0% found this document useful (0 votes)
16 views4 pages

Ais 2017 e

Uploaded by

Mustafa Galal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

Ais 2017 e

Uploaded by

Mustafa Galal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

(1) MCQ

1- Point out the wrong statement:


a) Cloud computing deployments must be monitored and managed in order to be optimized for
best performance
b) To the problems associated with analyzing distributed network applications, the cloud adds
the complexity of virtual infrastructure
c) Cloud management software provides capabilities for managing faults
d) None of the mentioned

2- Point out the correct statement:


a) Cloud management includes not only managing resources in the cloud, but managing
resources on-premises
b) The management of resources in the cloud requires new technology
c) Management of resources on-premises allows vendors to use well-established network
management technologies
d) All of the mentioned

3- Point out the correct statement:


a) Different types of cloud computing service models provide different levels of security services
b) Adapting your on-premises systems to a cloud model requires that you determine what
security mechanisms are required and mapping those to controls that exist in your chosen cloud
service provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All of the mentioned

4- API’s ( Application Programming Interface) is very useful in cloud platforms


a) It eliminates the need to write the fully fledged programs
b) It provides the instructions to make communication between one or more applications
c) It allows easy creation of applications and link the cloud services with other systems
d) All of the above

5- Point out the wrong statement:


a) Securing data sent to, received from, and stored in the cloud is the single largest security
concern
b) The problem with the data you store in the cloud is that it can be located anywhere in the
cloud service provider’s system
c) One and only approach to isolating storage in the cloud from direct client access is to create
layered access to the data

6- executes the requests generated from the virtualization layer or control layer
a. Functions of orchestration layer
b. Function of Physical Layer
c. Functions of Cloud Computing Layer
d. Functions of Virtual Layer

7- Physical layer, Virtual layer, Control layer, Service Orchestration layer, and
Service layer.
a. The three cross-layer functions of the cloud computing reference model
b. The five logical layers of the cloud computing reference model
c. Key goals of Reference Model
d. Functions of Cloud Computing Layer

8- Deployed on the physical layer and specifies the entities that operate at this layer:
- Virtualization Software, - Resource Pools, - Virtual Resources
a. Cloud Computing Layer Characteristics
b. Virtual layer characteristics
c. Physical layer characteristics
d. Service Orchestration Layer Characteristics

9- Specifies the entities that operate at this layer:


- Orchestration Software
a. Physical layer characteristics
b. Service Orchestration Layer Characteristics
c. Virtual layer characteristics
d. Cloud Computing Layer Characteristics

10- In addition to the operating system, what other components does the consumer manage in
an IaaS cloud service model?
A. Application, data, storage, and physical networking
B. Data, middleware, application, and runtime
C. Runtime, physical servers, application, and middleware
D. Middleware, runtime, hypervisor, and application

If the key space for encryption is 3 5 7 9 8 2 * . & = - + 1 4 0 and the key value is 3

11- The cipher text for the original 357 is


a. 357
b. 140
c. 982
d. *=#
e.
12- The original text for the cipher 357 is
a. 982
b. *.,
c. 140
d. None of the above
e.
13- In order to restore a virtual machine, the backup file used is called
a. Snapshot file
b. Configuration file
c. Virtual disk file
d. All of the above
e.
14- What is a service contract?
A. An agreement between provider and supplier that describes the service template specifics
B. An agreement between provider and consumer that lists the conditions for Greenfield service
deployment
C. An agreement between provider and consumer that states the terms of service usage

15- Which of the following service provider provides the most amount of built insecurity?
a)SaaS b)PaaS c)IaaS d) All of the mentioned

Question (2) True or false


1- Virtual machines on the different servers communicate using virtual LANs

2- In order to reclaim memory, an agent is installed on each virtual machine or a management server
reclaim the memory.

3- Server flash cash techniques is similar across all storage pools.

4- Automated storage tiering is based on pool grades.

5- Load balancer is used to provide network storm control.

6- Configure a database is considered a Paas management interface function.

7- Work schedule is considered and administrative mechanism.

8- In workflow modelling, a manual interaction prompts a user for input.

9- Assessing service requirement includes market research.

10- According to the workflows, orchestrator interacts with infrastructure components.

11- In defining service offering, limiting resource access from 1 to 10 am is an example of policies.

12- Resource discovery tools interacts with service assets through a web portal.

13- Resource discovery is performed periodically by the cloud client.

14- If a service provider does not provide the requested security measures, this is considered a natural
cloud service termination.

15- Business continuity include both reactive and proactive measures.

16- Single points of failure can occur on the compute, storage or network levels.

17- Active/active compute cluster means that both servers work concurrently.

18- Hypervisor cluster is established using native file system.

19- In virtual machine live migration, updates are applied with little downtime
20- Aggregation in networks is performed on the NIC only.

21- RAID is the same as disk sparing.

22- In image level backup, initiation is done through a dedicated server.

23- If data is to be replicated to a remote site, asynchronous replication is best.

24- Using try and catch programming statements can be used to provide graceful degradation.

25- Storing application state information in memory is an example of monitoring application


availability.

26- Each hypervisor has one virtual machine manager.

27- Each virtual machine has a log file.

28- Virtual appliance is used for routing packets.

29- Data is moved between storage tiers based on defined tiering constraints.

30- A tenant administrator can set access rights and resource quota and approve user requests.

Question (3):

Assume that organization C fears from denial of service attack. Attack duration is expected to last 10
hours on a yearly basis during which:
1- Additional laptop purchased for secretary work 25000 on a 5 year service life
2- Programmer’s additional hourly work 25 per hour. The company has 15 programmers.
3- Indirect damage for company repetition 30000
4- 20 long distance faxes will be sent costing 20 per fax
If the probability of the attack is 10% and a friend suggested replacing the firewall with a stronger one
that cost 15000 and its cost can be spread over 3 years. Do you accept the offer or not.

Good Luck

You might also like