tags needs an external source to wake up the battery.
1. acitve rfid
2.passive rfid
3.battery-assisted passive rfid
4. battery-assisted active rfid
is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.
1.ec2
2.azure
3.ec5
4.None of the mentioned
refers to an increase in the performance by the addition of moreresources along the service layers
1.horizontal scalability
2.vertical scalability
3.diagonal scalability
4.None of These
is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
1.gps
2.cloud
3.iot
4.rfid
tags contain battery and transmit signals autonomously
1.acitve rfid
2.passive rfid
3.battery-assistedpassive rfid
4.battery-assisted rfid
Which of the following correctly describes components roughly in their order of importance from top to down?
1. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elasticblock store
2. 1. amazon elastic block store2. amazon elastic compute cloud3. amazon simplestorage system
3. 1. amazon simple storage system2. amazon elastic block store3. amazon elasticcompute cloud
4.none of the mentioned
Point out the correct statement.
1.a volume is mounted on a particular instance and is available to allinstances
2.the advantages of an ebs boot partition are that you can have a volume up to 1tb
3. you cannot mount multiple volumes on a single instance
4.All of the mentioned
Process that prevents someone from denying that she accessed resource
1.accounting
2.non-repudiation
3.sniffing
4.authorisation
Request field is present in which message format?
1.request message
2.response message
3.both request andresponse
4.neither request norresponse
RFID stand for .
1.rangeable frequency identification
2.radio fragment identification
3. radio frequency identification
4.rangeable fragment identification
The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer
1. i, ii, iv
2.i, iii, iv
3.ii, iii, iv
4. ii, iii, iv
The types of AMI provided by AWS are:
1. instance store backed
2.ebs backed
3.both a & b
4.none of the above
To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a grid and workload management solution of cloud computing platform
1.load setting facility
2.load sharing facility
3. load setting faculty
4.load assigning faculty
What is the full form of SCADA?
1. supervisory control and document acquisition
2.supervisory control and data acquisition
3.supervisory column and data assessment
4. supervisory column and data assessment
What is the full form of WLAN?
1.wide local areanetwork
2. wireless local areanetwork
3.wireless land accessnetwork
4. wireless local areanode
What is the typical range of transmission distance in a ZigBee network?
1.5 m.
2. 50 m.
3.500 m.
4.5 km
When did the SCADA start?
1. 1980s
2.1990s
3.1970s
4.1960s
Which layer is CoAP?
1.control layer
2.transport layer
3.service layer
4.application layer
Which of the following is an online backup and storage system?
1.amazon elastic compute cloud
2.amazon simple queue service
3.amazon simple notification service
4.amazon simple storage system
Which of the following is not a characteristic of a ZigBee network?
1.low powerconsumption
2.easy installation
3.high data rates
4.unlicensed radiobands.
Which of the following is not a correct way to secure communication layer
1.cloud initiated communication
2.tls/ssl
3.ips(intrusion prevention system)
4.firewalls
Which of the following is not involved in working of IoT?
1.rfid
2. sensor
3. nano tech
4.server
Which of the following is relational database service provided by Amazon?
1. simpledb
2.sql server
3.oracle
4.rds
Which of the following layers are defined by the ZigBee stack?
1.transport layer
2.physical layer
3.application supportsub-layer.
4.medium access layer
Which of the following makes sure that data is not changed when it notsupposed to be?
1. integrity
2.availability
3.confidentiality
4.accounting
Which of these statements regarding sensors is TRUE?
1.sensors are input devices.
2. sensors can be analog as well as digital
3.sensors respond to some external stimuli.
4.all of these
[Ï€=n/Ttotal=nâ„[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?
1.scalability
2.throughput
3.availability
4.effectiveness
A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms
1.accessibility
2.mobility
3.agility
4.scalability
Amazon cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.
1.s1
2.s2
3.s3
4.s4
Amazon Relational Database Service is a variant of the 5.1 databasesystem.
1. oracle
2.mysql
3.sql server
4.All of the mentioned
Amazon Web Services falls into which of the following cloud-computingcategory?
1.platform as a service
2.software as a service
3.infrastructure as aservice
4. back-end as a service
AMIs are operating systems running on the virtualization hypervisor.
1. yen
2.xen
3. ben
4. multi-factorauthentication
AWS reaches customers in countries.
1.137
2.182
3.190
4.86
CloudFront supports data by performing static data transfers andstreaming content from one CloudFront location to another.
1.table caching
2.geocaching
3.index caching
4.windows mediaserver
CoAP is a specialized protocol.
1.web transfer
2.power
3.application
4.resource
CoAP is specialized for
1. internet applications
2.device applications
3.wireless applications
4.wired applications
CoAP provides which of the following requirements?
1. multicast support and simplicity
2. low overhead and multicast support
3.simplicity and low overhead
4.multicast support,low over head, and simplicity
Cyclone is available in two service models as follows:
1. paas and iaas
2.saas and paas
3.saas and iaas
4.all of the above
DCS is a
1. distributed controlsystem
2.data control system
3.data column system
4.distributed columnsystem
Even with two-factor authentication, users may still be vulnerableto attacks.
1.scripting
2.cross attack
3.man-in-the-middle
4.radiant
How many EC2 service zones or regions exist?
1.1
2.2
3.3
4.4
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as
1.web sphere
2.tivoli
3.nebula
4. altix
In threat modeling, what methodology used to perform risk analysis
1.dread
2.owasp
3.stride
4.dar
loud system from SGI is functionally considered as an
1.on-demand cloudcomputing service
2.on-demand cloudstorage service
3.on-demand cloudaccessing service
4.on-demand
M2M is a term introduced by
1. iot service providers
2. fog computingservice providers
3.telecommunicationservice providers
4. none of these
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient
1.nebula cloud
2.cyclone cloud
3.force.com cloud
4. cern cloud
Out of the following which is not element of threat modelling
1. asset
2.vulnerability
3.threat
4.time
Performance metrics for HPC/HTC systems include :
1.multitaskingscalability
2.security index
3.cost effectiveness
4.All of the above
Point out the correct statement.
1. A. with ec2, you can launch and run server instances called amazon machine images (amis) running different operating systems such as red hat linux
2.a machine image is the software and operating system running on top of the instance
3.a machine image may be thought of as the contents of a boot drive
4.All of the mentioned
Point out the correct statement.
1. security can be set through passwords, kerberos tickets, or certificates
2. secure access to your ec2 amis is controlled by passwords, kerberos, and 509 certificates
3.most of the system image templates that amazon aws offers are based on red hat linux
4.All of the mentioned
Point out the wrong statement.
1. amazon machine instances are sized at various levels and rented on a computing/hour basis
2.the metrics obtained by cloudwatch may be used to enable a feature called auto scaling
3.a number of tools are used to support ec2 services
4.none of the mentioned
Process of identifying any individual
1.auditing
2.authorisation
3.authentication
4.accounting
RFID stands for?
1.random frequencyidentification
2.radio frequencyidentification
3.random frequencyinformation
4. radio frequencyinformation
Smart Dust can be used to measure the
1. temperature of theindustrial lathe machine
2.chemical in the soil
3.heat inside a computer’s cpu
4.strength of a solid material
Storage classes available with Amazon s3 are -
1.amazon s3 standard
2.amazon s3 standard- infrequent access
3.amazon glacier
4.All of the above
The Cloudlets have a ownership unlike that of Clouds.
1.centralized
2.decentralized
3.global
4.None of These
The control in SCADA is
1.online control
2.direct control
3.supervisory control
4.automatic control
The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.
1.htc
2.hpc
3.hcc
4.hac
The percentage of time the system is up and running smoothly is referred as.
1.system up time
2.system scalability
3.system availability
4.system efficiency
The three major components of RFID hardware based on functionality include:
1.rfid reader
2.reader antenna
3.reader
4.All of the above
Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor
1. i, ii, iii
2. i, ii, iii, iv
3. ii, iii, iv
4. i, ii, iv
URI and content type support is which protocol feature?
1.http
2.udp
3.coap
4.spi
What are the different types of instances?
1. general purpose
2.computer optimized
3.storage optimized
4.All of the above
What is SCADA?
1.software
2.process
3.system
4.hardware
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
1.making infrastructure vulnerable to malware
2.potential for noncompliance
3.data loss
4.All of the above
Which of the following can be considered as a distributed caching system?
1. cnd
2.cdn
3.cwd
4. all of the mentioned
Which of the following can be done with S3 buckets through the SOAP and REST APIs?
1.upload new objects to a bucket and download them
2. create, edit, or delete existing buckets
3.specify where a bucket should be stored
4.all of the mentioned
Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?
1.ieee 802.11.
2.ieee 802.15.1.
3.ieee 802.15.3
4.ieee 802.15.4.
Which of the following instance class is best used for applications that areprocessor or compute-intensive?
1.standard instances
2.high memoryinstances
3.high cpu instances
4.None of the mentioned
Which of the following is a batch processing application?
1. ibm smash
2.ibm websphereapplication server
3.condor
4.windows mediaserver
Which of the following is not the component of a SCADA system?
1. database server
2.i/o system
3.plc controller
4.sparger controller
Which of the following is not the component of IoT Endpoint
1.sensor
2.gateway
3.communicationmodule
4.mcu
Which of the following is the heart of a SCADA system?
1.plc
2.hmi
3.alarm task
4. i/o task
Which of the following operation retrieves the newest version of the object?
1.put
2.get
3.post
4.copy
Which of the following provides access for developers to charge Amazon’scustomers for their purchases?
1. fws
2.fas
3.fps
4.all of the mentioned
Which of the following should be used considering factors shown in thefigure?
1.simpledb
2.rds
3.amazon ec2
4.All of the mentioned
Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?
1. ieee 802.16
2.ieee 802.
3. ieee 802.11
4.ieee 802.15
Which of the following statement is wrong about Amazon S3?
1. A. amazon s3 is highly reliable
2.amazon s3 provides large quantities of reliable storage that is highly protected
3.amazon s3 is highly available
4.none of the mentioned
Which of the following terms indicates that information is to be read only bythose people for whom it is intended?
1.availability
2.accounting
3.integrity
4.confidentiality
_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.
1.cross-site scoringscripting
2.cross-site requestforgery
3.two-factorauthentication
4.cross-site scripting