Cloud Infrastructure & Operation

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sitti.fatimah
S
Sitti.fatimah
Community Contributor
Quizzes Created: 1 | Total Attempts: 188
Questions: 25 | Attempts: 188

SettingsSettingsSettings
Cloud Infrastructure & Operation - Quiz


Questions and Answers
  • 1. 

    Which of the following statement is NOT an advantage of LINUX?

    • A.

      LINUX is cheap

    • B.

      LINUX is secure

    • C.

      LINUX is portable

    • D.

      LINUX is scalable

    Correct Answer
    A. LINUX is cheap
    Explanation
    The statement "LINUX is cheap" is not an advantage of LINUX because although LINUX is an open-source operating system and can be obtained for free, the cost associated with implementing and maintaining a LINUX system can still be significant. This includes expenses related to hardware, software, training, and technical support. Therefore, while LINUX may be cost-effective compared to some proprietary operating systems, it is not necessarily cheap in all aspects.

    Rate this question:

  • 2. 

    Most of the configuration file is stored in the /etc directory. Which of the following is classified under system administration category? 

    • A.

      /etc/mtab

    • B.

      /etc/nologin

    • C.

      /etc/services

    • D.

      /etc/logrotate.conf

    Correct Answer
    B. /etc/nologin
    Explanation
    The file "/etc/nologin" is classified under the system administration category because it is used to prevent users from logging into the system. When this file exists, it displays a message to users attempting to log in and denies them access. This file is commonly used during system maintenance or when the administrator wants to restrict user access temporarily.

    Rate this question:

  • 3. 

    Which of the following is the main portion or also known as the heart of LINUX?

    • A.

      Firewall

    • B.

      Kernel

    • C.

      Library

    • D.

      Shell

    Correct Answer
    B. Kernel
    Explanation
    The kernel is considered the main portion or heart of LINUX because it is the core component that interacts directly with the hardware and manages system resources. It provides essential services such as process management, memory management, device drivers, and file system access. The kernel is responsible for maintaining the stability, security, and overall functioning of the operating system. Without the kernel, LINUX would not be able to function properly.

    Rate this question:

  • 4. 

    Which of the following keystroke allow user to save and exit vi editor?

    • A.

      Esc + :we

    • B.

      Esc + :sq

    • C.

      Esc + :se

    • D.

      Esc + :wq

    Correct Answer
    D. Esc + :wq
    Explanation
    The correct answer is "esc + :wq". In the vi editor, pressing the escape key (esc) allows the user to enter command mode. The ":wq" command in vi stands for "write and quit", which saves the changes made to the file and exits the editor. Therefore, pressing escape followed by ":wq" allows the user to save and exit the vi editor.

    Rate this question:

  • 5. 

    Which of the following keystroke allow user to delete one line of words in vi editor?

    • A.

      Esc + x

    • B.

      Esc + dd

    • C.

      Esc + do

    • D.

      Esc + dw

    Correct Answer
    B. Esc + dd
    Explanation
    In vi editor, the keystroke "esc + dd" allows the user to delete one line of words. The "esc" key is used to switch from insert mode to command mode, and the "dd" command is used to delete the current line. So, pressing "esc" followed by "dd" will delete the line the cursor is currently on.

    Rate this question:

  • 6. 

    Which of this is NOT a form of DoS attack?

    • A.

      Buffer Overflow Attacks

    • B.

      SYN floods

    • C.

      Smurf Attack

    • D.

      Device Denial-of-Service Attacks

    Correct Answer
    D. Device Denial-of-Service Attacks
    Explanation
    Device Denial-of-Service Attacks is not a form of DoS attack. A DoS attack is designed to overwhelm or disrupt the normal functioning of a network, system, or device. Buffer Overflow Attacks, SYN floods, and Smurf Attacks are all examples of DoS attacks. However, Device Denial-of-Service Attacks refers to attacks that target specific devices, such as routers or switches, rather than the entire network or system. These attacks aim to exhaust the resources of the targeted device, causing it to become unresponsive or unavailable.

    Rate this question:

  • 7. 

    Which of the following attack is best prevented by a strong encryption services that are based on cryptography only?

    • A.

      DoS

    • B.

      Mapping

    • C.

      Social Engineering

    • D.

      Trojan

    Correct Answer
    B. Mapping
    Explanation
    A strong encryption service based on cryptography can effectively prevent mapping attacks. Mapping attacks involve gathering information about a network or system to identify vulnerabilities and potential points of entry. By encrypting the data, it becomes extremely difficult for attackers to decipher and gain insights into the network or system's structure and weaknesses. This ensures that even if attackers manage to intercept the encrypted data, they will not be able to extract any valuable information from it. Therefore, a strong encryption service based on cryptography is the best defense against mapping attacks.

    Rate this question:

  • 8. 

    #!/bin/bash #My first shell script echo Hello World Which of the following statement is TRUE?

    • A.

      Tell LINUX that the file is to be executed by bin/bash

    • B.

      Tell LINUX to print My first shell script

    • C.

      Tell LINUX to repeat Hello World

    • D.

      Tell LINUX that the file is to be saved by bin/bash

    Correct Answer
    A. Tell LINUX that the file is to be executed by bin/bash
    Explanation
    The correct answer is "tell LINUX that the file is to be executed by bin/bash". This is because the first line in the script "#!/bin/bash" is known as the shebang, and it specifies the interpreter to be used to execute the script, which in this case is the bash shell.

    Rate this question:

  • 9. 

    Which command allow user to delete a directory?

    • A.

      Deldir

    • B.

      Mkdir

    • C.

      Rmdir

    • D.

      Unmount

    Correct Answer
    C. Rmdir
    Explanation
    The correct answer is "rmdir". This command is used to remove or delete a directory in a file system. It is specifically designed for deleting directories and will only work if the directory is empty. If the directory contains any files or subdirectories, the command will not work and an error message will be displayed. Therefore, "rmdir" is the appropriate command to delete a directory.

    Rate this question:

  • 10. 

    What does the bin sub-directory contains?

    • A.

      It contains many other parts of the basic LINUX system.

    • B.

      It contains sequence of directories to follow to reach the file.

    • C.

      It contains program that correspond to core LINUX command.

    • D.

      It contains home directories of all users with accounts on the system.

    Correct Answer
    C. It contains program that correspond to core LINUX command.
    Explanation
    The bin sub-directory in Linux contains programs that correspond to core Linux commands. These programs are essential for the functioning of the Linux system and are used for various tasks and operations. The bin directory is typically included in the system's PATH variable, allowing users to easily access these core commands from any directory in the system.

    Rate this question:

  • 11. 

    Which of the following describe the directory /dev/hdb?

    • A.

      Floppy (b:)

    • B.

      Hard disk (master)

    • C.

      Hard disk (slave)

    • D.

      2nd SCSI hard disk

    Correct Answer
    C. Hard disk (slave)
    Explanation
    The directory /dev/hdb is described as a "Hard disk (slave)". This indicates that it is a secondary hard disk drive connected to the computer. In a master-slave configuration, the primary hard disk is the master, and the secondary hard disk is the slave. The slave drive typically has a lower priority and is used for additional storage or backup purposes.

    Rate this question:

  • 12. 

    Which of the following symbol represent the CORRECT permission access to test.txt if the owner & group access were given read & writes permission while the guest was only allowed to read?

    • A.

      -r--rw-rw-

    • B.

      -rw-rw-r--

    • C.

      Dr--rw-rw-

    • D.

      Drw-rw-r--

    Correct Answer
    B. -rw-rw-r--
    Explanation
    The correct answer is "-rw-rw-r--". In this symbol, the first character "-" represents a regular file, the next three characters "rw-" represent the owner's permission as read and write, the next three characters "rw-" represent the group's permission as read and write, and the last three characters "r--" represent the guest's permission as read only.

    Rate this question:

  • 13. 

    What is the command to change the permission access -rwxrw-r-- of test2.txt?

    • A.

      Chmod 246 test2.txt

    • B.

      Chmod 442 test2.txt

    • C.

      Chmod 627 test2.txt

    • D.

      Chmod 764 test2.txt

    Correct Answer
    D. Chmod 764 test2.txt
    Explanation
    The command "chmod 764 test2.txt" is the correct answer because it changes the permission access of "test2.txt" to -rwxrw-r--. In the chmod command, the first digit represents the owner's permission, the second digit represents the group's permission, and the third digit represents the others' permission. In this case, the owner has read, write, and execute permissions (7), the group has read and write permissions (6), and others have read-only permission (4).

    Rate this question:

  • 14. 

    How to achieve a secure connection between your Private Cloud and Public Cloud provider?

    • A.

      Consolidate data storage

    • B.

      De-provisioned automatically

    • C.

      Jointly managed the activities

    • D.

      Connect the environment through VPN

    Correct Answer
    D. Connect the environment through VPN
    Explanation
    To achieve a secure connection between a Private Cloud and a Public Cloud provider, the environment can be connected through a Virtual Private Network (VPN). A VPN creates a secure and encrypted connection between the two networks, ensuring that data transmitted between them is protected from unauthorized access. By establishing a VPN connection, organizations can securely transfer data and communicate between their Private Cloud and the Public Cloud provider, minimizing the risk of data breaches and ensuring the confidentiality and integrity of their information.

    Rate this question:

  • 15. 

    Which class does 16 ports SAN switch with a single controller component classified?

    • A.

      Active Class

    • B.

      Director Class

    • C.

      Modular Class

    • D.

      Service Class

    Correct Answer
    C. Modular Class
    Explanation
    A 16 ports SAN switch with a single controller component is classified as a Modular Class. This means that the switch has a modular design, allowing for expansion and customization by adding additional modules or components as needed. The single controller component indicates that there is only one controller managing the switch's operations.

    Rate this question:

  • 16. 

    What type of attack that occurs when someone between you and the person with whom you are communicating is actively monitoring and controlling your communication transparently. 

    • A.

      Hijacking

    • B.

      Trojan

    • C.

      Sniffing

    • D.

      Spoofing

    Correct Answer
    A. Hijacking
    Explanation
    Hijacking is the correct answer because it refers to a type of attack where an unauthorized person intercepts and takes control of a communication session between two parties. This attacker can monitor and manipulate the communication without the knowledge of the communicating parties. Hijacking can occur in various forms, such as session hijacking or man-in-the-middle attacks, where the attacker can eavesdrop on the communication, alter the data being transmitted, or even impersonate one of the parties involved.

    Rate this question:

  • 17. 

    Which of the following is NOT a SAN component layer?

    • A.

      Access Layer

    • B.

      Host Layer

    • C.

      Fabric Layer

    • D.

      Storage Layer

    Correct Answer
    A. Access Layer
    Explanation
    The Access Layer is not a SAN component layer. In a Storage Area Network (SAN), the Access Layer refers to the layer that provides connectivity between the SAN fabric and the servers or hosts. It includes components such as host bus adapters (HBAs) and network switches. The Host Layer, Fabric Layer, and Storage Layer are all valid SAN component layers. The Host Layer consists of the servers or hosts that access the SAN. The Fabric Layer includes the network switches and other devices that form the SAN fabric. The Storage Layer refers to the storage devices, such as disk arrays or tape libraries, that store the data in the SAN.

    Rate this question:

  • 18. 

    What SUDO program does?

    • A.

      Unmount a device

    • B.

      Access user root privileges

    • C.

      Act as system administrator

    • D.

      Formatting capabilities software

    Correct Answer
    B. Access user root privileges
    Explanation
    The SUDO program allows users to access root privileges on a system. This means that users can execute commands and perform tasks that are typically restricted to the system administrator. By using SUDO, users can temporarily elevate their privileges and perform administrative tasks without having to log in as the root user. This helps to enhance security and limit the potential damage that can be caused by unauthorized access to system resources.

    Rate this question:

  • 19. 

    Which cloud deployment model is use if there is a needs for sharing data, platform and applications to a specific group with a common goal?

    • A.

      Community Cloud

    • B.

      Hybrid Cloud

    • C.

      Private Cloud

    • D.

      Public Cloud

    Correct Answer
    A. Community Cloud
    Explanation
    A community cloud deployment model is used when there is a need for sharing data, platform, and applications among a specific group with a common goal. In a community cloud, multiple organizations or individuals with similar interests or requirements come together to share resources and collaborate on projects. This model allows for cost-sharing, increased security, and customized solutions tailored to the specific needs of the community members.

    Rate this question:

  • 20. 

    Which cloud deployment model is solution if there is a needs for high degree of governance?

    • A.

      Community Cloud

    • B.

      Hybrid Cloud

    • C.

      Private Cloud

    • D.

      Public Cloud

    Correct Answer
    C. Private Cloud
    Explanation
    A private cloud deployment model is the solution if there is a need for a high degree of governance. In a private cloud, the infrastructure is dedicated to a single organization, providing them with full control over security, compliance, and data governance. This allows the organization to implement strict governance policies and ensure that their sensitive data and resources are protected. Compared to public or hybrid clouds, a private cloud offers a higher level of control and customization, making it suitable for organizations with specific governance requirements.

    Rate this question:

  • 21. 

    What is UNIX?

    • A.

      Sub -directory folder

    • B.

      Non-portable hardware

    • C.

      Freely available application

    • D.

      Open source Operating System

    Correct Answer
    D. Open source Operating System
    Explanation
    UNIX is an open source operating system. Open source refers to a type of software that allows users to view, modify, and distribute the source code. This means that anyone can access and modify the underlying code of UNIX, making it highly customizable and adaptable to different needs. As an operating system, UNIX provides a platform for running software and managing computer hardware resources. It is known for its stability, security, and scalability, making it a popular choice for servers and high-performance computing environments.

    Rate this question:

  • 22. 

    Which one of the following is use to automate the creation, monitoring and deployment of resources in data centre?

    • A.

      OVF

    • B.

      Orchestrator

    • C.

      Service Manager

    • D.

      Virtual Machine Manager

    Correct Answer
    B. Orchestrator
    Explanation
    Orchestrator is the correct answer because it is a tool used to automate the creation, monitoring, and deployment of resources in a data center. It helps in managing and coordinating various tasks and workflows, allowing for efficient and streamlined operations. OVF (Open Virtualization Format) is a standard for packaging and distributing virtual machines, but it does not specifically focus on automation or resource management. Service Manager is a tool for managing and automating IT service delivery, but it may not have the same level of focus on data center resources as Orchestrator. Virtual Machine Manager is a tool for managing virtual machines, but it may not cover the broader range of data center resource automation that Orchestrator does.

    Rate this question:

  • 23. 

    Which of the following is NOT a cloud service model?

    • A.

      IaaS

    • B.

      PaaS

    • C.

      FaaS

    • D.

      SaaS

    Correct Answer
    C. FaaS
    Explanation
    FaaS stands for Function as a Service, which is a cloud computing model where developers can execute individual functions in the cloud without managing the infrastructure. It allows developers to focus solely on writing and deploying code, without worrying about servers or scaling. Therefore, FaaS is indeed a cloud service model, making it the incorrect answer for this question.

    Rate this question:

  • 24. 

    What does SOA stands for?

    • A.

      Service oriented archictecture

    • B.

      Storage oriented archictecture

    • C.

      Server oriented archictecture

    • D.

      System oriented archictecture

    Correct Answer
    A. Service oriented archictecture
    Explanation
    SOA stands for Service Oriented Architecture. It is a design approach that organizes software components as services, which can be accessed and reused by different applications. This architecture promotes loose coupling, flexibility, and interoperability between systems. It allows businesses to integrate and combine various software components and services to create new applications or modify existing ones easily.

    Rate this question:

  • 25. 

    Which of the following is NOT the limitation of cloud computing?

    • A.

      Automated updates

    • B.

      Vendor - lock in application

    • C.

      Legislation on privacy

    • D.

      Cloud Security

    Correct Answer
    A. Automated updates
    Explanation
    Automated updates are not a limitation of cloud computing because they are actually a benefit. Cloud computing allows for automatic updates to be applied to software and systems, ensuring that users always have the latest features and security patches without needing to manually install them. This helps to improve efficiency and reduce the risk of security vulnerabilities. Therefore, automated updates are not a limitation, but rather a valuable feature of cloud computing.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 09, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 07, 2013
    Quiz Created by
    Sitti.fatimah
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.