Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

Computer Science Engineering (CSE)

_________ is a service that creates and manages virtual network interfaces.

Question:

_________ is a service that creates and manages virtual network interfaces.

A.

VMware vStorage

B.

VMware vNetwork

C.

VMware vCompute

D.

Application services

Answer» b. VMware vNetwork

Note: The above multiple-choice question is for all general and Competitive Exams in India

_________ is a service that creates and manages virtual network interfaces. Read More »

» Cloud Computing solved MCQs

Cloud system from SGI is functionally considered as an ________.

Question:

Cloud system from SGI is functionally considered as an ________.

A.

on-demand cloud computing service

B.

on-demand cloud storage service

C.

on-demand cloud accessing service

D.

on-demand

Answer» a. on-demand cloud computing service

Note: The above multiple-choice question is for all general and Competitive Exams in India

Cloud system from SGI is functionally considered as an ________. Read More »

» Cloud Computing solved MCQs

The source of HDFS architecture in Hadoop originated as

Question:

The source of HDFS architecture in Hadoop originated as

A.

Google distributed filesystem

B.

Yahoo distributed filesystem

C.

Facebook distributed filesystem

D.

Amazon S3 storage

Answer» a. Google distributed filesystem

Note: The above multiple-choice question is for all general and Competitive Exams in India

The source of HDFS architecture in Hadoop originated as Read More »

» Cloud Computing solved MCQs

Which of the following backup create a cloned copy of your current data or drive ?

Question:

Which of the following backup create a cloned copy of your current data or drive ?

A.

Continuous Data Protection

B.

Open file backup

C.

Reverse Delta backup

D.

None of the mentioned

Answer» a. Continuous Data Protection

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following backup create a cloned copy of your current data or drive ? Read More »

» Cloud Computing solved MCQs

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Question:

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A.

Cross-site scoring scripting

B.

Cross-site request forgery

C.

Two-factor authentication

D.

Cross-site scripting

Answer» d. Cross-site scripting

Note: The above multiple-choice question is for all general and Competitive Exams in India

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. Read More »

» Cloud Computing solved MCQs

The technology used to distribute service requests to resources is referred to as _____________

Question:

The technology used to distribute service requests to resources is referred to as _____________

A.

load performing

B.

load scheduling

C.

load balancing

D.

all of the mentioned

Answer» c. load balancing

Note: The above multiple-choice question is for all general and Competitive Exams in India

The technology used to distribute service requests to resources is referred to as _____________ Read More »

» Cloud Computing solved MCQs

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.

Question:

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.

A.

table caching

B.

geocaching

C.

index caching

D.

windows Media Server

Answer» b. geocaching

Note: The above multiple-choice question is for all general and Competitive Exams in India

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another. Read More »

» Cloud Computing solved MCQs

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

Question:

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A.

Making infrastructure vulnerable to malware

B.

Potential for noncompliance

C.

Data Loss

D.

All of the above

Answer» d. All of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? Read More »

» Cloud Computing solved MCQs