R4RIN
Articles
Java 8
MCQS
Google Cloud Platform(GCP) MCQ Quiz Hub
Google Cloud MCQ Set 8
Choose a topic to test your knowledge and improve your Google Cloud Platform(GCP) skills
1. Which of the following service provider provides the least amount of built in security?
SaaS
PaaS
IaaS
all of the mentioned
2. Point out the correct statement.
Different types of cloud computing service models provide different levels of security services
Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
Data should be transferred and stored in an encrypted format for security purpose
All of the mentioned
3. Which of the following services that need to be negotiated in Service Level Agreements?
Logging
Auditing
Regulatory compliance
all of the mentioned
4. Which of the following area of cloud computing is uniquely troublesome?
Auditing
Data integrity
e-Discovery for legal compliance
all of the mentioned
5. Which of the following is the operational domain of CSA?
Scalability
Portability and interoperability
Flexibility
none of the mentioned
6. Which of the following is considered an essential element in cloud computing by CSA?
Multi-tenancy
Identity and access management
Virtualization
all of the mentioned
7. Which of the following is used for Web performance management and load testing?
VMware Hyperic
Webmetrics
Univa UD
Tapinsystems
8. Which of the following is application and infrastructure management software for hybrid multi-clouds?
VMware Hyperic
Webmetrics
Univa UD
Tapinsystems
9. Which of the following service provider provides the highest level of service?
SaaS
PaaS
IaaS
All of the mentioned
10. Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
CAS
CSA
SAC
all of the mentioned
11. For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
SaaS
PaaS
IaaS
All of the mentioned
12. Which of the following model allows vendor to provide security as part of the Service Level Agreement?
SaaS
PaaS
IaaS
all of the mentioned
13. Which of the following cloud does not require mapping?
Public
Private
Private
none of the mentioned
14. Which of the following service model is owned in terms of infrastructure by both vendor and customer?
Public
Private
Hybrid
None of the mentioned
15. Which of the following model type is not trusted in terms of security?
Public
Private
Hybrid
none of the mentioned
16. Which of the following has infrastructure security managed and owned by the vendor?
Hybrid
Private/Community
Public
none of the mentioned
17. Which of the following is a compliance standard?
PCI-DSS
HIPPA
GLBA
all of the mentioned
18. Which of the following is a key mechanism for protecting data?
Access control
Auditing
Authentication
all of the mentioned
19. Which of the following are a common means for losing encrypted data?
lose the keys
lose the encryption standard
lose the account
all of the mentioned
20. Which of the following is the standard for interoperable cloud-based key management?
KMIP
PMIK
AIMK
None of the mentioned
21. Which of the following was one of the weaker aspects of early cloud computing service offerings?
Logging
Integrity checking
Consistency checking
none of the mentioned
22. Which of the following is one of the most actively developing and important areas of cloud computing technology?
Logging
Auditing
Regulatory compliance
none of the mentioned
23. Amazon Web Services supports ________ Type II Audits.
SAS70
SAS20
SAS702
none of the mentioned
24. Which of the following is done by Identity management?
controlling access to data in the cloud
maintaining user roles
preventing unauthorized uses
all of the mentioned
25. Which of the following is required by Cloud Computing?
That you establish an identity
That the identity be authenticated
That the authentication be portable
all of the mentioned
26. Which of the following standard is the key to creating Single Sign-On (SSO) systems?
OpenID 2.0
CHAP
SMAL
none of the mentioned
27. Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
OpenSSL
CHAP
SMAL
None of the mentioned
28. Which of the following entity queries the OpenID identity provider to authenticate the veracity of the OpenID credentials?
serving party
relieving party
relaying party
none of the mentioned
29. Which of the following provides a token service that can be used to present validated access to resources?
OAuth
OCheck
SAML
none of the mentioned
30. Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open standards?
Windows Workflow
Windows Identity
Windows compliance
none of the mentioned
31. _____ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identity.
AD FS
AC
SAS
none of the mentioned
32. Which of the following describes a message-passing taxonomy for a component-based architecture that provides services to clients upon demand?
SOA
EBS
GEC
all of the mentioned
33. Which of the following is a repeatable task within a business process?
service
bus
methods
all of the mentioned
34. Which of the following is used to define the service component that performs the service?
WSDL
SCDL
XML
none of the mentioned
35. Which of the following is commonly used to describe the service interface, how to bind information, and the nature of the component’s service or endpoint?
WSDL
SCDL
XML
none of the mentioned
36. Which of the following provides commands for defining logic using conditional statements?
XML
WS-BPEL
JSON
none of the mentioned
37. Which of the following element is used by orchestrated business process commonly referred to as?
conductor
coordinator
orchestrator
all of the mentioned
38. SOA _____ an extension of the Service Oriented Architecture to respond to events that occur as a result of business processes.
2.0
3.0
4.0
all of the mentioned
39. Point out the wrong statement.
Event handling is part of event-driven SOA or SOA 2.0
An ESB provides a lower layer for event management with a messaging infrastructure
UML is the modeling language of the Object Management Group that provides a method for creating visual models for software
None of the mentioned
40. Which of the following application has the ability to query event data in the same way that a stock ticker or trading application can query trading data?
CVE
CEV
XML
none of the mentioned
41. What does CVE in SOA design stand for?
Causal Vector Engine
Continuous Vector Engine
Causal Valuable Engine
None of the mentioned
42. Which of the following is a collaborative effort where the logic of the business process is pushed out to the members?
Orchestration
Choreography
SOA 2.0
none of the mentioned
43. In the ______ model, data and messages are exchanged in a Service Data Object (SDO).
CSA
SCA
UDDI
none of the mentioned
44. How many types of methods are used to combine web services?
1
2
3
none of the mentioned
45. Which of the following function is performed by the service bus?
auditing
routing
message translation
all of the mentioned
46. Which of the following is an ESB based on open standards such as Java EE?
InfoSphere ESB 7.0
WebSphere ESB 7.0
CloudSphere ESB 7.0
All of the mentioned
47. Which of the following manage message transactions?
Data abstraction services
Process management services
Data repositories
Governance
48. Which of the following statement is incorrect related to a repository and a registry in ESB?
Repositories and registries are both data stores
Repository stores references to the components of the SOA
A registry serves the role that a name server does in a network operating system infrastructure
none of the mentioned
49. Which of the following stores business logic and aid in governance of business processes?
Data abstraction services
Process management services
Data repositories
Governance
50. Which of the following is used to aid for locating services in SOA?
catalog service
data abstraction services
data bus
all of the mentioned
51. Which of the following catalog service requires some sort of synchronization or update to maintain a unified data store across the servers involved?
global
standalone
federated
all of the mentioned
52. How many different protocol types are required for message passing in SOA?
1
2
3
4
53. Which of the following combination is possible in WebSphere ESB?
XML/JMS
SOAP/JMS
SOAP/HTTP
Governance
54. Which of the following statement is incorrect related to catalog servers?
They can be standalone catalog servers serving a single site
They cannot serve the role of a global catalog service where two or more catalog servers are merged to include several sites
They can be part of a federated catalog service
None of the mentioned
55. Which of the following version of WSDL is a W3C standard?
1.1
2.3
3.1
Governance
56. Which of the following essential object in WSDL is used to support message transfer?
bus
binding
type
none of the mentioned
57. Which of the following object is used to describe the data, usually as part of the XML schema?
operation
prototype
types
none of the mentioned
58. Which of the following is the language standard for Web service interactions?
WS-BPEL
WS-XML
WS-JSON
all of the mentioned
59. Which of the following messaging protocol is used with XML in BPEL?
WS-Coordination
WS-Addressing
WS-Transactions
all of the mentioned
60. Which of the following statement is incorrect related to BPEL?
Data functions in BPEL support process data and control flow
BPEL includes techniques for error handling and scopes transactions
BPEL uses Web services for standards and to assemble and decompose processes
None of the mentioned
Submit