Google Cloud Platform(GCP)/Google Cloud MCQ Set 9 Sample Test,Sample questions

Question:
 Point out the correct statement.

1.The cloud turns physical systems into virtual systems

2.The printing service decided to eliminate infrastructure and streamline the process

3.The first stage in the redeployment is to eliminate the local processing associated with the scanning machines

4.none of the mentioned


Question:
 Point out the wrong statement.

1. Star model is favored in orchestration processes

2.UML models often use XMI as their interchange format

3.XMI files are generally interchangeable between the different modeling languages that can use them

4.none of the mentioned


Question:
 Point out the wrong statement.

1.When applications get moved to the cloud, they do not retain the features of a three-layered architecture

2.Virtual machines are not only stateless

3.Some applications can be successfully ported to the cloud, while others suffer from the translation

4. None of the mentioned


Question:
 The properties necessary to guarantee a reliable transaction in databases and other applications is referred to as _______

1.BASE

2.ACID

3.ATOM

4.all of the mentioned


Question:
 Which of the following is a second level attribute in relation to scalability?

1.Fault management

2.Caching

3.Expertise

4.Geographic location


Question:
 Which of the following property defines a transaction as something that cannot be subdivided and must be completed or abandoned as a unit?

1.Atomicity

2.Consistency

3.Isolation

4.Durability


Question:
 Which of the following topology is useful for services that use broadcasting or multicasting services?

1.Circular

2.Hierarchical

3.Network

4.Star


Question:
A _____ is the combination of data from two or more sources that creates a unique service.

1.dev

2.mashup

3.ajax

4.all of the mentioned


Question:
AJAX uses _________ for asynchronous communication between various data sources.

1.XSLT

2.XMLHttpRequest

3. DTD

4. None of the mentioned


Question:
An application that needed _______ storage alone might not benefit from a cloud deployment at all.

1. online

2. offline

3.virtual

4.all of the mentioned


Question:
APIs and Deployment are second level application attributes in accordance with _______

1.application

2. costs

3.maintenance

4.user interface


Question:
How many types of modeling topologies for message passing are used in SOMF?

1.1

2.2

3.3

4.None of the mentioned


Question:
OCC supports the management of cloud computing infrastructure for scientific research as part of the ________ working group initiative.

1. OSCD

2.OSCDP

3. OSCP

4.all of the mentioned


Question:
Point out the correct statement.

1. SOA offers an architectural blueprint for accessing diverse optimized services through a loosely coupled standardized method

2.OCC does not support the development of open-source reference implementations for cloud computing

3.OCC does not support the development of open-source reference implementations for cloud computing

4. SOA offers an architectural blueprint for accessing diverse optimized services through a tightly coupled standardized method


Question:
Point out the correct statement.

1.An application that runs as a service on the Internet has a client portion that makes a request and a server portion that responds to that request

2.In a distributed system, the transaction is stateful

3.In order to create a stateless system in a distributed architecture, a transaction manager or broker must be added so that the intermediary service can account for transactions and react accordingly w

4. None of the mentioned


Question:
Point out the wrong statement.

1.To address SOA security, a set of OASIS standards have been created

2.WS-SecureConversion attaches a security context token to communications such as SOAP used to transport messages in an SOA enterprise

3.WS-Trust is an extension of SOA that enforces security by applying tokens such as Kerberos, SAML, or X.509 to messages

4.none of the mentioned


Question:
Point out the wrong statement.

1. In theory, any application can run either completely or partially in the cloud

2.The location of an application or service plays a fundamental role in how the application must be written

3.An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program

4. None of the mentioned


Question:
Providing XML Gateway SOA security requires a _________ so that encryption is enforced by digital signatures.

1. Public Key Infrastructure

2.Private Key Infrastructure

3.Hybrid Key Infrastructure

4.none of the mentioned


Question:
The __________ property states that the system must have a mechanism to recover from committed transactions should that be necessary.

1.Atomicity

2.Consistency

3. Isolation

4. Durability


Question:
Which of the attributes is required for the best user interface?

1.User interaction

2.Ease of use

3.Interface features

4.all of the mentioned


Question:
Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained?

1.Atomicity

2.Consistency

3. Isolation

4. Durability


Question:
Which of the following combines a modeling language with a graphical display of the various SOA components?

1.Business Process Modeling Notation

2. Service-Oriented Modeling Framework

3.Systems Modeling Language

4. All of the mentioned


Question:
Which of the following component is required for both online and local data access in hybrid application?

1.local

2. cloud

3.both local and cloud

4.none of the mentioned


Question:
Which of the following correctly describes group of technologies that leverage HTML and CSS for styling?

1. DOM

2.AJAX

3. SAS

4.all of the mentioned


Question:
Which of the following criteria needs to be met so that key drivers benefit from deployment to the cloud?

1.Are mission critical

2. Do have sensitive data to protect

3.Do need to be customized

4.Are legacy applications with no particular competitive advantage


Question:
Which of the following element in SOMF determines how components are exposed?

1.Discovery

2. Conceptualization

3.Analysis

4. All of the mentioned


Question:
Which of the following extends WS-Security to provide a mechanism to issue, renew, and validate security tokens?

1.WS-Trust

2.WS-SecureConversion

3.WS-SecurityPolicy

4.all of the mentioned


Question:
Which of the following factors might offset the cost of offline access in hybrid applications?

1. scalability

2. costs

3.ubiquitous access

4. All of the mentioned


Question:
Which of the following function is provided by OCC working group?

1.Develop benchmarks for measuring cloud computing performance

2. Provide testbeds that vendors can use to test their applications

3. Support the development of open-source reference implementations for cloud computing

4.all of the mentioned


Question:
Which of the following is a key cloud service attribute?

1.Abstraction

2. Infrastructure

3.User Interface

4.all of the mentioned


Question:
Which of the following is a web services protocol for creating and sharing security context?

1.WS-Trust

2.WS-SecureConversion

3.WS-SecurityPolicy

4.all of the mentioned


Question:
Which of the following is an open-source extension of the part of the UML system dealing with profiles?

1. UML

2. XMI

3.SysML

4.None of the mentioned


Question:
Which of the following is best suited for the analysis of an application’s suitability to be ported to the cloud?

1.Service Attributes

2.Cloud Attributes

3.Application Attributes

4.all of the mentioned


Question:
Which of the following is not a second level application attribute?

1.Reliability

2.Resource access

3.Uptime

4. costs


Question:
Which of the following is not a second level attribute in relation to Data Management?

1.Data exchange

2.Staging

3.Index

4. Portability


Question:
Which of the following is not an OASIS standard for SOA Security?

1.Security Assertion Markup Language

2.Synchronized Multimedia Integration Language

3.WS-SecureConversion

4.all of the mentioned


Question:
Which of the following is part of a general WS-Policy framework?

1.WS-Trust

2.WS-SecureConversion

3.WS-SecurityPolicy

4.All of the mentioned


Question:
Which of the following is policy based XML security service by Cisco?

1.Application Oriented Manager

2.Application Oriented Networking

3.Application Process Networking

4.all of the mentioned


Question:
Which of the following is property of ACID principle?

1.Atomicity

2.Consistency

3.Isolation

4.all of the mentioned


Question:
Which of the following is single-purpose application implemented in the cloud?

1.Carbonite backup

2.Google’s Gmail email

3.Twitter’s Instant Messaging

4.all of the mentioned


Question:
Which of the following is the first level applicable attribute?

1.Availability

2.Monitoring

3. Configuring

4. All of the mentioned


Question:
Which of the following is the first level cloud service attribute?

1.Accounting

2. Application support

3.Core Services

4.all of the mentioned


Question:
Which of the following is used to describe Web services that allow for user input and modification?

1.Web 2.0

2.Web 1.0

3.Web 3.0

4.all of the mentioned


Question:
Which of the following organization supports the development of standards for cloud computing?

1. OPC

2.OCP

3. OCC

4. All of the mentioned


Question:
Which of the following provides data authentication and authorization between client and service?

1.SAML

2.WS-SecureConversion

3. WS-Security

4.all of the mentioned


Question:
Which of the following provides information on service and service boundaries, service granularity, and asset analysis?

1.SMIL

2.SOMA

3.SMA

4.all of the mentioned


Question:
Which of the following system models creates a graphical representation of software systems in the form of a set of diagram types?

1.SysML

2. UML

3. XMI

4.none of the mentioned


Question:
Which of the following topology has a many-to-many relationship between services and their clients?

1.Circular

2.Hierarchical

3.Network

4. Star


Question:
Which of the following topology has no orchestrator in the system?

1.Circular

2.Hierarchical

3.Network

4. Star


Question:
_____ is a mechanism for attaching security tokens to messages.

1. STT

2.STS

3.SAS

4.all of the mentioned


More MCQS

  1. Google Cloud MCQ Set 1
  2. Google Cloud MCQ Set 2
  3. Google Cloud MCQ Set 3
  4. Google Cloud MCQ Set 4
  5. Google Cloud MCQ Set 5
  6. Google Cloud MCQ Set 6
  7. Google Cloud MCQ Set 7
  8. Google Cloud MCQ Set 8
  9. Google Cloud MCQ Set 9
  10. Google Cloud MCQ Set 10
  11. Google Cloud MCQ Set 11
  12. Google Cloud MCQ Set 12
  13. Google Cloud MCQ Set 13
  14. Google Cloud MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!