Cloud Computing MCQ Quiz Hub

Cloud Computing Mcq Set 4

Choose a topic to test your knowledge and improve your Cloud Computing skills

Point out the correct statement.





✅ Correct Answer: 4

Which of the following provides access for developers to charge Amazon’scustomers for their purchases?





✅ Correct Answer: 3

Which of the following is a batch processing application?





✅ Correct Answer: 3

Point out the correct statement.





✅ Correct Answer: 4

How many EC2 service zones or regions exist?





✅ Correct Answer: 4

Amazon cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.





✅ Correct Answer: 3

CloudFront supports data by performing static data transfers andstreaming content from one CloudFront location to another.





✅ Correct Answer: 2

Point out the correct statement.





✅ Correct Answer: 2

Amazon Web Services falls into which of the following cloud-computingcategory?





✅ Correct Answer: 3

AWS reaches customers in countries.





✅ Correct Answer: 3

Which of the following should be used considering factors shown in thefigure?





✅ Correct Answer: 2

Point out the wrong statement.





✅ Correct Answer: 4

Which of the following correctly describes components roughly in their order of importance from top to down?





✅ Correct Answer: 1

Which of the following is an online backup and storage system?





✅ Correct Answer: 4

is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.





✅ Correct Answer: 2

AMIs are operating systems running on the virtualization hypervisor.





✅ Correct Answer: 2

Which of the following instance class is best used for applications that areprocessor or compute-intensive?





✅ Correct Answer: 3

Which of the following can be done with S3 buckets through the SOAP and REST APIs?





✅ Correct Answer: 4

Which of the following operation retrieves the newest version of the object?





✅ Correct Answer: 2

Which of the following statement is wrong about Amazon S3?





✅ Correct Answer: 4

Which of the following is relational database service provided by Amazon?





✅ Correct Answer: 4

Which of the following can be considered as a distributed caching system?





✅ Correct Answer: 2

Amazon Relational Database Service is a variant of the 5.1 databasesystem.





✅ Correct Answer: 2

What are the different types of instances?





✅ Correct Answer: 4

The types of AMI provided by AWS are:





✅ Correct Answer: 3

Storage classes available with Amazon s3 are -





✅ Correct Answer: 4

IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as





✅ Correct Answer: 2

loud system from SGI is functionally considered as an





✅ Correct Answer: 1

Cyclone is available in two service models as follows:





✅ Correct Answer: 1

NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient





✅ Correct Answer: 1

To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a grid and workload management solution of cloud computing platform





✅ Correct Answer: 2

A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms





✅ Correct Answer: 3

The Cloudlets have a ownership unlike that of Clouds.





✅ Correct Answer: 2

The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.





✅ Correct Answer: 1

Performance metrics for HPC/HTC systems include :





✅ Correct Answer: 4

[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?





✅ Correct Answer: 2

refers to an increase in the performance by the addition of moreresources along the service layers





✅ Correct Answer: 2

The percentage of time the system is up and running smoothly is referred as.





✅ Correct Answer: 3

is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry





✅ Correct Answer: 4

RFID stand for .





✅ Correct Answer: 3

The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer





✅ Correct Answer: 1

tags contain battery and transmit signals autonomously





✅ Correct Answer: 1

tags needs an external source to wake up the battery.





✅ Correct Answer: 3

The three major components of RFID hardware based on functionality include:





✅ Correct Answer: 4

Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor





✅ Correct Answer: 1

Even with two-factor authentication, users may still be vulnerableto attacks.





✅ Correct Answer: 3

Process of identifying any individual





✅ Correct Answer: 3

Process that prevents someone from denying that she accessed resource





✅ Correct Answer: 2

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?





✅ Correct Answer: 4

Which of the following is not a correct way to secure communication layer





✅ Correct Answer: 1

Which of the following is not the component of IoT Endpoint





✅ Correct Answer: 2

Which of the following makes sure that data is not changed when it notsupposed to be?





✅ Correct Answer: 1

Which of the following terms indicates that information is to be read only bythose people for whom it is intended?





✅ Correct Answer: 4

What is the full form of SCADA?





✅ Correct Answer: 3

DCS is a





✅ Correct Answer: 1

What is SCADA?





✅ Correct Answer: 2

The control in SCADA is





✅ Correct Answer: 3

When did the SCADA start?





✅ Correct Answer: 3

Which of the following is not the component of a SCADA system?





✅ Correct Answer: 4

Which of the following is the heart of a SCADA system?





✅ Correct Answer: 4

RFID stands for?





✅ Correct Answer: 2

Which of the following is not involved in working of IoT?





✅ Correct Answer: 4

M2M is a term introduced by





✅ Correct Answer: 3

Which of these statements regarding sensors is TRUE?





✅ Correct Answer: 4

Smart Dust can be used to measure the





✅ Correct Answer: 3

In threat modeling, what methodology used to perform risk analysis





✅ Correct Answer: 2

Out of the following which is not element of threat modelling





✅ Correct Answer: 4

Request field is present in which message format?





✅ Correct Answer: 1

CoAP is specialized for





✅ Correct Answer: 1

Which layer is CoAP?





✅ Correct Answer: 3

CoAP provides which of the following requirements?





✅ Correct Answer: 4

CoAP is a specialized protocol.





✅ Correct Answer: 1

URI and content type support is which protocol feature?





✅ Correct Answer: 3

What is the full form of WLAN?





✅ Correct Answer: 2

Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?





✅ Correct Answer: 3

Which of the following is not a characteristic of a ZigBee network?





✅ Correct Answer: 3

Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?





✅ Correct Answer: 4

Which of the following layers are defined by the ZigBee stack?





✅ Correct Answer: 4

_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.





✅ Correct Answer: 4

What is the typical range of transmission distance in a ZigBee network?





✅ Correct Answer: 2