Cloud Computing MCQ Quiz Hub

Cloud Computing Mcq Set 4

Choose a topic to test your knowledge and improve your Cloud Computing skills

1. Point out the correct statement.




2. Which of the following provides access for developers to charge Amazon’scustomers for their purchases?




3. Which of the following is a batch processing application?




4. Point out the correct statement.




5. How many EC2 service zones or regions exist?




6. Amazon cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.




7. CloudFront supports data by performing static data transfers andstreaming content from one CloudFront location to another.




8. Point out the correct statement.




9. Amazon Web Services falls into which of the following cloud-computingcategory?




10. AWS reaches customers in countries.




11. Which of the following should be used considering factors shown in thefigure?




12. Point out the wrong statement.




13. Which of the following correctly describes components roughly in their order of importance from top to down?




14. Which of the following is an online backup and storage system?




15. is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.




16. AMIs are operating systems running on the virtualization hypervisor.




17. Which of the following instance class is best used for applications that areprocessor or compute-intensive?




18. Which of the following can be done with S3 buckets through the SOAP and REST APIs?




19. Which of the following operation retrieves the newest version of the object?




20. Which of the following statement is wrong about Amazon S3?




21. Which of the following is relational database service provided by Amazon?




22. Which of the following can be considered as a distributed caching system?




23. Amazon Relational Database Service is a variant of the 5.1 databasesystem.




24. What are the different types of instances?




25. The types of AMI provided by AWS are:




26. Storage classes available with Amazon s3 are -




27. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as




28. loud system from SGI is functionally considered as an




29. Cyclone is available in two service models as follows:




30. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient




31. To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a grid and workload management solution of cloud computing platform




32. A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms




33. The Cloudlets have a ownership unlike that of Clouds.




34. The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.




35. Performance metrics for HPC/HTC systems include :




36. [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?




37. refers to an increase in the performance by the addition of moreresources along the service layers




38. The percentage of time the system is up and running smoothly is referred as.




39. is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry




40. RFID stand for .




41. The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer




42. tags contain battery and transmit signals autonomously




43. tags needs an external source to wake up the battery.




44. The three major components of RFID hardware based on functionality include:




45. Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor




46. Even with two-factor authentication, users may still be vulnerableto attacks.




47. Process of identifying any individual




48. Process that prevents someone from denying that she accessed resource




49. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?




50. Which of the following is not a correct way to secure communication layer




51. Which of the following is not the component of IoT Endpoint




52. Which of the following makes sure that data is not changed when it notsupposed to be?




53. Which of the following terms indicates that information is to be read only bythose people for whom it is intended?




54. What is the full form of SCADA?




55. DCS is a




56. What is SCADA?




57. The control in SCADA is




58. When did the SCADA start?




59. Which of the following is not the component of a SCADA system?




60. Which of the following is the heart of a SCADA system?




61. RFID stands for?




62. Which of the following is not involved in working of IoT?




63. M2M is a term introduced by




64. Which of these statements regarding sensors is TRUE?




65. Smart Dust can be used to measure the




66. In threat modeling, what methodology used to perform risk analysis




67. Out of the following which is not element of threat modelling




68. Request field is present in which message format?




69. CoAP is specialized for




70. Which layer is CoAP?




71. CoAP provides which of the following requirements?




72. CoAP is a specialized protocol.




73. URI and content type support is which protocol feature?




74. What is the full form of WLAN?




75. Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?




76. Which of the following is not a characteristic of a ZigBee network?




77. Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?




78. Which of the following layers are defined by the ZigBee stack?




79. _ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.




80. What is the typical range of transmission distance in a ZigBee network?