Google Cloud Platform(GCP)/Google Cloud MCQ Set 4 Sample Test,Sample questions

Question:
 Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider.

1.OpenID

2.OpenUser

3.OpenSSD

4.none of the mentioned


Question:
 Point out the correct statement.

1.Mashups are an incredibly useful hybrid Web application

2. SaaS will eventually replace all locally installed software

3.The establishment and proof of identity is a central network function

4. All of the mentioned


Question:
 Point out the wrong statement.

1.Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems

2.Services that provide digital identity management as a service have been part of internetworked systems from Day One

3.IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

4.none of the mentioned


Question:
 Point out the wrong statement.

1.XML checks the ID request against its policies and either allows or denies the request

2.SPML in most instances operates as a reply/request mechanism

3.User centric authentication takes place usually in the form of knowledge cards

4.all of the mentioned


Question:
 Point out the wrong statement.

1.Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems

2.The Distributed Audit Service provides accountability for users accessing a system

3.The OpenID and CardSpace specifications support the authentication type of data object

4. None of the mentioned


Question:
 Point out the wrong statement.

1.SPML is used to prepare Web services and applications for use

2.With SPML, a system can provide automated user and system access

3.Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

4. All of the mentioned


Question:
 Point out the wrong statement.

1. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

2. Guest operating systems in full virtualization systems are generally faster than other virtualization schemes

3.A process virtual machine instantiates when a command begins a process

4. All of the mentioned


Question:
 Which of the following allows a distributed ID system to write and enforce custom policy expressions?

1. XACML

2.XML

3.SOAP

4.none of the mentioned


Question:
 Which of the following can be used for the banking industry?

1. athenahealth

2.bankserve

3.bankingsol

4.all of the mentioned


Question:
 Which of the following is a PCI CaaS service?

1. FedCloud

2. ClearSoln

3.Rackserve PCI

4.all of the mentioned


Question:
 Which of the following is another name for the system virtual machine?

1.hardware virtual machine

2.software virtual machine

3. real machine

4. None of the mentioned


Question:
 Which of the following is authorization markup language?

1. eXtensible Access Control Markup Language

2. intrinsic Access Control Markup Language

3. hypertext Access Control Markup Language

4.all of the mentioned


Question:
 Which of the following network resources can be load balanced?

1.Connections through intelligent switches

2.DNS

3.Storage resources

4.all of the mentioned


Question:
 Which of the following operating system support operating system virtualization?

1.Windows NT

2.Sun Solaris

3.Windows XP

4.Compliance


Question:
 Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V?

1.paravirtualization

2. full virtualization

3.emulation

4. None of the mentioned


Question:
A ______ is a combination load balancer and application server that is a server placed between a firewall or router.

1.ABC

2.ACD

3. ADC

4.all of the mentioned


Question:
A _______ image makes a copy or a clone of the entire computer system inside a single container such as a file.

1. system

2. software

3.hardware

4.none of the mentioned


Question:
AMI imaging service is provided by Amazon for ______

1. private use

2.public use

3.pay-per-use

4.all of the mentioned


Question:
An operating system running on a Type ______ VM is full virtualization.

1.1

2.2

3.3

4.All of the mentioned


Question:
In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware.

1. paravirtualization

2. full virtualization

3.emulation

4.none of the mentioned


Question:
In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware.

1. paravirtualization

2.full virtualization

3.emulation

4. None of the mentioned


Question:
Point out the correct statement.

1. Cloud computing by its very nature spans same jurisdictions

2.SaaS is much more than simply providing an anonymous service token to an identity

3.A Compliance as a Service application would need to serve as a trusted third party

4.all of the mentioned


Question:
Point out the correct statement.

1. A client can request access to a cloud service from any location

2.A cloud has multiple application instances and directs requests to an instance based on conditions

3.Computers can be partitioned into a set of virtual machines with each machine being assigned a workload

4. All of the mentioned


Question:
Point out the correct statement.

1.Virtual appliances are a relatively new paradigm for application deployment

2. External network virtualization cannot be done using network switches and VLAN software

3.All imaging programs can take snapshots of systems

4.all of the mentioned


Question:
Point out the wrong statement.

1.A virtual network can create virtual network interfaces

2.Instantiating a virtual machine is a very slow process

3.You can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtual machines

4.all of the mentioned


Question:
Point out the wrong statement.

1. Cloud computing applications have the ability to run on virtual systems

2. Systems (VMs running applications), storage, and network assets cannot be virtualized

3. Applications that run in data centers are captive to the operating systems and hardware platforms that they run on

4.all of the mentioned


Question:
Salesforce.com is the largest ______ provider of CRM software.

1.PaaS

2.IaaS

3.CaaS

4.SaaS


Question:
Simple Cloud API is useful for applications written in _______

1. PHP

2. Python

3. Scala

4.none of the mentioned


Question:
The technology used to distribute service requests to resources is referred to as _______

1. load performing

2. load scheduling

3. load balancing

4.all of the mentioned


Question:
The _______ Open Source Identity Framework is used to create a vendor-neutral cloud-based authentication service.

1.Higgins

2.Hughes

3.Hinges

4.all of the mentioned


Question:
The __________ solution creates a virtual application appliance as an architectural layer between the Windows or the UNIX operating system and applications.

1.AppOne

2.AppZero

3.AppZero

4.none of the mentioned


Question:
What does L in LAMP stands for?

1.Lamp

2.Linux

3.Lone

4.none of the mentioned


Question:
What is the relation of the capacity attribute to performance?

1.same

2.different

3. similar

4.none of the mentioned


Question:
Which of the following allows a virtual machine to run on two or more physical processors at the same time?

1. Virtual SMP

2. Distributed Resource Scheduler

3.Network Distributed Switch

4. Storage VMotion


Question:
Which of the following application delivery platform’s main focus is on desktop installations?

1.Microsoft App-V

2.Microsoft Hyper

3. Amazon EC2

4.all of the mentioned


Question:
Which of the following attribute should be unique?

1.identity

2. digital identity

3.mashup

4.all of the mentioned


Question:
Which of the following group is dedicated to support technologies that implement enterprise mashups?

1.Open Alliance Apache

2. Open Mashup Alliance

3.Open Tech Alliance

4.none of the mentioned


Question:
Which of the following is a man-in-the-middle type of service?

1. CaaS

2.IaaS

3.AaaS

4. All of the mentioned


Question:
Which of the following is a more sophisticated load balancer?

1.workload managers

2.workspace managers

3.rackserve managers

4.all of the mentioned


Question:
Which of the following is a potent cloud-building technology?

1.vSphere

2.HyperCube

3. vCube

4.all of the mentioned


Question:
Which of the following is a service that aggregates servers into an assignable pool?

1.VMware vStorage

2.VMware vNetwork

3.VMware vCompute

4.Application services


Question:
Which of the following is an example of a vertical cloud that advertise CaaS capabilities?

1. FedCloud

2.ClearPoint PCI

3.Rackserve PCI

4. All of the mentioned


Question:
Which of the following is an open standard for storing a system image?

1. OVF

2.PPF

3.VOF

4.Compliance


Question:
Which of the following is one of the major categories of Amazon Machine Instances that you can create on the Amazon Web Service?

1.WAMP

2.XAMPP

3. LAMP

4.none of the mentioned


Question:
Which of the following is provided by Identity as a Service?

1.Identity governance

2. Provisioning

3.Risk and event monitoring

4. all of the mentioned


Question:
Which of the following is the most widely used technique for abstraction?

1. Load balancing

2. Load scheduling

3. Load scaling

4.all of the mentioned


Question:
Which of the following is Type 1 Hypervisor?

1.Wind River Simics

2.Virtual Server 2005 R2

3. KVM

4.LynxSecure


Question:
Which of the following is Type 2 VM?

1.VirtualLogix VLX

2.VMware ESX

3. Xen

4.LynxSecure


Question:
Which of the following layer serves as the mediator for file I/O, the memory I/O, and application calls and response to DLLs?

1.application

2.client

3.virtualization

4.none of the mentioned


Question:
Which of the following product migrate files from one datastore to another datastore?

1.Network Distributed Switch

2. Storage VMotion

3.VMotion

4.none of the mentioned


Question:
Which of the following provide system resource access to virtual machines?

1. VMM

2.VMC

3.VNM

4.all of the mentioned


Question:
Which of the following runs on Xen Hypervisor?

1. Azure

2.AWS EC2

3. AWS EC3

4. All of the mentioned


Question:
Which of the following software can be used to implement load balancing?

1. Apache mod_balancer

2. Apache mod_proxy_balancer

3.F6’s BigIP

4. All of the mentioned


Question:
Which of the following standard is concerned with the exchange and control of identity information?

1. IGK

2.IDF

3. IGF

4.all of the mentioned


Question:
Which of the following type of virtualization is also characteristic of cloud computing?

1.Storage

2.Application

3. CPU

4.all of the mentioned


Question:
Which of the following vendor is offering optimization appliances for VMware infrastructure?

1. Expand Networks

2.Certeon

3.Replify

4.none of the mentioned


Question:
Which of the following visualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address?

1.Storage

2. Network

3.Software

4.none of the mentioned


Question:
Which of the following will be the host operating system for Windows Server?

1. VirtualLogix VLX

2.Microsoft Hyper-V

3. Xen

4.all of the mentioned


Question:
___ virtualization abstracts networking hardware and software into a virtual network that can be managed.

1.Storage

2. Network

3.Software

4.none of the mentioned


Question:
____ creates a container that encapsulates the application and all the application’s dependencies within a set of files.

1.VAA

2.VAS

3. VSA

4. None of the mentioned


Question:
____ is a Microsoft software client that is part of the company’s Identity Metasystem and built into the Web Services Protocol Stack.

1. IHA

2.EHA

3.CardSpace

4. None of the mentioned


Question:
____ is a service that creates and manages virtual network interfaces.

1. VMware vStorage

2.VMware vNetwork

3.VMware vCompute

4.Application services


Question:
____ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks.

1.Internet Hardware Addresses

2. Ethernet Software Addresses

3.Ethernet Hardware Addresses

4.none of the mentioned


Question:
_____ as a Service is a development environment that builds upon an existing cloud computing application infrastructure.

1. Software

2.Platform

3.Analytics

4.Compliance


Question:
_____ is a standard of OASIS’s PSTC that conforms to the SOA architecture.

1.XACML

2. SPML

3. SML

4. All of the mentioned


Question:
______ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application.

1.Software

2.Platform

3. Analytics

4. Compliance


Question:
______ is one of the more expensive and complex areas of network computing.

1.Multi-Factor Authentication

2.Fault tolerance

3.Identity protection

4. All of the mentioned


Question:
______ is used by Amazon Web Services to store copies of a virtual machine.

1. AMI

2. EMI

3.IMI

4.Application services


Question:
_______ authentication requires the outside use of a network security or trust service.

1. SSO

2.Singlefactor

3.Multi Factor

4.all of the mentioned


Question:
_______ is used for merchant transactions under the Payment Card Industry Data Security Standard.

1. ClearPoint PCI

2. ClearSoln

3. Rackserve PCI

4.all of the mentioned


More MCQS

  1. Google Cloud MCQ Set 1
  2. Google Cloud MCQ Set 2
  3. Google Cloud MCQ Set 3
  4. Google Cloud MCQ Set 4
  5. Google Cloud MCQ Set 5
  6. Google Cloud MCQ Set 6
  7. Google Cloud MCQ Set 7
  8. Google Cloud MCQ Set 8
  9. Google Cloud MCQ Set 9
  10. Google Cloud MCQ Set 10
  11. Google Cloud MCQ Set 11
  12. Google Cloud MCQ Set 12
  13. Google Cloud MCQ Set 13
  14. Google Cloud MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!