R4RIN
Articles
Java 8
MCQS
Google Cloud Platform(GCP) MCQ Quiz Hub
Google Cloud MCQ Set 4
Choose a topic to test your knowledge and improve your Google Cloud Platform(GCP) skills
1. Salesforce.com is the largest ______ provider of CRM software.
PaaS
IaaS
CaaS
SaaS
2. Point out the correct statement.
Mashups are an incredibly useful hybrid Web application
SaaS will eventually replace all locally installed software
The establishment and proof of identity is a central network function
All of the mentioned
3. Which of the following group is dedicated to support technologies that implement enterprise mashups?
Open Alliance Apache
Open Mashup Alliance
Open Tech Alliance
none of the mentioned
4. Which of the following attribute should be unique?
identity
digital identity
mashup
all of the mentioned
5. Point out the wrong statement.
Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
Services that provide digital identity management as a service have been part of internetworked systems from Day One
IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
none of the mentioned
6. _______ authentication requires the outside use of a network security or trust service.
SSO
Singlefactor
Multi Factor
all of the mentioned
7. ____ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks.
Internet Hardware Addresses
Ethernet Software Addresses
Ethernet Hardware Addresses
none of the mentioned
8. ______ is one of the more expensive and complex areas of network computing.
Multi-Factor Authentication
Fault tolerance
Identity protection
All of the mentioned
9. Which of the following is provided by Identity as a Service?
Identity governance
Provisioning
Risk and event monitoring
all of the mentioned
10. Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider.
OpenID
OpenUser
OpenSSD
none of the mentioned
11. Point out the wrong statement.
XML checks the ID request against its policies and either allows or denies the request
SPML in most instances operates as a reply/request mechanism
User centric authentication takes place usually in the form of knowledge cards
all of the mentioned
12. Which of the following allows a distributed ID system to write and enforce custom policy expressions?
XACML
XML
SOAP
none of the mentioned
13. _____ is a standard of OASIS’s PSTC that conforms to the SOA architecture.
XACML
SPML
SML
All of the mentioned
14. Point out the wrong statement.
Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems
The Distributed Audit Service provides accountability for users accessing a system
The OpenID and CardSpace specifications support the authentication type of data object
None of the mentioned
15. Which of the following standard is concerned with the exchange and control of identity information?
IGK
IDF
IGF
all of the mentioned
16. ____ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.
IHA
EHA
CardSpace
None of the mentioned
17. The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.
Higgins
Hughes
Hinges
all of the mentioned
18. Which of the following is authorization markup language?
eXtensible Access Control Markup Language
intrinsic Access Control Markup Language
hypertext Access Control Markup Language
all of the mentioned
19. Which of the following is an example of a vertical cloud that advertise CaaS capabilities?
FedCloud
ClearPoint PCI
Rackserve PCI
All of the mentioned
20. Point out the wrong statement.
SPML is used to prepare Web services and applications for use
With SPML, a system can provide automated user and system access
Without a provisioning system, a cloud computing system can be very efficient and potentially reliable
All of the mentioned
21. Which of the following is a man-in-the-middle type of service?
CaaS
IaaS
AaaS
All of the mentioned
22. Point out the correct statement.
Cloud computing by its very nature spans same jurisdictions
SaaS is much more than simply providing an anonymous service token to an identity
A Compliance as a Service application would need to serve as a trusted third party
all of the mentioned
23. Which of the following can be used for the banking industry?
athenahealth
bankserve
bankingsol
all of the mentioned
24. ______ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.
Software
Platform
Analytics
Compliance
25. Which of the following is a PCI CaaS service?
FedCloud
ClearSoln
Rackserve PCI
all of the mentioned
26. _______ is used for merchant transactions under the Payment Card Industry Data Security Standard.
ClearPoint PCI
ClearSoln
Rackserve PCI
all of the mentioned
27. _____ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.
Software
Platform
Analytics
Compliance
28. Which of the following type of virtualization is also characteristic of cloud computing?
Storage
Application
CPU
all of the mentioned
29. The technology used to distribute service requests to resources is referred to as _______
load performing
load scheduling
load balancing
all of the mentioned
30. Point out the correct statement.
A client can request access to a cloud service from any location
A cloud has multiple application instances and directs requests to an instance based on conditions
Computers can be partitioned into a set of virtual machines with each machine being assigned a workload
All of the mentioned
31. Which of the following software can be used to implement load balancing?
Apache mod_balancer
Apache mod_proxy_balancer
F6’s BigIP
All of the mentioned
32. Which of the following network resources can be load balanced?
Connections through intelligent switches
DNS
Storage resources
all of the mentioned
33. Which of the following is a more sophisticated load balancer?
workload managers
workspace managers
rackserve managers
all of the mentioned
34. A ______ is a combination load balancer and application server that is a server placed between a firewall or router.
ABC
ACD
ADC
all of the mentioned
35. Which of the following is another name for the system virtual machine?
hardware virtual machine
software virtual machine
real machine
None of the mentioned
36. Which of the following provide system resource access to virtual machines?
VMM
VMC
VNM
all of the mentioned
37. An operating system running on a Type ______ VM is full virtualization.
1
2
3
All of the mentioned
38. Which of the following is Type 1 Hypervisor?
Wind River Simics
Virtual Server 2005 R2
KVM
LynxSecure
39. Which of the following is Type 2 VM?
VirtualLogix VLX
VMware ESX
Xen
LynxSecure
40. Which of the following will be the host operating system for Windows Server?
VirtualLogix VLX
Microsoft Hyper-V
Xen
all of the mentioned
41. Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V?
paravirtualization
full virtualization
emulation
None of the mentioned
42. In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware.
paravirtualization
full virtualization
emulation
None of the mentioned
43. Point out the wrong statement.
Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
Guest operating systems in full virtualization systems are generally faster than other virtualization schemes
A process virtual machine instantiates when a command begins a process
All of the mentioned
44. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.
paravirtualization
full virtualization
emulation
none of the mentioned
45. Which of the following operating system support operating system virtualization?
Windows NT
Sun Solaris
Windows XP
Compliance
46. Which of the following is a service that aggregates servers into an assignable pool?
VMware vStorage
VMware vNetwork
VMware vCompute
Application services
47. ____ is a service that creates and manages virtual network interfaces.
VMware vStorage
VMware vNetwork
VMware vCompute
Application services
48. Which of the following allows a virtual machine to run on two or more physical processors at the same time?
Virtual SMP
Distributed Resource Scheduler
Network Distributed Switch
Storage VMotion
49. Which of the following product migrate files from one datastore to another datastore?
Network Distributed Switch
Storage VMotion
VMotion
none of the mentioned
50. ___ virtualization abstracts networking hardware and software into a virtual network that can be managed.
Storage
Network
Software
none of the mentioned
51. Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address?
Storage
Network
Software
none of the mentioned
52. Point out the wrong statement.
A virtual network can create virtual network interfaces
Instantiating a virtual machine is a very slow process
You can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtual machines
all of the mentioned
53. A _______ image makes a copy or a clone of the entire computer system inside a single container such as a file.
system
software
hardware
none of the mentioned
54. Which of the following is an open standard for storing a system image?
OVF
PPF
VOF
Compliance
55. ______ is used by Amazon Web Services to store copies of a virtual machine.
AMI
EMI
IMI
Application services
56. AMI imaging service is provided by Amazon for ______
private use
public use
pay-per-use
all of the mentioned
57. Which of the following runs on Xen Hypervisor?
Azure
AWS EC2
AWS EC3
All of the mentioned
58. Which of the following vendor is offering optimization appliances for VMware infrastructure?
Expand Networks
Certeon
Replify
none of the mentioned
59. Point out the correct statement.
Virtual appliances are a relatively new paradigm for application deployment
External network virtualization cannot be done using network switches and VLAN software
All imaging programs can take snapshots of systems
all of the mentioned
60. Simple Cloud API is useful for applications written in _______
PHP
Python
Scala
none of the mentioned
61. The __________ solution creates a virtual application appliance as an architectural layer between the Windows or the UNIX operating system and applications.
AppOne
AppZero
AppZero
none of the mentioned
62. Point out the wrong statement.
Cloud computing applications have the ability to run on virtual systems
Systems (VMs running applications), storage, and network assets cannot be virtualized
Applications that run in data centers are captive to the operating systems and hardware platforms that they run on
all of the mentioned
63. ____ creates a container that encapsulates the application and all the application’s dependencies within a set of files.
VAA
VAS
VSA
None of the mentioned
64. Which of the following layer serves as the mediator for file I/O, the memory I/O, and application calls and response to DLLs?
application
client
virtualization
none of the mentioned
65. Which of the following application delivery platform’s main focus is on desktop installations?
Microsoft App-V
Microsoft Hyper
Amazon EC2
all of the mentioned
66. Which of the following is the most widely used technique for abstraction?
Load balancing
Load scheduling
Load scaling
all of the mentioned
67. Which of the following is a potent cloud-building technology?
vSphere
HyperCube
vCube
all of the mentioned
68. What is the relation of the capacity attribute to performance?
same
different
similar
none of the mentioned
69. What does L in LAMP stands for?
Lamp
Linux
Lone
none of the mentioned
70. Which of the following is one of the major categories of Amazon Machine Instances that you can create on the Amazon Web Service?
WAMP
XAMPP
LAMP
none of the mentioned
Submit