Cloud Computing/Cloud Computing Mcq Set 4 Sample Test,Sample questions

Question:
              tags needs an external source to wake up the battery.

1. acitve rfid

2.passive rfid

3.battery-assisted passive rfid

4. battery-assisted active rfid

Posted Date:-2022-07-02 13:22:25


Question:
           is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.

1.ec2

2.azure

3.ec5

4.None of the mentioned

Posted Date:-2022-07-02 11:45:09


Question:
           refers to an increase in the performance by the addition of moreresources along the service layers

1.horizontal scalability

2.vertical scalability

3.diagonal scalability

4.None of These

Posted Date:-2022-07-02 13:17:59


Question:
     is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

1.gps

2.cloud

3.iot

4.rfid

Posted Date:-2022-07-02 13:19:26


Question:
     tags contain battery and transmit signals autonomously

1.acitve rfid

2.passive rfid

3.battery-assistedpassive rfid

4.battery-assisted rfid

Posted Date:-2022-07-02 13:21:35


Question:
  Which of the following correctly describes components roughly in their order of importance from top to down?

1. 1. amazon elastic compute cloud2. amazon simple storage system3. amazon elasticblock store

2. 1. amazon elastic block store2. amazon elastic compute cloud3. amazon simplestorage system

3. 1. amazon simple storage system2. amazon elastic block store3. amazon elasticcompute cloud

4.none of the mentioned

Posted Date:-2022-07-02 11:39:01


Question:
 Point out the correct statement.

1.a volume is mounted on a particular instance and is available to allinstances

2.the advantages of an ebs boot partition are that you can have a volume up to 1tb

3. you cannot mount multiple volumes on a single instance

4.All of the mentioned

Posted Date:-2022-07-02 11:32:01


Question:
 Process that prevents someone from denying that she accessed resource

1.accounting

2.non-repudiation

3.sniffing

4.authorisation

Posted Date:-2022-07-02 13:26:47


Question:
 Request field is present in which message format?

1.request message

2.response message

3.both request andresponse

4.neither request norresponse

Posted Date:-2022-07-02 13:52:09


Question:
 RFID stand for                 .

1.rangeable frequency identification

2.radio fragment identification

3. radio frequency identification

4.rangeable fragment identification

Posted Date:-2022-07-02 13:20:16


Question:
 The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer

1. i, ii, iv

2.i, iii, iv

3.ii, iii, iv

4. ii, iii, iv

Posted Date:-2022-07-02 13:20:56


Question:
 The types of AMI provided by AWS are:

1. instance store backed

2.ebs backed

3.both a & b

4.none of the above

Posted Date:-2022-07-02 12:00:27


Question:
 To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a                  grid and workload management solution of cloud computing platform

1.load setting facility

2.load sharing facility

3. load setting faculty

4.load assigning faculty

Posted Date:-2022-07-02 12:07:46


Question:
 What is the full form of SCADA?

1. supervisory control and document acquisition

2.supervisory control and data acquisition

3.supervisory column and data assessment

4. supervisory column and data assessment

Posted Date:-2022-07-02 13:34:09


Question:
 What is the full form of WLAN?

1.wide local areanetwork

2. wireless local areanetwork

3.wireless land accessnetwork

4. wireless local areanode

Posted Date:-2022-07-02 13:58:06


Question:
 What is the typical range of transmission distance in a ZigBee network?

1.5 m.

2. 50 m.

3.500 m.

4.5 km

Posted Date:-2022-07-02 14:03:24


Question:
 When did the SCADA start?

1. 1980s

2.1990s

3.1970s

4.1960s

Posted Date:-2022-07-02 13:40:13


Question:
 Which layer is CoAP?

1.control layer

2.transport layer

3.service layer

4.application layer

Posted Date:-2022-07-02 13:54:49


Question:
 Which of the following is an online backup and storage system?

1.amazon elastic compute cloud

2.amazon simple queue service

3.amazon simple notification service

4.amazon simple storage system

Posted Date:-2022-07-02 11:44:18


Question:
 Which of the following is not a characteristic of a ZigBee network?

1.low powerconsumption

2.easy installation

3.high data rates

4.unlicensed radiobands.

Posted Date:-2022-07-02 13:59:47


Question:
 Which of the following is not a correct way to secure communication layer

1.cloud initiated communication

2.tls/ssl

3.ips(intrusion prevention system)

4.firewalls

Posted Date:-2022-07-02 13:28:39


Question:
 Which of the following is not involved in working of IoT?

1.rfid

2. sensor

3. nano tech

4.server

Posted Date:-2022-07-02 13:44:59


Question:
 Which of the following is relational database service provided by Amazon?

1. simpledb

2.sql server

3.oracle

4.rds

Posted Date:-2022-07-02 11:55:46


Question:
 Which of the following layers are defined by the ZigBee stack?

1.transport layer

2.physical layer

3.application supportsub-layer.

4.medium access layer

Posted Date:-2022-07-02 14:01:28


Question:
 Which of the following makes sure that data is not changed when it notsupposed to be?

1. integrity

2.availability

3.confidentiality

4.accounting

Posted Date:-2022-07-02 13:32:31


Question:
 Which of these statements regarding sensors is TRUE?

1.sensors are input devices.

2. sensors can be analog as well as digital

3.sensors respond to some external stimuli.

4.all of these

Posted Date:-2022-07-02 13:47:51


Question:
 [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?

1.scalability

2.throughput

3.availability

4.effectiveness

Posted Date:-2022-07-02 13:17:06


Question:
A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms

1.accessibility

2.mobility

3.agility

4.scalability

Posted Date:-2022-07-02 13:14:04


Question:
Amazon              cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.

1.s1

2.s2

3.s3

4.s4

Posted Date:-2022-07-02 11:29:57


Question:
Amazon Relational Database Service is a variant of the                5.1 databasesystem.

1. oracle

2.mysql

3.sql server

4.All of the mentioned

Posted Date:-2022-07-02 11:57:52


Question:
Amazon Web Services falls into which of the following cloud-computingcategory?

1.platform as a service

2.software as a service

3.infrastructure as aservice

4. back-end as a service

Posted Date:-2022-07-02 11:33:19


Question:
AMIs are operating systems running on the            virtualization hypervisor.

1. yen

2.xen

3. ben

4. multi-factorauthentication

Posted Date:-2022-07-02 11:46:48


Question:
AWS reaches customers in                             countries.

1.137

2.182

3.190

4.86

Posted Date:-2022-07-02 11:34:04


Question:
CloudFront supports              data by performing static data transfers andstreaming content from one CloudFront location to another.

1.table caching

2.geocaching

3.index caching

4.windows mediaserver

Posted Date:-2022-07-02 11:30:48


Question:
CoAP is a specialized protocol.

1.web transfer

2.power

3.application

4.resource

Posted Date:-2022-07-02 13:56:35


Question:
CoAP is specialized for

1. internet applications

2.device applications

3.wireless applications

4.wired applications

Posted Date:-2022-07-02 13:54:08


Question:
CoAP provides which of the following requirements?

1. multicast support and simplicity

2. low overhead and multicast support

3.simplicity and low overhead

4.multicast support,low over head, and simplicity

Posted Date:-2022-07-02 13:56:02


Question:
Cyclone is available in two service models as follows:

1. paas and iaas

2.saas and paas

3.saas and iaas

4.all of the above

Posted Date:-2022-07-02 12:05:23


Question:
DCS is a    

1. distributed controlsystem

2.data control system

3.data column system

4.distributed columnsystem

Posted Date:-2022-07-02 13:36:20


Question:
Even with two-factor authentication, users may still be vulnerableto attacks.

1.scripting

2.cross attack

3.man-in-the-middle

4.radiant

Posted Date:-2022-07-02 13:24:39


Question:
How many EC2 service zones or regions exist?

1.1

2.2

3.3

4.4

Posted Date:-2022-07-02 11:29:14


Question:
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as                 

1.web sphere

2.tivoli

3.nebula

4. altix

Posted Date:-2022-07-02 12:02:42


Question:
In threat modeling, what methodology used to perform risk analysis

1.dread

2.owasp

3.stride

4.dar

Posted Date:-2022-07-02 13:49:43


Question:
loud system from SGI is functionally considered as an               

1.on-demand cloudcomputing service

2.on-demand cloudstorage service

3.on-demand cloudaccessing service

4.on-demand

Posted Date:-2022-07-02 12:03:40


Question:
M2M is a term introduced by

1. iot service providers

2. fog computingservice providers

3.telecommunicationservice providers

4. none of these

Posted Date:-2022-07-02 13:46:41


Question:
NASA created                  can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient

1.nebula cloud

2.cyclone cloud

3.force.com cloud

4. cern cloud

Posted Date:-2022-07-02 12:06:33


Question:
Out of the following which is not element of threat modelling

1. asset

2.vulnerability

3.threat

4.time

Posted Date:-2022-07-02 13:51:04


Question:
Performance metrics for HPC/HTC systems include :

1.multitaskingscalability

2.security index

3.cost effectiveness

4.All of the above

Posted Date:-2022-07-02 13:16:30


Question:
Point out the correct statement.

1. A. with ec2, you can launch and run server instances called amazon machine images (amis) running different operating systems such as red hat linux

2.a machine image is the software and operating system running on top of the instance

3.a machine image may be thought of as the contents of a boot drive

4.All of the mentioned

Posted Date:-2022-07-02 05:53:27


Question:
Point out the correct statement.

1. security can be set through passwords, kerberos tickets, or certificates

2. secure access to your ec2 amis is controlled by passwords, kerberos, and 509 certificates

3.most of the system image templates that amazon aws offers are based on red hat linux

4.All of the mentioned

Posted Date:-2022-07-02 11:27:44


Question:
Point out the wrong statement.

1. amazon machine instances are sized at various levels and rented on a computing/hour basis

2.the metrics obtained by cloudwatch may be used to enable a feature called auto scaling

3.a number of tools are used to support ec2 services

4.none of the mentioned

Posted Date:-2022-07-02 11:36:49


Question:
Process of identifying any individual

1.auditing

2.authorisation

3.authentication

4.accounting

Posted Date:-2022-07-02 13:25:26


Question:
RFID stands for?

1.random frequencyidentification

2.radio frequencyidentification

3.random frequencyinformation

4. radio frequencyinformation

Posted Date:-2022-07-02 13:43:33


Question:
Smart Dust can be used to measure the

1. temperature of theindustrial lathe machine

2.chemical in the soil

3.heat inside a computer’s cpu

4.strength of a solid material

Posted Date:-2022-07-02 13:48:46


Question:
Storage classes available with Amazon s3 are -

1.amazon s3 standard

2.amazon s3 standard- infrequent access

3.amazon glacier

4.All of the above

Posted Date:-2022-07-02 12:01:47


Question:
The Cloudlets have a                  ownership unlike that of Clouds.

1.centralized

2.decentralized

3.global

4.None of These

Posted Date:-2022-07-02 13:15:13


Question:
The control in SCADA is

1.online control

2.direct control

3.supervisory control

4.automatic control

Posted Date:-2022-07-02 13:39:25


Question:
The Data-Intensive Scalable Computing(DISC) utilizes a                  data-centerclusters to gather and maintain data.

1.htc

2.hpc

3.hcc

4.hac

Posted Date:-2022-07-02 13:15:51


Question:
The percentage of time the system is up and running smoothly is referred as.

1.system up time

2.system scalability

3.system availability

4.system efficiency

Posted Date:-2022-07-02 13:18:31


Question:
The three major components of RFID hardware based on functionality include:

1.rfid reader

2.reader antenna

3.reader

4.All of the above

Posted Date:-2022-07-02 13:22:52


Question:
Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor

1. i, ii, iii

2. i, ii, iii, iv

3. ii, iii, iv

4. i, ii, iv

Posted Date:-2022-07-02 13:24:04


Question:
URI and content type support is which protocol feature?

1.http

2.udp

3.coap

4.spi

Posted Date:-2022-07-02 13:57:19


Question:
What are the different types of instances?

1. general purpose

2.computer optimized

3.storage optimized

4.All of the above

Posted Date:-2022-07-02 11:59:32


Question:
What is SCADA?

1.software

2.process

3.system

4.hardware

Posted Date:-2022-07-02 13:38:33


Question:
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

1.making infrastructure vulnerable to malware

2.potential for noncompliance

3.data loss

4.All of the above

Posted Date:-2022-07-02 13:27:52


Question:
Which of the following can be considered as a distributed caching system?

1. cnd

2.cdn

3.cwd

4. all of the mentioned

Posted Date:-2022-07-02 11:56:47


Question:
Which of the following can be done with S3 buckets through the SOAP and REST APIs?

1.upload new objects to a bucket and download them

2. create, edit, or delete existing buckets

3.specify where a bucket should be stored

4.all of the mentioned

Posted Date:-2022-07-02 11:49:08


Question:
Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?

1.ieee 802.11.

2.ieee 802.15.1.

3.ieee 802.15.3

4.ieee 802.15.4.

Posted Date:-2022-07-02 14:00:44


Question:
Which of the following instance class is best used for applications that areprocessor or compute-intensive?

1.standard instances

2.high memoryinstances

3.high cpu instances

4.None of the mentioned

Posted Date:-2022-07-02 11:48:08


Question:
Which of the following is a batch processing application?

1. ibm smash

2.ibm websphereapplication server

3.condor

4.windows mediaserver

Posted Date:-2022-07-02 05:59:01


Question:
Which of the following is not the component of a SCADA system?

1. database server

2.i/o system

3.plc controller

4.sparger controller

Posted Date:-2022-07-02 13:41:03


Question:
Which of the following is not the component of IoT Endpoint

1.sensor

2.gateway

3.communicationmodule

4.mcu

Posted Date:-2022-07-02 13:31:58


Question:
Which of the following is the heart of a SCADA system?

1.plc

2.hmi

3.alarm task

4. i/o task

Posted Date:-2022-07-02 13:41:53


Question:
Which of the following operation retrieves the newest version of the object?

1.put

2.get

3.post

4.copy

Posted Date:-2022-07-02 11:53:56


Question:
Which of the following provides access for developers to charge Amazon’scustomers for their purchases?

1. fws

2.fas

3.fps

4.all of the mentioned

Posted Date:-2022-07-02 05:55:35


Question:
Which of the following should be used considering factors shown in thefigure?

1.simpledb

2.rds

3.amazon ec2

4.All of the mentioned

Posted Date:-2022-07-02 11:35:08


Question:
Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?

1. ieee 802.16

2.ieee 802.

3. ieee 802.11

4.ieee 802.15

Posted Date:-2022-07-02 13:59:02


Question:
Which of the following statement is wrong about Amazon S3?

1. A. amazon s3 is highly reliable

2.amazon s3 provides large quantities of reliable storage that is highly protected

3.amazon s3 is highly available

4.none of the mentioned

Posted Date:-2022-07-02 11:54:44


Question:
Which of the following terms indicates that information is to be read only bythose people for whom it is intended?

1.availability

2.accounting

3.integrity

4.confidentiality

Posted Date:-2022-07-02 13:33:04


Question:
_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.

1.cross-site scoringscripting

2.cross-site requestforgery

3.two-factorauthentication

4.cross-site scripting

Posted Date:-2022-07-02 14:02:23


More MCQS

  1. Cloud Computing Mcq Set 1
  2. Computer Science & Engineering Cloud Computing MCQs Part 2
  3. Cloud Computing Mcq
  4. Cloud Computing Multiple Choice Questions
  5. Cloud Computing Mcq Set 1
  6. Cloud Computing Mcq Set 2
  7. Cloud Computing Mcq Set 3
  8. Cloud Computing Mcq Set 4
  9. Cloud Computing Mcq Set 5
  10. Cloud Computing Mcq Set 6
  11. High Performance Computing Set 3
  12. High Performance Computing Set 4
  13. High Performance Computing Set 5
  14. High Performance Computing Set 6
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!