Deck 6: Cloud Computing, Virtualization, Search Engines, and Instant Messaging

ملء الشاشة (f)
exit full mode
سؤال
The output of the reduce task is typically written to the FileSystem via __________    

A)outputcollector.collect
B)outputcollector.get
C)outputcollector.receive
D)outputcollector.put
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which type of Hypervisor is shown in the following figure?

A)type 1
B)type 2
C)type 3
D)all of the mentioned
سؤال
Point out the wrong statement.

A)load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)multiple instances of various google applications are running on different hosts
C)google uses hardware virtualization
D)all of the mentioned
سؤال
Which of the following is another name for the system virtual machine?

A)hardware virtual machine
B)software virtual machine
C)real machine
D)none of the mentioned
سؤال
Which of the following provide system resource access to virtual machines?

A)vmm
B)vmc
C)vnm
D)all of the mentioned
سؤال
An operating system running on a Type              VM is full virtualization.

A)1
B)2
C)3
D)all of the mentioned
سؤال
Which of the following is Type 1 Hypervisor?

A)wind river simics
B)virtual server 2005 r2
C)kvm
D)lynxsecure
سؤال
Which of the following is Type 2 VM?

A)virtuallogix vlx
B)vmware esx
C)xen
D)lynxsecure
سؤال
Which of the following will be the host operating system for Windows Server?

A)virtuallogix vlx
B)microsoft hyper-v
C)xen
D)all of the mentioned
سؤال
Which of the following should be placed in second lowermost layer for the following figure?

A)host operating system
B)software
C)vm
D)none of the mentioned
سؤال
Which of the following algorithm is used by Google to determine the importance of a particular page?

A)svd
B)pagerank
C)fastmap
D)all of the mentioned
سؤال
Point out the correct statement.

A)with paas, the goal is to create hosted scalable applications that are used in a software as a service model
B)applications built using paas tools need to be standards-based
C)in wolf, the data and transaction management conforms to the business rules you create
D)all of the mentioned
سؤال
Based on PageRank algorithm, Google returns ___________    for a query that is parsed for its keywords.

A)sep
B)sap
C)serp
D)business objects build
سؤال
Point out the wrong statement.

A)wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
B)applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
C)google applications are cloud-based applications
D)none of the mentioned
سؤال
Which of the following protocol lets a Web site list in an XML file information?

A)sitemaps
B)mashups
C)hashups
D)all of the mentioned
سؤال
Which of the following is not provided by "Deep Web"?

A)database generated web pages
B)private or limited access web pages
C)pages without links
D)all of the mentioned
سؤال
Dynamic content presented in Google _____________ crawling isn't normally indexed.

A)ajax
B)java
C)javascript
D)all of the mentioned
سؤال
Which of the following google product sends you periodic email alerts based on your search term?

A)alerts
B)blogger
C)calendar
D)all of the mentioned
سؤال
Which of the following is a payment processing system by Google?

A)paytm
B)checkout
C)code
D)all of the mentioned
سؤال
How many types of protocols are important for instant messaging?

A)2
B)3
C)4
D)all of the mentioned
سؤال
Point out the correct statement.

A)every third-party im clients aim to allow their users to connect to the different major im services
B)sip stands for secure initiation protocol
C)xmpp stands for extensible messaging and presence protocol
D)all of the mentioned
سؤال
Which of the following protocol is adopted for interoperability by top three IM service providers?

A)sip
B)simple
C)xmpp
D)imps
سؤال
Which of the following protocol is not an Internet Engineering Task Force standard?

A)sip
B)simple
C)xmpp
D)imps
سؤال
Point out the wrong statement.

A)all im clients use peer-to-peer messaging
B)im software aimed at businesses such as xmpp, lotus sametime, and microsoft office communicator use a client/server architecture
C)instant messaging is as popular in business as it is in personal communications
D)none of the mentioned
سؤال
Which of the following IM client allow their users to connect to the different major IM services?

A)pidgin
B)miranda im
C)trillian
D)all of the mentioned
سؤال
Which of the architectural layer is used as a front end in cloud computing?

A)client
B)cloud
C)soft
D)all of the mentioned
سؤال
Which of the following benefit is provided by the PaaS service provider

A)A larger pool of qualified developers
B)More reliable operation
C)A logical design methodology
D)All of the mentioned
سؤال
Communication between services is done widely using _______ protocol

A)REST
B)SOAP
C)RESTful
D)None of the mentioned
سؤال
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
سؤال
Which of the following component is called hypervisor?

A)VGM
B)VMc
C)VMM
D)All of the mentioned
سؤال
Applications such as a Web server or database server that can run on a virtual machine image are referred to as __

A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
سؤال
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.

A)Ben
B)Xen
C)Ken
D)Zen
سؤال
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
سؤال
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
سؤال
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
سؤال
The source of HDFS architecture in Hadoop originated as

A)Google distributed filesystem
B)Yahoo distributed filesystem
C)Facebook distributed filesystem
D)Amazon S3 storage
سؤال
What is default replication factor?

A)1
B)2
C)3
D)5
سؤال
What is HDFS Block in Hadoop?

A)It is the logical representation of data
B)It is the physical representation of data
C)Both the above
D)None of the above
سؤال
The need for data replication can arise in various scenarios like

A)DataNode is the slave/worker node and holds the user data in the form of Data Blocks
B)DataNode goes down
C)Data Blocks get corrupted
D)All of the above
سؤال
If the IP address or hostname of a data node changes

A)The namenode updates the mapping between file name and block name
B)The data in that data node is lost forever
C)The namenode need not update mapping between file name and block name
D)There namenode has to be restarted
سؤال
For the frequently accessed HDFS files the blocks are cached in

A)The memory of the data node
B)In the memory of the namenode
C)Both the above
D)None of the above
سؤال
In HDFS the files cannot be

A)Read
B)Deleted
C)Executed
D)Archived
سؤال
Which of the following is not the feature of Network management systems?

A)Accounting
B)Security
C)Performance
D)None of the mentioned
سؤال
Which of the following service provider provides the least amount of built in security?

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
سؤال
Point out the correct statement.

A)Different types of cloud computing service models provide different levels of security services
B)Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required
C)Data should be transferred and stored in an encrypted format for security purpose
D)All of the mentioned
سؤال
Point out the wrong statement.

A)You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
C)Cloud computing doesn't have vulnerabilities associated with Internet applications
D)All of the mentioned
سؤال
Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A)Scalability
B)Portability and interoperability
C)Flexibility
D)None of the mentioned
سؤال
Which of the following is considered an essential element in cloud computing by CSA?

A)Multi-tenancy
B)Identity and access management
C)Virtualization
D)All of the mentioned
سؤال
Which of the following is used for Web performance management and load testing?

A)VMware Hyperic
B)Webmetrics
C)Univa UD
D)Tapinsystems
سؤال
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)CAS
B)CSA
C)SAC
D)All of the mentioned
سؤال
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
سؤال
Which of the following cloud does not require mapping?

A)Public
B)Private
C)Hybrid
D)None of the mentioned
سؤال
Point out the wrong statement.

A)Each different type of cloud service delivery model creates a security boundary
B)Any security mechanism below the security boundary must be built into the system
C)Any security mechanism above the security boundary must be maintained by the customer
D)All of the mentioned
سؤال
Amazon EC2 provides virtual computing environments, known as :

A)chunks
B)instances
C)messages
D)None of the mentioned
سؤال
Data stored in __________ domains doesn't require maintenance of a schema.

A)SimpleDB
B)SQL Server
C)Oracle
D)RDS
سؤال
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

A)CloudWatch
B)Amazon Elastic Block Store
C)AWS Import/Export
D)All of the mentioned
سؤال
Which of the following is most important feature of cloud storage listed below ?

A)Logon authentication
B)Bare file
C)Multiplatform support
D)Adequate bandwidth
سؤال
Which of the following is open cloud storage management standard by SNIA ?

A)CDMI
B)OCCI
C)CEA
D)Adequate bandwidth
سؤال
Which of the following service is provided by Google for online storage ?

A)Drive
B) SkyDrive
C)Dropbox
D)All of the mentioned
سؤال
Which of the following backup create a cloned copy of your current data or drive ?

A)Continuous Data Protection
B)Open file backup
C)Reverse Delta backup
D)None of the mentioned
سؤال
Point out the correct statement.

A)Amazon Elastic Cloud is a system for creating virtual disks(volume)
B)SimpleDB interoperates with both Amazon EC2 and Amazon S3
C)EC3 is an Analytics as a Service provider
D)None of the mentioned
سؤال
Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?

A)CloudWatch
B)Amazon SimpleDB
C)Amazon Cloudfront
D)All of the mentioned
سؤال
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?

A)Amazon Elastic Compute Cloud
B)Amazon Associates Web Services
C)Alexa Web Information Service
D)All of the mentioned
سؤال
Which of the following is a billing and account management service?

A)Amazon Elastic MapReduce
B)Amazon Mechanical Turk
C)Amazon DevPay
D)Multi-Factor Authentication
سؤال
___________ is an application for collecting messages sent in RSS and Atom format from information providers.

A)Google Reader
B)Yahoo Mail
C)EmailRackspace
D)All of the mentioned
سؤال
The advantages of Ajax is _______________

A)Bandwidth utilization
B)More interactive
C)Speeder retrieval of data
D)All of these
سؤال
Virtual Machines (VMs) are offered in cloud by

A)SaaS
B)PaaS
C)IaaS
D)None of these
سؤال
The technology used to distribute service requests to resources is referred to as _____________

A)load performing
B)load scheduling
C)load balancing
D)all of the mentioned
سؤال
_________ computing refers to applications and services that run on a distributed network using virtualized resources.

A)Distributed
B)Cloud
C)Soft
D)Parallel
سؤال
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.

A)real
B)virtual
C)cloud
D)none of the mentioned
سؤال
Amazon's Elastic Compute Cloud (EC2) is a well known ______.

A)Virtual machine
B)Cloud Storage
C)PaaS
D)SoA
سؤال
________ virtualization abstracts networking hardware and software into a virtual network that can be managed.

A)Storage
B)Network
C)Software
D)None of the mentioned
سؤال
_________ is used by Amazon Web Services to store copies of a virtual machine.

A)AMI
B)EMI
C)IMI
D)Application services
سؤال
In para-virtualization, VMs run on hypervisor that interacts with the hardware.
سؤال
An operating system running on a Type __ VM is a full virtualization.

A)1
B)2
C)3
D)All of the mentioned
سؤال
_____________________where a VM can be moved from one physical machine to another even as it continues to execute.

A)Load Balancing
B)Migration
C)Live Migration
D)Server consolidation
سؤال
Point out the wrong statement :

A)Load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)Multiple instances of various Google applications are running on different hosts
C)Google uses hardware virtualization
D)All of the mentioned
سؤال
Point out the wrong statement :

A)Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM
B)All CPUs support virtual machines
C)On a Type 2 VM, a software interface is created that emulates the devices with which a system would normally interact
D)All of the mentioned
سؤال
Which of the following type of virtualization is found in hypervisor such as Microsoft's Hyper-V ?

A)paravirtualization
B)full virtualization
C)emulation
D)none of the mentioned
سؤال
Point out the wrong statement :

A)Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
B)Guest operating systems in full virtualization systems are generally faster than other virtualization schemes
C)A process virtual machine instantiates when a command begins a process
D)All of the mentioned
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/125
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Cloud Computing, Virtualization, Search Engines, and Instant Messaging
1
The output of the reduce task is typically written to the FileSystem via __________    

A)outputcollector.collect
B)outputcollector.get
C)outputcollector.receive
D)outputcollector.put
outputcollector.collect
2
Which type of Hypervisor is shown in the following figure?

A)type 1
B)type 2
C)type 3
D)all of the mentioned
type 1
3
Point out the wrong statement.

A)load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)multiple instances of various google applications are running on different hosts
C)google uses hardware virtualization
D)all of the mentioned
google uses hardware virtualization
4
Which of the following is another name for the system virtual machine?

A)hardware virtual machine
B)software virtual machine
C)real machine
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following provide system resource access to virtual machines?

A)vmm
B)vmc
C)vnm
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
6
An operating system running on a Type              VM is full virtualization.

A)1
B)2
C)3
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is Type 1 Hypervisor?

A)wind river simics
B)virtual server 2005 r2
C)kvm
D)lynxsecure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is Type 2 VM?

A)virtuallogix vlx
B)vmware esx
C)xen
D)lynxsecure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following will be the host operating system for Windows Server?

A)virtuallogix vlx
B)microsoft hyper-v
C)xen
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following should be placed in second lowermost layer for the following figure?

A)host operating system
B)software
C)vm
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following algorithm is used by Google to determine the importance of a particular page?

A)svd
B)pagerank
C)fastmap
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
12
Point out the correct statement.

A)with paas, the goal is to create hosted scalable applications that are used in a software as a service model
B)applications built using paas tools need to be standards-based
C)in wolf, the data and transaction management conforms to the business rules you create
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
13
Based on PageRank algorithm, Google returns ___________    for a query that is parsed for its keywords.

A)sep
B)sap
C)serp
D)business objects build
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
14
Point out the wrong statement.

A)wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
B)applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
C)google applications are cloud-based applications
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following protocol lets a Web site list in an XML file information?

A)sitemaps
B)mashups
C)hashups
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not provided by "Deep Web"?

A)database generated web pages
B)private or limited access web pages
C)pages without links
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
17
Dynamic content presented in Google _____________ crawling isn't normally indexed.

A)ajax
B)java
C)javascript
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following google product sends you periodic email alerts based on your search term?

A)alerts
B)blogger
C)calendar
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is a payment processing system by Google?

A)paytm
B)checkout
C)code
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
20
How many types of protocols are important for instant messaging?

A)2
B)3
C)4
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
21
Point out the correct statement.

A)every third-party im clients aim to allow their users to connect to the different major im services
B)sip stands for secure initiation protocol
C)xmpp stands for extensible messaging and presence protocol
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following protocol is adopted for interoperability by top three IM service providers?

A)sip
B)simple
C)xmpp
D)imps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following protocol is not an Internet Engineering Task Force standard?

A)sip
B)simple
C)xmpp
D)imps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
24
Point out the wrong statement.

A)all im clients use peer-to-peer messaging
B)im software aimed at businesses such as xmpp, lotus sametime, and microsoft office communicator use a client/server architecture
C)instant messaging is as popular in business as it is in personal communications
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following IM client allow their users to connect to the different major IM services?

A)pidgin
B)miranda im
C)trillian
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the architectural layer is used as a front end in cloud computing?

A)client
B)cloud
C)soft
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following benefit is provided by the PaaS service provider

A)A larger pool of qualified developers
B)More reliable operation
C)A logical design methodology
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
28
Communication between services is done widely using _______ protocol

A)REST
B)SOAP
C)RESTful
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following component is called hypervisor?

A)VGM
B)VMc
C)VMM
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
31
Applications such as a Web server or database server that can run on a virtual machine image are referred to as __

A)virtual server
B)virtual appliances
C)machine imaging
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
32
Amazon Machine Images are virtual appliances that have been packaged to run on the grid of ____ nodes.

A)Ben
B)Xen
C)Ken
D)Zen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
33
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following provider rely on the virtual machine technology to deliver servers?

A)CaaS
B)AaaS
C)PaaS
D)IaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
35
__________ is a CPU emulator and virtual machine monitor

A)Imaging
B)Parallels
C)QEMU
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
36
The source of HDFS architecture in Hadoop originated as

A)Google distributed filesystem
B)Yahoo distributed filesystem
C)Facebook distributed filesystem
D)Amazon S3 storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is default replication factor?

A)1
B)2
C)3
D)5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is HDFS Block in Hadoop?

A)It is the logical representation of data
B)It is the physical representation of data
C)Both the above
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
39
The need for data replication can arise in various scenarios like

A)DataNode is the slave/worker node and holds the user data in the form of Data Blocks
B)DataNode goes down
C)Data Blocks get corrupted
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
40
If the IP address or hostname of a data node changes

A)The namenode updates the mapping between file name and block name
B)The data in that data node is lost forever
C)The namenode need not update mapping between file name and block name
D)There namenode has to be restarted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
41
For the frequently accessed HDFS files the blocks are cached in

A)The memory of the data node
B)In the memory of the namenode
C)Both the above
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
42
In HDFS the files cannot be

A)Read
B)Deleted
C)Executed
D)Archived
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is not the feature of Network management systems?

A)Accounting
B)Security
C)Performance
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following service provider provides the least amount of built in security?

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
45
Point out the correct statement.

A)Different types of cloud computing service models provide different levels of security services
B)Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required
C)Data should be transferred and stored in an encrypted format for security purpose
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
46
Point out the wrong statement.

A)You can use proxy and brokerage services to separate clients from direct access to shared cloud storage
B)Any distributed application has a much greater attack surface than an application that is closely held on a Local Area Network
C)Cloud computing doesn't have vulnerabilities associated with Internet applications
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A)Scalability
B)Portability and interoperability
C)Flexibility
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is considered an essential element in cloud computing by CSA?

A)Multi-tenancy
B)Identity and access management
C)Virtualization
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is used for Web performance management and load testing?

A)VMware Hyperic
B)Webmetrics
C)Univa UD
D)Tapinsystems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model?

A)CAS
B)CSA
C)SAC
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
51
For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A)SaaS
B)PaaS
C)IaaS
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following cloud does not require mapping?

A)Public
B)Private
C)Hybrid
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
53
Point out the wrong statement.

A)Each different type of cloud service delivery model creates a security boundary
B)Any security mechanism below the security boundary must be built into the system
C)Any security mechanism above the security boundary must be maintained by the customer
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
54
Amazon EC2 provides virtual computing environments, known as :

A)chunks
B)instances
C)messages
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
55
Data stored in __________ domains doesn't require maintenance of a schema.

A)SimpleDB
B)SQL Server
C)Oracle
D)RDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

A)CloudWatch
B)Amazon Elastic Block Store
C)AWS Import/Export
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following is most important feature of cloud storage listed below ?

A)Logon authentication
B)Bare file
C)Multiplatform support
D)Adequate bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is open cloud storage management standard by SNIA ?

A)CDMI
B)OCCI
C)CEA
D)Adequate bandwidth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following service is provided by Google for online storage ?

A)Drive
B) SkyDrive
C)Dropbox
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following backup create a cloned copy of your current data or drive ?

A)Continuous Data Protection
B)Open file backup
C)Reverse Delta backup
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
61
Point out the correct statement.

A)Amazon Elastic Cloud is a system for creating virtual disks(volume)
B)SimpleDB interoperates with both Amazon EC2 and Amazon S3
C)EC3 is an Analytics as a Service provider
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following is a structured data store that supports indexing and data queries to both EC2 and S3?

A)CloudWatch
B)Amazon SimpleDB
C)Amazon Cloudfront
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following is the machinery for interacting with Amazon's vast product data and eCommerce catalog function?

A)Amazon Elastic Compute Cloud
B)Amazon Associates Web Services
C)Alexa Web Information Service
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
64
Which of the following is a billing and account management service?

A)Amazon Elastic MapReduce
B)Amazon Mechanical Turk
C)Amazon DevPay
D)Multi-Factor Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
65
___________ is an application for collecting messages sent in RSS and Atom format from information providers.

A)Google Reader
B)Yahoo Mail
C)EmailRackspace
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
66
The advantages of Ajax is _______________

A)Bandwidth utilization
B)More interactive
C)Speeder retrieval of data
D)All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
67
Virtual Machines (VMs) are offered in cloud by

A)SaaS
B)PaaS
C)IaaS
D)None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
68
The technology used to distribute service requests to resources is referred to as _____________

A)load performing
B)load scheduling
C)load balancing
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
69
_________ computing refers to applications and services that run on a distributed network using virtualized resources.

A)Distributed
B)Cloud
C)Soft
D)Parallel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
70
Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.

A)real
B)virtual
C)cloud
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
71
Amazon's Elastic Compute Cloud (EC2) is a well known ______.

A)Virtual machine
B)Cloud Storage
C)PaaS
D)SoA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
72
________ virtualization abstracts networking hardware and software into a virtual network that can be managed.

A)Storage
B)Network
C)Software
D)None of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
73
_________ is used by Amazon Web Services to store copies of a virtual machine.

A)AMI
B)EMI
C)IMI
D)Application services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
74
In para-virtualization, VMs run on hypervisor that interacts with the hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
75
An operating system running on a Type __ VM is a full virtualization.

A)1
B)2
C)3
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
76
_____________________where a VM can be moved from one physical machine to another even as it continues to execute.

A)Load Balancing
B)Migration
C)Live Migration
D)Server consolidation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
77
Point out the wrong statement :

A)Load balancing virtualizes systems and resources by mapping a logical address to a physical address
B)Multiple instances of various Google applications are running on different hosts
C)Google uses hardware virtualization
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
78
Point out the wrong statement :

A)Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM
B)All CPUs support virtual machines
C)On a Type 2 VM, a software interface is created that emulates the devices with which a system would normally interact
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the following type of virtualization is found in hypervisor such as Microsoft's Hyper-V ?

A)paravirtualization
B)full virtualization
C)emulation
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
80
Point out the wrong statement :

A)Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
B)Guest operating systems in full virtualization systems are generally faster than other virtualization schemes
C)A process virtual machine instantiates when a command begins a process
D)All of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 125 في هذه المجموعة.