McqMate
201. |
Which of the following can be considered as a distributed caching system? |
A. | cnd |
B. | cdn |
C. | cwd |
D. | all of the mentioned |
Answer» B. cdn |
202. |
Amazon Relational Database Service is a variant of the 5.1 database system. |
A. | oracle |
B. | mysql |
C. | sql server |
D. | all of the mentioned |
Answer» B. mysql |
203. |
What are the different types of instances? |
A. | general purpose |
B. | computer optimized |
C. | storage optimized |
D. | all of the above |
Answer» D. all of the above |
204. |
The types of AMI provided by AWS are: |
A. | instance store backed |
B. | ebs backed |
C. | both a & b |
D. | none of the above |
Answer» C. both a & b |
205. |
Storage classes available with Amazon s3 are - |
A. | amazon s3 standard |
B. | amazon s3 standard- infrequent access |
C. | amazon glacier |
D. | all of the above |
Answer» D. all of the above |
206. |
IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as . |
A. | web sphere |
B. | tivoli |
C. | nebula |
D. | altix |
Answer» B. tivoli |
207. |
Cloud system from SGI is functionally considered as an . |
A. | on-demand cloud computing service |
B. | on-demand cloud storage service |
C. | on-demand cloud accessing service |
D. | on-demand |
Answer» A. on-demand cloud computing service |
208. |
Cyclone is available in two service models as follows: |
A. | paas and iaas |
B. | saas and paas |
C. | saas and iaas |
D. | all of the above |
Answer» C. saas and iaas |
209. |
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient. |
A. | nebula cloud |
B. | cyclone cloud |
C. | force.com cloud |
D. | cern cloud |
Answer» A. nebula cloud |
210. |
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform |
A. | load setting facility |
B. | load sharing facility |
C. | load setting faculty |
D. | load assigning faculty |
Answer» B. load sharing facility |
211. |
One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False. |
A. | true |
B. | false |
Answer» A. true |
212. |
A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms |
A. | accessibility |
B. | mobility |
C. | agility |
D. | scalability |
Answer» C. agility |
213. |
The Cloudlets have a ownership unlike that of Clouds. |
A. | centralized |
B. | decentralized |
C. | global |
D. | none of the above |
Answer» B. decentralized |
214. |
The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data. |
A. | htc |
B. | hpc |
C. | hcc |
D. | hac |
Answer» A. htc |
215. |
Performance metrics for HPC/HTC systems include : |
A. | multitasking scalability |
B. | security index |
C. | cost effectiveness |
D. | all of the above |
Answer» D. all of the above |
216. |
[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which of the following? |
A. | scalability |
B. | throughput |
C. | availability |
D. | effectiveness |
Answer» B. throughput |
217. |
refers to an increase in the performance by the addition of more resources along the service layers |
A. | horizontal scalability |
B. | vertical scalability |
C. | diagonal scalability |
D. | none of the above |
Answer» B. vertical scalability |
218. |
The percentage of time the system is up and running smoothly is referred as . |
A. | system up time |
B. | system scalability |
C. | system availability |
D. | system efficiency |
Answer» C. system availability |
219. |
is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry |
A. | gps |
B. | cloud |
C. | iot |
D. | rfid |
Answer» D. rfid |
220. |
RFID stand for . |
A. | rangeable frequency identification |
B. | radio fragment identification |
C. | radio frequency identification |
D. | rangeable fragment identification |
Answer» C. radio frequency identification |
221. |
The architecture of IoT consists of different layers including which of the following? i. Application Layer
|
A. | i, ii, iv |
B. | i, iii, iv |
C. | ii, iii, iv |
D. | ii, iii, iv |
Answer» A. i, ii, iv |
222. |
tags contain battery and transmit signals autonomously |
A. | acitve rfid |
B. | passive rfid |
C. | battery-assisted passive rfid |
D. | battery-assisted rfid |
Answer» A. acitve rfid |
223. |
tags needs an external source to wake up the battery. |
A. | acitve rfid |
B. | passive rfid |
C. | battery-assisted passive rfid |
D. | battery-assisted active rfid |
Answer» C. battery-assisted passive rfid |
224. |
The three major components of RFID hardware based on functionality include : |
A. | rfid reader |
B. | reader antenna |
C. | reader |
D. | all of the above |
Answer» D. all of the above |
225. |
Types of Zigbee devices are available as follows: i. ZigBee Coordinator
|
A. | i, ii, iii |
B. | i, ii, iii, iv |
C. | ii, iii, iv |
D. | i, ii, iv |
Answer» A. i, ii, iii |
226. |
Even with two-factor authentication, users may still be vulnerable to attacks. |
A. | scripting |
B. | cross attack |
C. | man-in-the-middle |
D. | radiant |
Answer» C. man-in-the-middle |
227. |
Process of identifying any individual |
A. | auditing |
B. | authorisation |
C. | authentication |
D. | accounting |
Answer» C. authentication |
228. |
Process that prevents someone from denying that she accessed resource |
A. | accounting |
B. | non-repudiation |
C. | sniffing |
D. | authorisation |
Answer» B. non-repudiation |
229. |
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? |
A. | making infrastructure vulnerable to malware |
B. | potential for noncompliance |
C. | data loss |
D. | all of the above |
Answer» D. all of the above |
230. |
Which of the following is not a correct way to secure communication layer |
A. | cloud initiated communication |
B. | tls/ssl |
C. | ips(intrusion prevention system) |
D. | firewalls |
Answer» A. cloud initiated communication |
231. |
Which of the following is not the component of IoT Endpoint |
A. | sensor |
B. | gateway |
C. | communication module |
D. | mcu |
Answer» B. gateway |
232. |
Which of the following makes sure that data is not changed when it not supposed to be? |
A. | integrity |
B. | availability |
C. | confidentiality |
D. | accounting |
Answer» A. integrity |
233. |
Which of the following terms indicates that information is to be read only by those people for whom it is intended? |
A. | availability |
B. | accounting |
C. | integrity |
D. | confidentiality |
Answer» D. confidentiality |
234. |
What is the full form of SCADA? |
A. | supervisory control and document acquisition |
B. | supervisory control and data acquisition |
C. | supervisory column and data assessment |
D. | supervisory column and data assessment |
Answer» B. supervisory control and data acquisition |
235. |
DCS is a |
A. | distributed control system |
B. | data control system |
C. | data column system |
D. | distributed column system |
Answer» A. distributed control system |
236. |
What is SCADA? |
A. | software |
B. | process |
C. | system |
D. | hardware |
Answer» B. process |
237. |
The control in SCADA is |
A. | online control |
B. | direct control |
C. | supervisory control |
D. | automatic control |
Answer» C. supervisory control |
238. |
When did the SCADA start? |
A. | 1980s |
B. | 1990s |
C. | 1970s |
D. | 1960s |
Answer» B. 1990s |
239. |
Which of the following is not the component of a SCADA system? |
A. | database server |
B. | i/o system |
C. | plc controller |
D. | sparger controller |
Answer» D. sparger controller |
240. |
Which of the following is the heart of a SCADA system? |
A. | plc |
B. | hmi |
C. | alarm task |
D. | i/o task |
Answer» D. i/o task |
241. |
RFID stands for? |
A. | random frequencyidentification |
B. | radio frequencyidentification |
C. | random frequencyinformation |
D. | radio frequencyinformation |
Answer» B. radio frequencyidentification |
242. |
Which of the following is not involved in working of IoT? |
A. | rfid |
B. | sensor |
C. | nano tech |
D. | server |
Answer» D. server |
243. |
M2M is a term introduced by |
A. | iot service providers |
B. | fog computing service providers |
C. | telecommunication service providers |
D. | none of these |
Answer» C. telecommunication service providers |
244. |
Which of these statements regarding sensors is TRUE? |
A. | sensors are input devices. |
B. | sensors can be analog as well as digital |
C. | sensors respond to some external stimuli. |
D. | all of these |
Answer» D. all of these |
245. |
Smart Dust can be used to measure the |
A. | temperature of the industrial lathe machine |
B. | heat inside a computer’s cpu |
C. | chemical in the soil |
D. | strength of a solid material |
Answer» C. chemical in the soil |
246. |
In threat modeling, what methodology used to perform risk analysis |
A. | dread |
B. | owasp |
C. | stride |
D. | dar |
Answer» A. dread |
247. |
Out of the following which is not element of threat modelling |
A. | asset |
B. | vulnerability |
C. | threat |
D. | time |
Answer» D. time |
248. |
Request field is present in which message format? |
A. | request message |
B. | response message |
C. | both request and response |
D. | neither request nor response |
Answer» A. request message |
249. |
CoAP is specialized for |
A. | internet applications |
B. | device applications |
C. | wireless applications |
D. | wired applications |
Answer» A. internet applications |
250. |
Which layer is CoAP? |
A. | control layer |
B. | transport layer |
C. | service layer |
D. | application layer |
Answer» C. service layer |
251. |
CoAP provides which of the following requirements? |
A. | multicast support and simplicity |
B. | low overhead and multicast support |
C. | simplicity and low overhead |
D. | multicast support, low over head, and simplicity |
Answer» D. multicast support, low over head, and simplicity |
252. |
CoAP is a specialized protocol. |
A. | web transfer |
B. | power |
C. | application |
D. | resource |
Answer» A. web transfer |
253. |
URI and content type support is which protocol feature? |
A. | http |
B. | udp |
C. | coap |
D. | spi |
Answer» C. coap |
254. |
What is the full form of WLAN? |
A. | wide local area network |
B. | wireless local area network |
C. | wireless land access network |
D. | wireless local area node |
Answer» B. wireless local area network |
255. |
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs? |
A. | ieee 802.16 |
B. | ieee 802.3 |
C. | ieee 802.11 |
D. | ieee 802.15 |
Answer» C. ieee 802.11 |
256. |
Which of the following is not a characteristic of a ZigBee network? |
A. | low power consumption |
B. | easy installation. |
C. | high data rates. |
D. | unlicensed radio bands. |
Answer» C. high data rates. |
257. |
Which of the following IEEE standards provides the lowest level of the ZigBee software stack? |
A. | ieee 802.11. |
B. | ieee 802.15.1. |
C. | ieee 802.15.3. |
D. | ieee 802.15.4. |
Answer» D. ieee 802.15.4. |
258. |
Which of the following layers are defined by the ZigBee stack? |
A. | transport layer |
B. | physical layer. |
C. | application support sub-layer. |
D. | medium access layer |
Answer» D. medium access layer |
259. |
What is the typical range of transmission distance in a ZigBee network? |
A. | 5 m. |
B. | 50 m. |
C. | 500 m. |
D. | 5 km |
Answer» B. 50 m. |
260. |
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. |
A. | cross-site scoring scripting |
B. | cross-site request forgery |
C. | two-factor authentication |
D. | cross-site scripting |
Answer» D. cross-site scripting |
261. |
Representational State Transfer (REST) is the standard interface between |
A. | two machines in a lan |
B. | http client and user |
C. | http client and servers |
D. | none of the above |
Answer» C. http client and servers |
262. |
Which of the following is not a messaging mode in CoAP? |
A. | confirmable |
B. | separate |
C. | direct |
D. | piggyback |
Answer» C. direct |
263. |
Which of the following is the full form of XMPP? |
A. | extension messaging and presence protocol |
B. | extensible messaging and presence protocol |
C. | extension messaging and privacy protocol |
D. | extensible messaging and privacy protocol |
Answer» B. extensible messaging and presence protocol |
264. |
In 6LoWPAN address, how many bits are globally unique? |
A. | 16 bits |
B. | 32 bits |
C. | 64 bits |
D. | 128 bits |
Answer» C. 64 bits |
265. |
IEEE 802.15.4 uses which of the following for accessing the channel? |
A. | carrier sense multiple access (csma) |
B. | carrier sense multiple access with collision detection (csma-cd) |
C. | carrier sense multiple access with collision avoidance (csma-ca) |
D. | none of these |
Answer» C. carrier sense multiple access with collision avoidance (csma-ca) |
266. |
Three parts of GPS include: |
A. | space segment |
B. | control segment |
C. | user segment |
D. | all of the above |
Answer» D. all of the above |
267. |
In case of , the GPS works as a receiver, not a transmitter. |
A. | active tracking |
B. | passive tracking |
C. | assisted tracking |
D. | receiver tracking |
Answer» B. passive tracking |
268. |
is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system |
A. | cloud-physical system |
B. | cyber-space system |
C. | cyber-physical system |
D. | none of the above |
Answer» C. cyber-physical system |
269. |
The number of binding of a node to other actors of the graph in the graph representation of a network is called as . |
A. | node degree |
B. | path length |
C. | social circle |
D. | bridge |
Answer» A. node degree |
270. |
is the degree to which nodes have a common set of connections to other nodes |
A. | structural hole |
B. | structural equivalence |
C. | structural cohesion |
D. | none of the above |
Answer» C. structural cohesion |
271. |
The degree to which actors are directly linked to one another through cohesive bonds is called as . |
A. | closeness |
B. | cohesion |
C. | centralized |
D. | path length |
Answer» B. cohesion |
272. |
The social circles are loosely coupled if there is stringency of direct contact. |
A. | less |
B. | more |
C. | equal |
D. | no |
Answer» A. less |
273. |
The measures of centrality include: |
A. | betweenness |
B. | closeness |
C. | degree |
D. | all of the above |
Answer» D. all of the above |
274. |
Arrange the stages in supply chain management:
|
A. | iv, v, i, ii, iii |
B. | iv, i, v, iii, ii |
C. | iv, i, v, ii, iii |
D. | i, ii, iv, v, ii |
Answer» C. iv, i, v, ii, iii |
275. |
Nodes in the network analysis graph represent the and the edges represent the relationships between nodes. |
A. | actors |
B. | nodes |
C. | users |
D. | both a and b |
Answer» D. both a and b |
276. |
Which is the latest Operating System? |
A. | real-time os |
B. | desktop os |
C. | mainframe os |
D. | cloud os |
Answer» D. cloud os |
277. |
JOES stands for |
A. | joint expensive operating system |
B. | just expensive operating system |
C. | just enough operating system |
D. | joined environmental operating system |
Answer» C. just enough operating system |
278. |
Responsibility of OS developers to add new feature in existing OS are |
A. | more reliability |
B. | convenience and security |
C. | compatibility |
D. | all of the above |
Answer» D. all of the above |
279. |
In future, companies wont worry about the capital for large data center because of |
A. | saas solution |
B. | paas solution |
C. | iaas solution |
D. | none of the above |
Answer» B. paas solution |
280. |
is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability |
A. | cometcloud |
B. | asteroidcloud |
C. | starcloud |
D. | planetcloud |
Answer» A. cometcloud |
281. |
CometCloud supports policy based autonomic and |
A. | cloudbursting |
B. | cloudbridging |
C. | none |
D. | both a and b |
Answer» D. both a and b |
282. |
Which are the three conceptual layers in CometCloud? |
A. | development, application, physical |
B. | infrastructure, dynamic, static |
C. | transport, network, programming |
D. | programming, service, infrastructure |
Answer» D. programming, service, infrastructure |
283. |
In Comet, a tuple is a simple string |
A. | java |
B. | python |
C. | xml |
D. | html |
Answer» C. xml |
284. |
Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst? |
A. | deadline-based |
B. | budget-based |
C. | quality-based |
D. | workload-based |
Answer» C. quality-based |
285. |
The cloud media services are: |
A. | cloud gaming |
B. | experiencing multi- screens |
C. | image processing |
D. | all of the above |
Answer» D. all of the above |
286. |
KPI stands for |
A. | key practices in industry |
B. | key performance index |
C. | key performance indicators |
D. | key parameters in information |
Answer» C. key performance indicators |
287. |
SEEP is used in |
A. | energy optimization |
B. | multimedia |
C. | information leakage |
D. | cost reduction |
Answer» A. energy optimization |
288. |
SEEP stands for |
A. | system end to end protocol |
B. | static environmental execution process |
C. | symbolic execution and energy profiles |
D. | state execution and energy profiles |
Answer» C. symbolic execution and energy profiles |
289. |
Keywords in Docker are |
A. | develop, ship, run anywhere |
B. | create, export |
C. | transport, cloud |
D. | user, data, privacy |
Answer» A. develop, ship, run anywhere |
290. |
Docker can simplify both, and |
A. | process, state |
B. | behavior, aspect |
C. | workflows, communication |
D. | all of the above |
Answer» C. workflows, communication |
291. |
Basic approach of Docker as a company is: |
A. | “batteries included but removable” |
B. | “batteries included but non-removable” |
C. | “batteries but chargeable” |
D. | “battery less execution” |
Answer» A. “batteries included but removable” |
292. |
Which containers are used by Docker severs? |
A. | windows |
B. | android |
C. | linux |
D. | mac |
Answer» C. linux |
293. |
Two main components in Docker are: |
A. | master, slave |
B. | client, server |
C. | client, master |
D. | all of the above |
Answer» B. client, server |
294. |
Docker is generally configured to use TCP port while executing unencrypted traffic |
A. | 3306 |
B. | 53378 |
C. | 2375 |
D. | 2376 |
Answer» C. 2375 |
295. |
Docker is generally configured to use TCP port while managing encrypted traffic. |
A. | 3306 |
B. | 53378 |
C. | 2375 |
D. | 2376 |
Answer» D. 2376 |
296. |
Containers require less disk space as compared to virtual machine |
A. | true |
B. | false |
Answer» A. true |
297. |
There is no built-in framework in Docker for testing. |
A. | true |
B. | false |
Answer» A. true |
298. |
Docker provides simple one-line deployment strategy. |
A. | true |
B. | false |
Answer» A. true |
299. |
The examples of deployment tools are: |
A. | docker’s storm |
B. | new relic’s centurion |
C. | spotify’s helios |
D. | all of the above |
Answer» D. all of the above |
300. |
CNS stands for |
A. | consumption near sweet-spot |
B. | continuous network system |
C. | compact neural system |
D. | compound near sweet-sp0t |
Answer» A. consumption near sweet-spot |
Done Reading?