0% found this document useful (0 votes)
10 views8 pages

Cloud_Computing_Virtualization_MCQs (2)

Uploaded by

smitha shetty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views8 pages

Cloud_Computing_Virtualization_MCQs (2)

Uploaded by

smitha shetty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Unit II MCQs

1. 1. Which of the following best describes virtualization?

● A. The process of creating physical copies of hardware resources.

● B. The process of creating software-based representations of physical resources.

● C. A method to enhance network speed.

● D. An approach to increase the power supply in data centers.

● Answer: B

2. 2. Which is NOT a characteristic of virtualized environments?

● A. Isolation

● B. Resource pooling

● C. Dedicated hardware resources

● D. Elasticity

● Answer: C

3. 3. Which of the following types of virtualization deals with creating virtual CPUs?

● A. Network virtualization

● B. Compute virtualization

● C. Storage virtualization

● D. Desktop virtualization

● Answer: B

4. 4. What is the primary benefit of desktop virtualization?

● A. Improved desktop performance

● B. Centralized management of desktops

● C. Increased data center space


● D. Enhanced CPU power

● Answer: B

5. 5. Which virtualization technology was developed by Microsoft?

● A. VMware

● B. XEN

● C. Microsoft Hyper-V

● D. Oracle VirtualBox

● Answer: C

6. 6. What is a common drawback of virtualization?

● A. Reduced efficiency

● B. Higher hardware costs

● C. Dependency on a hypervisor

● D. Limited scalability

● Answer: C

7. 7. Which technique is NOT a type of virtualization?

● A. Execution virtualization

● B. Desktop virtualization

● C. Network virtualization

● D. Hardware extension virtualization

● Answer: D

8. 8. Network virtualization primarily helps in:

● A. Enhancing physical memory.

● B. Managing network resources efficiently.


● C. Expanding CPU capabilities.

● D. Allocating storage resources dynamically.

● Answer: B

9. 9. In application virtualization, applications are:

● A. Installed directly on the user’s device.

● B. Encapsulated from the underlying OS.

● C. Dependent on physical hardware.

● D. Limited to a specific platform.

● Answer: B

10. 10. Compute virtualization is primarily about virtualizing:

● A. Network infrastructure

● B. Physical servers

● C. Storage disks

● D. Desktop environments

● Answer: B

11. 11. How does virtualization support cloud computing?

● A. By reducing the need for hardware resources

● B. By enabling resource sharing and dynamic scaling

● C. By offering physical resource allocation

● D. By improving cloud security protocols

● Answer: B

12. 12. Which of the following is a virtualization technology often used in cloud
environments?

● A. Docker
● B. Microsoft Word

● C. Windows OS

● D. Oracle SQL

● Answer: A

13. 13. What is the relationship between virtualization and cloud computing?

● A. Virtualization is only used in private clouds.

● B. Virtualization is an essential technology that enables cloud computing.

● C. Cloud computing replaces virtualization.

● D. They are unrelated technologies.

● Answer: B

14. 14. A primary security concern of virtualization is:

● A. Increased power consumption

● B. Hypervisor vulnerabilities

● C. Enhanced physical security requirements

● D. Reduced efficiency in resource usage

● Answer: B

15. 15. In cloud computing, the term 'provisioning' refers to:

● A. Terminating virtual resources

● B. The process of setting up and managing resources

● C. Implementing security protocols

● D. Increasing cloud storage capacity

● Answer: B

16. 16. Which of the following is a potential risk in cloud computing security?
● A. Decreased service reliability

● B. Physical hardware damage

● C. Data breaches

● D. Redundant systems

● Answer: C

17. 17. Which organization provides a model and guidelines for cloud security controls?

● A. Cloud Service Alliance

● B. Cloud Security Alliance

● C. National Cloud Foundation

● D. International Cloud Union

● Answer: B

18. 18. What is a key strategy for securing the cloud environment?

● A. Minimizing the use of encryption

● B. Using third-party software

● C. Effectively managing risks

● D. Avoiding hypervisors

● Answer: C

19. 19. The risk management stage involving continuous assessment of threats is known as:

● A. Incident response

● B. Risk assessment

● C. Asset management

● D. Threat monitoring

● Answer: B

20. 20. Which model classifies security controls as Confidential, Secret, and Top Secret?
● A. Classified model

● B. Unclassified model

● C. Public-private model

● D. Federal Control System

● Answer: A

21. 21. According to the NIST framework, security controls are divided into:

● A. Three main categories

● B. One overall category

● C. Four classifications

● D. Five deployment modes

● Answer: A

22. 22. A basic best practice for cloud service providers is:

● A. Ignoring multi-factor authentication

● B. Minimizing access to sensitive data

● C. Encrypting data in transit and at rest

● D. Avoiding cloud updates

● Answer: C

23. 23. Which of the following is a key security measure for cloud consumers?

● A. Disabling security updates

● B. Not using a firewall

● C. Reviewing service level agreements (SLAs) carefully

● D. Using public Wi-Fi for access

24. 24. The Cloud Security Alliance emphasizes the importance of:
● A. Cloud storage only

● B. Securing virtual machines only

● C. Comprehensive security controls for all aspects of cloud infrastructure

● D. High-speed network requirements

25. 25. Security monitoring in a cloud environment helps in:

● A. Increasing overall latency

● B. Reducing cloud storage usage

● C. Identifying and responding to threats

● D. Providing faster CPU speed

26. 26. A 'first principle' for cloud computing best practices is:

● A. Implementing a single security layer

● B. Assuming every layer is secure by default

● C. Zero Trust Model - treating every access attempt as potentially suspicious

● D. Utilizing minimal resources for security

27.27 Which of the following is NOT a type of virtualization?


● A Compute virtualization

● B Network virtualization

● C Security virtualization

● D Storage virtualization

28.28 Which of the following is NOT a type of virtualization?


● A Compute virtualization

● B Network virtualization

● C Security virtualization
● D Storage virtualization

29.29Which of the following is NOT a type of virtualization?


● A Compute virtualization

● B Network virtualization

● C Security virtualization

● D Storage virtualization


30.30Which of the following is a key advantage of virtualization in cloud computing?
● A Increased hardware costs

● B Higher resource utilization

● C Reduced flexibility

● D Slower deployment times


31.31 According to the Cloud Security Alliance (CSA), which of the following is NOT a stage
in risk management?
● A Risk assessment

● B Risk monitoring

● C Risk reduction

● D Risk elimination
32.32 Which virtualization technology is developed by Microsoft?
● A Xen

● B VMware

● C Hyper-V

● D KVM

You might also like