0% found this document useful (0 votes)
33 views

CC Bit Bank For Mid-2

Uploaded by

21491a0773
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

CC Bit Bank For Mid-2

Uploaded by

21491a0773
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 25

S.

NO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136

137

138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187

188
189
190
191
192
193
194
195
196
197
198
199
200
QUESTION
Which of the following is not a type of cloud?
Which of the following architectural standards is working with cloud computing industry?
Which of the following provides evidence that the message received is the same as created by its rightful sender ?
Point out the correct statement:
The mechanism to convert Plaintext data into Ciphertext data is known as
OVF Stands for
XML standard is used for
When you add operating system and applications to the service, the model called as ____________.
Which organization supports the development of standards for the cloud computing?
JSON stands for
Which of the following mechanisms are contained by Cloud API for accessing cloud services?
Which of the following Cloud Security Characteristic states that data not having been altered by an unauthorized party ?
Google _______ is a collection of applications and utilities under development and testing.
Volume mapping maps the host server’s directory into the Docker container. The data will remain in a safe and accessible place if you do which of the follo
Which is not true about Docker Hub?
Name the cloud developed by SGI
Which of the following is a photo and video sharing service by MobileMe?
Computer system of a parallel computer is capable of
Writing parallel programs is referred to as
Simplifies application’s of three-tier architecture is ____________.
Dynamic networks of networks, is a dynamic connection that grows is called
In which application system Distributed systems can run well?
In which systems desire HPC and HTC.
No special machines manage the network of architecture in which resources are known as
Significant characteristics of Distributed systems have of
Built of Peer machines are over
Type HTC applications are
Virtualization that creates one single address space architecture that of, is called
We have an internet cloud of resources In cloud computing to form
Data access and storage are elements of Job throughput, of __________.
Billions of job requests is over massive data sets, ability to support known as
Broader concept offers Cloud computing .to select which of the following.
Resources and clients transparency that allows movement within a system is called
Distributed program in a distributed computer running a is known as
Uniprocessor computing devices is called__________.
Utility computing focuses on a______________ model.
what is a CPS merges technologies
Aberavationn of HPC
Peer-to-Peer leads to the development of technologies like
Type of HPC applications of.
The high-throughput service provided is measures taken by
............. is the essential concept related to Cloud?
Which of the following type of virtualization is also characteristic of cloud computing?
Which one of the following options can be considered as the Cloud?
In Google cloud platform, pricing of a VM can be vary based on _____
Scopes are access controls that are applied to ______?
Which of the following services are serverless?
Which of the below gcloud command is used to create a custom role?
What block size used by all block storage systems?
The most fundamental unit of cloud computing is?
The Google Cloud Platform (GCP) was launched in
Cloud Vision is a ____
Which of the following Cloud shell command will open a blank editor window?
Upto ____ number of days log data will be stored in Stackdriver Logging
Stackdriver can be used to monitor resources where?
Cloud Filestore is based on what file system technology?
In Google Cloud Platform, your network and all it’s resources are considered as?
In Google cloud platform, pricing of a VM can be vary based on _____
Point out the wrong statement :
Which of the following can be considered PaaS offering ?
__________ is the most refined and restrictive service model.
Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to :
Rackspace Cloud Service is an example of :
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
Aberavationn of HPC
Which of the following is best suited for the analysis of an application’s suitability to be ported to the cloud?
Point out the correct statement.
Which of the following is the first level applicable attribute?
Which of the following is a second level attribute in relation to scalability?
Point out the wrong statement.
Which of the following is not a second level attribute in relation to Data Management?
Which of the following criteria needs to be met so that key drivers benefit from deployment to the cloud?
APIs and Deployment are second level application attributes in accordance with ____________
Which of the attributes is required for the best user interface?
Which of the following is not a second level application attribute?
Cloud computing refers to which of the following.
Soft Cloud computing represents ______ in the way in which systems are deployed.
. ______ as a utility is a dream from the beginning of the computing industry itself.
_______ as a service develops application upon an existing cloud computing application infrastructure.
Which of the following is a feature of cloud storage?
Which of the following system provide limited storage to the user?
Is google doc related to cloud computing?
Which of the following provides evidence that the message received is the same as created by its rightful sender ?
Google _______ is a collection of applications and utilities under development and testing.
Which of the following mechanisms are contained by Cloud API for accessing cloud services?
Point out the correct statement.
Which of the following is cross-platform API based on generalizing the major cloud vendors APIs?
Applications using managed cloud storage are __________ as a Service Web service.
Point out the wrong statement.
Which of the following presents the developer with their own APIs?
Which of the following storage is presented to a user as if it is a ready-to-use disk drive?
8. Which of the following cloud storage involves the provisioning of a raw virtualized disk?
Which of the following storage option is available for managed storage?
Which of the following cloud storage is consumed by file sharing software?
Which of the following is best suited for the analysis of an application’s suitability to be ported to the cloud?
Point out the correct statement.
which of the following is the first level applicable attribute?
Which of the following is a second level cloud attribute in relation to Platform Features?
Point out the correct statement.
Which of the following is not a second level cloud attribute in relation to Storage?
Which of the following scenario can be referred to as cloud bursting?
Which of the following is not a first level cloud service attribute?
An application that provides for transaction overflow in a reservation system is an example of ____________
Which of the following is not a second level cloud attribute?
The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as __________
Point out the wrong statement.
Which of the following is property of ACID principle?
Which of the following ACID property states that the system must go from one known state to another and that the system in
Point out the wrong statement.
Which of the following component is required for both online and local data access in hybrid application?
Which of the following factors might offset the cost of offline access in hybrid applications?
An application that needed _______ storage alone might not benefit from a cloud deployment at all.
The __________ property states that the system must have a mechanism to recover from committed transactions should that
Which of the following property defines a transaction as something that cannot be subdivided and must be completed or aba
which allows you to schedule virtually any job, including batch, big data jobs, cloud infrastructure operations
Which of the following is a core management feature offered by most cloud management service products?
Point out the correct statement.
Which of the following is an industry organization that develops industry system management standards for platform interop
Which of the following is used to extend CIM to virtual computer system management?
Point out the wrong statement.
Which of the following initiative tries to provide a way of measuring cloud computing services along dimension like cost?
Which of the following is open and both hypervisor and processor-architecture-agnostic?
Which of the following is a workflow control and policy based automation service by CA?
Which of the following monitors the performance of the major cloud-based services in real time in Cloud Commons?
Which of the following is done by Identity management?
Point out the correct statement.
Which of the following is required by Cloud Computing?
Which of the following standard is the key to creating Single Sign-On (SSO) systems?
Point out the wrong statement.
Which of the following is a complementary mechanism to OpenID and is used to create SSO systems?
Which of the following foundation offers .NET developers Visual Studio integration of WS-Federation and WS-Trust open
__________ allows users to authenticate their access to applications both locally and in the cloud with a claims-based identi
Which of the following is a compliance standard?
Point out the correct statement.
How many security accounts per client is provided by Microsoft?
Amazon S3 is which type of storage service?
Which AWS storage service assists S3 with transferring data?

Object storage systems store files in a flat organization of containers called what?
Amazon S3 offers encryption services for which types of data?
Amazon S3 has how many pricing components?
Object storage systems require less _____ than file systems to store and access files.
S3 objects are only accessible from the region they were created in
What are the characteristic of a DFS?
What are the different ways file accesses take place.
Which is not a major component of a file system
What are the different ways mounting of the file system
Advantages of caching in remote file acess
What is networked virtual memory
What are the examples of state information
Which is not example of state information
What are the advantages of file replication
Which of the following command is used to come out of safe mode
Which among of the following are features of hadoop
Which of the following command is used to enter the safemode
During safemode hadoop cluster is in
Can mutiple clients write in to a HDFS fike concurrently
Which of the following system does not provision storag to most users
How many categories storage device broadly exist in cloud
Which of the following is a feautures of a cloud storage
How many types of computing cloud service are present
Which of the following is the main concern related to cloud computing
Which of the followinf company is not a vendor of cloud computing
Hybrid cloud is a combiation of
Amazon uses_________as a cloud platform
Microsoft Azure was released by __________vendor
Microsoft Azure was released in which year
How many techniques of evaluatin of various storage technologies
Which of the following is not a type of cloud
When did cluster system first appear in
Most of the cloud architectures are built on this type of architecture
The technology used to distribute service requests to resources is referres to as
The file once created cannot be changed is called
_______is not possible in distributed file system
__ distributed file systems are dispersed among various machines distributed system
In a distributed file system___ is mappping between logical and physical object
In a distributed file system a file is uniquely identified by ________
Which of the following is the distributed file system?
In a distributed file system the file name doesnot reveal the files
To keep the GFS,highly available there are two strategies used namely___ and__
In GFS(Google file system) files are divided in_________- chunks
In GFS(Google file system) supports following operations
what are the characteristic of p2p network?
which of these is an example of unstructured p2p overlay network
which of the following options can be considered as the colud
which of the following is an essential concept related to cloud
Amazon S3 is which type of storage service?
Which AWS storage service assists S3 with transferring data?
Object storage systems store files in a flat organization of containers called what?

Amazon S3 offers encryption services for which types of data?


Amazon S3 has how many pricing components?
Object storage systems require less _____ than file systems to store and access files.
S3 objects are only accessible from the region they were created in
What are the characteristic of a DFS?
What are the different ways file accesses take place.
Which is not a major component of a file system
What are the different ways mounting of the file system
Advantages of caching in remote file acess
What is networked virtual memory
What are the examples of state information
Which is not example of state information
OPTION 1
private
Service-oriented architecture
Trusted Signature
Google’s cloud includes perhaps some 10 datacenters worldwide
Identity Management
Open Virtualization Format
Web development
PaaS
IEEE
Java Script Object Notation
Abstraction
Integrity
Code
re-create the container
he Hub is a network service
Nebula
iDisk
Decentralized computing
Parallel computation
Maintenance
Multithreading
HPC
Adaptivity
Peer-to-Peer
5 types
Many Server machines
Business
Loosely coupled
Centralized computing
Flexibility
Efficiency
Parallel computing
.Mobility transparency
Distributed process
Grid computing
Data
5C
High-peak computing
Norming grids
Management
Flexibility
Reliability
Storage
1. Hadoop
server location
Storage buckets
Cloud Storage
gcloud project roles create
4KB
Physical server

service based on 3 servers


$ cloudshell edit
7 days
In Google Cloud Platform only
Network File System (NFS)
Virtual private cloud
server location
The customer takes no responsibility for maintaining the hardware, the software, or the development of the applications
Google Maps
Iaas
Iaas
Iaas
Iaas
High-peak computing
a) Service Attributes
a) An application that runs as a service on the Internet has a client portion that makes a request and a server portion that resp
a) Availability
a) Fault management
a) When applications get moved to the cloud, they do not retain the features of a three-layered architecture
a) Data exchange
a) Are mission critical
a) application
a) User interaction
a) Reliability
Application and services that run on a distributed network using virtualized resource
A real paradigm shift
Computing
Platform
Logon authentication
Paas – platform as a service
Yes
A : Trusted Signature
A : Code
a) Abstraction
a) The nature of a cloud provider’s Cloud API will impact the ability to move an application to the cloud
a) Deltacloud
a) Infrastructure
a) Some APIs are both exposed as SOAP and REST
a) VMWare vCloud
a) Managed
a) Managed
a) formatting
a) Managed
a) Service Attributes
a) An application that runs as a service on the Internet has a client portion that makes a request and a server portion that resp
a) Availability
a) Development environment
a) Virtual machines are not provisioned to process the scans
a) Non-relational
a) Part of the application is on a local system, and part is in the cloud
a) Applications
a) cloud servicing
a) Applications
a) BASE
a) In theory, any application can run either completely or partially in the cloud
a) Atomicity
a) Atomicity
a) Taken as a unit, “Request => Process => Response” is not an atomic transaction
a) local
a) scalability
a) online
a) Atomicity
a) Atomicity
Cloud Scheduler
a) Support of different cloud types
a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services
a) DMTF
a) OVF
a) Cloudkick’s Insight module is powerful and particularly easy to use
a) CCE
a) Dell Scalent
a) CA Cloud Optimize
a) CloudWatch
a) controlling access to data in the cloud
a) Identities are not tied to the concept of accounts and can be used for contacts or “ID cards”
a) That you establish an identity
a) OpenID 2.0
a) OpenID 2.0 is the standard associated with creating an identity
a) OpenSSL
a) Windows Workflow
a) AD FS
a) PCI-DSS
a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other re
a) 1
Object
CloudFront

Baskets
Data inflight
4
Big data
1
Fault tolerance
Sequential
Directory service
Boot Mounting
Faster network acess
Caching
Openes files &clients
Mounting information
Decrease memory
Hadoop-safemode leave
Open source
Hadoop dfsadmin-get
Read only
Yes
Paas
1
Logon authentication
2
Security
Amazon
Private
AWS
Microsoft
2000
2
Private
1980
Skeleton
Load scheduling
Mutable file
File replication
clients
client interfacing
Host name
Network
Local name
fast recovery,garbage
variable size
Read only
Fault tolerance
CAN
hadoop
realiability
Object
CloudFront

Baskets
Data inflight

Big data

Fault tolerance
Sequential
Directory service
Boot Mounting
Faster network acess
Caching
Openes files &clients
Mounting information
OPTION 2
public
Standardized Web services
Analog Signature
Flipkart.com’s infrastructure was built to support elastic demand so the system could accommodate peak traffic
Credential Management
Open Virualization File
Send structured data over network
CaaS
OMG
Java Source Object Notation
Authentication
Confidentiality
Labs
migrate the container
Docker Hub is a network storage
Andromeda
Find My iPhone
Parallel computing
Parallel processes
Initiation
Cyber cycle
HTC
Transparency
Space based
2 types
1 Server machine
Engineering
Peer-to-Peer
Decentralized computing
Adaptation
Dependability
Centralized computing
Concurrency transparency
Distributed program
Centralized computing
cloud
2C
High-peripheral computing
Data grids
Media mass
Efficiency
abstraction
Application
1. Intranet
machine type
VM instances
App Engine
gcloud iam roles create
8KB
Block

service based on single server


$ cloudshell new
15 days
In Google Cloud Platform and AWS only
XFS
Subdomain
machine type
The vendor is responsible for all the operational aspects of the service
gmail
caas
Caas
Saas
Caas
High-peripheral computing
b) Cloud Attributes
b) In a distributed system, the transaction is stateful
b) Monitoring
b) Caching
b) Virtual machines are not only stateless
b) Staging
b) Do have sensitive data to protect
b) costs
b) Ease of use
b) Resource access
Application that runs on a distributed network using virtualized resource
A imaginary shift
Model
Software
Bare file
Iaas - infrastructure as a service
No
B : Analog Signature
B : Labs
b) Authentication
b) Cloud APIs are the Application Programming Interface to functions that exchange information in and with the cloud
b) Simple Cloud API
b) Platform
b) Most APIs are exposed as SOAP
b) Racksapce Cloud Servers
b) Unmanaged
b) Unmanaged
b) partitioning
b) Unmanaged
b) Cloud Attributes
b) In a distributed system, the transaction is stateful
b) Monitoring
b) Programming language support
b) Virtual machines are only stateless
b) SQL support
b) Complete part of the application is on local system
b) Infrastructure
b) cloud bursting
b) Infrastructure
b) ACID
b) The location of an application or service plays a fundamental role in how the application must be written
b) Consistency
b) Consistency
b) A coherent transaction either succeeds and is enacted, or fails and is rolled back
b) cloud
b) costs
b) offline
b) Consistency
b) Consistency
google scheduler
b) Creation and provisioning of different types of cloud resources, such as machine instances, storage, or staged applications
b) The RightScale user interface provides real-time measurements of individual server instances
b) DMS
b) VMAN
b) Both Cloudkick and RightScale are known to be easy to use with Window virtual servers and less so with Linux instances
b) OCCI
b) CloudKick
b) CA Cloud Orchestrate
b) CloudSensor
b) maintaining user roles
Identities are important from a reliability standpoint
b) That the identity be authenticated
b) CHAP
b) OpenID doesn’t specify the means for authentication of identity
b) CHAP
b) Windows Identity
b) AC
b) HIPPA
b) To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service m
b) 3
Block
AWS Import/Export

Brackets
Data at relax
5
Meta data
FALSE
Scalability
Direct
shadow service
Auto mounting
Scalability
Segmentation
File descriptors&handles
Description of HDD space
improves performance
Hadoop-safemode exit
Fault tolerant
Hadoop dfsadmin-enter
Write only
No
Iaas
2
Bare file
3
Cost
Google
Public
AZURE
IBM
2009
3
Public
1990
Grid
Load performing
Mutex file
Migration
servers
Naming
Local name
Novel
Physical storage location
fast recovery,replication
fixed size
Write only
self-adaptation
CHORD
intranet
abstraction
Block
AWS Import/Export
Brackets
Data at relax
5
Meta data

Scalability
Direct
shadow service
Auto mounting
Scalability
Segmentation
File descriptors&handles
Description of HDD space
OPTION 3 OPTION 4 CORRECT ANSWER LEVEL TOPIC
protected hybrid 3 easy 1
Web-application frameworks Web-based archietectrure 1 easy 1
Digital Signature Encryption 3 easy 1
Datacenters have been sited to optimiDatacenters don’t optimize the system 3 moderate 1
Decryption Encryption 4 moderate 1
Over Virtualization Format Over Virtualization File 1 moderate 1
Messaging Run Server 2 difficult 1
SaaS IaaS 3 difficult 1
OCC Stateless 3 difficult 1
Java Script Object Name Java Script Open Notation 1 easy 2
Replication Segmentation 2 easy 2
Authenticity Availability 1 easy 2
Hash Platform 2 moderate 2
delete the container backup the container 2 moderate 2
It gives access to Docker images It’s a totally private repository 4 moderate 2
Cyclone STANDARDS 3 difficult 2
iWeb Publish MobileMe Gallery 4 difficult 2
Centralized computing All of these 1 difficult 2
Parallel development Parallel programming 4 easy 3
Implementation Deployment 4 easy 3
Internet of things Cyber-physical system 3 easy 3
HRC BOTH A& B 4 moderate 3
Dependency Secretive 2 moderate 3
Tightly coupled Loosely coupled 1 moderate 3
3 types 4 types 3 difficult 3
1 Client machine Many Client machines 4 difficult 3
Science Media mass 1 difficult 3
Space-based Tightly coupled 3 easy 4
Parallel computing All of these 4 easy 4
Efficiency Dependability 3 easy 4
Adaptation Flexibility 3 moderate 4
Utility computing Decentralized computing 3 moderate 4
Performance transparency Replication transparency 1 difficult 4
Distributed application Distributed computing 2 difficult 4
Parallel computing Distributed computing 2 difficult 4
scalable business 4 easy 5
3C 4C 3 easy 5
High-performance computing Highly-parallel computing 3 easy 5
Computational grids BOTH A&B 4 moderate 5
Business science 4 moderate 5
adaption Dependability 4 moderate 5
Productivity none of these 2 difficult 5
CPU all 3 difficult 5
1. Web Applications none of these 1 difficult 5
Type and size of storage disk All of the above 4 easy 6
. Persistent disks Subnets 2 easy 6
Cloud Functions all of the above 4 easy 6
gcloud project create roles gcloud iam create roles 2 easy 6
16KB Block size can vary. 4 moderate 6
VM Subnet 3 moderate 6
1995 2005 1 moderate 6
VM serverless service 4 difficult 6
$ cloudshell blank $ cloudshell editor 1 difficult 6
30 days 60 days 3 difficult 6
In Google Cloud Platform and on preIn Google Cloud Platform, AWS, and on 3 easy 7
EXT4 ReiserFS 1 easy 7
Cluster none of these 1 easy 7
Type and size of storage disk all of the above 4 easy 7
Google’s App Engine platform isNone of the mentioned 3 easy 7
google earth all 1 moderate 7
paas all 3 moderate 7
Paas all 3 moderate 7
Paas All 1 difficult 7
c) In order to create a
Paas
stateless system in a ALL 1 difficult 7
High-performance computing a Highly-parallel computing
distributed architecture, 3 difficult 7
c) Application manager
transaction Attributes or d) All of the mentioned 3 Easy 1
broker must be added so d) None of the mentioned 1 Easy 1
that the intermediary service d) All of the mentioned
c) Configuring 1 Easy 1
c)
canSome applications
account
c) Expertise can be d) Geographic location
for transactions 3 Moderate 1
successfully ported to
and react accordingly when the
d) None of the mentioned 3 Moderate 1
cloud, whileorothers
they succeed fail suffer
c) Index
from the translation d) Portability
Are legacy applications 2 Moderate 1
c) Do need to be customized with no particular competitive 4 Difficult 1
c) maintenance advantage
d) user interface 3 Difficult 1
c) Interface features d) All of the mentioned 4 Difficult 1
c) Uptime that run on a d) costs
Services 4 Difficult 1
distributed network using Option b alone 1 Easy 2
virtualized
Both a andresource
b A imaginary paradigm shift 1 Easy 2
Hardware Software 1 Easy 2
Hardware Analytics 1 Moderate 2
Multiplatform support Bandwidth 1 Moderate 2
Saas – software as a
Both a and b 2 Moderate 2
service
Maybe 1 Difficult 2
C : Digital Signature D : Encryption 3 Difficult 2
C : Hash D : Platform 2 Difficult 2
c) Replication d) All of the mentioned 2 Difficult 2
c) Each cloud vendor has its
d) All of the mentioned 4 Easy 3
own specific API
c) Design Cloud d) All of the mentioned 4 Easy 3
c) Service d) All of the mentioned 1 Easy 3
c) Few APIs are exposed as
d) None of the mentioned 4 Moderate 3
REST
c) RimuHosting d) Racksapce Cloud Servers 4 Moderate 3
c) Unavailable d) None of the mentioned 2 Moderate 3
c) Unavailable d) All of the mentioned 1 Difficult 3
c) replicating data d) all of the mentioned 4 Difficult 3
c) UnAvailable d) All of the mentioned 2 Difficult 3
c) Application Attributes d) All of the mentioned 3 Difficult 3
c) In order to create a
stateless system in a
distributed architecture, a
transaction manager or
broker must be added so d) None of the mentioned 1 Easy 4
that
c) the intermediarystorage,
c) Configuring
Infrastructure, service d) All of the mentioned 1 Easy 4
can
and account
c) Deployment for
the queuing transactions
technology
system all d) All of the mentioned 4 Easy 4
and
comereact accordingly
together to eliminatewhena d) None of the mentioned 3 Moderate 4
they
great succeed or fail
deal ofpartcostof and
c)
c) Replication
Complete the d) Language and locale 4 Moderate 4
operational complexity
application is on local d) None of the mentioned 1 Moderate 4
system
c) Core Services d) None of the mentioned 4 Difficult 4
c) cloud provisioning d) all of the mentioned 2 Difficult 4
c) Database
An application or process d) Storage 3 Difficult 4
that
c) ATOMruns on a desktop or d) All of the mentioned 2 Difficult 4
server is executed
d) None of the mentioned 4 Easy 5
coherently, as a unit, under
c) When rollback is not
the control of an integrated d) All of the mentioned
Isolation 4 Easy 5
possible
c) Isolation
program due to optimistic d) Durability 2 Easy 5
transaction commitment in a
d) None of the mentioned 1 Moderate 5
multiuser application,
c) both local and cloud
durability requires d) none of the mentioned 3 Moderate 5
c) ubiquitous access
correcting the condition d) all of the mentioned 4 Moderate 5
c) virtual d) all of the mentioned 2 Difficult 5
c) Isolation d) Durability 4 Difficult 5
c)
c) Isolation
Performance reporting d) Durability 1 Difficult 5
including
c) availabilityserver
RightScale and Difficult 5
uptime,
templates response
and time,
the d) All of the mentioned 4 Easy 6
resource quota usage, and
Rightscript technology are d) All of the mentioned 4 Easy 6
other
highly
c) EBS characteristics
configurable and can d) All of the mentioned 1 Easy 6
be
c) run under batch control 6
c) OCSI
All of the service models d) None of the mentioned 2 Moderate
support monitoring d) All of the mentioned 2 Moderate 6
solutions
c) SMI d) All of the mentioned 3 Moderate 6
c) Elastra d) All of the mentioned 1 Difficult 6
c) CA Cloud Insight d) CA Cloud Compose 2 Difficult 6
c)
c) CloudMetrics important in d) All of the mentioned 2 Difficult 6
c) Presence
preventingis unauthorized
cloud d) all of the mentioned 4 Difficult 6
uses computing because it
adds context that can d) All of the mentioned 3 Easy 7
c) That the
modify authentication
services and servicebe
d) All of the mentioned 4 Easy 7
portable
delivery
c) SMAL d) None of the mentioned 1 Easy 7
c) OpenID provides access
d) None of the mentioned 4 Moderate 7
to important Web sites
c) SMAL d) None of the mentioned 3 Moderate 7
c) Windows compliance d) None of the mentioned 2 Moderate 7
c) SAS d) None of the mentioned 1 Difficult 7
c) A
c) GLBAsecurity control model d) All of the mentioned 4 Difficult 7
includes the security that
d) All of the mentioned 1 Difficult 7
you normally use for your
c) 5
applications only d) 7 3 Difficult 7
Simple Secure A Easy 1

DynamoDB Elastic chache B Easy


1

clusters Buckets B moderate


1
Data at rest Data in motion Both A & C easy 1
3 2 c east 1
Master data Exit data B moderate 1
B easy 1
Heteroginity Uggradation D easy 1
indexed All the above D difficult 1
system service Authorization service B moderate 2
Explicit mounting All the above D easy 2
Network trafic None D difficult 2
Ram disk None A easy 2
Current file position ALL the above D moderate 2
Session keys Lock status B easy 2
Improves speed Improves availability Both B&D difficult 2
Hadoop-safemode out None A moderate 2
High availability All the above D moderate 2
bin dfsadmin-get None B easy 3
Read write None A easy 3
B easy 3
Caas Saas B moderate 3
3 4 B easy 3
Multi platform support Bandwidth A moderate 3
4 5 B moderate 3
Space Platform A difficult 3
Microsoft Blackboard D easy 3
Community Both A&B D easy 4
OPERA GDRIVE A moderate 4
Amazon Dell A difficult 4
2010 2012 D easy 4
4 5 B easy 4
Protected Hybrid C easy 4
2000 2010 D moderate 4
Linear Template B moderate 4
Load balancing Load measuring C difficult 5
Immutable file None C difficult 5
Client interface Remote acess B difficult 5
storage device All the above D moderate 5
Migration Heterogenity B easy 5
combination of A&B None C eas 5
Andrew All the above D moderate 5
Both A&B None B moderate 5
master replication,integrity None B difficult 5
Both A&B none B moderate 6
open,close ALL the above D easy 6
dealing with instability All the above D moderate 6
Kademila Gnutella D moderate 6
web applications All the above A easy 6
productivity All the above B difficult 6
Simple Secure A Easy 6
DynamoDB Elastic chache B Easy 5

clusters Buckets B moderate


6
Data at rest Data in motion Both A & C easy 6
3 2c east 5
Master data Exit data B moderate 6
B easy 6
Heteroginity Uggradation D easy 6
indexed All the above D difficult 6
system service Authorization service B moderate 6
Explicit mounting All the above D easy 5
Network trafic None D difficult 4
Ram disk None A easy 6
Current file position ALL the above D moderate 6
Session keys Lock status B easy 6

You might also like