Basic Cloud Programming Objective Type Questions(OTQs)& Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
461 Which of the following is a core management feature offered by most cloud management service products?
A Support of different cloud types
B Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
C Performance reporting including availability and uptime, response time, resource quota usage, and other characteristics
D All of the mentioned

Answer: All of the mentioned
462 Point out the correct statement.
A Eucalyptus and Rackspace both use Amazon EC2 and S3 services
B The RightScale user interface provides real-time measurements of individual server instances
C RightScale server templates and the Rightscript technology are highly configurable and can be run under batch control
D All of the mentioned

Answer: All of the mentioned
Advertisement
463 Which of the following is an industry organization that develops industry system management standards for platform interoperability?
A DMTF
B DMS
C EBS
D All of the mentioned

Answer: DMTF
464 ___________ is used to extend CIM to virtual computer system management?
A OVF
B VMAN
C OCSI
D None of the mentioned

Answer: VMAN
465 Point out the wrong statement.
A Cloudkick’s Insight module is powerful and particularly easy to use
B Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
C All of the service models support monitoring solutions
D All of the mentioned

Answer: Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
466 Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
A CCE
B OCCI
C SMI
D All of the mentioned

Answer: SMI
467 Which of the following statements are correct about functions used in C#.NET?

1. Function definitions cannot be nested.

2. Functions can be called recursively.

3. If we do not return a value from a function then a value -1 gets returned.

4. To return the control from middle of a function exit function should be used.

5. Function calls can be nested.

A 1, 2, 5
B 2, 3, 5
C 2, 3
D 4, 5

Answer: 1,2,5
468 ___________ is open and both hypervisor and processor-architecture-agnostic?
A Dell Scalent
B CloudKick
C Elastra
D All of the mentioned

Answer: Dell Scalent
469 Choice the correct answer Which is a workflow control and policy based automation service by CA?
A CA Cloud Optimize
B CA Cloud Orchestrate
C CA Cloud Insight
D CA Cloud Compose

Answer: CA Cloud Orchestrate
470 Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
A CloudWatch
B CloudSensor
C CloudMetrics
D All of the mentioned

Answer: CloudSensor
471 Which of the following service provider provides the least amount of built in security?
A SaaS
B PaaS
C IaaS
D All of the mentioned

Answer: IaaS
472 Point out the correct statement.
A Different types of cloud computing service models provide different levels of security services
B Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C Data should be transferred and stored in an encrypted format for security purpose
D All of the mentioned

Answer: All of the mentioned
473 _____________ services that need to be negotiated in Service Level Agreements?
A Logging
B Auditing
C Regulatory compliance
D All of the mentioned

Answer: If we do not provide a constructor, then the compiler provides a zero-argument constructor.
474 intended to evaluate __________ in any cloud.
A risk
B errors
C inconsistencies
D none of the mentioned

Answer: risk
475 Point out the wrong statement.
A You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
C Cloud computing doesn’t have vulnerabilities associated with Internet applications
D All of the mentioned

Answer: Cloud computing doesn’t have vulnerabilities associated with Internet applications
476 _______________ area of cloud computing is uniquely troublesome?
A Auditing
B Data integrity
C e-Discovery for legal compliance
D All of the mentioned

Answer: All of the mentioned
477 ____________ is the operational domain of CSA?
A Scalability
B Portability and interoperability
C Flexibility
D None of the mentioned

Answer: Flexibility
478 Which of the following is considered an essential element in cloud computing by CSA?
A Multi-tenancy
B Identity and access management
C Virtualization
D All of the mentioned

Answer: Multi-tenancy
479 _____________ is used for Web performance management and load testing?
A VMware Hyperic
B Webmetrics
C Univa UD
D Tapinsystems

Answer: Webmetrics
480 Which of the following is application and infrastructure management software for hybrid multi-clouds?
A VMware Hyperic
B Webmetrics
C Univa UD
D Tapinsystems

Answer: Univa UD
apsc cce prelims 2025