GkSeries.com

Basic Cloud Programming Objective Type Questions(OTQs)& Answers

461 Which of the following is a core management feature offered by most cloud management service products?
[A] Support of different cloud types
[B] Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
[C] Performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
[D] All of the mentioned
Answer: All of the mentioned
462 Point out the correct statement.
[A] Eucalyptus and Rackspace both use Amazon EC2 and S3 services
[B] The RightScale user interface provides real-time measurements of individual server instances
[C] RightScale server templates and the Rightscript technology are highly configurable and can be run under batch control
[D] All of the mentioned
Answer: All of the mentioned

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

463 Which of the following is an industry organization that develops industry system management standards for platform interoperability?
[A] DMTF
[B] DMS
[C] EBS
[D] All of the mentioned
Answer: DMTF
464 ___________ is used to extend CIM to virtual computer system management?
[A] OVF
[B] VMAN
[C] OCSI
[D] None of the mentioned
Answer: VMAN
465 Point out the wrong statement.
[A] Cloudkick’s Insight module is powerful and particularly easy to use
[B] Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
[C] All of the service models support monitoring solutions
[D] All of the mentioned
Answer: Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
466 Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
[A] CCE
[B] OCCI
[C] SMI
[D] All of the mentioned
Answer: SMI
467 Which of the following statements are correct about functions used in C#.NET?

1. Function definitions cannot be nested.

2. Functions can be called recursively.

3. If we do not return a value from a function then a value -1 gets returned.

4. To return the control from middle of a function exit function should be used.

5. Function calls can be nested.

[A] 1, 2, 5
[B] 2, 3, 5
[C] 2, 3
[D] 4, 5
Answer: 1,2,5
468 ___________ is open and both hypervisor and processor-architecture-agnostic?
[A] Dell Scalent
[B] CloudKick
[C] Elastra
[D] All of the mentioned
Answer: Dell Scalent
469 Choice the correct answer Which is a workflow control and policy based automation service by CA?
[A] CA Cloud Optimize
[B] CA Cloud Orchestrate
[C] CA Cloud Insight
[D] CA Cloud Compose
Answer: CA Cloud Orchestrate
470 Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
[A] CloudWatch
[B] CloudSensor
[C] CloudMetrics
[D] All of the mentioned
Answer: CloudSensor
471 Which of the following service provider provides the least amount of built in security?
[A] SaaS
[B] PaaS
[C] IaaS
[D] All of the mentioned
Answer: IaaS
472 Point out the correct statement.
[A] Different types of cloud computing service models provide different levels of security services
[B] Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
[C] Data should be transferred and stored in an encrypted format for security purpose
[D] All of the mentioned

Answer: All of the mentioned
473 _____________ services that need to be negotiated in Service Level Agreements?
[A] Logging
[B] Auditing
[C] Regulatory compliance
[D] All of the mentioned

Answer: If we do not provide a constructor, then the compiler provides a zero-argument constructor.
474 intended to evaluate __________ in any cloud.
[A] risk
[B] errors
[C] inconsistencies
[D] none of the mentioned

Answer: risk
475 Point out the wrong statement.
[A] You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
[B] Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
[C] Cloud computing doesn’t have vulnerabilities associated with Internet applications
[D] All of the mentioned
Answer: Cloud computing doesn’t have vulnerabilities associated with Internet applications
476 _______________ area of cloud computing is uniquely troublesome?
[A] Auditing
[B] Data integrity
[C] e-Discovery for legal compliance
[D] All of the mentioned
Answer: All of the mentioned
477 ____________ is the operational domain of CSA?
[A] Scalability
[B] Portability and interoperability
[C] Flexibility
[D] None of the mentioned
Answer: Flexibility
478 Which of the following is considered an essential element in cloud computing by CSA?
[A] Multi-tenancy
[B] Identity and access management
[C] Virtualization
[D] All of the mentioned
Answer: Multi-tenancy
479 _____________ is used for Web performance management and load testing?
[A] VMware Hyperic
[B] Webmetrics
[C] Univa UD
[D] Tapinsystems
Answer: Webmetrics
480 Which of the following is application and infrastructure management software for hybrid multi-clouds?
[A] VMware Hyperic
[B] Webmetrics
[C] Univa UD
[D] Tapinsystems
Answer: Univa UD

Please share this page

Click Here to Read more questions

Teacher Eligibility Test