer»

Which of the FOLLOWING options are virtualization CHARACTERISTICS?
Choose the correct option from below list
(1)Isolation
(2)All of the options
(3)ENCAPSULATION
(4)Partitioning

Answer:-(2)All of the options

3.

Better Control, higher security, and privacy can be achieved through which type of cloud deployment model?

Answer»

Better Control, higher security, and privacy can be achieved through which type of cloud deployment model?
CHOOSE the CORRECT option from below list
(1)PUBLIC
(2)COMMUNITY
(3)PRIVATE
(4)Hybrid

Answer:-(3)Private

4.

What are the security risks of cloud computing?

Answer»

What are the security RISKS of cloud computing?
Choose the correct option from below list
(1)All of the options
(2)Privileged access
(3)LONG TERM viability
(4)Data location and segregation
(5)Recovery

Answer:-(1)All of the options

5.

Which of the following cloud client constitute computers without a hard drive?

Answer»

Which of the following cloud client constitute computers without a hard DRIVE?
CHOOSE the CORRECT OPTION from below list
(1)Thick
(2)None of the options
(3)Mobile
(4)Thin

Answer:-(4)Thin

6.

What do you understand by Amazon SQS?

Answer»

What do you UNDERSTAND by AMAZON SQS?
To do communicate between the different connectors we use Amazon SQS. And in VARIOUS components of Amazon it is ACT as communicator.

7.

Which of the following is an essential concept related to the cloud?

Answer»

Which of the FOLLOWING is an ESSENTIAL concept related to the cloud?
CHOOSE the correct option from below list
(1)Abstraction
(2)Reliability
(3)PRODUCTIVITY
(4)All of the options

Answer:-(1)Abstraction

8.

Among the following options, which is an example of hypervisor?

Answer»

Among the FOLLOWING OPTIONS, which is an example of hypervisor?
Choose the correct option from below list
(1)NONE of the options
(2)Server
(3)Hyper-V
(4)VIRTUAL machine

Answer:-(3)Hyper-V

9.

Infrastructure APIs help in provisioning ________.

Answer»

Infrastructure APIS help in provisioning ________.
Choose the CORRECT option from below list
(1)All of the options
(2)Computing and storage resources
(3)FUNCTIONALITY for the applications
(4)INTERACTION with application layer

Answer:-(2)Computing and storage resources

10.

Which clouds are on-premise giving IT managers complete control over the available resources?

Answer»

Which clouds are on-premise giving IT managers complete control over the AVAILABLE resources?
Choose the correct OPTION from below list
(1)HYBRID
(2)Community
(3)public
(4)private

Answer:-(4)private

11.

In the public cloud, it incurs high CAPEX and less OPEX.

Answer»

In the public CLOUD, it incurs high CAPEX and less OPEX.
Choose the correct OPTION from below LIST
(1)True
(2)False

Answer:-(2)False

12.

SaaS supports multiple users and provides a shared data model through ________ model.

Answer» SAAS supports MULTIPLE users and provides a shared DATA model through ________ model.
Choose the correct option from below LIST
(1)Multi-tenancy
(2)Single-tenancy
(3)Multiple-instance
(4)Single-instance

Answer:-(1)Multi-tenancy
13.

What are the cloud cost models?

Answer»

What are the cloud cost models?
CHOOSE the correct OPTION from below list
(1)Plan payment
(2)Pay as you use
(3)All of the options
(4)Free payment

Answer:-(4)Free payment

14.

Salesforce.com is the largest service provider of _________.

Answer»

Salesforce.com is the largest SERVICE PROVIDER of _________.
Choose the correct option from below LIST
(1)IaaS
(2)BpaaS
(3)PAAS
(4)SaaS

Answer:-(4)SaaS

15.

Which of the following options is cloud computing key enabling technologies?

Answer»

Which of the following options is CLOUD computing KEY enabling technologies?
Choose the correct option from below LIST
(1)Cloud Data centers
(2)All of the options
(3)Cloud APIs
(4)Cloud Storage
(5)Virtualization

Answer:-(2)All of the options

16.

IDaaS is a ________-based identity and access management offering.

Answer»

IDaaS is a ________-based IDENTITY and access MANAGEMENT offering.
Choose the CORRECT option from below list
(1)IaaS
(2)DaaS
(3)SaaS
(4)PaaS

Answer:-(3)SaaS

17.

In full virtualization, the guest operating systems run in isolation.

Answer»

In full virtualization, the guest OPERATING SYSTEMS RUN in isolation.
Choose the correct option from below LIST
(1)False
(2)TRUE

Answer:-(2)True

18.

Hosted email infrastructure is an example for _________.

Answer»

Hosted email INFRASTRUCTURE is an example for _________.
Choose the correct option from below LIST
(1)PaaS
(2)IaaS
(3)DAAS
(4)SaaS

Answer:-(4)SaaS

19.

Which of the following option is offered by Identity as a Service?

Answer»

Which of the following OPTION is offered by Identity as a Service?
Choose the correct option from below list
(1)Provisioning
(2)Identity governance
(3)RISK and EVENT
(4)All of the OPTIONS

Answer:-(4)All of the options

20.

________ environment is used to deploy private clouds for critical workloads and a public cloud to host less critical workloads.

Answer»

________ environment is used to deploy private clouds for CRITICAL WORKLOADS and a public CLOUD to HOST less critical workloads.
Choose the correct option from below list
(1)Hybrid cloud
(2)Private cloud
(3)Community cloud
(4)Public cloud

Answer:-(1)Hybrid cloud

21.

What refers to the location and management of clouds infrastructure?

Answer»

What refers to the location and management of clouds infrastructure?
Choose the correct OPTION from below LIST
(1)Application
(2)Deployment
(3)Service
(4)None of the options

Answer:-(2)Deployment

22.

What is the first step in the process of deploying a cloud computing offering?

Answer»

What is the first STEP in the process of DEPLOYING a cloud computing offering?
Choose the correct option from below list
(1)Plan governance
(2)ASSESS risk
(3)Cloud READINESS assessment
(4)None of the options

Answer:-(3)Cloud Readiness assessment

23.

Reporting services are one of the cloud characteristics.

Answer»

Reporting SERVICES are one of the cloud characteristics.
Choose the CORRECT OPTION from below list
(1)False
(2)True

Answer:-(1)False

24.

Which delivery model is an example of a cloud computing environment that provides users with a web-based email service?

Answer»

Which delivery model is an EXAMPLE of a CLOUD computing ENVIRONMENT that provides users with a web-based email service?
CHOOSE the correct option from below list
(1)IaaS
(2)DaaS
(3)SaaS
(4)PaaS

Answer:-(3)SaaS

25.

Which of the following option is not an issue with private clouds?

Answer»

Which of the following option is not an ISSUE with private CLOUDS?
Choose the correct option from below list
(1)Security
(2)Security and Oversubscribing
(3)Oversubscribing
(4)Service level agreements

Answer:-(2)Security and Oversubscribing

26.

Which of the following attribute should be unique?

Answer»

Which of the following attribute should be unique?
Choose the correct OPTION from below LIST
(1)DIGITAL identity
(2)DATA
(3)All of the options
(4)Identity

Answer:-(1)Digital identity

27.

Which of the following option is not a service model?

Answer»

Which of the FOLLOWING OPTION is not a SERVICE model?
Choose the correct option from below LIST
(1)SaaS
(2)IaaS
(3)BaaS
(4)PaaS

Answer:-(3)BaaS

28.

Different types of Cloud Computing

Answer»

Below are the DIFERENT types of cloud. All of these are used for different PURPOSE
(1)PUBLIC Cloud
(2)PRIVATE Cloud
(3)Hybrid Cloud
Below image will helps you to get different types of cloud computing




cloud computing

29.

DaaS is utilized for provisioning critical data on demand.

Answer» DAAS is utilized for provisioning CRITICAL data on demand.
Choose the correct option from below list
(1)FALSE
(2)TRUE

Answer:-(2)True
30.

Multi-factor authentication is one of the DaaS applications.

Answer»

Multi-factor AUTHENTICATION is one of the DaaS applications.
Choose the correct option from below list
(1)False
(2)True

Answer:-(1)False

31.

What are the two different datacenters in cloud computing

Answer»

What are the TWO DIFFERENT DATACENTERS in cloud COMPUTING
Below are the two main different datacenters in cloud computing
(a)Containerized Datacenters
(B)Low Density Datacenters

32.

Some of silent Advantages or features of Cloud Computing

Answer»

Some of silent Advantages or features of Cloud Computing
Below are the different advantages of using cloud computing are
(1)DATA backup & storage of data
(2)Powerful server capabilities
(3)SaaS(Software as a service)
(4)Information TECHNOLOGY sandboxing capabilities
(5)Increase in productivity
(6)Cost EFFECTIVE & Time SAVING

33.

Paravirtualization is ideal for __________.

Answer»

Paravirtualization is ideal for __________.
CHOOSE the correct OPTION from below list
(1)Data replication
(2)Computer system sharing,isolate users
(3)Disaster recovery, migration capacity
(4)AUTOMATIC failure detection

Answer:-(3)Disaster recovery, migration capacity

34.

Which computing points to services and applications that operate on a distributed network utilizing virtualized resources?

Answer»

Which computing points to services and applications that OPERATE on a distributed network UTILIZING virtualized RESOURCES?
CHOOSE the correct option from below LIST
(1)Distributed
(2)Cloud
(3)Soft
(4)Parallel

Answer:-(2)Cloud

35.

Which of the following are Virtualization Characteristics?

Answer»

Which of the following are Virtualization Characteristics?
CHOOSE the correct option from below LIST
(1)Isolation
(2)ENCAPSULATION
(3)All of the OPTIONS
(4)Partitioning

Answer:-(3)All of the options

36.

In hardware virtualization, the resource allotment for the virtual machine is done by __________.

Answer»

In hardware virtualization, the RESOURCE ALLOTMENT for the virtual machine is DONE by __________.
Choose the correct option from below list
(1)Virtualization Platform
(2)VIM
(3)Hypervisor
(4)Host server

Answer:-(3)Hypervisor

37.

The primary requirement to implement cloud computing is ________.

Answer»

The PRIMARY requirement to implement cloud computing is ________.
Choose the CORRECT OPTION from below list
(1)Scalability
(2)HARDWARE
(3)Internet
(4)Intranet

Answer:-(3)Internet

38.

Clients access their data in the cloud through web-based protocols.

Answer»

Clients access their data in the cloud through web-based protocols.
CHOOSE the correct OPTION from below list
(1)True
(2)False

Answer:-(1)True