Cloud Computing MCQ Questions & Answers Part 2

Q 21. In distributed systems, link and site failure is detected by . . . . . . . .

A. polling

B. token passing

C. handshaking

D. none of the mentioned

Show Answer Answer:-C. handshaking
Explanation The correct answer is Option C: Handshaking, as it is the most reliable and commonly used method in distributed systems for detecting link and site failures.

Q 22. Dynamic content presented in Google . . . . . . . . crawling isn’t normally indexed.

A. ajax

B. java

C. javascript

D. all of the mentioned

Show Answer Answer:-C. javascript
Explanation The correct answer is Option C: JavaScript, as it is the most significant factor in dynamic content that may not be indexed by Google’s crawlers without proper handling.

Q 23. Which of the following is not a messaging mode in CoAP?

A. Confirmable

B. Separate

C. Direct

D. Piggyback

Show Answer Answer:-C. Direct
Explanation The correct answer is Option C: Direct, as it is not a valid messaging mode in CoAP, unlike the other options, which are part of the CoAP messaging system.

Q 24. AMIs are operating systems running on the . . . . . . . . virtualization hypervisor.

A. Yen

B. Xen

C. Ben

D. Multi-Factor Authentication

Show Answer Answer:-B. Xen
Explanation The correct answer is Option B: Xen, as it is the virtualization hypervisor used by AWS to run AMIs. The other options are unrelated to hypervisors or AMIs.

Q 25. Which of the following aspect of the service is abstracted away?

A. data escrow

B. user interaction

C. adoption drivers

D. none of the mentioned

Show Answer Answer:-B. user interaction
Explanation The correct answer is Option B: User interaction, as it is the aspect of the service that is often abstracted away to provide a simplified experience for users, while the other options either remain visible to the user or are not relevant in the context of abstraction.

Q 26. Which of the following instance class is best used for applications that are processor or compute-intensive?

A. standard instances

B. high memory instances

C. high cpu instances

D. none of the mentioned

Show Answer Answer:-C. high cpu instances
Explanation The correct answer is Option C: High CPU instances, as they are the best choice for applications that are processor or compute-intensive, providing the necessary resources to handle demanding workloads effectively.

27. The message in pub/sub is an opaque blob of . . . . . . . .

A. bits

B. bytes

C. word

D. nibble

Show Answer Answer:-B. bytes
Explanation The correct answer is Option B: Bytes, as messages in pub/sub systems are typically described as opaque blobs of bytes, providing a flexible and efficient way to handle various types of data without interpretation by the messaging system.

Q 28. CNS stands for . . . . . . . .

A. consumption near sweet-spot

B. continuous network system

C. compact neural system

D. compound near sweet-sp0t

Show Answer Answer:-A. consumption near sweet-spot
Explanation None of the options accurately define CNS in the context of cloud computing. However, if the question aims to refer to a term often associated with network optimization, Option A might be the closest in concept, but it is still incorrect. The acronym CNS is generally understood to refer to “Cloud Networking Services,” which is not listed here. Therefore, the question may require clarification, as none of the provided options are standard definitions for CNS.

Q 29. URI and content type support is which protocol feature?

A. http

B. udp

C. coap

D. Both A and C

Show Answer Answer:-D. Both A and C
Explanation The correct answers are Option A: HTTP and Option C: CoAP, as both protocols support URI and content type features.

Q 30. Processes on the remote systems are identified by . . . . . . . .

A. host id

B. host name and identifier

C. identifier

D. process id

Show Answer Answer:-D. process id
Explanation Conclusion: The correct answer is Option D: Process ID, as it accurately represents how processes on remote systems are identified. Process IDs are essential for managing and monitoring processes effectively, making them the most relevant choice in this context.

Q 31. Point out the wrong statement.

A. unmanaged storage is reliable

B. managed storage is relatively cheap to use

C. most of the user-based applications that work with cloud storage are of unmanaged type

D. none of the mentioned

Show Answer Answer:-A. unmanaged storage is reliable
Explanation The wrong statement is Option A: Unmanaged storage is reliable, as it suggests a level of reliability that unmanaged storage may not inherently possess due to the user’s responsibility for managing their own data.

Q 32. . . . . . . . . is the central application in the AWS portfolio.

A. Amazon Simple Queue Service

B. Amazon Simple Notification Service

C. Amazon Elastic Compute Cloud

D. All of the above

Show Answer Answer:-C. Amazon Elastic Compute Cloud
Explanation The most accurate answer is Option B: Amazon Elastic Compute Cloud, as it is widely regarded as the central application in the AWS portfolio, serving as the backbone for many cloud computing operations and services.

Q 33. Which one of the statement is generally NOT correct for Microkernelized Hypervisor?

A. drivers run within guests

B. simple partitioning functionality

C. increase reliability and minimize lowest level of the tcb

D. contains its own drivers model

Show Answer Answer:-D. contains its own drivers model
Explanation The statement that is generally NOT correct for Microkernelized Hypervisors is Option D: Contains its own drivers model, as microkernelized hypervisors rely on guest operating systems to manage drivers rather than implementing their own dedicated driver model.

Q 34. Does publish() method accepts arbitrary arguments.

A. TRUE

B. FALSE

Show Answer Answer:-A. TRUE
Explanation The correct answer is Option A: TRUE, as many implementations of the publish() method are designed to accept arbitrary arguments to accommodate various data types and payloads. However, it is essential to refer to the specific documentation for the publish() method in the context being used to confirm its behavior, as this can vary across different frameworks.

Q 35. IEEE 802.15.4 uses which of the following for accessing the channel?

A. Carrier sense multiple access with collision avoidance (CSMA-CA)

B. Carrier sense multiple access with collision detection (CSMA-CD)

C. Carrier sense multiple access (CSMA)

D. None of these

Show Answer Answer:-A. Carrier sense multiple access with collision avoidance (CSMA-CA)
Explanation The correct answer is Option C: Carrier sense multiple access with collision avoidance (CSMA-CA), as IEEE 802.15.4 employs this method to manage access to the communication channel effectively, minimizing the potential for collisions in wireless environments.

Q 36. In threat modeling, what methodology used to perform risk analysis

A. dread

B. stride

C. owasp

D. dar

Show Answer Answer:-B. stride
Explanation The most appropriate answer for the methodology used to perform risk analysis in threat modeling is Option C: stride, as it provides a comprehensive framework for identifying and categorizing various threats effectively.

Q 37. The advantages of Ajax is . . . . . . . .

A. Bandwidth utilization

B. More interactive

C. Speeder retrieval of data

D. All of these

Show Answer Answer:-D. All of these
Explanation The correct answer is Option D: All of these, as Ajax provides multiple advantages, including better bandwidth utilization, enhanced interactivity, and speedier data retrieval, making it a powerful tool for modern web development.

Q 38. The . . . . . . . . property states that the system must have a mechanism to recover from committed transactions should that be necessary.

A. atomicity

B. consistency

C. durability

D. isolation

Show Answer Answer:-C. durability
Explanation The correct answer is Option D: durability, as it specifically relates to the requirement for a system to have mechanisms to recover from committed transactions if necessary.

Q 39. Publishing an application’s data as a REST service requires.

A. @requestmapping

B. @pathvariable

C. all of the mentioned

D. none

Show Answer Answer:-C. all of the mentioned
Explanation The correct answer is Option C: all of the mentioned, as both @RequestMapping and @PathVariable are necessary for effectively publishing an application’s data as a REST service.

Q 40. client() class provides . . . . . . . . to create topics.

A. methods

B. classes

C. software

D. batch

Show Answer Answer:-A. methods
Explanation The correct answer is Option C: methods, as the client() class typically provides methods that facilitate the creation of topics in programming and cloud service contexts.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

You cannot copy content of this page