Cloud Infrastructure & Operation

25 Questions | Attempts: 161
Share

SettingsSettingsSettings
Cloud Infrastructure & Operation - Quiz


Questions and Answers
  • 1. 
    Which of the following statement is NOT an advantage of LINUX?
    • A. 

      LINUX is cheap

    • B. 

      LINUX is secure

    • C. 

      LINUX is portable

    • D. 

      LINUX is scalable

  • 2. 
    Most of the configuration file is stored in the /etc directory. Which of the following is classified under system administration category? 
    • A. 

      /etc/mtab

    • B. 

      /etc/nologin

    • C. 

      /etc/services

    • D. 

      /etc/logrotate.conf

  • 3. 
    Which of the following is the main portion or also known as the heart of LINUX?
    • A. 

      Firewall

    • B. 

      Kernel

    • C. 

      Library

    • D. 

      Shell

  • 4. 
    Which of the following keystroke allow user to save and exit vi editor?
    • A. 

      Esc + :we

    • B. 

      Esc + :sq

    • C. 

      Esc + :se

    • D. 

      Esc + :wq

  • 5. 
    Which of the following keystroke allow user to delete one line of words in vi editor?
    • A. 

      Esc + x

    • B. 

      Esc + dd

    • C. 

      Esc + do

    • D. 

      Esc + dw

  • 6. 
    Which of this is NOT a form of DoS attack?
    • A. 

      Buffer Overflow Attacks

    • B. 

      SYN floods

    • C. 

      Smurf Attack

    • D. 

      Device Denial-of-Service Attacks

  • 7. 
    Which of the following attack is best prevented by a strong encryption services that are based on cryptography only?
    • A. 

      DoS

    • B. 

      Mapping

    • C. 

      Social Engineering

    • D. 

      Trojan

  • 8. 
    #!/bin/bash #My first shell script echo Hello World Which of the following statement is TRUE?
    • A. 

      Tell LINUX that the file is to be executed by bin/bash

    • B. 

      Tell LINUX to print My first shell script

    • C. 

      Tell LINUX to repeat Hello World

    • D. 

      Tell LINUX that the file is to be saved by bin/bash

  • 9. 
    Which command allow user to delete a directory?
    • A. 

      Deldir

    • B. 

      Mkdir

    • C. 

      Rmdir

    • D. 

      Unmount

  • 10. 
    What does the bin sub-directory contains?
    • A. 

      It contains many other parts of the basic LINUX system.

    • B. 

      It contains sequence of directories to follow to reach the file.

    • C. 

      It contains program that correspond to core LINUX command.

    • D. 

      It contains home directories of all users with accounts on the system.

  • 11. 
    Which of the following describe the directory /dev/hdb?
    • A. 

      Floppy (b:)

    • B. 

      Hard disk (master)

    • C. 

      Hard disk (slave)

    • D. 

      2nd SCSI hard disk

  • 12. 
    Which of the following symbol represent the CORRECT permission access to test.txt if the owner & group access were given read & writes permission while the guest was only allowed to read?
    • A. 

      -r--rw-rw-

    • B. 

      -rw-rw-r--

    • C. 

      Dr--rw-rw-

    • D. 

      Drw-rw-r--

  • 13. 
    What is the command to change the permission access -rwxrw-r-- of test2.txt?
    • A. 

      Chmod 246 test2.txt

    • B. 

      Chmod 442 test2.txt

    • C. 

      Chmod 627 test2.txt

    • D. 

      Chmod 764 test2.txt

  • 14. 
    How to achieve a secure connection between your Private Cloud and Public Cloud provider?
    • A. 

      Consolidate data storage

    • B. 

      De-provisioned automatically

    • C. 

      Jointly managed the activities

    • D. 

      Connect the environment through VPN

  • 15. 
    Which class does 16 ports SAN switch with a single controller component classified?
    • A. 

      Active Class

    • B. 

      Director Class

    • C. 

      Modular Class

    • D. 

      Service Class

  • 16. 
    What type of attack that occurs when someone between you and the person with whom you are communicating is actively monitoring and controlling your communication transparently. 
    • A. 

      Hijacking

    • B. 

      Trojan

    • C. 

      Sniffing

    • D. 

      Spoofing

  • 17. 
    Which of the following is NOT a SAN component layer?
    • A. 

      Access Layer

    • B. 

      Host Layer

    • C. 

      Fabric Layer

    • D. 

      Storage Layer

  • 18. 
    What SUDO program does?
    • A. 

      Unmount a device

    • B. 

      Access user root privileges

    • C. 

      Act as system administrator

    • D. 

      Formatting capabilities software

  • 19. 
    Which cloud deployment model is use if there is a needs for sharing data, platform and applications to a specific group with a common goal?
    • A. 

      Community Cloud

    • B. 

      Hybrid Cloud

    • C. 

      Private Cloud

    • D. 

      Public Cloud

  • 20. 
    Which cloud deployment model is solution if there is a needs for high degree of governance?
    • A. 

      Community Cloud

    • B. 

      Hybrid Cloud

    • C. 

      Private Cloud

    • D. 

      Public Cloud

  • 21. 
    What is UNIX?
    • A. 

      Sub -directory folder

    • B. 

      Non-portable hardware

    • C. 

      Freely available application

    • D. 

      Open source Operating System

  • 22. 
    Which one of the following is use to automate the creation, monitoring and deployment of resources in data centre?
    • A. 

      OVF

    • B. 

      Orchestrator

    • C. 

      Service Manager

    • D. 

      Virtual Machine Manager

  • 23. 
    Which of the following is NOT a cloud service model?
    • A. 

      IaaS

    • B. 

      PaaS

    • C. 

      FaaS

    • D. 

      SaaS

  • 24. 
    What does SOA stands for?
    • A. 

      Service oriented archictecture

    • B. 

      Storage oriented archictecture

    • C. 

      Server oriented archictecture

    • D. 

      System oriented archictecture

  • 25. 
    Which of the following is NOT the limitation of cloud computing?
    • A. 

      Automated updates

    • B. 

      Vendor - lock in application

    • C. 

      Legislation on privacy

    • D. 

      Cloud Security

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.