Cloud Computing/Cloud Computing Mcq Set 4 Sample Test,Sample questions

Question:
              tags needs an external source to wake up the battery.

1. acitve rfid

2.passive rfid

3.battery-assisted passive rfid

4. battery-assisted active rfid


Question:
           is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.

1.ec2

2.azure

3.ec5

4.None of the mentioned


Question:
           refers to an increase in the performance by the addition of moreresources along the service layers

1.horizontal scalability

2.vertical scalability

3.diagonal scalability

4.None of These


Question:
     is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

1.gps

2.cloud

3.iot

4.rfid


Question:
     tags contain battery and transmit signals autonomously

1.acitve rfid

2.passive rfid

3.battery-assistedpassive rfid

4.battery-assisted rfid


Question:
  Which of the following correctly describes components roughly in their order of importance from top to down?

1. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elasticblock store

2. 1. amazon elastic block store2. amazon elastic compute cloud3. amazon simplestorage system

3. 1. amazon simple storage system2. amazon elastic block store3. amazon elasticcompute cloud

4.none of the mentioned


Question:
 Point out the correct statement.

1.a volume is mounted on a particular instance and is available to allinstances

2.the advantages of an ebs boot partition are that you can have a volume up to 1tb

3. you cannot mount multiple volumes on a single instance

4.All of the mentioned


Question:
 Process that prevents someone from denying that she accessed resource

1.accounting

2.non-repudiation

3.sniffing

4.authorisation


Question:
 Request field is present in which message format?

1.request message

2.response message

3.both request andresponse

4.neither request norresponse


Question:
 RFID stand for                 .

1.rangeable frequency identification

2.radio fragment identification

3. radio frequency identification

4.rangeable fragment identification


Question:
 The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer

1. i, ii, iv

2.i, iii, iv

3.ii, iii, iv

4. ii, iii, iv


Question:
 The types of AMI provided by AWS are:

1. instance store backed

2.ebs backed

3.both a & b

4.none of the above


Question:
 To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a                  grid and workload management solution of cloud computing platform

1.load setting facility

2.load sharing facility

3. load setting faculty

4.load assigning faculty


Question:
 What is the full form of SCADA?

1. supervisory control and document acquisition

2.supervisory control and data acquisition

3.supervisory column and data assessment

4. supervisory column and data assessment


Question:
 What is the full form of WLAN?

1.wide local areanetwork

2. wireless local areanetwork

3.wireless land accessnetwork

4. wireless local areanode


Question:
 What is the typical range of transmission distance in a ZigBee network?

1.5 m.

2. 50 m.

3.500 m.

4.5 km


Question:
 When did the SCADA start?

1. 1980s

2.1990s

3.1970s

4.1960s


Question:
 Which layer is CoAP?

1.control layer

2.transport layer

3.service layer

4.application layer


Question:
 Which of the following is an online backup and storage system?

1.amazon elastic compute cloud

2.amazon simple queue service

3.amazon simple notification service

4.amazon simple storage system


Question:
 Which of the following is not a characteristic of a ZigBee network?

1.low powerconsumption

2.easy installation

3.high data rates

4.unlicensed radiobands.


Question:
 Which of the following is not a correct way to secure communication layer

1.cloud initiated communication

2.tls/ssl

3.ips(intrusion prevention system)

4.firewalls


Question:
 Which of the following is not involved in working of IoT?

1.rfid

2. sensor

3. nano tech

4.server


Question:
 Which of the following is relational database service provided by Amazon?

1. simpledb

2.sql server

3.oracle

4.rds


Question:
 Which of the following layers are defined by the ZigBee stack?

1.transport layer

2.physical layer

3.application supportsub-layer.

4.medium access layer


Question:
 Which of the following makes sure that data is not changed when it notsupposed to be?

1. integrity

2.availability

3.confidentiality

4.accounting


Question:
 Which of these statements regarding sensors is TRUE?

1.sensors are input devices.

2. sensors can be analog as well as digital

3.sensors respond to some external stimuli.

4.all of these


Question:
 [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?

1.scalability

2.throughput

3.availability

4.effectiveness


Question:
A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms

1.accessibility

2.mobility

3.agility

4.scalability


Question:
Amazon              cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.

1.s1

2.s2

3.s3

4.s4


Question:
Amazon Relational Database Service is a variant of the                5.1 databasesystem.

1. oracle

2.mysql

3.sql server

4.All of the mentioned


Question:
Amazon Web Services falls into which of the following cloud-computingcategory?

1.platform as a service

2.software as a service

3.infrastructure as aservice

4. back-end as a service


Question:
AMIs are operating systems running on the            virtualization hypervisor.

1. yen

2.xen

3. ben

4. multi-factorauthentication


Question:
AWS reaches customers in                             countries.

1.137

2.182

3.190

4.86


Question:
CloudFront supports              data by performing static data transfers andstreaming content from one CloudFront location to another.

1.table caching

2.geocaching

3.index caching

4.windows mediaserver


Question:
CoAP is a specialized protocol.

1.web transfer

2.power

3.application

4.resource


Question:
CoAP is specialized for

1. internet applications

2.device applications

3.wireless applications

4.wired applications


Question:
CoAP provides which of the following requirements?

1. multicast support and simplicity

2. low overhead and multicast support

3.simplicity and low overhead

4.multicast support,low over head, and simplicity


Question:
Cyclone is available in two service models as follows:

1. paas and iaas

2.saas and paas

3.saas and iaas

4.all of the above


Question:
DCS is a    

1. distributed controlsystem

2.data control system

3.data column system

4.distributed columnsystem


Question:
Even with two-factor authentication, users may still be vulnerableto attacks.

1.scripting

2.cross attack

3.man-in-the-middle

4.radiant


Question:
How many EC2 service zones or regions exist?

1.1

2.2

3.3

4.4


Question:
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as                 

1.web sphere

2.tivoli

3.nebula

4. altix


Question:
In threat modeling, what methodology used to perform risk analysis

1.dread

2.owasp

3.stride

4.dar


Question:
loud system from SGI is functionally considered as an               

1.on-demand cloudcomputing service

2.on-demand cloudstorage service

3.on-demand cloudaccessing service

4.on-demand


Question:
M2M is a term introduced by

1. iot service providers

2. fog computingservice providers

3.telecommunicationservice providers

4. none of these


Question:
NASA created                  can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient

1.nebula cloud

2.cyclone cloud

3.force.com cloud

4. cern cloud


Question:
Out of the following which is not element of threat modelling

1. asset

2.vulnerability

3.threat

4.time


Question:
Performance metrics for HPC/HTC systems include :

1.multitaskingscalability

2.security index

3.cost effectiveness

4.All of the above


Question:
Point out the correct statement.

1. A. with ec2, you can launch and run server instances called amazon machine images (amis) running different operating systems such as red hat linux

2.a machine image is the software and operating system running on top of the instance

3.a machine image may be thought of as the contents of a boot drive

4.All of the mentioned


Question:
Point out the correct statement.

1. security can be set through passwords, kerberos tickets, or certificates

2. secure access to your ec2 amis is controlled by passwords, kerberos, and 509 certificates

3.most of the system image templates that amazon aws offers are based on red hat linux

4.All of the mentioned


Question:
Point out the wrong statement.

1. amazon machine instances are sized at various levels and rented on a computing/hour basis

2.the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

3.a number of tools are used to support ec2 services

4.none of the mentioned


Question:
Process of identifying any individual

1.auditing

2.authorisation

3.authentication

4.accounting


Question:
RFID stands for?

1.random frequencyidentification

2.radio frequencyidentification

3.random frequencyinformation

4. radio frequencyinformation


Question:
Smart Dust can be used to measure the

1. temperature of theindustrial lathe machine

2.chemical in the soil

3.heat inside a computer’s cpu

4.strength of a solid material


Question:
Storage classes available with Amazon s3 are -

1.amazon s3 standard

2.amazon s3 standard- infrequent access

3.amazon glacier

4.All of the above


Question:
The Cloudlets have a                  ownership unlike that of Clouds.

1.centralized

2.decentralized

3.global

4.None of These


Question:
The control in SCADA is

1.online control

2.direct control

3.supervisory control

4.automatic control


Question:
The Data-Intensive Scalable Computing(DISC) utilizes a                  data-centerclusters to gather and maintain data.

1.htc

2.hpc

3.hcc

4.hac


Question:
The percentage of time the system is up and running smoothly is referred as.

1.system up time

2.system scalability

3.system availability

4.system efficiency


Question:
The three major components of RFID hardware based on functionality include:

1.rfid reader

2.reader antenna

3.reader

4.All of the above


Question:
Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor

1. i, ii, iii

2. i, ii, iii, iv

3. ii, iii, iv

4. i, ii, iv


Question:
URI and content type support is which protocol feature?

1.http

2.udp

3.coap

4.spi


Question:
What are the different types of instances?

1. general purpose

2.computer optimized

3.storage optimized

4.All of the above


Question:
What is SCADA?

1.software

2.process

3.system

4.hardware


Question:
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

1.making infrastructure vulnerable to malware

2.potential for noncompliance

3.data loss

4.All of the above


Question:
Which of the following can be considered as a distributed caching system?

1. cnd

2.cdn

3.cwd

4. all of the mentioned


Question:
Which of the following can be done with S3 buckets through the SOAP and REST APIs?

1.upload new objects to a bucket and download them

2. create, edit, or delete existing buckets

3.specify where a bucket should be stored

4.all of the mentioned


Question:
Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?

1.ieee 802.11.

2.ieee 802.15.1.

3.ieee 802.15.3

4.ieee 802.15.4.


Question:
Which of the following instance class is best used for applications that areprocessor or compute-intensive?

1.standard instances

2.high memoryinstances

3.high cpu instances

4.None of the mentioned


Question:
Which of the following is a batch processing application?

1. ibm smash

2.ibm websphereapplication server

3.condor

4.windows mediaserver


Question:
Which of the following is not the component of a SCADA system?

1. database server

2.i/o system

3.plc controller

4.sparger controller


Question:
Which of the following is not the component of IoT Endpoint

1.sensor

2.gateway

3.communicationmodule

4.mcu


Question:
Which of the following is the heart of a SCADA system?

1.plc

2.hmi

3.alarm task

4. i/o task


Question:
Which of the following operation retrieves the newest version of the object?

1.put

2.get

3.post

4.copy


Question:
Which of the following provides access for developers to charge Amazon’scustomers for their purchases?

1. fws

2.fas

3.fps

4.all of the mentioned


Question:
Which of the following should be used considering factors shown in thefigure?

1.simpledb

2.rds

3.amazon ec2

4.All of the mentioned


Question:
Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?

1. ieee 802.16

2.ieee 802.

3. ieee 802.11

4.ieee 802.15


Question:
Which of the following statement is wrong about Amazon S3?

1. A. amazon s3 is highly reliable

2.amazon s3 provides large quantities of reliable storage that is highly protected

3.amazon s3 is highly available

4.none of the mentioned


Question:
Which of the following terms indicates that information is to be read only bythose people for whom it is intended?

1.availability

2.accounting

3.integrity

4.confidentiality


Question:
_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.

1.cross-site scoringscripting

2.cross-site requestforgery

3.two-factorauthentication

4.cross-site scripting


More MCQS

  1. Cloud Computing Mcq Set 1
  2. Computer Science & Engineering Cloud Computing MCQs Part 2
  3. Cloud Computing Mcq
  4. Cloud Computing Multiple Choice Questions
  5. Cloud Computing Mcq Set 1
  6. Cloud Computing Mcq Set 2
  7. Cloud Computing Mcq Set 3
  8. Cloud Computing Mcq Set 4
  9. Cloud Computing Mcq Set 5
  10. Cloud Computing Mcq Set 6
  11. High Performance Computing Set 3
  12. High Performance Computing Set 4
  13. High Performance Computing Set 5
  14. High Performance Computing Set 6
Learn Cloud Computing Mcq Set 4,Learn Cloud Computing Objetive choice questions and answers,Cloud Computing Multiple choice questions and answers,Cloud Computing objective, Cloud Computing questions , Cloud Computing answers,Cloud Computing MCQs questions and answer
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!