Cloud Computing MCQ Practice Test
Cloud Computing MCQ Practice Test
MULTIPLE CHOICE
Choose one of the most appropriate answers by marking an X on the letter a, b, c, d, or e.
on the answer sheet provided!
1. The use of computer technology for Internet-based development with complete software and
the operating system is also available online, called?
a. Distributed Computing d. Central Computing
b. Cloud Computing e. Parallel Computing
c. Creative Computing
2. The conditions of Cloud Computing services are: Services are fully managed by the provider.
needed by users is a computer supported by...
a. Internet Network d. Hardware Cloud
b. Cloud Services e. Maintenance
c. Software Cloud
3. Characteristics of Cloud Computing Services: A computing concept where users only pay for what they
Does it include characteristics?
a. Grid Computing d. Utility Computing
b. Cloud Application e. Cloud Platform
c. Cloud Storage
4. Which of the following is not a computing activity?
a. Software programming d. Information management with computers
b. Scientific research using computers e. Artificial Intelligence Programming
c. Create limited communication and media
5. Enables computers to communicate with other computers located elsewhere in the world.
is a creation of:
a. Internet d. Extranet
b. Intranet e. Distributed System
c. Grid Computing
6. Every activity that is goal-oriented that requires, benefits from, or creates a computer
referred to as:
a. Utility d. Cluster
b. Grid e. Computing
c. Cloud
7. A computer system in which several interconnected computers share computing tasks.
the one given to the system is called:
a. Cluster Computing d. Grid Computing
b. Cloud Computing e. Distributed Computing
c. Computing System
8. A parallel and distributed system consisting of a collection of standalone computers that interact with each other.
connected partners as data sources are called:
a. Cluster Computing d. Computing System
b. Distributed Computing e. Cloud Computing
c. Grid Computing
19. The main character in cloud computing systems that allows users to choose and order,
therefore, the management of services or features in the cloud according to needs is a characteristic of ...
21. Cloud computing services consist of a collection of computing resources that can be shared.
for customers. This service is usually multi-tenant / many users sharing resources.
computation collaboratively, is a characteristic of...
a. On demand self service d. Rapid elasticity
b. Resource pooling e. Measured service
c. Broad network access
22. A service from Cloud Computing where customers can use the provided software.
by Cloud Provider is a characteristic of...
a. SaaS d. WaaS
b. PaaS e. DaaS
c. IaaS
23. There is no need to purchase physical computers, which saves costs. The configuration of virtual computers also
It can be modified as needed. For example, when the storage is almost full, the storage can be increased immediately.
is an advantage of cloud computing with services..
a. SaaS d. WaaS
b. PaaS e. DaaS
c. IaaS
24. Developers can focus on the applications they create without worrying about maintenance.
computing platform. It is one of the advantages of cloud computing with services...
a. SaaS d. WaaS
b. PaaS e. EaaS
c. IaaS
25. Below is one example of a service from PaaS (Platform as a Service) which is..
a. iCloud d. MiCloud
b. Office365 e. Amazon Web Service (AWS)
c. Amazon EC2
26. Which of the following is not an example of a service from SaaS is..
Amazon Web Services (AWS) d. Microsoft Outlook
b. Google+ e. Adobe Creative Cloud
c. Office365
27. Which are the types of cloud computing services are...
a. Yahoo d. IaaS, PaaS, SaaS
b. Yandex e. Webmaster
c. Bing
28. The next advantage of cloud security is allowing users to reset connections or
access is granted when changes occur in the local network. Automatically, the previous network that has ever
will be blocked by the system so that user data can no longer be accessed through that route,
is one of the advantages of cloud security based on the understanding....
a. Can be adjusted to the local network d. Susceptible to data theft
b. Supported by data backup features e. Cloud security is very expensive
c. Data security optimization
29. Cloud security is used to store and protect national secret data and archives that must not be disclosed.
known to the public. Of course, the security system implemented in this field is very strict, it is
the implementation of cloud security in the field...
a. Government and national security d. Economy
a. Combination of hardware and software d. Physical hardware and other emulations
b. Catalyst e. Emulator
c. software or other programs
32. An emulator that implements only one instruction at a time is called:
a. Static binary translation d. Dynamic binary translation
b. Design challenges e. Register mapping
c. Interpretation
33. Which of the following is not a goal of Memory Virtualization?
a. Address translation d. Memory protection
b. Choosing the most efficient one e. Establishing access rights
c. Access attribute
34. A computer component that is responsible for handling access to memory requested by the CPU.
called..
a. MMU d. PTBR
b. TLB e. VMM
c. EPT
35. In every memory access operation, the EPT MMU will directly obtain the guest's physical address from the page.
the guest table, and then obtain the physical address from the host by VMM with the mapping table as follows:
a. Virtual d. Otomtais
b. Parallel e. Manual
c. Series
36. A virtualization technique separates physical resources from the virtual environment, standing on top of a
operating system or can be installed directly to hardware by taking physical resources and
dividing it so that the virtual environment can use it is called...
a. Supervisor d. Resistor
b. Advisor e. Hypervisor
c. Submissive
37. With virtualization, the amount of hardware needed can be drastically reduced. Energy savings that
Virtualization adoption includes eliminating the need to build multiple power plants.
Based on the above statement, virtualization can also be categorized as...
a. Green technology ( eco friendly ) d. Bad Sector
b. Bad technology e. A system that is difficult to use
c. Not environmentally friendly
At this time, the majority of virtualization in the world is server virtualization, there are three types of virtualization.
server, a type that represents the computer hardware environment in software, thus one computer
can be installed multiple operating systems are..
a. Paravirtualization d. Software Emulation
b. Container e. Pravirtualization
c. Hardware emulation
39. The type of virtualization that creates an independent representation of an existing operating system to be able to make
applications in certain environments are called...
a. Paravirtualization d. Software emulation
b. Container e. Privatization
Answer the questions below correctly!
Infrastructure as a Service
Cloud security incorporates measures like network security, data encryption, and access control to safeguard data privacy and ownership. Challenges arise as data can become shared ownership in the cloud, necessitating robust security protocols to ensure that only authorized users can access the data while maintaining compliance with privacy laws and regulations .
Data mobility in cloud computing poses risks of data breaches and loss of control, as data often traverses multiple locations. Mitigation strategies include using end-to-end encryption, enforcing strict access controls, deploying data loss prevention tools, and regularly auditing data movements to ensure compliance with data protection regulations .
PaaS simplifies application development by providing a preconfigured platform that handles infrastructure management, including servers, storage, and networking. It allows developers to focus on coding and deploying applications without concerning themselves with hardware provisioning, software maintenance, or scalability issues, thereby speeding up the development lifecycle and improving productivity .
Resource pooling allows multiple users to share a common pool of computing resources dynamically allocated based on demand. This model optimizes resource utilization by reducing idle times and ensuring that hardware resources such as storage, processing, and network bandwidth are efficiently distributed among users, leading to cost savings and improved operational performance .
Government regulations, such as requiring banks to host servers on-site, can impede cloud computing deployment by raising compliance costs and complicating infrastructure management. These regulations ensure data security and sovereignty, but they can also limit the flexibility and scalability benefits that cloud computing typically offers .
Hypervisors play a crucial role in virtualization by managing virtual machines on a single physical host, allocating resources efficiently among them. They improve computing efficiency by enabling resource isolation, dynamic resource allocation, and reducing overhead. This results in better utilization of hardware resources and improved operational efficiency .
Cloud computing faces challenges in data interoperability and standardization due to the diverse array of services and platforms. This lack of uniformity can hinder seamless data exchange and integration across different systems. Overcoming these challenges requires establishing common protocols and standards, fostering collaboration among providers, and investing in middleware solutions that facilitate data translation and integration .
Virtualization promotes green technology by reducing the need for physical hardware, thus lowering energy consumption and cooling requirements. It enables running multiple operating systems on a single hardware platform, leading to energy savings and reduced carbon footprint. This capability positions virtualization as an eco-friendly technology that aligns with sustainability goals .
Cloud computing is characterized by on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service . These features distinguish it from traditional computing models by allowing users to access computing resources over the internet efficiently, scale resources dynamically according to their needs, and pay based on usage.
IaaS provides users with the most control and responsibility as they manage operating systems, applications, and storage. PaaS offers a platform with tools to develop, run, and manage applications without handling the underlying infrastructure, thus reducing management overhead. SaaS delivers software over the internet, handling maintenance and updates for the user, offering the least control but simplifying management .