an HCL GUVI product

cloud-computing banner

Cloud Computing Multiple Choice Questions (MCQs) and Answers

Master Cloud Computing with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Cloud Computing concepts. Begin your placement preparation journey now!

Q61

Q61 A virtual machine in your cloud environment is experiencing slow performance. What could be a likely cause?

A

Insufficient CPU allocation

B

Network failure

C

Disk corruption

D

Over-provisioned RAM

Q62

Q62 A containerized application in a virtualized environment is not able to access the host network. What could be the issue?

A

Misconfigured network bridge

B

Container not started

C

Disk space issue

D

Insufficient permissions

Q63

Q63 A company using virtual machines is experiencing resource contention between the VMs. What could be the solution?

A

Add more physical servers

B

Use better storage

C

Optimize VM resource allocation

D

Install security patches

Q64

Q64 Which of the following is an example of object storage in the cloud?

A

Google Cloud Storage

B

Amazon RDS

C

Microsoft Azure Blob Storage

D

Amazon S3

Q65

Q65 What is the main advantage of using cloud storage over traditional on-premise storage?

A

Higher security

B

Faster access

C

Scalability

D

More control

Q66

Q66 Which type of cloud storage is best suited for storing frequently accessed data?

A

Cold storage

B

Archival storage

C

Object storage

D

Block storage

Q67

Q67 Which of the following cloud storage services is primarily designed for structured data?

A

Amazon S3

B

Google Cloud Storage

C

Amazon DynamoDB

D

Azure Blob Storage

Q68

Q68 What is a common use case for block storage in cloud computing?

A

Large data archives

B

Databases and boot volumes

C

Backup of infrequent data

D

Image hosting

Q69

Q69 Which cloud storage technology allows for high availability and automatic replication across multiple regions?

A

Object storage

B

File storage

C

Block storage

D

Distributed storage

Q70

Q70 Which command is used in AWS CLI to upload a file to an S3 bucket?

A

aws s3 upload

B

aws s3 cp

C

aws s3 put

D

aws s3 send

Q71

Q71 In Google Cloud Storage, which command is used to list objects in a bucket?

A

gsutil ls

B

gsutil list

C

gcloud storage list

D

gcloud storage ls

Q72

Q72 How would you create a new storage bucket in AWS using the CLI?

A

aws s3 create-bucket

B

aws s3 mb bucket

C

aws s3 cp bucket

D

aws s3 make-bucket

Q73

Q73 What is the correct command to copy a file from an Azure Blob Storage container to your local machine using the Azure CLI?

A

az storage blob download

B

az storage cp

C

az storage blob get

D

az storage blob copy

Q74

Q74 A user is unable to access a file stored in Amazon S3. What could be the likely cause?

A

Incorrect bucket permissions

B

File is corrupt

C

The bucket is deleted

D

Invalid file format

Q75

Q75 A company is experiencing slow retrieval times when accessing data stored in cold cloud storage. What could be the issue?

A

Bandwidth issues

B

Cold storage retrieval latency

C

Overloaded cloud servers

D

Low disk space

Q76

Q76 A cloud storage solution is reporting out-of-space errors even though it should have auto-scaling. What could be the problem?

A

Quota limits on storage

B

Network issues

C

Permission issues

D

Data corruption

Q77

Q77 What is the most common security risk in cloud computing?

A

Data breaches

B

Natural disasters

C

Increased latency

D

Hardware failures

Q78

Q78 Which of the following is a security feature commonly provided by cloud service providers?

A

Automated scaling

B

Firewall protection

C

Network acceleration

D

Reduced storage costs

Q79

Q79 What is a key role of encryption in cloud security?

A

Increase storage

B

Enhance user experience

C

Protect data at rest and in transit

D

Reduce latency

Q80

Q80 Which of the following is a shared responsibility between the cloud provider and the customer?

A

Securing physical infrastructure

B

Data encryption

C

Firewall configuration

D

Network hardware maintenance

Q81

Q81 In cloud environments, what is the purpose of identity and access management (IAM)?

A

Controlling user access to resources

B

Reducing latency

C

Managing storage

D

Controlling physical security

Q82

Q82 Which of the following cloud security models ensures that data is protected while being processed?

A

Encryption at rest

B

Data masking

C

Homomorphic encryption

D

Symmetric encryption

Q83

Q83 Which AWS service can be used to enable encryption for data stored in Amazon S3?

A

AWS Shield

B

AWS CloudTrail

C

AWS KMS

D

AWS EC2

Q84

Q84 Which command would you use in AWS CLI to enable server-side encryption on an S3 bucket?

A

aws s3 enable-encryption

B

aws s3api put-bucket-encryption

C

aws s3api set-encryption

D

aws s3 secure-bucket

Q85

Q85 What command would you use to retrieve the IAM policy for an AWS user using the AWS CLI?

A

aws iam get-user-policy

B

aws iam describe-policy

C

aws iam list-users

D

aws iam get-user

Q86

Q86 A cloud user is unable to access resources they previously had access to. What is the likely issue?

A

Incorrect IAM policy

B

Network failure

C

Hardware malfunction

D

Server downtime

Q87

Q87 A company notices unusual login activities in their cloud environment. What is the most immediate security action to take?

A

Disable all user accounts

B

Reset all passwords

C

Enable multi-factor authentication

D

Shut down all services

Q88

Q88 A company is facing a data breach in their cloud infrastructure. What is the first step in mitigating the breach?

A

Shut down the entire cloud system

B

Notify customers

C

Isolate the affected system

D

Update software patches

Q89

Q89 What is the primary purpose of Identity and Access Management (IAM) in cloud computing?

A

Manage cloud costs

B

Control access to resources

C

Increase network speed

D

Enhance data storage

Q90

Q90 Which of the following is a core feature of IAM?

A

Network management

B

Encryption

C

User authentication

D

Data storage

ad vertical