R4RIN
Articles
Java 8
MCQS
Cloud Computing MCQ Quiz Hub
Cloud Computing Mcq Set 4
Choose a topic to test your knowledge and improve your Cloud Computing skills
1. Point out the correct statement.
A. with ec2, you can launch and run server instances called amazon machine images (amis) running different operating systems such as red hat linux
a machine image is the software and operating system running on top of the instance
a machine image may be thought of as the contents of a boot drive
All of the mentioned
2. Which of the following provides access for developers to charge Amazon’scustomers for their purchases?
fws
fas
fps
all of the mentioned
3. Which of the following is a batch processing application?
ibm smash
ibm websphereapplication server
condor
windows mediaserver
4. Point out the correct statement.
security can be set through passwords, kerberos tickets, or certificates
secure access to your ec2 amis is controlled by passwords, kerberos, and 509 certificates
most of the system image templates that amazon aws offers are based on red hat linux
All of the mentioned
5. How many EC2 service zones or regions exist?
1
2
3
4
6. Amazon cloud-based storage system allows you to store data objectsranging in size from 1 byte up to 5GB.
s1
s2
s3
s4
7. CloudFront supports data by performing static data transfers andstreaming content from one CloudFront location to another.
table caching
geocaching
index caching
windows mediaserver
8. Point out the correct statement.
a volume is mounted on a particular instance and is available to allinstances
the advantages of an ebs boot partition are that you can have a volume up to 1tb
you cannot mount multiple volumes on a single instance
All of the mentioned
9. Amazon Web Services falls into which of the following cloud-computingcategory?
platform as a service
software as a service
infrastructure as aservice
back-end as a service
10. AWS reaches customers in countries.
137
182
190
86
11. Which of the following should be used considering factors shown in thefigure?
simpledb
rds
amazon ec2
All of the mentioned
12. Point out the wrong statement.
amazon machine instances are sized at various levels and rented on a computing/hour basis
the metrics obtained by cloudwatch may be used to enable a feature called auto scaling
a number of tools are used to support ec2 services
none of the mentioned
13. Which of the following correctly describes components roughly in their order of importance from top to down?
1. amazon elastic compute cloud2. amazon simple storage system3. amazon elasticblock store
1. amazon elastic block store2. amazon elastic compute cloud3. amazon simplestorage system
1. amazon simple storage system2. amazon elastic block store3. amazon elasticcompute cloud
none of the mentioned
14. Which of the following is an online backup and storage system?
amazon elastic compute cloud
amazon simple queue service
amazon simple notification service
amazon simple storage system
15. is a virtual server platform that allows users to create and runvirtual machines on Amazon’s server farm.
ec2
azure
ec5
None of the mentioned
16. AMIs are operating systems running on the virtualization hypervisor.
yen
xen
ben
multi-factorauthentication
17. Which of the following instance class is best used for applications that areprocessor or compute-intensive?
standard instances
high memoryinstances
high cpu instances
None of the mentioned
18. Which of the following can be done with S3 buckets through the SOAP and REST APIs?
upload new objects to a bucket and download them
create, edit, or delete existing buckets
specify where a bucket should be stored
all of the mentioned
19. Which of the following operation retrieves the newest version of the object?
put
get
post
copy
20. Which of the following statement is wrong about Amazon S3?
A. amazon s3 is highly reliable
amazon s3 provides large quantities of reliable storage that is highly protected
amazon s3 is highly available
none of the mentioned
21. Which of the following is relational database service provided by Amazon?
simpledb
sql server
oracle
rds
22. Which of the following can be considered as a distributed caching system?
cnd
cdn
cwd
all of the mentioned
23. Amazon Relational Database Service is a variant of the 5.1 databasesystem.
oracle
mysql
sql server
All of the mentioned
24. What are the different types of instances?
general purpose
computer optimized
storage optimized
All of the above
25. The types of AMI provided by AWS are:
instance store backed
ebs backed
both a & b
none of the above
26. Storage classes available with Amazon s3 are -
amazon s3 standard
amazon s3 standard- infrequent access
amazon glacier
All of the above
27. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as
web sphere
tivoli
nebula
altix
28. loud system from SGI is functionally considered as an
on-demand cloudcomputing service
on-demand cloudstorage service
on-demand cloudaccessing service
on-demand
29. Cyclone is available in two service models as follows:
paas and iaas
saas and paas
saas and iaas
all of the above
30. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient
nebula cloud
cyclone cloud
force.com cloud
cern cloud
31. To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a grid and workload management solution of cloud computing platform
load setting facility
load sharing facility
load setting faculty
load assigning faculty
32. A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms
accessibility
mobility
agility
scalability
33. The Cloudlets have a ownership unlike that of Clouds.
centralized
decentralized
global
None of These
34. The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.
htc
hpc
hcc
hac
35. Performance metrics for HPC/HTC systems include :
multitaskingscalability
security index
cost effectiveness
All of the above
36. [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of whichof the following?
scalability
throughput
availability
effectiveness
37. refers to an increase in the performance by the addition of moreresources along the service layers
horizontal scalability
vertical scalability
diagonal scalability
None of These
38. The percentage of time the system is up and running smoothly is referred as.
system up time
system scalability
system availability
system efficiency
39. is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
gps
cloud
iot
rfid
40. RFID stand for .
rangeable frequency identification
radio fragment identification
radio frequency identification
rangeable fragment identification
41. The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer
i, ii, iv
i, iii, iv
ii, iii, iv
ii, iii, iv
42. tags contain battery and transmit signals autonomously
acitve rfid
passive rfid
battery-assistedpassive rfid
battery-assisted rfid
43. tags needs an external source to wake up the battery.
acitve rfid
passive rfid
battery-assisted passive rfid
battery-assisted active rfid
44. The three major components of RFID hardware based on functionality include:
rfid reader
reader antenna
reader
All of the above
45. Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor
i, ii, iii
i, ii, iii, iv
ii, iii, iv
i, ii, iv
46. Even with two-factor authentication, users may still be vulnerableto attacks.
scripting
cross attack
man-in-the-middle
radiant
47. Process of identifying any individual
auditing
authorisation
authentication
accounting
48. Process that prevents someone from denying that she accessed resource
accounting
non-repudiation
sniffing
authorisation
49. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
making infrastructure vulnerable to malware
potential for noncompliance
data loss
All of the above
50. Which of the following is not a correct way to secure communication layer
cloud initiated communication
tls/ssl
ips(intrusion prevention system)
firewalls
51. Which of the following is not the component of IoT Endpoint
sensor
gateway
communicationmodule
mcu
52. Which of the following makes sure that data is not changed when it notsupposed to be?
integrity
availability
confidentiality
accounting
53. Which of the following terms indicates that information is to be read only bythose people for whom it is intended?
availability
accounting
integrity
confidentiality
54. What is the full form of SCADA?
supervisory control and document acquisition
supervisory control and data acquisition
supervisory column and data assessment
supervisory column and data assessment
55. DCS is a
distributed controlsystem
data control system
data column system
distributed columnsystem
56. What is SCADA?
software
process
system
hardware
57. The control in SCADA is
online control
direct control
supervisory control
automatic control
58. When did the SCADA start?
1980s
1990s
1970s
1960s
59. Which of the following is not the component of a SCADA system?
database server
i/o system
plc controller
sparger controller
60. Which of the following is the heart of a SCADA system?
plc
hmi
alarm task
i/o task
61. RFID stands for?
random frequencyidentification
radio frequencyidentification
random frequencyinformation
radio frequencyinformation
62. Which of the following is not involved in working of IoT?
rfid
sensor
nano tech
server
63. M2M is a term introduced by
iot service providers
fog computingservice providers
telecommunicationservice providers
none of these
64. Which of these statements regarding sensors is TRUE?
sensors are input devices.
sensors can be analog as well as digital
sensors respond to some external stimuli.
all of these
65. Smart Dust can be used to measure the
temperature of theindustrial lathe machine
chemical in the soil
heat inside a computer’s cpu
strength of a solid material
66. In threat modeling, what methodology used to perform risk analysis
dread
owasp
stride
dar
67. Out of the following which is not element of threat modelling
asset
vulnerability
threat
time
68. Request field is present in which message format?
request message
response message
both request andresponse
neither request norresponse
69. CoAP is specialized for
internet applications
device applications
wireless applications
wired applications
70. Which layer is CoAP?
control layer
transport layer
service layer
application layer
71. CoAP provides which of the following requirements?
multicast support and simplicity
low overhead and multicast support
simplicity and low overhead
multicast support,low over head, and simplicity
72. CoAP is a specialized protocol.
web transfer
power
application
resource
73. URI and content type support is which protocol feature?
http
udp
coap
spi
74. What is the full form of WLAN?
wide local areanetwork
wireless local areanetwork
wireless land accessnetwork
wireless local areanode
75. Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?
ieee 802.16
ieee 802.
ieee 802.11
ieee 802.15
76. Which of the following is not a characteristic of a ZigBee network?
low powerconsumption
easy installation
high data rates
unlicensed radiobands.
77. Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?
ieee 802.11.
ieee 802.15.1.
ieee 802.15.3
ieee 802.15.4.
78. Which of the following layers are defined by the ZigBee stack?
transport layer
physical layer
application supportsub-layer.
medium access layer
79. _ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.
cross-site scoringscripting
cross-site requestforgery
two-factorauthentication
cross-site scripting
80. What is the typical range of transmission distance in a ZigBee network?
5 m.
50 m.
500 m.
5 km
Submit