Choose a topic to test your knowledge and improve your Cloud Computing skills
Point out the correct statement.
Which of the following provides access for developers to charge Amazon’scustomers for their purchases?
Which of the following is a batch processing application?
Point out the correct statement.
How many EC2 service zones or regions exist?
Amazon cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.
CloudFront supports data by performing static data transfers andstreaming content from one CloudFront location to another.
Point out the correct statement.
Amazon Web Services falls into which of the following cloud-computingcategory?
AWS reaches customers in countries.
Which of the following should be used considering factors shown in thefigure?
Point out the wrong statement.
Which of the following correctly describes components roughly in their order of importance from top to down?
Which of the following is an online backup and storage system?
is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.
AMIs are operating systems running on the virtualization hypervisor.
Which of the following instance class is best used for applications that areprocessor or compute-intensive?
Which of the following can be done with S3 buckets through the SOAP and REST APIs?
Which of the following operation retrieves the newest version of the object?
Which of the following statement is wrong about Amazon S3?
Which of the following is relational database service provided by Amazon?
Which of the following can be considered as a distributed caching system?
Amazon Relational Database Service is a variant of the 5.1 databasesystem.
What are the different types of instances?
The types of AMI provided by AWS are:
Storage classes available with Amazon s3 are -
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as
loud system from SGI is functionally considered as an
Cyclone is available in two service models as follows:
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient
To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a grid and workload management solution of cloud computing platform
A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms
The Cloudlets have a ownership unlike that of Clouds.
The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.
Performance metrics for HPC/HTC systems include :
[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?
refers to an increase in the performance by the addition of moreresources along the service layers
The percentage of time the system is up and running smoothly is referred as.
is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
RFID stand for .
The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer
tags contain battery and transmit signals autonomously
tags needs an external source to wake up the battery.
The three major components of RFID hardware based on functionality include:
Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor
Even with two-factor authentication, users may still be vulnerableto attacks.
Process of identifying any individual
Process that prevents someone from denying that she accessed resource
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
Which of the following is not a correct way to secure communication layer
Which of the following is not the component of IoT Endpoint
Which of the following makes sure that data is not changed when it notsupposed to be?
Which of the following terms indicates that information is to be read only bythose people for whom it is intended?
What is the full form of SCADA?
DCS is a
What is SCADA?
The control in SCADA is
When did the SCADA start?
Which of the following is not the component of a SCADA system?
Which of the following is the heart of a SCADA system?
RFID stands for?
Which of the following is not involved in working of IoT?
M2M is a term introduced by
Which of these statements regarding sensors is TRUE?
Smart Dust can be used to measure the
In threat modeling, what methodology used to perform risk analysis
Out of the following which is not element of threat modelling
Request field is present in which message format?
CoAP is specialized for
Which layer is CoAP?
CoAP provides which of the following requirements?
CoAP is a specialized protocol.
URI and content type support is which protocol feature?
What is the full form of WLAN?
Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?
Which of the following is not a characteristic of a ZigBee network?
Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?
Which of the following layers are defined by the ZigBee stack?
_ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.
What is the typical range of transmission distance in a ZigBee network?