Cloud Computing Quiz 4
In a SLA negotiation, the provider agreed with the service availability of 98%. The consumer runs the application for X hours/day. At the end of one month [31 days], the total service outage was 12 hrs. However, SLA negotiation (in terms of service availability) is honored.
a. X is atleast 19.74
b. X is atmost 19.74
a. X is atleast 19.74
b. X is atmost 19.74
To honor the SLA with a service availability of 98% and a total service outage of 12 hours in a 31-day month, the consumer must run the application for X is at least 19.74 hours per day.
Average resource demand is 45 units, Baseline (owned) unit cost is 200 units, Time is 10 hours, Peak resource demand is 100 units. If the cloud is cheaper than owning of computer infrastructures, the utility premium is
a. Greater than 2.22
b. Less than 2.22
a. Greater than 2.22
b. Less than 2.22
If the cloud is cheaper than owning computer infrastructures, given an average resource demand of 45 units, a baseline unit cost of 200 units, and a peak resource demand of 100 units over 10 hours, the utility premium is less than 2.22.
In computing, there is a linear relationship between the number of processing cores used and power consumption.
a. TRUE
b. FALSE
a. TRUE
b. FALSE
The statement is False, as there is a nonlinear relationship between the number of processing cores used and power consumption.
The ________ takes a series of key/value pairs, processes each, and generates zero or more output.
a. map function
b. partition function
c. reduce function
a. map function
b. partition function
c. reduce function
The map function takes a series of key/value pairs, processes each, and generates zero or more outputs.
In a MapReduce framework, the HDFS block size is 64 MB. We have 6 files of size 64KB, 65MB, X MB, Y KB, 67KB, and 127MB. 24 blocks are created by the Hadoop framework. The size of X and Y are respectively:
a. 66 and 64
b. 64 and 64
c. 64 and 66
a. 66 and 64
b. 64 and 64
c. 64 and 66
In a MapReduce framework with an HDFS block size of 64 MB, if 24 blocks are created for files sized 64KB, 65MB, X MB, Y KB, 67KB, and 127MB, the sizes of X and Y are respectively 64 and 64 MB, or 64 and 66 KB.
Which among the following is/are logical resource(s)?
a. Network
b. Computer
c. Database
d. Execution
a. Network
b. Computer
c. Database
d. Execution
Among the given options, the logical resource is Execution.
When load decreases, VM management can be done by
a. Live migrate VMs to more utilized nodes
b. Shutdown unused nodes
c. Migrate VMs to less utilized nodes
a. Live migrate VMs to more utilized nodes
b. Shutdown unused nodes
c. Migrate VMs to less utilized nodes
When load decreases, VM management can be done by live migrating VMs to more utilized nodes and shutting down unused nodes.
Correspondence between resources required by the users and resources available with the provider is known as
a. Resource provisioning
b. Resource adaptation
c. Resource mapping
a. Resource provisioning
b. Resource adaptation
c. Resource mapping
The correspondence between resources required by users and resources available with the provider is known as Resource mapping.
Ability or capacity of that system to adjust the resources dynamically to fulfill the requirements of the user is known as
a. Resource provisioning
b. Resource adaptation
c. Resource mapping
a. Resource provisioning
b. Resource adaptation
c. Resource mapping
The ability or capacity of a system to adjust resources dynamically to fulfill the requirements of the user is known as Resource adaptation.
Statement 1: Map operation consists of transforming one set of key-value pairs to another. Statement 2: Each reducer groups the results of the map step using the same key.
Both statements are true
Interception is considered as an attack on
A. Confidentiality
B. Availability
C. Integrity
D. Authenticity
A. Confidentiality
B. Availability
C. Integrity
D. Authenticity
Interception is considered an attack on Confidentiality.
Find the correct statement(s):
A. Different types of cloud computing service models provide different levels of security services
B. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C. Data should be transferred and stored in an encrypted format for security purpose
D. All are incorrect statements
A. Different types of cloud computing service models provide different levels of security services
B. Adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider
C. Data should be transferred and stored in an encrypted format for security purpose
D. All are incorrect statements
The correct statements are: Different types of cloud computing service models provide different levels of security services, adapting your on-premises systems to a cloud model requires that you determine what security mechanisms are required and mapping those to controls that exist in your chosen cloud service provider, and data should be transferred and stored in an encrypted format for security purpose.
Which of the following is/are example(s) of passive attack?
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade
A. Replay
B. Denial of service
C. Traffic analysis
D. Masquerade
The example of a passive attack is Traffic analysis.
Modification is considered as an attack on
A. Confidentiality
B. Availability
C. Integrity
D. Authenticity
A. Confidentiality
B. Availability
C. Integrity
D. Authenticity
Modification is considered an attack on Integrity.
Spoofing is not an example of
A. Deception
B. Disclosure
C. Usurpation
D. Disruption
A. Deception
B. Disclosure
C. Usurpation
D. Disruption
Spoofing is not an example of Disclosure or Disruption.
Consider the following statements:
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
Statement I: Authorization is the identification of legitimate users.
Statement II: Integrity is the protection against data alteration/corruption.
Statement I is FALSE and Statement II is TRUE.
Access policy control refers to
A. Cyclic Inheritance Control
B. Virus Attack
C. Violation of SoD (separation of duties) Constraint
D. Man in the middle attack
A. Cyclic Inheritance Control
B. Virus Attack
C. Violation of SoD (separation of duties) Constraint
D. Man in the middle attack
Access policy control refers to Cyclic Inheritance Control and Violation of SoD (separation of duties) Constraint.
Which of the options is/are considered as the basic components of security?
A. Confidentiality
B. Integrity
C. Reliability
D. Efficiency
A. Confidentiality
B. Integrity
C. Reliability
D. Efficiency
The basic components of security are Confidentiality and Integrity.
Which of the following is/are not a type of passive attack?
A. Traffic Analysis
B. Release of message contents
C. Denial of service
D. Replay
A. Traffic Analysis
B. Release of message contents
C. Denial of service
D. Replay
The options that are not a type of passive attack are Denial of service and Replay.
Side channel exploitation has the potential to extract RSA & AES secret keys.
A. True
B. False
A. True
B. False
The given statement, side channel exploitation has the potential to extract RSA & AES secret keys is True.
Also Available:
Cloud Computing Quiz 1 Flashcards