For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

Question:

For the _________ model, the security boundary may be defined for the vendor to include the software framework and middleware layer.

A.

SaaS

B.

PaaS

C.

IaaS

D.

All of the mentioned

Answer» b. PaaS

Note: The above multiple-choice question is for all general and Competitive Exams in India

If the IP address or hostname of a data node changes

Question:

If the IP address or hostname of a data node changes

A.

The namenode updates the mapping between file name and block name

B.

The data in that data node is lost forever

C.

The namenode need not update mapping between file name and block name

D.

There namenode has to be restarted

Answer» c. The namenode need not update mapping between file name and block name

Note: The above multiple-choice question is for all general and Competitive Exams in India

Cloud system from SGI is functionally considered as an ________.

Question:

Cloud system from SGI is functionally considered as an ________.

A.

on-demand cloud computing service

B.

on-demand cloud storage service

C.

on-demand cloud accessing service

D.

on-demand

Answer» a. on-demand cloud computing service

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following backup create a cloned copy of your current data or drive ?

Question:

Which of the following backup create a cloned copy of your current data or drive ?

A.

Continuous Data Protection

B.

Open file backup

C.

Reverse Delta backup

D.

None of the mentioned

Answer» a. Continuous Data Protection

Note: The above multiple-choice question is for all general and Competitive Exams in India