Multiple Choice Questions and Answers
Question 1 : Potential defense mechanism to repudiation include all of the following except
(a) Digital signatures
(b) Time stamps
(c) Audit trails
(d) Filtering
Answer : (d) Filtering
Question 2 : Authentication, authorization, throttling, and filtering are potential defense mechanisms for
(a) Data tampering
(b) Repudiation
(c) Information Disclosure
(d) Denial of Service
Answer : (d) Denial of Service
Question 3 : The user layer of the cloud security architecture consists of the following except
(a) Authentication
(b) Security-as-a-Service
(c) Infrastructure
(d) Browser Security
Answer : (c) Infrastructure
Question 4 : Origin in browser security means
(a) Different browser
(b) Same application
(c) Source browser
(d) Origin application
Answer : (b) Same application
Question 5 : Cloud monitoring requirements are all of the following except
(a) Migration
(b) Scalability
(c) Portability
(d) Autonomy
Answer : (c) Portability
Question 6 : Which of the following is related to RESTful Web Services?
(a) CMS
(b) PCMONS
(c) RMCM
(d) CloudWatch
Answer : (a) CMS
Question 7 : When an authorized intruder access, copies or transmits private, confidential or sensitive data belonging to a person or organization, this phenomenon is known as
(a) Data loss
(b) Data access
(c) Data breach
(d) Data hack
Answer : (c) Data breach
Question 8 : A cloud service level agreement is composed of all the following except
(a) Service guarantee
(b) Service guarantee time period
(c) Service guarantee granularity
(d) Service guarantee inclusions
Answer : (d) Service guarantee inclusions
Question 9 : BladeSystem matrix servers are products of which cloud vendor?
(a) IBM
(b) HP
(c) Salesforce
(d) RackSpace
Answer : (b) HP
Question 10 : Customer relationship management is associated with one of the following cloud vendors.
(a) IBM
(b) HP
(c) Salesforce
(d) RackSpace
Answer : (c) Salesforce
Question 11 : HP Cloud Services Enablement for Infrastructure-as-a-Service is made up of all of the following except
(a) HP Cloud Service Automation
(b) HP Cloud Autumn Matrix server
(c) HP Aggregation Platform for SaaS
(d) HP BladeSystem Matrix server
Answer : (b) HP Cloud Autumn Matrix server
Question 12 : One of the following can be used to enhance the deployment of a successful private cloud architecture.
(a) HP Cloud Service Automation
(b) HP Cloud Autumn Matrix server
(c) HP Aggregation Platform for SaaS
(d) HP BladeSystem Matrix server
Answer : (a) HP Cloud Service Automation
Question 13 : Packet loss frequency is associated with which of the cloud QoS measures ?
(a) Computation
(b) Communication
(c) Memory
(d) Transport
Answer : (b) Communication
Question 14 : Maturity is associated with which of the cloud QoS measures ?
(a) Adaptability
(b) Usability
(c) Reliability
(d) Efficiency
Answer : (c) Reliability
Question 15 : Power usage efficiency is associated with which of the cloud QoS measures ?
(a) Sustainability
(b) Modifiability
(c) Reliability
(d) Reusability
Answer : (a) Sustainability
Question 16 : Cosine similarity is associated with none of the following trust management except
(a) Reputation-based
(b) Prediction-based
(c) Recommendation-based
(d) Policy-based
Answer : (b) Prediction-based
Question 17 : Amazon and eBay are examples of which trust management?
(a) Reputation-based
(b) Prediction-based
(c) Recommendation-based
(d) Policy-based
Answer : (a) Reputation-based
Question 18 : Which of the following cloud-enabled migration is also known as Cloudify?
(a) Type I
(b) Type II
(c) Type III
(d) Type IV
Answer : (d) Type IV
Question 19 : The techniques for provisioning quality of service to the cloud applications include all of the following except:
(a) Admission control
(b) Scheduling
(c) Handoff
(d) Dynamic resource provisioning
Answer : (c) Handoff
Question 20 : ‘Mean Time to Change’ is associated with
(a) Modifiability
(b) Usability
(c) Reusability
(d) Sustainability
Answer : (a) Modifiability
Fill in the Blanks
Question 1 : …………….. refers to the ability to share sensitive data between number of users without violating the privileges granted by the data owner to each of the targeted user.
Answer : Data confidentiality
Question 2 : When a browser is incapable of generating cryptographically-valid XML tokens, such an attack is known as …………. .
Answer : attacks on browser-based cloud authentication
Question 3 : ………………….. involves the scripting of web pages for access and usage rights.
Answer : The legacy same origin policy
Question 4 : ………………. uses IF-MAP standard to authorize users in real-time communication between the cloud provider and the consumer.
Answer : Trusted Platform Module (TPM)
Question 5 : …………. is a typical attack aimed at injecting a malicious service performance module into a legitimate instance of a virtual machine.
Answer : Cloud Malware Injection Attack
Question 6 : …………………….. is a component of the virtual machine that enables host isolation and resource sharing.
Answer : Hypervisor
Question 7 : ……………….. is the economics of cloud computing and a multi-tenancy architecture used in SaaS.
Answer : Data-at-rest
Question 8 : ……………….. can be referred to as a statistical concept associated with uncertain outcomes of business activities in the future.
Answer : Risk
Question 9 : ………………….. is the degree of quality of a cloud service provided to a cloud service consumer by a cloud service provider.
Answer : Credibility
Question 10 : The resource scale on which a provider defines a service guarantee is known as ………………. .
Answer : Service guarantee granularity
Question 11 : ……………….. allows credentials to be issued following standards like Security Assertion Markup Language (SAML) and Simple Public Key Infrastructure (SPKI).
Answer : credential-based threshold
Question 12 : …………………… occurs when a cloud service consumer directly recommends a particular cloud service to their established trusted contacts.
Answer : Explicit recommendation
Question 13 : ………………. is an official document that clearly specifies technical and functional descriptions to be complied by the cloud service provider.
Answer : Service level agreement
Question 14 : ………………. is derived from the analysis of cloud service rating feedback supplied by trading partners after a transaction is completed successfully.
Answer : The trust level
Question 15 : ………….. reflects redundant provisioning of data storage and processing facilities to manage a potential single point of failure events.
Answer : Adaptability
Question 16 : ………….. is the assurance component for establishing and maintaining successful relational exchanges among all stakeholders in a cloud environment.
Answer : Trust management
Question 17 : ……………. involves the selection, deployment and run-time management of software and hardware resources for ensuring guaranteed satisfaction of cloud service performance to the end-users.
Answer : Dynamic Resource Provisioning
Question 18 : The speed of response to adjusted workload is known as ………………. .
Answer : cloud elasticity OR rapid elasticity (any one is correct)
Question 19 : ……………….. is a document that contains the records of all service level management problems related to a group of certain users.
Answer : Customer Level SLA
Question 20 : …………………. measures the quality of the efficiency of the connection and data transfer between internal service instances, different cloud services, or between external consumer and the cloud.
Answer : Communication