Uploaded by Mohamed Yasser

CIS Student GUIDE

advertisement
Cloud Computing Questions
1. What is a key benefit of virtualization technology?
a. Capacity planning
b. Flexible metering
c. Policy compliance
d. Rapid elasticity
2. Which tool helps to create Cloud services?
a. Service management tool
b. Service creation tool
c. Service monitoring tool
d. Service planning tool
3. Which technique enables making physical resources appear as logical
resources?
a. Grid Computing
b. Utility computing
c. Virtualization
d. Self provisioning
4. Which is an essential characteristic of the Cloud?
a. Resource utilization
b. Resource pooling
c. Resource planning
d. Resource reservation
5. Which is a key step in building a Cloud Infrastructure?
a. Centralize services and resources
b. Automate resource classification
c. Automate service provisioning
d. Customize services and resources
6. Which is a benefit of RAID?
a. Ensures data integrity in a RAID set
b. Prevents disk failure in a RAID set
c. Improves storage system performance
d. Simplifies distribution of parity across mirrored disks
7. Which statement is true about FC SAN?
a. Provides higher scalability as compared to DAS
b. Has limited ability to share resources
c. Enables object level access to data
d. Supports a maximum of 256 nodes
8. Which key requirement of a data center refers to the ability of IT to support
new business initiatives dynamically?
a. Manageability
b. Availability
c. Capacity
d. Flexibility
9. Which are the key parameters that determine the performance and
availability of a RAID set?
a. Number of drives in a RAID set and RAID level
b. Number of drives in a RAID set and the capacity of each drive
c. Number of RAID controllers and type of RAID implementation
d. Number of drives in a RAID set and Type of RAID implementation
10. Which key requirement of a data center is violated when an authorized
storage administrator is not able to remotely login to a server in the data
center?
a. Scalability
b. Flexibility
c. Security
d. Availability
11. What is stored in virtual machine log file?
a. Information of virtual machine’s activities
b. Virtual machine’s RAM contents
c. Virtual machine BIOS information
d. Information of virtual machine’s configuration
12. Which parameter determines the maximum amount of resource that a virtual
machine can consume?
a. Share
b. Limit
c. Reservation
d. Priority
13. Which technology enables a physical CPU to appear as two or more logical
CPUs?
a. Hyper-threading
b. Multi-core
c. Load balancing
d. Ballooning
14. Which optimization technique is used to detect identical pages in the
memory?
a. Transparent page sharing
b. Memory ballooning
c. Memory swapping
d. Cache flushing
15. Which is the primary function of hypervisor?
a. Allows multiple operating systems to run concurrently on a physical
machine
b. Allows multiple operating systems to run concurrently on a virtual
machine
c. Allows multiple file systems to run concurrently on a virtual machine
d. Allows authorization to virtual machine resources to users
16. Which method enables a virtual machine to directly access a LUN on a
storage array?
a. File system locking
b. Virtual machine clustering
c. Raw device mapping
d. Virtual storage mapping
17. What are the three major building blocks for automated storage tiering?
a. RAID type, storage type, policies
b. Storage type, storage group, policies
c. Storage group, RAID group, storage type
d. Storage group, RAID group, group policy
18. What is used to create secondary cache in cache tiering mechanism?
a. DRAM
b. FC drive
c. Solid state drive
d. SATA drive
19. When is thin LUN preferred over traditional LUN?
a. Performance is predominant
b. Security is more important
c. Storage space efficiency is paramount
d. High availability is predominant
20.
What defines the minimum amount of physical storage allocated at a
time to a thin LUN from a thin Pool?
a. Thin LUN extent
b. Thin LUN capacity
c. Thin LUN factor
d. Thin LUN set size
21. Which is a benefit of network virtualization?
a. Enhanced storm control
b. Increased resource acquisition
c. Improved manageability
d. Better policy control
22. Which network parameter sets maximum data transfer rate across a virtual
machine port group without queuing or dropping frames?
a. Burst size
b. Peak bandwidth
c. Share
d. Limit
23. As an organization leverages more resources from Cloud service providers,
which expense of the organization would be expected to grow larger?
a. Power and energy
b. Management
c. Infrastructure
d. Operational
24. Which technique allows traffic from multiple VLANs to traverse over a single
network connection?
a. NIC Teaming
b. Multipathing
c. Port group
d. Trunking
25. What is enabled by using NIC teaming?
a. Balance traffic across physical servers
b. Allocate bandwidth to traffic based on priority
c. Failover to another available physical NIC in the event of a physical
NIC failure
d. Transfer data to a LUN on a FC storage system using multiple network
links
26. What best describes the "metered service" characteristic of Cloud
computing?
a. Consumers are billed based on resource usage.
b. Services are provisioned based on their deman
c. Metering services are created when required from the resource
pools.
d. Metering services can scale up and down based on resource usage.
27. Which correctly describes N_Port ID Virtualization technology?
a. Single physical FC HBA port functions as multiple virtual N_ports
b. Single physical FC HBA port functions as multiple virtual E_ports
c. Single virtual FC HBA port functions as multiple physical N_ports
d. Single virtual FC HBA port functions as multiple physical E_ports
28. What correctly describes application virtualization?
a. Encapsulates operating system resources and the application
b. Increases application and CPU utilization
c. Provides interoperability between different application versions
d. Breaks dependencies between application interface and processing
logic
29. What is true about application encapsulation?
a. Requires a locally installed agent on the client machine
b. Requires a built-in agent at the remote server
c. Does not rely on software installation or underlying OS
d. Requires a locally installed agent on the client machine and a built–in
agent
30. What is true about application streaming?
a. Requires no agent at client machine
b. Requires a locally installed agent on the client machine and a built–in
agent on the application
c. Requires a locally installed agent on the client machine
d. All the data is delivered to the client after application starts
31. When is a connection broker a mandatory component of Virtual Desktop
Infrastructure architecture?
a. Desktop VMs are assigned from VM pool
b. High-end graphic applications are used
c. Additional security is required
d. Dedicated desktop VM is assigned to each user
32. In which Cloud deployment model would an organization see operational
expenditures grow in proportion to capital expenditures?
a.
b.
c.
d.
On-premise Private Cloud
External Private Cloud
Public Cloud
Hybrid Cloud
33. What is the Cloud service model offered by EMC Mozy?
a.
b.
c.
d.
Software-as-a-Service
Platform-as-a-Service
Infrastructure-as-a-Service
Virtualization-as-a-Service
34. What is true about virtual desktop infrastructure (VDI)?
a. Involves hosting desktop which runs as hypervisor on the server
b. Requires hypervisor based VDI agent support
c. Each desktop has its own OS and applications in a VM on server
d. Each desktop has its own OS and applications installed on client
machine
35. What is an advantage of image based backup approach?
a. Single pass information collection
b. Reduced RPO
c. Eliminate site failures
d. Reduced VM failures
36. Which is true about virtual machine (VM) fault tolerance mechanism?
a. Both primary and secondary VMs share same virtual disks
b. Both primary and secondary VMs have separate virtual disks
c. Only primary VM can access the shared virtual disk
d. Only secondary VM can access the shared virtual disk
37. What occurs to the guest OS configuration when a virtual machine is
reverted from its snapshot?
a. Guest OS configurations are reverted to the point-in-time of snapshot
creation
b. Current guest OS configurations are preserved
c. Reference VM Settings are used to configure guest OS
d. Settings are lost and need manual configuration
38. What is the Cloud service model offered by Cloud Foundry?
a.
b.
c.
d.
Software-as-a-Service
Platform-as-a-Service
Infrastructure-as-a-Service
Virtualization-as-a-Service
39. What correctly describes the state of virtual disks of a virtual machine after
an array-to-array migration is performed?
a. Virtual disks are maintained at both source and target arrays
b. Virtual disks are only maintained at the source array
c. Virtual disks are deleted from the source array after they are copied
to the target array
d. Virtual disks are deleted from both source and target arrays
40. Which is used as a master copy to create and provision a new virtual
machine (VM)?
a. VM template
b. VM snapshot
c. VM clone
d. VM backup
41. Which resource may be hired in infrastructure-as-a-service model?
a. Operating system
b. Storage space
c. Middleware
d. Database
42. What is the Cloud service model offered by EMC Syncplicity?
a.
b.
c.
d.
Software-as-a-Service
Platform-as-a-Service
Infrastructure-as-a-Service
Virtualization-as-a-Service
43. Which is an example of platform-as-a-service?
a. EMC Atmos online
b. Salesforce.com
c. Google App Engine
d. EMC Mozy
44. Which is an example of infrastructure-as-a-service offering?
a. Amazon Elastic Compute Cloud
b. Google App Engine
c. Salesforce.com
d. EMC Mozy
45. Which is an example of software-as-a-service offering?
a. Amazon Elastic Compute Cloud
b. Google App Engine
c. Microsoft Azure
d. EMC Mozy
46. Which is the Cloud deployment model that will be a suitable choice for a
group of organizations with shared concerns?
a.
b.
c.
d.
Private Cloud
Hybrid Cloud
Public Cloud
Community Cloud
47. Which is a component of virtual infrastructure in Cloud?
a. Management software
b. Storage array
c. Network identity pool
d. Service catalog
48. Which option best describes ‘resource bundling’ in Cloud service creation
procedure?
a. Bundling application, platform software, and migration tools
b. Integrating virtual machine, virtual network, and virtual volume
c. Bundling graded compute, network, and application services
d. Integrating graded compute, network, and storage pools
49. Which is a key activity in ‘problem management’?
a. Rectifying error to return Cloud services as quickly as possible
b. Analyzing incident history to identify impending service failures
c. Checking veracity of problem records in CMDB
d. Transferring problem history to incident management
50. Which Cloud service management process is responsible for optimizing
utilization of IT resources?
a. Service asset and configuration management
b. Financial management
c. Compliance management
d. Capacity management
51. Which functionality is offered by unified management software in the Cloud?
a. Provides consolidated view of existing physical and virtual
infrastructure across data centers
b. Create VMs and allocate them CPU, memory, and storage capacity
c. Create zone sets and include nodes into zones
d. Create virtual machines and allocate them specified resources
52. Which security mechanism provides an effective control for data
confidentiality and integrity?
a. Copy and move restrictions
b. Authorization
c. Trusted computing base
d. Encryption
53. What is the primary goal of a security audit?
a. Evaluate effectiveness of security enforcement
b. Evaluate effectiveness of data confidentiality
c. Evaluate effectiveness of data integrity
d. Evaluate effectiveness of data availability
54. Which security goal is achieved by data shredding technique?
a. Preventing data loss
b. Preventing data manipulation
c. Ensuring data confidentiality
d. Enabling data encryption
55. Which GRC process determines scope of adoption of Cloud services?
a. Anti-virus protection measures in Cloud
b. Business Continuity
c. Risk Assessment
d. Disaster management
56. How is intrusion detection implemented under software-as-a-service model?
a. Implemented by the Cloud Consumer
b. Implemented by the Cloud Service Provider
c. Implemented by the Cloud Service Provider and Consumer together
d. Implemented by a 3rd party provider
57. Which Cloud model is best suited for small and medium businesses?
a. Public
b. Private
c. Hybrid
d. Community
58. Which Cloud adoption phase enables consumer to explore the geographic
location to store their data?
a. Assessment
b. Proof of concept
c. Migration
d. Optimization
59. Which Cloud migration strategy is recommended for tightly coupled
applications?
a. Hybrid
b. Forklift
c. Private
d. Public
Download