1120+ Cloud Computing Solved MCQs

201.

Which of the following can be considered as a distributed caching system?

A. cnd
B. cdn
C. cwd
D. all of the mentioned
Answer» B. cdn
202.

Amazon Relational Database Service is a variant of the                5.1 database system.

A. oracle
B. mysql
C. sql server
D. all of the mentioned
Answer» B. mysql
203.

What are the different types of instances?

A. general purpose
B. computer optimized
C. storage optimized
D. all of the above
Answer» D. all of the above
204.

The types of AMI provided by AWS are:

A. instance store backed
B. ebs backed
C. both a & b
D. none of the above
Answer» C. both a & b
205.

Storage classes available with Amazon s3 are -

A. amazon s3 standard
B. amazon s3 standard- infrequent access
C. amazon glacier
D. all of the above
Answer» D. all of the above
206.

IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as                 .

A. web sphere
B. tivoli
C. nebula
D. altix
Answer» B. tivoli
207.

Cloud system from SGI is functionally considered as an                 .

A. on-demand cloud computing service
B. on-demand cloud storage service
C. on-demand cloud accessing service
D. on-demand
Answer» A. on-demand cloud computing service
208.

Cyclone is available in two service models as follows:

A. paas and iaas
B. saas and paas
C. saas and iaas
D. all of the above
Answer» C. saas and iaas
209.

NASA created                  can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

A. nebula cloud
B. cyclone cloud
C. force.com cloud
D. cern cloud
Answer» A. nebula cloud
210.

To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a                  grid and workload management solution of cloud computing platform

A. load setting facility
B. load sharing facility
C. load setting faculty
D. load assigning faculty
Answer» B. load sharing facility
211.

One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.

A. true
B. false
Answer» A. true
212.

A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms

A. accessibility
B. mobility
C. agility
D. scalability
Answer» C. agility
213.

The Cloudlets have a                  ownership unlike that of Clouds.

A. centralized
B. decentralized
C. global
D. none of the above
Answer» B. decentralized
214.

The Data-Intensive Scalable Computing(DISC) utilizes a                  data-center clusters to gather and maintain data.

A. htc
B. hpc
C. hcc
D. hac
Answer» A. htc
215.

Performance metrics for HPC/HTC systems include :

A. multitasking scalability
B. security index
C. cost effectiveness
D. all of the above
Answer» D. all of the above
216.

[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which of the following?

A. scalability
B. throughput
C. availability
D. effectiveness
Answer» B. throughput
217.

                 refers to an increase in the performance by the addition of more resources along the service layers

A. horizontal scalability
B. vertical scalability
C. diagonal scalability
D. none of the above
Answer» B. vertical scalability
218.

The percentage of time the system is up and running smoothly is referred as .

A. system up time
B. system scalability
C. system availability
D. system efficiency
Answer» C. system availability
219.

                 is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

A. gps
B. cloud
C. iot
D. rfid
Answer» D. rfid
220.

RFID stand for                 .

A. rangeable frequency identification
B. radio fragment identification
C. radio frequency identification
D. rangeable fragment identification
Answer» C. radio frequency identification
221.

The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer

A. i, ii, iv
B. i, iii, iv
C. ii, iii, iv
D. ii, iii, iv
Answer» A. i, ii, iv
222.

                 tags contain battery and transmit signals autonomously

A. acitve rfid
B. passive rfid
C. battery-assisted passive rfid
D. battery-assisted rfid
Answer» A. acitve rfid
223.

                 tags needs an external source to wake up the battery.

A. acitve rfid
B. passive rfid
C. battery-assisted passive rfid
D. battery-assisted active rfid
Answer» C. battery-assisted passive rfid
224.

The three major components of RFID hardware based on functionality include :

A. rfid reader
B. reader antenna
C. reader
D. all of the above
Answer» D. all of the above
225.

Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor

A. i, ii, iii
B. i, ii, iii, iv
C. ii, iii, iv
D. i, ii, iv
Answer» A. i, ii, iii
226.

Even with two-factor authentication, users may still be vulnerable to attacks.

A. scripting
B. cross attack
C. man-in-the-middle
D. radiant
Answer» C. man-in-the-middle
227.

Process of identifying any individual

A. auditing
B. authorisation
C. authentication
D. accounting
Answer» C. authentication
228.

Process that prevents someone from denying that she accessed resource

A. accounting
B. non-repudiation
C. sniffing
D. authorisation
Answer» B. non-repudiation
229.

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A. making infrastructure vulnerable to malware
B. potential for noncompliance
C. data loss
D. all of the above
Answer» D. all of the above
230.

Which of the following is not a correct way to secure communication layer

A. cloud initiated communication
B. tls/ssl
C. ips(intrusion prevention system)
D. firewalls
Answer» A. cloud initiated communication
231.

Which of the following is not the component of IoT Endpoint

A. sensor
B. gateway
C. communication module
D. mcu
Answer» B. gateway
232.

Which of the following makes sure that data is not changed when it not supposed to be?

A. integrity
B. availability
C. confidentiality
D. accounting
Answer» A. integrity
233.

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A. availability
B. accounting
C. integrity
D. confidentiality
Answer» D. confidentiality
234.

What is the full form of SCADA?

A. supervisory control and document acquisition
B. supervisory control and data acquisition
C. supervisory column and data assessment
D. supervisory column and data assessment
Answer» B. supervisory control and data acquisition
235.

DCS is a                  

A. distributed control system
B. data control system
C. data column system
D. distributed column system
Answer» A. distributed control system
236.

What is SCADA?

A. software
B. process
C. system
D. hardware
Answer» B. process
237.

The control in SCADA is

A. online control
B. direct control
C. supervisory control
D. automatic control
Answer» C. supervisory control
238.

When did the SCADA start?

A. 1980s
B. 1990s
C. 1970s
D. 1960s
Answer» B. 1990s
239.

Which of the following is not the component of a SCADA system?

A. database server
B. i/o system
C. plc controller
D. sparger controller
Answer» D. sparger controller
240.

Which of the following is the heart of a SCADA system?

A. plc
B. hmi
C. alarm task
D. i/o task
Answer» D. i/o task
241.

RFID stands for?

A. random frequencyidentification
B. radio frequencyidentification
C. random frequencyinformation
D. radio frequencyinformation
Answer» B. radio frequencyidentification
242.

Which of the following is not involved in working of IoT?

A. rfid
B. sensor
C. nano tech
D. server
Answer» D. server
243.

M2M is a term introduced by

A. iot service providers
B. fog computing service providers
C. telecommunication service providers
D. none of these
Answer» C. telecommunication service providers
244.

Which of these statements regarding sensors is TRUE?

A. sensors are input devices.
B. sensors can be analog as well as digital
C. sensors respond to some external stimuli.
D. all of these
Answer» D. all of these
245.

Smart Dust can be used to measure the

A. temperature of the industrial lathe machine
B. heat inside a computer’s cpu
C. chemical in the soil
D. strength of a solid material
Answer» C. chemical in the soil
246.

In threat modeling, what methodology used to perform risk analysis

A. dread
B. owasp
C. stride
D. dar
Answer» A. dread
247.

Out of the following which is not element of threat modelling

A. asset
B. vulnerability
C. threat
D. time
Answer» D. time
248.

Request field is present in which message format?

A. request message
B. response message
C. both request and response
D. neither request nor response
Answer» A. request message
249.

CoAP is specialized for

A. internet applications
B. device applications
C. wireless applications
D. wired applications
Answer» A. internet applications
250.

Which layer is CoAP?

A. control layer
B. transport layer
C. service layer
D. application layer
Answer» C. service layer
251.

CoAP provides which of the following requirements?

A. multicast support and simplicity
B. low overhead and multicast support
C. simplicity and low overhead
D. multicast support, low over head, and simplicity
Answer» D. multicast support, low over head, and simplicity
252.

CoAP is a specialized protocol.

A. web transfer
B. power
C. application
D. resource
Answer» A. web transfer
253.

URI and content type support is which protocol feature?

A. http
B. udp
C. coap
D. spi
Answer» C. coap
254.

What is the full form of WLAN?

A. wide local area network
B. wireless local area network
C. wireless land access network
D. wireless local area node
Answer» B. wireless local area network
255.

Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A. ieee 802.16
B. ieee 802.3
C. ieee 802.11
D. ieee 802.15
Answer» C. ieee 802.11
256.

Which of the following is not a characteristic of a ZigBee network?

A. low power consumption
B. easy installation.
C. high data rates.
D. unlicensed radio bands.
Answer» C. high data rates.
257.

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A. ieee 802.11.
B. ieee 802.15.1.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» D. ieee 802.15.4.
258.

Which of the following layers are defined by the ZigBee stack?

A. transport layer
B. physical layer.
C. application support sub-layer.
D. medium access layer
Answer» D. medium access layer
259.

What is the typical range of transmission distance in a ZigBee network?

A. 5 m.
B. 50 m.
C. 500 m.
D. 5 km
Answer» B. 50 m.
260.

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. cross-site scoring scripting
B. cross-site request forgery
C. two-factor authentication
D. cross-site scripting
Answer» D. cross-site scripting
261.

Representational State Transfer (REST) is the standard interface between

A. two machines in a lan
B. http client and user
C. http client and servers
D. none of the above
Answer» C. http client and servers
262.

Which of the following is not a messaging mode in CoAP?

A. confirmable
B. separate
C. direct
D. piggyback
Answer» C. direct
263.

Which of the following is the full form of XMPP?

A. extension messaging and presence protocol
B. extensible messaging and presence protocol
C. extension messaging and privacy protocol
D. extensible messaging and privacy protocol
Answer» B. extensible messaging and presence protocol
264.

In 6LoWPAN address, how many bits are globally unique?

A. 16 bits
B. 32 bits
C. 64 bits
D. 128 bits
Answer» C. 64 bits
265.

IEEE 802.15.4 uses which of the following for accessing the channel?

A. carrier sense multiple access (csma)
B. carrier sense multiple access with collision detection (csma-cd)
C. carrier sense multiple access with collision avoidance (csma-ca)
D. none of these
Answer» C. carrier sense multiple access with collision avoidance (csma-ca)
266.

Three parts of GPS include:

A. space segment
B. control segment
C. user segment
D. all of the above
Answer» D. all of the above
267.

In case of , the GPS works as a receiver, not a transmitter.

A. active tracking
B. passive tracking
C. assisted tracking
D. receiver tracking
Answer» B. passive tracking
268.

                 is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A. cloud-physical system
B. cyber-space system
C. cyber-physical system
D. none of the above
Answer» C. cyber-physical system
269.

The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

A. node degree
B. path length
C. social circle
D. bridge
Answer» A. node degree
270.

                 is the degree to which nodes have a common set of connections to other nodes

A. structural hole
B. structural equivalence
C. structural cohesion
D. none of the above
Answer» C. structural cohesion
271.

The degree to which actors are directly linked to one another through cohesive bonds is called as .

A. closeness
B. cohesion
C. centralized
D. path length
Answer» B. cohesion
272.

The social circles are loosely coupled if there is                   stringency of direct contact.

A. less
B. more
C. equal
D. no
Answer» A. less
273.

The measures of centrality include:

A. betweenness
B. closeness
C. degree
D. all of the above
Answer» D. all of the above
274.

Arrange the stages in supply chain management:
i. Material and Equipment Supplies
ii. Delivery of Products
iii. After Sale Service and Returns
iv. Planning and Coordination
v. Manufacturing and Testing

A. iv, v, i, ii, iii
B. iv, i, v, iii, ii
C. iv, i, v, ii, iii
D. i, ii, iv, v, ii
Answer» C. iv, i, v, ii, iii
275.

Nodes in the network analysis graph represent the                   and the edges represent the relationships between nodes.

A. actors
B. nodes
C. users
D. both a and b
Answer» D. both a and b
276.

Which is the latest Operating System?

A. real-time os
B. desktop os
C. mainframe os
D. cloud os
Answer» D. cloud os
277.

JOES stands for                  

A. joint expensive operating system
B. just expensive operating system
C. just enough operating system
D. joined environmental operating system
Answer» C. just enough operating system
278.

Responsibility of OS developers to add new feature in existing OS are

A. more reliability
B. convenience and security
C. compatibility
D. all of the above
Answer» D. all of the above
279.

In future, companies wont worry about the capital for large data center because of                        

A. saas solution
B. paas solution
C. iaas solution
D. none of the above
Answer» B. paas solution
280.

                   is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability

A. cometcloud
B. asteroidcloud
C. starcloud
D. planetcloud
Answer» A. cometcloud
281.

CometCloud supports policy based autonomic      and      

A. cloudbursting
B. cloudbridging
C. none
D. both a and b
Answer» D. both a and b
282.

Which are the three conceptual layers in CometCloud?

A. development, application, physical
B. infrastructure, dynamic, static
C. transport, network, programming
D. programming, service, infrastructure
Answer» D. programming, service, infrastructure
283.

In Comet, a tuple is a simple        string

A. java
B. python
C. xml
D. html
Answer» C. xml
284.

Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?

A. deadline-based
B. budget-based
C. quality-based
D. workload-based
Answer» C. quality-based
285.

The cloud media services are:

A. cloud gaming
B. experiencing multi- screens
C. image processing
D. all of the above
Answer» D. all of the above
286.

KPI stands for

A. key practices in industry
B. key performance index
C. key performance indicators
D. key parameters in information
Answer» C. key performance indicators
287.

SEEP is used in                    

A. energy optimization
B. multimedia
C. information leakage
D. cost reduction
Answer» A. energy optimization
288.

SEEP stands for                    

A. system end to end protocol
B. static environmental execution process
C. symbolic execution and energy profiles
D. state execution and energy profiles
Answer» C. symbolic execution and energy profiles
289.

Keywords in Docker are                  

A. develop, ship, run anywhere
B. create, export
C. transport, cloud
D. user, data, privacy
Answer» A. develop, ship, run anywhere
290.

Docker can simplify both,          and          

A. process, state
B. behavior, aspect
C. workflows, communication
D. all of the above
Answer» C. workflows, communication
291.

Basic approach of Docker as a company is:

A. “batteries included but removable”
B. “batteries included but non-removable”
C. “batteries but chargeable”
D. “battery less execution”
Answer» A. “batteries included but removable”
292.

Which containers are used by Docker severs?

A. windows
B. android
C. linux
D. mac
Answer» C. linux
293.

Two main components in Docker are:

A. master, slave
B. client, server
C. client, master
D. all of the above
Answer» B. client, server
294.

Docker is generally configured to use TCP port          while executing unencrypted traffic

A. 3306
B. 53378
C. 2375
D. 2376
Answer» C. 2375
295.

Docker is generally configured to use TCP port          while managing encrypted traffic.

A. 3306
B. 53378
C. 2375
D. 2376
Answer» D. 2376
296.

Containers require less disk space as compared to virtual machine

A. true
B. false
Answer» A. true
297.

There is no built-in framework in Docker for testing.

A. true
B. false
Answer» A. true
298.

Docker provides simple one-line deployment strategy.

A. true
B. false
Answer» A. true
299.

The examples of deployment tools are:

A. docker’s storm
B. new relic’s centurion
C. spotify’s helios
D. all of the above
Answer» D. all of the above
300.

CNS stands for                      

A. consumption near sweet-spot
B. continuous network system
C. compact neural system
D. compound near sweet-sp0t
Answer» A. consumption near sweet-spot
Tags
Question and answers in Cloud Computing, Cloud Computing multiple choice questions and answers, Cloud Computing Important MCQs, Solved MCQs for Cloud Computing, Cloud Computing MCQs with answers PDF download