Download PDF
Free download in PDF Cloud programming Multiple Choice Questions(MCQs) & Answers. These multiple choice questions on Computer Science are very useful for NIELIT, BCA, B.Sc. MCA, M.Sc. B.Tech, M.Tech, BE, ME students an interview for various positions like Web Developer, System Analyst etc.
481
Choice the correct answer Which service provider provides the highest level of service?
[A]
SaaS
[B]
PaaS
[C]
IaaS
[D]
All of the mentioned
482
Point out the correct statement.
[A]
PaaS supplies the infrastructure
[B]
IaaS adds application development frameworks, transactions, and control structures
[C]
SaaS is an operating environment with applications, management, and the user interface
[D]
All of the mentioned
Answer: REST stands for Representational State Transfer
483
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?
[A]
CAS
[B]
CSA
[C]
SAC
[D]
All of the mentioned
484
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.
[A]
SaaS
[B]
PaaS
[C]
IaaS
[D]
All of the mentioned
485
Point out the wrong statement.
[A]
Each different type of cloud service delivery model creates a security boundary
[B]
Any security mechanism below the security boundary must be built into the system
[C]
Any security mechanism above the security boundary must be maintained by the customer
[D]
All of the mentioned
Answer: All of the mentioned
486
__________ model allows vendor to provide security as part of the Service Level Agreement?
[A]
SaaS
[B]
PaaS
[C]
IaaS
[D]
All of the mentioned
487
Which of the following cloud does not require mapping?
[A]
Public
[B]
Private
[C]
Hybrid
[D]
None of the mentioned
488
____________ service model is owned in terms of infrastructure by both vendor and customer?
[A]
Public
[B]
Private
[C]
Hybrid
[D]
None of the mentioned
489
Which of the following model type is not trusted in terms of security?
[A]
Public
[B]
Private
[C]
Hybrid
[D]
None of the mentioned
490
Which of the following has infrastructure security managed and owned by the vendor?
[A]
Hybrid
[B]
Private/Community
[C]
Public
[D]
None of the mentioned
Answer: Private/Community
491
___________ is a compliance standard?
[A]
PCI-DSS
[B]
HIPPA
[C]
GLBA
[D]
All of the mentioned
Answer: All of the mentioned
492
Point out the correct statement.
[A]
The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements
[B]
To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
[C]
A security control model includes the security that you normally use for your applications only
[D]
All of the mentioned
View Answer
Answer: To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
493
_________ is a key mechanism for protecting data?
[A]
Access control
[B]
Auditing
[C]
Authentication
[D]
All of the mentioned
View Answer
494
How many security accounts per client is provided by Microsoft?
View Answer
495
Point out the wrong statement.
[A]
Securing data sent to, received from, and stored in the cloud is the single largest security concern
[B]
The problem with the data you store in the cloud is that it can be located anywhere in the cloud service provider’s system
[C]
One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
[D]
All of the mentioned
Answer: One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
496
Which of the following are a common means for losing encrypted data?
[A]
lose the keys
[B]
lose the encryption standard
[C]
lose the account
[D]
all of the mentioned
497
____________ is the standard for interoperable cloud-based key management?
[A]
KMIP
[B]
PMIK
[C]
AIMK
[D]
None of the mentioned
498
Which of the following was one of the weaker aspects of early cloud computing service offerings?
[A]
Logging
[B]
Integrity checking
[C]
Consistency checking
[D]
None of the mentioned
499
Choice correct answer which is one of the most actively developing and important areas of cloud computing technology?
[A]
Logging
[B]
Logging
[C]
Regulatory compliance
[D]
None of the mentioned
Answer: Regulatory compliance
500
Amazon Web Services supports which of the following Type II Audits.
[A]
SAS70
[B]
SAS20
[C]
SAS702
[D]
None of the mentioned
Please share this page