Monday, December 14, 2015

Computer Networks quiz 3


1.Which of the following statements is/are NOT True?

Select one:
a. Queuing Delay in case of Switches is ZERO.  {correct}
b. If the queue is empty and no other packet is currently being transmitted then our packets queuing delay will be ZERO  
c. Queuing Delay in case of Hubs is ZERO.


2.To which OSI Layer or Layers does the Ethernet belong?

Network Layer

Data Link Layer

Transport Layer

Physical Layer

Network Layer

Session Layer

Application Layer

Select one:
a.
Data Link Layer and Physical Layer{correct}

b. Network Layer
c. Data Link Layer
d. Physical Layer


3.What is the data transfer rate of a GbE Card?    

Select one:
a. 1 Gbps{correct}
b. 100 Mbps
c. 1 Tbps
d. 10 Mbps

4.Latest version of HTTP is 1.1

Select one:
True
False{correct}


5.In the case study of Gigabit Ethernet which of the following factor contributes more in Delay?

Select one:
a. Queuing Delay{correct}
b. Propagation Delay
c. Transmission Time

6. DHCP Solicitation and DHCP Advertise Messages are meant to do the same thing but use different message formats and different points of origin.

Select one:
True
False{correct}

7.Telnet protocol does not benefit from cache mechanism.

Select one:
True{correct}
False

8.ARP and RARP are different variations of the same protocol.

Select one:
True
False{correct}

9. Reverse DNS Look-up is required for mapping an IP Address to to a TSAP.

Select one:
True
False{correct}

10.In the case study of Gigabit Ethernet if we increase the size of data for each node from 1472 Bytes to 5120 Bytes what would be its effect on utilization of the Network?

Select one:
a. Increase in Utilization  {correct}
b. Decrease in utilization
c. No change in Utilization level

Tuesday, November 10, 2015

SEM - 3 Regular Papers

                                                                     Cloud Computing



                                       Data Storage Technologies and Networks






                                               Advanced Computer Networks








                                                      Computer Networks



Data Storage Technologies and Networks Quiz 3

1.Which of the following is NOT related to Data
protection:
Select one:
a.
Risk vs. Cost vs. Complexity
b.
RPO and RTO
c.
Performance
d.
Historic data{correct}


2.The use of redundant storage networking
components for I/O transfer to happen between the server and storage
is called
Select one:
a. Adapter
b. Multipath{correct}
c. Storage Fabricated
d. Storage Controller

3.VTL gives us a better performance as compared to
tapes:
Select one:
True{correct}
False

4.Taking a full backup offers you a more effective
deduplication as compared to an incremental backup
Select one:
True
False{correct}

5.Hundreds of nodes are possible to be supported
in a SAN File System:-
Select one:
True{correct}
False

6.From an Availability perspective, it is
advantageous to have a lower MTBF value and a higher MTTR value
Select one:
True
False{correct}

7.Replication and Continuous Data Protection are
one and the same.
Select one:
True
False{correct}

8.Identify the odd one among the following:
Select one:-
a.
Copy-on-Write
 b.
Cloud Backup
 c.
Archival
 d.
Instant Recovery {correct}

9.Identify the odd one out of the following:
Select one:
a.
LUN Masking
 b.
Zoning
 c.
Virtual LUN
 d.
RAID{correct}


10.Number of supported ports in Arbitrated Loop is
1024.
Select one:
True
False{correct}

11.The process of investigating for the presence of
redundant data at the granularity level of below a file is called
Select one:
a.
Snapshot
 b.
Continuous Data protection
 c.
Data Deduplication{correct}
 d.
Asynchronous Replication

12.What should be the sequence of operations at the
source end that would be done among the following choices:
Select one:
a.
Dedupe, encrypt, compress
 b.
Dedupe, compress, encrypt{correct}
 c.
Encrypt, Dedupe, compress
 d.
Compress, dedupe, encrypt

13.Storage Management Interface specifications
covers the following: Fabric, Switches, Arrays and Libraries
components of my network.
Select one:
True{correct}
False

14.Synchronous replication will result in zero data
loss:
Select one:
True{correct}
FalseCDP

15.In a volume based replication, it is relatively
easy to add new file systems after data is available in remote
location.
Select one:
True
False{correct}

16.Mutual CHAP protocol is used in:

Select one:
a. iSCSI{correct}
b. NFS
c. NFS
d. SMB

17.From a replication perspective, which one of the
following is an odd one:
Select one:
a. DAS{correct}
b. IPSAN
c. FC SAN
d. NAS

18.Identify the odd one among the following:
Select one:
a.
Media Server
 b.
Storage Manager{correct}
 c.
Backup Server
 d.
Backup Agent

19.FC Access control is implemented by multi-path.
Select one:
True
False{correct}

20.Replication can be done at Application layer,
Data base layer, Middleware layer, FS layer, LV layer.
Select one:
True{correct}
False

21.A series of mechanisms that helps in capturing
or tracking all data modifications and thereby facilitating a quick
recovery to previous points in time is called:
Select one:
a. Clone
b. All the given choices
c. NDMP
d. CDP{correct}

22.For the purposes of Storage management,
'Clients' run on Storage devices that are getting managed
Select one:
True
False{correct}

23.Choose the odd one out of the following:
Select one:
a. FC-3{correct}
b. FC-1
c. FC-4
d. FC-2

24.What is the relationship between deduplication
and compressed data?
Select one:
a.
No relationship exists between the two
 b.
Uncompressed data can be deduped to maximum{correct}
extent
 c.
Insufficient informations
 d.
Compressed data can be deduped to maximum extent

25.Choose the odd one out of the following:
Select one:
a.
Login Command
 b.
SCSI Data Out
 c.
NOP-Out
 d.
SCSI Data In{correct}

Data Storage Technologies and Networks Quiz 2

1.Which of the following File Systems does not use
journalling in it?
Select one:
a. ext2{correct}
b. ext3
c. Reiserfs
d. Reiser

2.BER is used in:
Select one:
a. NFS
b. NAS
c. iSCSI
d. FC{correct}

3.When someone refers to you as 100-SM-LL-L while
using FC, which of the following will you not be able to infer about
FC from the given phrase:
Select one:
a. Higher Layer Protocol-{correct}
b. Media
c. Speed
d. Distance

4.Which of the following is not a reason for fast
NFS4.1 adoption?
Select one:
a. iSCSI integration{correct}
b. Security
c. Performance
d. Single namespace

5.Which of the following is typically not
considered as a server consolidation solution?
Select one:
a. iSCSI
b. FCoE
c. FC{correct}
d. Infiniband

6.A good thumb rule to follow: NAS to be used for
File sharing and iSCSI to be used for Block IP Storage:
Select one:
True{correct}
False

7.Which of the following is not a variable used in
the smb.conf file (Configuration file for samba?)
Select one:
a. Encrypt passwords
b. host name{correct}
c. Printcap name
d. load printers

8.Mutual CHAP authentication algorithm is used in
which of the following protocols:
Select one:
a. NFS
b. iSCSI{correct}
c. None of the given options
d. FC

9.It is possible for a iSCSI initiator to talk
with a FC target device
Select one:
True{correct}
False

10.Which of the error recovery levels take the
maximum amount of time to happen in iSCSI?
Select one:
a. 2{correct}
b. 0
c. All of them take the same amount of time
d. 1

11.Which of the following is not related to
providing security in NFS protocol?
Select one:
a. Kerberos
b. None of the given options{correct}
c. GSS API
d. SEC_GSS

12.NAS device is used to run applications like we
do in server: 
Select one:
True
False{correct}

13.Which of the following tools/files are NOT part
of NFS setup?
Select one:
a. exports file
b. passwd-{correct}
c. exportfs
d. hosts.allow

14.Choose the odd one out of the following:
Select one:
a.
Login Command
b.
SCSI Data In{correct}
c.
SCSI Data Out
d.
NOP-Out

15.Which verion of NFS was deployable across
firewall devices
Select one:
a. v4{correct}
b. v1
c. v2
d. v3

16.Which class of service of Fibre Channel is most
preferable to use for editing of video streams:
Select one:
a. 3{correct}
b. 1
c. 2
d. None of the given options


17.Which of the following RAID levels will give me
the maximum usable capacity?
Select one:
a. 0-{correct}
b. 6
c. 5
d. 1

18.JBOD and RAID are one and same :
Select one:
True
False{correct}


19.The encryption algorithm used in SMB is:
Select one:
a. AES-{correct}
b. PKI
c. No encryption support is possible
d. IPSec


20.NFS maintains the current state by:
Select one:
a.
Having a single unified namespace
b.
Having a separate MDS server
c.
Delegating more work to clients
d.
Establishing sessions initially{correct}

21.Choose the odd one out of the following:
Select one:
a.
Fabric
b.
Point-to-point
c.
Arbitrated Loop
d.
Storage sytem{correct}

22.NFSv3 pushes more work to clients through
delegation:
Select one:
True{correct}
False

23.If I have 3 disks each of 500GB capacity used
for creating a RAID and if the usable capacity after creation of RAID
is approximately 500GB only, then which  of the RAID levels have been
created here:
Select one:
a. RAID 6
b. RAID 5
c. RAID 0
d. RAID 1-{correct}

24.The best features of channels and networks gets
combined in which of the following protocols:
Select one:
a. NFS
b. CIFS
c. FC{correct}
d. iSCSI

25.Choose the odd one out of the following:
Select one:
a. iSCSI{correct}
b. IP
c. SCSI
d. HIPPI

Computer Networks quiz 2

1.Which provides a better way to represent exchange of messages / data units between two given network nodes runningthe same Network Protocol?

Select one:
a. Sequence Diagram
b. Timing and Sequence Diagram{correct}
c. Graph
d. Timing Diagram

2.Which of the following enables bi-directional exchanges between different types of networks or the networks using different sets of protocols?

Select one:
a. A Gateway {correct}
b. A Network Interface Controller chip
c. A Web-Browser
d. A Web-Server

3.A Stateless protocol:

Select one:
a. Has no state
b. Does not record / store state information corresponding to any transaction{correct}


4.What is inside a Network Adapter?

Select one:
a. Transmitter and Receiver
b. Scrambler and Descrambler
c. Multiplexer, Demultiplexer, Transmitter, Receiver, Scrambler, Descrambler and a few more elements.{correct}
d. Multiplexer and Demultiplexer

5.Analyze the TCP using Wireshark and answer that- The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.

Select one:
a. Randomly Generated Number{correct}
b. Binary number starting with 0
c. Binary number starting with 1
d. Octal Number

6.Which of the following RFCs defines the format and syntax of the latest HTTP standard?

Select one:
a. RFC 2616
b. RFC 7230 {correct}
c. RFC 2460
d. RFC 7320

7.The term Edge of the Network in the sense of the Internet refers to:

Select one:
a. high capacity nodes that interconnect to one-another as well as two or more interior nodes and multiple exterior user facing nodes
b. highest capacity interior nodes interconnecting to the end user networks
c. a local area network
d. lowest capacity exterior nodes interconnecting to the end user networks{correct}

8.Analyze the TCP using Wireshark and answer that- which of the following service uses TCP?

Select one:
a. HTTP & FTP {correct}
b. DHCP & ARP
c. DHCP, TFTP & ARP
d. DHCP, TFTP & HTTP

9.A Network Protocol is considered incomplete when:

Select one:
a. It fails (breaks) at times
b. A given state is does not have a defined stimulus to be reached from another connect state
c. It does not depict all possible states and transitions required to depict the behavior and desired operation {correct}
d. It underperforms

10.Why is it important to ensure that every defined state is reachable in a State Transition Diagram representing a Network Protocol?

Select all those options which apply!

Select one or more:
a. To ensure that the Network Protocol has all desired and possible states as well as stimuli leading to those states indicated{correct}
b. No defined / possible state has a path leading to it  and a stimulus that could cause a transition from a prior state to a given state{correct}
c. To ensure that the protocol can handle all possible / likely errors{correct}

Cloud Computing Quiz 3

1.The underlying hardware/software infrastructure is well exposed to its end users in the cloud environment

Select one:
True
False{correct}

2.The design decisions for a cluster based file systems are mostly related to how the data is distributed across the cluster and how it is managed

Select one:
True{correct}
False

3.Which of the following is/are true about MapReduce - a parallel programming model

for distributed computing framework?

Select one:
a. Mappers preferentially scheduled on same node or same rack as their input
block
b. Mappers save outputs to local disk before serving to reducers
c. Mapper tasks executes independently
d. All of the above{correct}
e. A & B above

4.MapReduce frame work may use local reduce functions for performance optimization

Select one:
True{correct}
False

5.Which of the following node in MapReduce architecture "Keeps track of resource usage of tasks and kills the tasks that overshoots their memory limits”?

Select one:
a. job tracker
b. task tracker{correct}
c. Both A and B
d. None of the above

6.In Google file system, a file is updated by appending new entries at any place within the file

Select one:
True
False{correct}

7.Which of the following is/are the examples of distributed file system(s)?

Select one:
a. Google File System (GFS)
b. Hadoop File System (HFS)
c. Hierarchical File System (HFS+)
d. A & B above {correct}
e. None of the above

8.MapReduce - a distributed programming framework, is suitable for all kinds of computational problems

Select one:
True
False{correct}

9.The minimum number of disks required to configure RAID 6?

Select one:
a. 2
b. 3
c. 4 {correct}
d. 6

10.Reduce task is a mandatory requirement in MapReduce parallel programming model of distributed computing framework

Select one:
True
False{correct}

11.Which of the following is true about MapReduce architecture, if a computing node crashes?

Select one:
a. Relaunch its current tasks on other nodes
b. Relaunch any maps the node previously ran
c. Both of the above{correct}
d. None of the above

12.The node that stores meta data in Hadoop distributed cluster is called as
Select one:
a. Master node
b. Namenode{correct}
c. Chunkserver
d. Chunknode

13.Multi-tenancy feature of the cloud can be implemented in which of the following cloud service(s)?

Select one:
a. SaaS
b. PaaS
c. IaaS
d. All of the above{correct}

14.The Fabric Controller of Windows Azure environment is ...

Select one:
a. a distributed program that manages the hardware and applications in a cluster internally used by Azure
b. used to assign the appropriate resources to an application
c. Both A & B{correct}
d. None of the above

15.In Windows Azure's blob service, block blobs are optimized for random read/write

operations anywhere in the content of the blob

Select one:
True
False{correct}

Cloud Computing Quiz 2

Question 1

In Eucalyptus cloud architecture, the entry point into the cloud for users and administrators is ---

Select one:
a. Cloud Controller{correct}
b. Node Controller
c. Cluster Controller
d. Storage Controller

Question 2

Any existing DHCP server of a company network can respond to the DHCP requests from the Node controller host(s) in Eucalyptus cloud computing architecture.

Select one:
True
False{correct}

Question 3

All Node Controllers associated with a single Cluster Controller may not be in the same subnet.

Select one:
True
False{correct}

Question 4

Amazon EBS service of AWS cloud computing architecture provides functionality similar to which of the following component of Eucalyptus architecture.

Select one:
a. Walrus
b. RAID
c. Storage Controller{correct}
d. Cluster Controller

Question 5

S3 is a hierarchical file system in Amazon cloud

Select one:
True
False{correct}

Question 6
Which cloud characteristic refers to the ability of a subscriber to increase or decrease its computing requirements as needed without having to contact a human representative of the cloud provider?

Select one:
a. Rapid elasticity
b. On-demand self service{correct}
c. Broad network access
d. Resource pooling

Question 7

The immediate provisioning scheme used in public clouds, where resources are provisioned at the moment they are requested, is ineffective in private clouds.

Select one:
True{correct}
False

Question 8

In cold VM migration technique, there is a requirement of certain CPU compatibility

Select one:
True
False{correct}

Question 9

Which of the following is an important requirement for applications to be accessible in the Cloud computing?

Select one:
a. The application should be compatible with the browser of the user's computer{correct}
b. The application should use the same programming language as the clients
c. The user should know on which server the application is located
d. The users identity should be known by the application

Question 10

Which of the following isn't an advantage of cloud computing?

Select one:
a. No worries about running out of storage
b. Easier to maintain a cloud network{correct}
c. Immediate access to computing resources
d. None of the above


Question 11

Instance storage by default attached to S3-backed instances

Select one:
True-{correct}
False

Question 12

Which among the following is considered the most widely used cloud computing service?

Select one:
a. Infrastructure-as-a-Service (IaaS)
b. Platform-as-a-Service (PaaS)
c. Communication-as-a-Service (CaaS)
d. Software-as-a-Service (SaaS){correct}

Question 13

Which of the following is DNS service in Amazon cloud computing?

Select one:
a. Route 51
b. Route 53{correct}
c. Route 61
d. Route 63

Question 14

EBS storage is persistent even if instance is terminated

Select one:
True{correct}
False

Question 15

Which of the following is not a component in Eucalyptus cloud architecture?

Select one:
a. Cluster Controller
b. System Controller{correct}
c. Cloud Controller
d. Storage Controller