84
72.2k

1120+ Cloud Computing Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Computer Applications (BCA) , Master of Science in Information Technology (MSc IT) .

201.

Which of the following can be considered as a distributed caching system?

A. cnd
B. cdn
C. cwd
D. all of the mentioned
Answer» B. cdn
202.

Amazon Relational Database Service is a variant of the                5.1 database system.

A. oracle
B. mysql
C. sql server
D. all of the mentioned
Answer» B. mysql
203.

What are the different types of instances?

A. general purpose
B. computer optimized
C. storage optimized
D. all of the above
Answer» D. all of the above
204.

The types of AMI provided by AWS are:

A. instance store backed
B. ebs backed
C. both a & b
D. none of the above
Answer» C. both a & b
205.

Storage classes available with Amazon s3 are -

A. amazon s3 standard
B. amazon s3 standard- infrequent access
C. amazon glacier
D. all of the above
Answer» D. all of the above
206.

IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as                 .

A. web sphere
B. tivoli
C. nebula
D. altix
Answer» B. tivoli
207.

Cloud system from SGI is functionally considered as an                 .

A. on-demand cloud computing service
B. on-demand cloud storage service
C. on-demand cloud accessing service
D. on-demand
Answer» A. on-demand cloud computing service
208.

Cyclone is available in two service models as follows:

A. paas and iaas
B. saas and paas
C. saas and iaas
D. all of the above
Answer» C. saas and iaas
209.

NASA created                  can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

A. nebula cloud
B. cyclone cloud
C. force.com cloud
D. cern cloud
Answer» A. nebula cloud
210.

To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a                  grid and workload management solution of cloud computing platform

A. load setting facility
B. load sharing facility
C. load setting faculty
D. load assigning faculty
Answer» B. load sharing facility
211.

One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.

A. true
B. false
Answer» A. true
212.

A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms

A. accessibility
B. mobility
C. agility
D. scalability
Answer» C. agility
213.

The Cloudlets have a                  ownership unlike that of Clouds.

A. centralized
B. decentralized
C. global
D. none of the above
Answer» B. decentralized
214.

The Data-Intensive Scalable Computing(DISC) utilizes a                  data-center clusters to gather and maintain data.

A. htc
B. hpc
C. hcc
D. hac
Answer» A. htc
215.

Performance metrics for HPC/HTC systems include :

A. multitasking scalability
B. security index
C. cost effectiveness
D. all of the above
Answer» D. all of the above
216.

[π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which of the following?

A. scalability
B. throughput
C. availability
D. effectiveness
Answer» B. throughput
217.

                 refers to an increase in the performance by the addition of more resources along the service layers

A. horizontal scalability
B. vertical scalability
C. diagonal scalability
D. none of the above
Answer» B. vertical scalability
218.

The percentage of time the system is up and running smoothly is referred as .

A. system up time
B. system scalability
C. system availability
D. system efficiency
Answer» C. system availability
219.

                 is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

A. gps
B. cloud
C. iot
D. rfid
Answer» D. rfid
220.

RFID stand for                 .

A. rangeable frequency identification
B. radio fragment identification
C. radio frequency identification
D. rangeable fragment identification
Answer» C. radio frequency identification
221.

The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer

A. i, ii, iv
B. i, iii, iv
C. ii, iii, iv
D. ii, iii, iv
Answer» A. i, ii, iv
222.

                 tags contain battery and transmit signals autonomously

A. acitve rfid
B. passive rfid
C. battery-assisted passive rfid
D. battery-assisted rfid
Answer» A. acitve rfid
223.

                 tags needs an external source to wake up the battery.

A. acitve rfid
B. passive rfid
C. battery-assisted passive rfid
D. battery-assisted active rfid
Answer» C. battery-assisted passive rfid
224.

The three major components of RFID hardware based on functionality include :

A. rfid reader
B. reader antenna
C. reader
D. all of the above
Answer» D. all of the above
225.

Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor

A. i, ii, iii
B. i, ii, iii, iv
C. ii, iii, iv
D. i, ii, iv
Answer» A. i, ii, iii
226.

Even with two-factor authentication, users may still be vulnerable to attacks.

A. scripting
B. cross attack
C. man-in-the-middle
D. radiant
Answer» C. man-in-the-middle
227.

Process of identifying any individual

A. auditing
B. authorisation
C. authentication
D. accounting
Answer» C. authentication
228.

Process that prevents someone from denying that she accessed resource

A. accounting
B. non-repudiation
C. sniffing
D. authorisation
Answer» B. non-repudiation
229.

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A. making infrastructure vulnerable to malware
B. potential for noncompliance
C. data loss
D. all of the above
Answer» D. all of the above
230.

Which of the following is not a correct way to secure communication layer

A. cloud initiated communication
B. tls/ssl
C. ips(intrusion prevention system)
D. firewalls
Answer» A. cloud initiated communication
231.

Which of the following is not the component of IoT Endpoint

A. sensor
B. gateway
C. communication module
D. mcu
Answer» B. gateway
232.

Which of the following makes sure that data is not changed when it not supposed to be?

A. integrity
B. availability
C. confidentiality
D. accounting
Answer» A. integrity
233.

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A. availability
B. accounting
C. integrity
D. confidentiality
Answer» D. confidentiality
234.

What is the full form of SCADA?

A. supervisory control and document acquisition
B. supervisory control and data acquisition
C. supervisory column and data assessment
D. supervisory column and data assessment
Answer» B. supervisory control and data acquisition
235.

DCS is a                  

A. distributed control system
B. data control system
C. data column system
D. distributed column system
Answer» A. distributed control system
236.

What is SCADA?

A. software
B. process
C. system
D. hardware
Answer» B. process
237.

The control in SCADA is

A. online control
B. direct control
C. supervisory control
D. automatic control
Answer» C. supervisory control
238.

When did the SCADA start?

A. 1980s
B. 1990s
C. 1970s
D. 1960s
Answer» B. 1990s
239.

Which of the following is not the component of a SCADA system?

A. database server
B. i/o system
C. plc controller
D. sparger controller
Answer» D. sparger controller
240.

Which of the following is the heart of a SCADA system?

A. plc
B. hmi
C. alarm task
D. i/o task
Answer» D. i/o task
241.

RFID stands for?

A. random frequencyidentification
B. radio frequencyidentification
C. random frequencyinformation
D. radio frequencyinformation
Answer» B. radio frequencyidentification
242.

Which of the following is not involved in working of IoT?

A. rfid
B. sensor
C. nano tech
D. server
Answer» D. server
243.

M2M is a term introduced by

A. iot service providers
B. fog computing service providers
C. telecommunication service providers
D. none of these
Answer» C. telecommunication service providers
244.

Which of these statements regarding sensors is TRUE?

A. sensors are input devices.
B. sensors can be analog as well as digital
C. sensors respond to some external stimuli.
D. all of these
Answer» D. all of these
245.

Smart Dust can be used to measure the

A. temperature of the industrial lathe machine
B. heat inside a computer’s cpu
C. chemical in the soil
D. strength of a solid material
Answer» C. chemical in the soil
246.

In threat modeling, what methodology used to perform risk analysis

A. dread
B. owasp
C. stride
D. dar
Answer» A. dread
247.

Out of the following which is not element of threat modelling

A. asset
B. vulnerability
C. threat
D. time
Answer» D. time
248.

Request field is present in which message format?

A. request message
B. response message
C. both request and response
D. neither request nor response
Answer» A. request message
249.

CoAP is specialized for

A. internet applications
B. device applications
C. wireless applications
D. wired applications
Answer» A. internet applications
250.

Which layer is CoAP?

A. control layer
B. transport layer
C. service layer
D. application layer
Answer» C. service layer

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.