1. Which of the following can be considered as a distributed caching system?
Correct : B. cdn
2. Amazon Relational Database Service is a variant of the 5.1 database
system.
Correct : B. mysql
3. What are the different types of instances?
Correct : D. all of the above
4. The types of AMI provided by AWS are:
Correct : C. both a & b
5. Storage classes available with Amazon s3 are -
Correct : D. all of the above
6. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .
Correct : B. tivoli
7. Cloud system from SGI is functionally considered as an .
Correct : A. on-demand cloud
computing service
8. Cyclone is available in two service models as follows:
Correct : C. saas and iaas
9. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
Correct : A. nebula cloud
10. To establish scalability for the analysis of huge research data, CERN uses LSF
i.e. a grid and workload management solution of cloud computing platform
Correct : B. load sharing facility
11. One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.
Correct : A. true
12. A mashup cloud can be designed by utilizing the Scalability of AWS and
of GAE platforms
Correct : C. agility
13. The Cloudlets have a ownership unlike that of Clouds.
Correct : B. decentralized
14. The Data-Intensive Scalable Computing(DISC) utilizes a data-center
clusters to gather and maintain data.
Correct : A. htc
15. Performance metrics for HPC/HTC systems include :
Correct : D. all of the above
16. [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which
of the following?
Correct : B. throughput
17. refers to an increase in the performance by the addition of more
resources along the service layers
Correct : B. vertical scalability
18. The percentage of time the system is up and running smoothly is referred as
.
Correct : C. system availability
19. is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
Correct : D. rfid
20. RFID stand for .
Correct : C. radio frequency identification
21. The architecture of IoT consists of different layers including which of the following? i. Application Layer
ii. Sensing Layer
iii. Combination Layer
iv. Network Layer
Correct : A. i, ii, iv
22. tags contain battery and transmit signals autonomously
Correct : A. acitve rfid
23. tags needs an external source to wake up the battery.
Correct : C. battery-assisted passive rfid
24. The three major components of RFID hardware based on functionality include
:
Correct : D. all of the above
25. Types of Zigbee devices are available as follows: i. ZigBee Coordinator
ii. ZigBee Router
iii. ZigBee End Device
iv. ZigBee Accessor
Correct : A. i, ii, iii
26. Even with two-factor authentication, users may still be vulnerable
to attacks.
Correct : C. man-in-the-middle
27. Process of identifying any individual
Correct : C. authentication
28. Process that prevents someone from denying that she accessed resource
Correct : B. non-repudiation
29. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
Correct : D. all of the above
30. Which of the following is not a correct way to secure communication layer
Correct : A. cloud initiated communication
31. Which of the following is not the component of IoT Endpoint
Correct : B. gateway
32. Which of the following makes sure that data is not changed when it not
supposed to be?
Correct : A. integrity
33. Which of the following terms indicates that information is to be read only by
those people for whom it is intended?
Correct : D. confidentiality
34. What is the full form of SCADA?
Correct : B. supervisory control and data acquisition
35. DCS is a
Correct : A. distributed control
system
36. What is SCADA?
Correct : B. process
37. The control in SCADA is
Correct : C. supervisory control
38. When did the SCADA start?
Correct : B. 1990s
39. Which of the following is not the component of a SCADA system?
Correct : D. sparger controller
40. Which of the following is the heart of a SCADA system?
Correct : D. i/o task
41. RFID stands for?
Correct : B. radio frequencyidentification
42. Which of the following is not involved in working of IoT?
Correct : D. server
43. M2M is a term introduced by
Correct : C. telecommunication
service providers
44. Which of these statements regarding sensors is TRUE?
Correct : D. all of these
45. Smart Dust can be used to measure the
Correct : C. chemical in the soil
46. In threat modeling, what methodology used to perform risk analysis
Correct : A. dread
47. Out of the following which is not element of threat modelling
Correct : D. time
48. Request field is present in which message format?
Correct : A. request message
49. CoAP is specialized for
Correct : A. internet applications
50. Which layer is CoAP?
Correct : C. service layer
51. CoAP provides which of the following requirements?
Correct : D. multicast support,
low over head, and simplicity
52. CoAP is a specialized protocol.
Correct : A. web transfer
53. URI and content type support is which protocol feature?
Correct : C. coap
54. What is the full form of WLAN?
Correct : B. wireless local area
network
55. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
Correct : C. ieee 802.11
56. Which of the following is not a characteristic of a ZigBee network?
Correct : C. high data rates.
57. Which of the following IEEE standards provides the lowest level of the ZigBee
software stack?
Correct : D. ieee 802.15.4.
58. Which of the following layers are defined by the ZigBee stack?
Correct : D. medium access layer
59. What is the typical range of transmission distance in a ZigBee network?
Correct : B. 50 m.
60. _ is an attack which forces an end user to execute unwanted actions on a
web application in which he/she is currently authenticated.
Correct : D. cross-site scripting
61. Representational State Transfer (REST) is the standard interface between
Correct : C. http client and
servers
62. Which of the following is not a messaging mode in CoAP?
Correct : C. direct
63. Which of the following is the full form of XMPP?
Correct : B. extensible messaging and presence
protocol
64. In 6LoWPAN address, how many bits are globally unique?
Correct : C. 64 bits
65. IEEE 802.15.4 uses which of the following for accessing the channel?
Correct : C. carrier sense multiple access with collision avoidance (csma-ca)
66. Three parts of GPS include:
Correct : D. all of the above
67. In case of , the GPS works as a receiver, not a transmitter.
Correct : B. passive tracking
68. is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system
Correct : C. cyber-physical system
69. The number of binding of a node to other actors of the graph in the graph
representation of a network is called as .
Correct : A. node degree
70. is the degree to which nodes have a common set of connections to
other nodes
Correct : C. structural cohesion
71. The degree to which actors are directly linked to one another through
cohesive bonds is called as .
Correct : B. cohesion
72. The social circles are loosely coupled if there is stringency of direct contact.
Correct : A. less
73. The measures of centrality include:
Correct : D. all of the above
74. Arrange the stages in supply chain management:
i. Material and Equipment Supplies
ii. Delivery of Products
iii. After Sale Service and Returns
iv. Planning and Coordination
v. Manufacturing and Testing
Correct : C. iv, i, v, ii, iii
75. Nodes in the network analysis graph represent the and the edges represent the relationships between nodes.
Correct : D. both a and b
76. Which is the latest Operating System?
Correct : D. cloud os
77. JOES stands for
Correct : C. just enough operating system
78. Responsibility of OS developers to add new feature in existing OS are
Correct : D. all of the above
79. In future, companies wont worry about the capital for large data center because of
Correct : B. paas solution
80. is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability
Correct : A. cometcloud
81. CometCloud supports policy based autonomic and
Correct : D. both a and b
82. Which are the three conceptual layers in CometCloud?
Correct : D. programming, service, infrastructure
83. In Comet, a tuple is a simple string
Correct : C. xml
84. Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?
Correct : C. quality-based
85. The cloud media services are:
Correct : D. all of the above
86. KPI stands for
Correct : C. key performance indicators
87. SEEP is used in
Correct : A. energy optimization
88. SEEP stands for
Correct : C. symbolic execution and energy profiles
89. Keywords in Docker are
Correct : A. develop, ship, run anywhere
90. Docker can simplify both, and
Correct : C. workflows, communication
91. Basic approach of Docker as a company is:
Correct : A. “batteries included but removable”
92. Which containers are used by Docker severs?
Correct : C. linux
93. Two main components in Docker are:
Correct : B. client, server
94. Docker is generally configured to use TCP port while executing unencrypted traffic
Correct : C. 2375
95. Docker is generally configured to use TCP port while managing encrypted traffic.
Correct : D. 2376
96. Containers require less disk space as compared to virtual machine
Correct : A. true
97. There is no built-in framework in Docker for testing.