Cloud Computing New Assignments With Answers
Cloud Computing New Assignments With Answers
Public Cloud: Resources are owned and operated by a third-party provider and
accessible to the general public.
Hybrid Cloud: Combines public and private cloud resources, allowing for
flexibility and control.
Cloud Characteristics:
Resource Pooling: Resources are shared among multiple users and dynamically
allocated.
Broad Network Access: Accessible via standard network protocols and devices.
Virtualization:
Cloud Technologies:
Key Concepts:
Security: Protecting data and resources from unauthorized access and threats.
a) Cost reduction
b) Increased flexibility and control
c) Enhanced security
d) Simplified management
1. Which cloud service model provides users with the ability to access and use pre-
packaged software applications over the internet?
a) IaaS
b) PaaS
c) SaaS
d) Cloud Storage
Answer: c) SaaS
a) Limited scalability
b) On-demand self-service
Cloud Computing OC
c) Complex management
d) High cost
1. What is a hypervisor?
Q1
On-demand self-service
High latency
Fixed storage
Explanation
Cloud computing provides resources like storage and computing power as needed, without
manual intervention.
Q2
Security
Cost
Cloud Computing OC
Speed
Reliability
Answer: Cost
Explanation
Cloud computing reduces the need for physical infrastructure, thus lowering operational costs.
Q3
Public cloud
Private cloud
Hybrid cloud
Local cloud
Explanation
Local cloud is not a recognized deployment model. Cloud models include public, private, and
hybrid clouds.
Q4
Fixed capacity
B
Cloud Computing OC
Unlimited scalability
Local-only access
Hardware dependence
Explanation
Cloud computing offers scalability, allowing users to scale resources up or down based on their
needs.
Q5
Decentralization
Centralized hardware
On-site management
Manual updates
Answer: Decentralization
Explanation
Cloud computing decentralizes resources, providing access from various locations via the
internet.
Q6
SaaS
Cloud Computing OC
IaaS
PaaS
DaaS
Answer: IaaS
Explanation
Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet.
Q7
Virtualization
Blockchain
Quantum computing
Augmented reality
Q8
Which command in AWS CLI can you use to configure a default profile for cloud access?
aws configure
aws init
C
Cloud Computing OC
aws setup
aws create-user
Explanation
The aws configure command is used to set up default access and secret keys for AWS services.
Q9
A company moved to a cloud environment, but users are facing slow data access times. What
could be the cause?
Insufficient bandwidth
Automatic scaling
Virtualization
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Cloud Computing OC
Report
Explanation
Slow data access can often be attributed to limited bandwidth or network issues. Cloud
environments rely heavily on network infrastructure.
Q10
Microsoft Azure
Amazon EC2
Google Docs
VMware
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Google Docs is a SaaS offering, providing software over the internet without requiring
installation on a local device.
Q11
In which cloud service model does the provider manage everything from hardware to
applications?
IaaS
PaaS
SaaS
DaaS
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: SaaS
Explanation
Cloud Computing OC
In SaaS, the provider manages both the underlying infrastructure and the software applications
for the user.
Q12
Faster development
Manual scaling
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
PaaS allows developers to build, test, and deploy applications faster, without managing
underlying hardware.
Q13
Cloud Computing OC
In the IaaS model, which of the following is the responsibility of the user?
Application updates
Networking
Operating system
Data backup
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
In IaaS, the user is responsible for managing operating systems, applications, and data, while
the provider manages infrastructure.
Q14
Which cloud service model is best suited for developers who want to build custom applications
without managing infrastructure?
A
Cloud Computing OC
SaaS
PaaS
IaaS
FaaS
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: PaaS
Explanation
PaaS provides a platform for developers to build applications without needing to manage
infrastructure like servers or storage.
Q15
Which of the following is typically not a responsibility of the cloud provider in an IaaS model?
Networking
B
Cloud Computing OC
Security
Applications
Virtualization
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Applications
Explanation
In IaaS, the provider manages the hardware, networking, and virtualization, while users handle
applications and data.
Q16
Which service model allows customers to rent virtualized computing resources over the
internet?
SaaS
IaaS
C
Cloud Computing OC
PaaS
DBaaS
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: IaaS
Explanation
IaaS provides users with access to virtualized hardware resources, such as storage and
computing power.
Q17
AWS Lambda
Amazon EC2
AWS S3
D
Cloud Computing OC
AWS CloudFormation
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Amazon EC2 is an example of IaaS, offering scalable virtual machines in the cloud.
Q18
A company using a SaaS product for their business processes is facing issues with scaling. What
could be the reason?
Overloaded servers
Network issues
Hide Answer
Cloud Computing OC
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
SaaS applications may have inherent limitations on scalability, especially if they are not designed
for large workloads.
Q19
AWS
VMware
Microsoft Azure
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Public cloud models like AWS and Microsoft Azure provide shared infrastructure accessible over
the internet.
Q20
Shared resources
Increased security
Low cost
Limited scalability
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Private cloud offers dedicated infrastructure, enhancing security and privacy compared to public
cloud models.
Q21
Which deployment model combines both private and public cloud features?
Public cloud
Hybrid cloud
Private cloud
Community cloud
Hide Answer
Report a Problem!
Comment
Cloud Computing OC
CancelSubmit
close
Report
Explanation
A hybrid cloud integrates public and private cloud infrastructure, allowing data and applications
to be shared between them.
Q22
No scalability
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Cloud Computing OC
Report
Explanation
A community cloud shares infrastructure between multiple organizations with similar concerns.
Q23
Which of the following scenarios is best suited for a hybrid cloud model?
A personal blog
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
Hybrid clouds are ideal for enterprises with variable workloads, allowing them to balance
between private and public clouds.
Q24
Higher security
Lower cost
More scalability
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
A community cloud offers enhanced security and privacy, as it is shared only by a specific group
of organizations.
Q25
Cloud Computing OC
In Google Cloud Platform (GCP), which command can be used to create a new virtual machine
instance in a public cloud environment?
gcloud init
gcloud vm create
gcloud new vm
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The command gcloud compute instances create is used to create a new virtual machine
instance in GCP's public cloud.
Q26
Which Azure service is used to deploy applications across a hybrid cloud model?
A
Cloud Computing OC
Azure Stack
Azure VMs
Azure Functions
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Azure Stack allows enterprises to run Azure services on their own private cloud while
connecting to the public cloud for hybrid deployment.
Q27
Which AWS service is ideal for deploying applications in a private cloud environment?
B
Cloud Computing OC
AWS Lambda
AWS EC2
AWS VPC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
AWS VPC (Virtual Private Cloud) allows you to create a private cloud within AWS, with control
over networking.
Q28
In a hybrid cloud setup, which AWS tool helps securely connect an on-premises private cloud to
the AWS public cloud?
AWS VPN
C
Cloud Computing OC
AWS Lambda
AWS CloudFormation
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
AWS Direct Connect enables a dedicated network connection between an on-premises private
cloud and AWS public cloud for seamless integration.
Q29
A company using a public cloud environment is facing data security concerns. What could be a
possible solution?
D
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
A hybrid cloud allows sensitive data to be stored in a private cloud, while utilizing the public
cloud for less sensitive workloads.
Q30
An organization using a private cloud is finding it difficult to scale during peak times. What could
be the solution?
Hide Answer
Cloud Computing OC
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
A hybrid cloud enables organizations to maintain their private cloud while using the public cloud
for additional resources during peak times.
12...
Q31
Resource optimization
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
Virtualization allows for better resource utilization by running multiple virtual instances on a
single physical server.
Q32
Which type of hypervisor runs directly on the host's hardware without an underlying operating
system?
Type 1
Type 2
Bare-metal
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Type 1, or bare-metal hypervisors, run directly on the hardware, providing high performance
and direct access to hardware resources.
Q33
Enhances security
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The hypervisor is responsible for managing the interaction between virtual machines and the
underlying hardware.
Q34
Desktop virtualization
Network virtualization
Application virtualization
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
Fiber channel is a storage protocol, not a type of virtualization. Common types of virtualization
include desktop, network, and application.
Q35
What is one key advantage of using containers over traditional virtual machines?
More secure
Limited isolation
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Explanation
Containers are lightweight and share the host OS, leading to faster startup times compared to
traditional virtual machines.
Q36
Which technology is most commonly used to isolate different cloud applications in a single
environment?
Full virtualization
Paravirtualization
Containers
Hybrid virtualization
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Containers
Explanation
Cloud Computing OC
Containers allow for isolated application environments, which makes them ideal for cloud
environments where isolation and scalability are key.
Q37
docker run
docker ps
docker start
docker exec
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: docker ps
Explanation
Q38
Cloud Computing OC
How would you create a new virtual machine in VMware using the CLI?
vmware create-vm
vm create
vmware-vmcreate
vmware-cmd -s create
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The vmware-cmd -s create command is used to create a new virtual machine in VMware from
the command line.
Q39
A
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The docker run command is used to launch a new container from a specified image.
Q40
How do you mount a virtual disk image (VDI) to a virtual machine in VirtualBox?
VBoxManage mount-disk
VBoxManage attach-disk
Cloud Computing OC
VBoxManage load-vdi
VBoxManage add-storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The VBoxManage attach-disk command attaches a virtual disk image to a virtual machine in
VirtualBox.
Q41
A virtual machine in your cloud environment is experiencing slow performance. What could be a
likely cause?
Network failure
Disk corruption
Cloud Computing OC
Over-provisioned RAM
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
If the virtual machine has been allocated insufficient CPU resources, it can result in slow
performance.
Q42
A containerized application in a virtualized environment is not able to access the host network.
What could be the issue?
Insufficient permissions
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
A misconfigured network bridge could prevent the container from accessing the host network,
affecting communication.
Q43
A company using virtual machines is experiencing resource contention between the VMs. What
could be the solution?
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
Optimizing resource allocation ensures that VMs do not over-utilize shared hardware resources,
preventing contention.
Q44
Amazon RDS
Amazon S3
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Amazon S3
Explanation
Amazon S3 is an object storage service where data is stored as objects, allowing for high
scalability.
Q45
What is the main advantage of using cloud storage over traditional on-premise storage?
Higher security
Faster access
Scalability
More control
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Scalability
Explanation
Cloud storage offers the ability to scale storage space dynamically as needed, unlike traditional
storage solutions.
Q46
Which type of cloud storage is best suited for storing frequently accessed data?
Cold storage
Archival storage
Object storage
Block storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
Object storage is ideal for frequently accessed data as it allows for easy retrieval and scalability.
Q47
Which of the following cloud storage services is primarily designed for structured data?
Amazon S3
Amazon DynamoDB
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Amazon DynamoDB is a NoSQL database service, optimized for structured data and high-
performance access.
Q48
Image hosting
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Block storage is commonly used for databases and boot volumes due to its high performance
and low latency.
Cloud Computing OC
Q49
Which cloud storage technology allows for high availability and automatic replication across
multiple regions?
Object storage
File storage
Block storage
Distributed storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Distributed storage systems replicate data across multiple regions to ensure high availability and
resilience.
Q50
aws s3 upload
aws s3 cp
aws s3 put
aws s3 send
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: aws s3 cp
Explanation
Q51
gsutil ls
B
Cloud Computing OC
gsutil list
gcloud storage ls
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: gsutil ls
Explanation
The gsutil ls command is used to list the contents (objects) of a bucket in Google Cloud Storage.
Q52
How would you create a new storage bucket in AWS using the CLI?
aws s3 create-bucket
aws s3 mb bucket
aws s3 cp bucket
Cloud Computing OC
aws s3 make-bucket
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Q53
What is the correct command to copy a file from an Azure Blob Storage container to your local
machine using the Azure CLI?
az storage cp
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The az storage blob download command is used to download files from an Azure Blob Storage
container to a local machine.
Q54
A user is unable to access a file stored in Amazon S3. What could be the likely cause?
File is corrupt
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
In S3, incorrect permissions on the bucket or file can prevent access, even if the file exists.
Q55
A company is experiencing slow retrieval times when accessing data stored in cold cloud
storage. What could be the issue?
Bandwidth issues
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cold storage is optimized for long-term storage and may have higher retrieval latencies
compared to other types of storage.
Q56
A cloud storage solution is reporting out-of-space errors even though it should have auto-
scaling. What could be the problem?
Network issues
Permission issues
Data corruption
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Even with auto-scaling, cloud storage solutions may have quota limits that can prevent further
allocation of space.
Q57
Data breaches
Natural disasters
Increased latency
Hardware failures
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
Data breaches are one of the most common risks in cloud computing due to the accessibility of
data over the internet.
Q58
Which of the following is a security feature commonly provided by cloud service providers?
Automated scaling
Firewall protection
Network acceleration
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Explanation
Cloud service providers often offer firewall protection as part of their security features to
protect against unauthorized access.
Q59
Increase storage
Reduce latency
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
Encryption is critical in cloud security as it protects data both at rest (stored) and in transit
(moving between locations).
Q60
Which of the following is a shared responsibility between the cloud provider and the customer?
Data encryption
Firewall configuration
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
In cloud security, the provider ensures physical security, while the customer is responsible for
securing data through encryption.
123
Cloud Computing OC
Q61
In cloud environments, what is the purpose of identity and access management (IAM)?
Reducing latency
Managing storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
IAM helps ensure that only authorized users can access specific resources in a cloud
environment, enhancing security.
Q62
Which of the following cloud security models ensures that data is protected while being
processed?
Cloud Computing OC
Encryption at rest
Data masking
Homomorphic encryption
Symmetric encryption
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Homomorphic encryption allows data to be processed without needing to decrypt it, providing
security even during data processing.
Q63
Which AWS service can be used to enable encryption for data stored in Amazon S3?
AWS Shield
Cloud Computing OC
AWS CloudTrail
AWS KMS
AWS EC2
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
AWS Key Management Service (KMS) allows for the creation and control of encryption keys
used to encrypt data stored in S3.
Q64
Which command would you use in AWS CLI to enable server-side encryption on an S3 bucket?
aws s3 enable-encryption
aws s3 secure-bucket
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws s3api put-bucket-encryption command enables server-side encryption for an S3 bucket.
Q65
What command would you use to retrieve the IAM policy for an AWS user using the AWS CLI?
D
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws iam get-user-policy command retrieves the IAM policy for a specific AWS user, helping
manage permissions.
Q66
A cloud user is unable to access resources they previously had access to. What is the likely
issue?
Network failure
Hardware malfunction
Server downtime
Hide Answer
Cloud Computing OC
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Changes to IAM policies can restrict access to resources, and users may lose access if the
policies are misconfigured.
Q67
A company notices unusual login activities in their cloud environment. What is the most
immediate security action to take?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Q68
A company is facing a data breach in their cloud infrastructure. What is the first step in
mitigating the breach?
Notify customers
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Isolating the affected system helps contain the breach while preventing further damage or data
loss.
Q69
What is the primary purpose of Identity and Access Management (IAM) in cloud computing?
Hide Answer
Report a Problem!
Comment
Cloud Computing OC
CancelSubmit
close
Report
Explanation
IAM controls access to cloud resources by managing users, permissions, and roles.
Q70
Network management
Encryption
User authentication
Data storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Explanation
IAM ensures secure authentication of users and manages their access to resources.
Q71
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
RBAC assigns permissions based on the user's role in the organization, ensuring proper access
controls.
Q72
User identities
Resource access
Bandwidth allocation
Permission policies
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
IAM focuses on managing user identities, permissions, and access to resources, not network
bandwidth.
Q73
Cloud Computing OC
What is the difference between an IAM user and an IAM role in cloud computing?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Users are individual accounts, while roles are assigned to services or applications requiring
access to resources.
Q74
A
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws iam create-user command is used to create a new IAM user account in AWS.
Q75
How would you assign a new IAM policy to a user using the AWS CLI?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws iam attach-user-policy command is used to attach a managed policy to a specific IAM
user.
Q76
How would you create a new role with specific permissions in Google Cloud IAM using gcloud
CLI?
gcloud create-iam-role
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The gcloud iam create-role command creates a new role with specific permissions in Google
Cloud.
Q77
A user is unable to access a cloud resource even though they have been granted permissions.
What could be the cause?
Network issues
Software bugs
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
An incorrect or misconfigured IAM policy can prevent users from accessing resources despite
granted permissions.
Q78
A user has been granted access to multiple cloud resources but is unable to perform actions in
some of them. What is the likely issue?
Insufficient permissions
Network latency
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
The user may not have sufficient permissions for specific resources, leading to limited access.
Q79
An organization is facing unauthorized access issues despite having IAM policies in place. What
could be a potential solution?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Q80
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
A VPC allows for a secure and isolated environment within the cloud for connecting on-premise
resources.
Q81
Virtual Machines
Security Groups
Load Balancers
File Storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
Load balancers distribute incoming network traffic across multiple servers, improving
performance and reliability.
Q82
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Explanation
Subnets help divide a larger network into smaller, isolated sections, improving security and
traffic management.
Q83
Which service allows for direct, private connectivity between a customer's data center and a
cloud provider?
VPN
Direct Connect
Load Balancer
NAT Gateway
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
Services like AWS Direct Connect and Azure ExpressRoute enable private, secure connections
between on-premise data centers and cloud services.
Q84
Which cloud networking model provides scalability by abstracting the network layer entirely?
Traditional Networking
Overlay Networking
Underlay Networking
Cloud-Native Networking
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud-native networking abstracts the underlying network layer, providing automatic scaling
and resource management.
Q85
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws ec2 describe-subnets command provides details about the subnets in a specific region
in AWS.
Q86
How would you create a new Virtual Private Cloud (VPC) in AWS using the CLI?
A
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws ec2 create-vpc command is used to create a new VPC in AWS.
Q87
How would you attach an internet gateway to a VPC in AWS using the CLI?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws ec2 attach-internet-gateway command is used to attach an internet gateway to a VPC
for internet connectivity.
Q88
In Google Cloud, what is the command to create a new VPC using the gcloud CLI?
gcloud create-vpc
gcloud build-vpc
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The gcloud compute networks create command creates a new VPC in Google Cloud.
Q89
A user is unable to access their cloud resource over the internet. What could be a possible
reason?
Insufficient storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Without an attached internet gateway, resources in a VPC cannot be accessed over the public
internet.
Q90
A company is facing slow data transfers between their on-premise data center and the cloud.
What could be the issue?
Data encryption
Over-provisioned servers
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
High latency can slow down data transfers between an on-premise data center and cloud
resources.
12345
Q91
A company using cloud services is experiencing IP conflicts between their resources. What is a
potential solution?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Using multiple VPCs can help isolate resources, reducing the risk of IP conflicts within the cloud
network.
Q92
CPU performance
Security
Backup frequency
User authentication
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Security
Explanation
Security is a key concern when managing cloud deployments, as it ensures data and applications
are protected.
Q93
Reduced storage
Automatic billing
Hide Answer
Report a Problem!
Comment
Cloud Computing OC
CancelSubmit
close
Report
Explanation
Q94
Increased latency
Limited scalability
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Cloud Computing OC
Report
Explanation
Managing identities and permissions across multiple cloud providers can be challenging in
multi-cloud environments.
Q95
Improved security
Better storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
IaC allows for automated, repeatable deployment configurations, reducing manual errors in the
deployment process.
Q96
Which of the following strategies is essential for managing disaster recovery in cloud
deployments?
Regular testing
Increased encryption
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
Regular testing ensures that disaster recovery plans are effective and can be executed
successfully during an emergency.
Q97
In AWS, how would you update an existing CloudFormation stack to deploy new resources?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Q98
Cloud Computing OC
How would you deploy an application to Google Kubernetes Engine (GKE) using the gcloud CLI?
kubectl apply
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The kubectl apply command is used to deploy applications to Kubernetes clusters, including
GKE.
Q99
What command in AWS CLI would you use to provision resources using Terraform?
A
Cloud Computing OC
terraform create
terraform apply
terraform start
terraform deploy
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The terraform apply command provisions resources defined in the Terraform configuration file.
Q100
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Multiple provider blocks in Terraform allow you to manage infrastructure across multiple cloud
providers in a single configuration.
Q101
A company’s auto-scaling group is not scaling resources as expected in AWS. What could be the
cause?
Insufficient monitoring
Insufficient storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
An improperly defined scaling policy can prevent auto-scaling groups from adjusting resources
as expected.
Q102
A cloud application deployed using Kubernetes is showing high latency. What could be a
potential reason?
Misconfigured pods
Over-provisioned nodes
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Misconfigured pods or resource limits in a Kubernetes deployment can result in high latency or
performance issues.
Q103
A multi-cloud deployment is facing issues with data synchronization between clouds. What
could be the cause?
Slow storage
Network misconfiguration
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
A misconfigured network can result in data synchronization problems between different cloud
providers in a multi-cloud deployment.
Q104
Which regulation is often a requirement for companies handling customer data in Europe?
HIPAA
GDPR
SOC 2
PCI-DSS
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: GDPR
Explanation
The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the
collection and processing of personal information from individuals who live in the European
Union (EU).
Q105
What does the Health Insurance Portability and Accountability Act (HIPAA) regulate in cloud
computing?
Payment systems
Financial reporting
Storage limits
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
HIPAA sets guidelines for securing medical data and protecting patient privacy, which also
applies to cloud computing environments where health data is stored.
Q106
GDPR
ISO 27001
PCI-DSS
HIPAA
Hide Answer
Report a Problem!
Comment
Cloud Computing OC
CancelSubmit
close
Report
Answer: PCI-DSS
Explanation
PCI-DSS (Payment Card Industry Data Security Standard) is specifically designed for ensuring the
security of credit card information.
Q107
Ensures scalability
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Cloud Computing OC
Report
Explanation
ISO 27001 establishes an international standard for information security management systems,
applicable in cloud computing.
Q108
Which of the following is a key challenge in ensuring cloud compliance across different regions?
Regulatory diversity
Scalability issues
High costs
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Different regions may have varied regulatory frameworks, making it challenging for
organizations to ensure compliance across multiple jurisdictions.
Q109
In AWS, how would you enable logging for compliance audits in S3?
aws s3 enable-logs
aws s3 set-logging
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws s3api put-bucket-logging command enables logging for an S3 bucket, which is crucial
for audit compliance.
Cloud Computing OC
Q110
Which command in Google Cloud would you use to export audit logs for compliance purposes?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The gcloud logging export command is used to export logs in Google Cloud, which can be
essential for compliance audits.
Q111
A company is failing a compliance audit due to improper data encryption. What could be the
reason?
Cloud Computing OC
High latency
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Using the wrong encryption algorithm can result in non-compliance with data protection
regulations like GDPR or PCI-DSS.
Q112
A company is struggling to comply with local data residency requirements. What solution could
help?
Multi-region backups
Cloud Computing OC
End-to-end encryption
Faster storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Data residency regulations often require companies to store data within specific geographic
regions, making local cloud data centers a necessary solution.
Q113
A company using multiple cloud providers is facing issues with maintaining consistent
compliance. What could be the problem?
Overlapping identities
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Different cloud providers may adhere to different compliance standards, making it challenging
to ensure uniform compliance across the board.
Q114
What is the key advantage of building a cloud-native application over a traditional application?
Enhanced security
Manual scaling
Automatic scaling
Cloud Computing OC
Costly maintenance
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud-native applications are built to scale automatically, which adjusts resources based on
demand.
Q115
Which of the following architecture patterns is most suited for building scalable cloud
applications?
Monolithic
Serverless
Client-server
Peer-to-peer
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Serverless
Explanation
Serverless architectures allow for scaling without worrying about the underlying infrastructure,
making it ideal for building scalable cloud applications.
Q116
Scaling resources
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
Scaling stateful applications is difficult because session data must be managed and synchronized
across instances.
Q117
Which of the following is an optimal approach for handling massive read/write operations in a
scalable cloud database?
Horizontal scaling
Vertical scaling
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Horizontal scaling, by distributing the database load across multiple nodes, helps handle
massive operations efficiently.
Q118
How would you define an auto-scaling policy for an AWS EC2 instance using the CLI?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Q119
How would you configure an application load balancer in AWS using the CLI for a scalable web
application?
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
The aws elbv2 create-load-balancer command is used to configure an application load balancer,
a critical component for scaling web applications.
Q120
A cloud application is experiencing performance issues due to increased traffic. What could be a
solution?
Increase memory
Implement auto-scaling
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Explanation
1...
Q121
A highly scalable cloud application is experiencing database connection issues under load. What
could be the issue?
Database throttling
Lack of CPU
Slow storage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Database throttling under heavy load can limit the number of active connections, causing
performance issues in scalable applications.
Q122
Reduce costs
Minimize downtime
Increase performance
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The primary goal of disaster recovery is to ensure business continuity by minimizing downtime
and restoring services quickly.
Cloud Computing OC
Q123
What is the main difference between disaster recovery (DR) and high availability (HA)?
HA focuses on performance
HA prevents downtime
DR increases scalability
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Disaster recovery ensures quick recovery after an incident, while high availability aims to
prevent downtime through redundancy.
Q124
Which of the following strategies is most effective in ensuring business continuity during a
regional cloud outage?
Cloud Computing OC
Vertical scaling
Increased encryption
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Replicating data across multiple regions ensures that services can continue even if one region
experiences an outage.
Q125
High costs
Cloud Computing OC
Reduced compliance
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Synchronizing data across different cloud providers can be complex and is a key challenge in
multi-cloud disaster recovery plans.
Q126
How would you configure automatic backups for an Amazon RDS instance to support disaster
recovery?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws rds modify-db-instance command allows you to enable automatic backups for an RDS
instance, critical for disaster recovery.
Q127
How would you set up cross-region replication in Amazon S3 using the CLI for disaster recovery
purposes?
aws s3 enable-replication
aws s3 cp
Cloud Computing OC
aws s3 configure-replication
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws s3api create-replication-rule command sets up cross-region replication, which ensures
data availability in multiple regions.
Q128
A company is unable to restore its cloud application quickly after a failure. What could be the
issue?
High latency
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
If backups are not frequent enough, data loss can occur, making it harder to restore applications
quickly.
Q129
After a cloud disaster, a business is facing a longer recovery time than expected. What could be
the cause?
Insufficient storage
Network misconfiguration
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
Automated failover ensures that services switch to backup resources during a failure,
minimizing downtime and recovery time.
Q130
To increase storage
To manage costs
To prevent scaling
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud monitoring tools are designed to track the performance and availability of cloud
resources, ensuring optimal functionality.
Q131
Which of the following metrics is crucial for monitoring the health of a cloud application?
CPU utilization
Latency
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
CPU utilization, latency, and data transfer speed are key metrics that can indicate the health of
cloud applications.
Q132
High bandwidth
Limited scaling
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
Different cloud providers may use different metrics and standards, making unified monitoring
more challenging.
Q133
How would you enable CloudWatch logging for an AWS EC2 instance using the AWS CLI?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Explanation
The aws ec2 associate-iam-instance-profile command allows the EC2 instance to interact with
CloudWatch for logging and monitoring.
Q134
How would you create a custom CloudWatch alarm for high CPU utilization using the AWS CLI?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
The aws cloudwatch create-alarm command is used to set up alarms in CloudWatch based on
predefined metrics like CPU utilization.
Q135
A cloud application is experiencing intermittent downtime. What metric should you monitor to
identify the issue?
CPU utilization
Latency
Disk usage
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Answer: Latency
Explanation
Latency spikes often indicate network or performance issues that can lead to intermittent
downtime in cloud applications.
Cloud Computing OC
Q136
A company using multiple cloud services is struggling with unified monitoring. What could be a
solution?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Third-party tools like Datadog or New Relic can unify monitoring across multiple cloud
platforms, providing consolidated metrics.
Q137
Which of the following is a key benefit of using serverless computing in the cloud?
Cloud Computing OC
Reduced latency
Improved security
No server management
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Serverless computing allows developers to focus on code without worrying about managing or
provisioning servers.
Q138
By increasing bandwidth
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Edge computing processes data closer to the source (e.g., IoT devices), reducing latency and
enhancing performance.
Q139
Enhanced encryption
Easy to implement
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Quantum computing offers immense computational power, ideal for solving complex problems
that classical computers struggle with.
Q140
How would you deploy a containerized application using AWS Fargate, a serverless compute
engine for containers?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws ecs run-task command is used to run containers in AWS Fargate, which automates
container management without managing servers.
Q141
How would you configure a blockchain node on a cloud platform like AWS using the CLI?
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The aws managedblockchain create-node command is used to set up a blockchain node on AWS
Managed Blockchain.
Q142
A cloud application using edge computing is experiencing high latency. What could be the
cause?
Lack of encryption
Hide Answer
Report a Problem!
Cloud Computing OC
Comment
CancelSubmit
close
Report
Explanation
Edge computing relies on resources closer to the data source, and insufficient resources could
lead to higher latency.
Q143
A company implementing quantum computing in the cloud is facing issues with data stability.
What could be the cause?
Quantum decoherence
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Quantum decoherence is a common issue in quantum computing, where quantum states lose
stability, affecting data processing.
Q144
Improved performance
Increased security
Application compatibility
Lower costs
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Legacy systems may not be designed for the cloud, causing compatibility issues during
migration.
Q145
What is the main benefit of using the "lift and shift" migration strategy?
Ensures compliance
Improves security
Reduces latency
Hide Answer
Report a Problem!
Comment
CancelSubmit
Cloud Computing OC
close
Report
Explanation
Lift and shift moves existing applications to the cloud with minimal changes, making migration
faster and easier.
Q146
Which of the following migration strategies involves redesigning an application for the cloud?
Re-hosting
Re-platforming
Re-purchasing
Re-factoring
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Cloud Computing OC
Answer: Re-factoring
Explanation
Q147
How would you use the AWS CLI to migrate a database to Amazon RDS?
aws db migrate
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Cloud Computing OC
The aws dms create-migration-task command is used to migrate databases to Amazon RDS
using AWS Database Migration Service.
Q148
How would you perform a live migration of a virtual machine to Google Cloud using the CLI?
gcloud vm migrate
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
The gcloud compute instances live-migrate command is used to perform live migrations of
virtual machines in Google Cloud.
Q149
Cloud Computing OC
Excessive costs
Insufficient permissions
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Incomplete or poorly planned data migration can lead to downtime during the migration
process.
Q150
A cloud migration is complete, but the application is running slower than expected. What could
be the cause?
Cloud Computing OC
Hide Answer
Report a Problem!
Comment
CancelSubmit
close
Report
Explanation
Network settings may not be optimized for the cloud environment, resulting in poor application
performance post-migration.