Quiznetik

Cloud Computing | Set 3

1. Which of the following can be considered as a distributed caching system?

Correct : B. cdn

2. Amazon Relational Database Service is a variant of the                5.1 database system.

Correct : B. mysql

3. What are the different types of instances?

Correct : D. all of the above

4. The types of AMI provided by AWS are:

Correct : C. both a & b

5. Storage classes available with Amazon s3 are -

Correct : D. all of the above

6. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as                 .

Correct : B. tivoli

7. Cloud system from SGI is functionally considered as an                 .

Correct : A. on-demand cloud computing service

8. Cyclone is available in two service models as follows:

Correct : C. saas and iaas

9. NASA created                  can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

Correct : A. nebula cloud

10. To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a                  grid and workload management solution of cloud computing platform

Correct : B. load sharing facility

11. One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.

Correct : A. true

12. A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms

Correct : C. agility

13. The Cloudlets have a                  ownership unlike that of Clouds.

Correct : B. decentralized

14. The Data-Intensive Scalable Computing(DISC) utilizes a                  data-center clusters to gather and maintain data.

Correct : A. htc

15. Performance metrics for HPC/HTC systems include :

Correct : D. all of the above

16. [π=n/Ttotal=n⁄[kTo+Te(n,m)] The above equa on calculates the value of which of the following?

Correct : B. throughput

17. refers to an increase in the performance by the addition of more resources along the service layers

Correct : B. vertical scalability

18. The percentage of time the system is up and running smoothly is referred as .

Correct : C. system availability

19. is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

Correct : D. rfid

20. RFID stand for                 .

Correct : C. radio frequency identification

21. The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer

Correct : A. i, ii, iv

22. tags contain battery and transmit signals autonomously

Correct : A. acitve rfid

23. tags needs an external source to wake up the battery.

Correct : C. battery-assisted passive rfid

24. The three major components of RFID hardware based on functionality include :

Correct : D. all of the above

25. Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor

Correct : A. i, ii, iii

26. Even with two-factor authentication, users may still be vulnerable to attacks.

Correct : C. man-in-the-middle

27. Process of identifying any individual

Correct : C. authentication

28. Process that prevents someone from denying that she accessed resource

Correct : B. non-repudiation

29. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

Correct : D. all of the above

30. Which of the following is not a correct way to secure communication layer

Correct : A. cloud initiated communication

31. Which of the following is not the component of IoT Endpoint

Correct : B. gateway

32. Which of the following makes sure that data is not changed when it not supposed to be?

Correct : A. integrity

33. Which of the following terms indicates that information is to be read only by those people for whom it is intended?

Correct : D. confidentiality

34. What is the full form of SCADA?

Correct : B. supervisory control and data acquisition

35. DCS is a

Correct : A. distributed control system

36. What is SCADA?

Correct : B. process

37. The control in SCADA is

Correct : C. supervisory control

38. When did the SCADA start?

Correct : B. 1990s

39. Which of the following is not the component of a SCADA system?

Correct : D. sparger controller

40. Which of the following is the heart of a SCADA system?

Correct : D. i/o task

41. RFID stands for?

Correct : B. radio frequencyidentification

42. Which of the following is not involved in working of IoT?

Correct : D. server

43. M2M is a term introduced by

Correct : C. telecommunication service providers

44. Which of these statements regarding sensors is TRUE?

Correct : D. all of these

45. Smart Dust can be used to measure the

Correct : C. chemical in the soil

46. In threat modeling, what methodology used to perform risk analysis

Correct : A. dread

47. Out of the following which is not element of threat modelling

Correct : D. time

48. Request field is present in which message format?

Correct : A. request message

49. CoAP is specialized for

Correct : A. internet applications

50. Which layer is CoAP?

Correct : C. service layer

51. CoAP provides which of the following requirements?

Correct : D. multicast support, low over head, and simplicity

52. CoAP is a specialized protocol.

Correct : A. web transfer

53. URI and content type support is which protocol feature?

Correct : C. coap

54. What is the full form of WLAN?

Correct : B. wireless local area network

55. Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

Correct : C. ieee 802.11

56. Which of the following is not a characteristic of a ZigBee network?

Correct : C. high data rates.

57. Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

Correct : D. ieee 802.15.4.

58. Which of the following layers are defined by the ZigBee stack?

Correct : D. medium access layer

59. What is the typical range of transmission distance in a ZigBee network?

Correct : B. 50 m.

60. _ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Correct : D. cross-site scripting

61. Representational State Transfer (REST) is the standard interface between

Correct : C. http client and servers

62. Which of the following is not a messaging mode in CoAP?

Correct : C. direct

63. Which of the following is the full form of XMPP?

Correct : B. extensible messaging and presence protocol

64. In 6LoWPAN address, how many bits are globally unique?

Correct : C. 64 bits

65. IEEE 802.15.4 uses which of the following for accessing the channel?

Correct : C. carrier sense multiple access with collision avoidance (csma-ca)

66. Three parts of GPS include:

Correct : D. all of the above

67. In case of , the GPS works as a receiver, not a transmitter.

Correct : B. passive tracking

68. is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

Correct : C. cyber-physical system

69. The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

Correct : A. node degree

70. is the degree to which nodes have a common set of connections to other nodes

Correct : C. structural cohesion

71. The degree to which actors are directly linked to one another through cohesive bonds is called as .

Correct : B. cohesion

72. The social circles are loosely coupled if there is                   stringency of direct contact.

Correct : A. less

73. The measures of centrality include:

Correct : D. all of the above

74. Arrange the stages in supply chain management: i. Material and Equipment Supplies ii. Delivery of Products iii. After Sale Service and Returns iv. Planning and Coordination v. Manufacturing and Testing

Correct : C. iv, i, v, ii, iii

75. Nodes in the network analysis graph represent the                   and the edges represent the relationships between nodes.

Correct : D. both a and b

76. Which is the latest Operating System?

Correct : D. cloud os

77. JOES stands for

Correct : C. just enough operating system

78. Responsibility of OS developers to add new feature in existing OS are

Correct : D. all of the above

79. In future, companies wont worry about the capital for large data center because of

Correct : B. paas solution

80. is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability

Correct : A. cometcloud

81. CometCloud supports policy based autonomic      and

Correct : D. both a and b

82. Which are the three conceptual layers in CometCloud?

Correct : D. programming, service, infrastructure

83. In Comet, a tuple is a simple        string

Correct : C. xml

84. Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?

Correct : C. quality-based

85. The cloud media services are:

Correct : D. all of the above

86. KPI stands for

Correct : C. key performance indicators

87. SEEP is used in

Correct : A. energy optimization

88. SEEP stands for

Correct : C. symbolic execution and energy profiles

89. Keywords in Docker are

Correct : A. develop, ship, run anywhere

90. Docker can simplify both,          and

Correct : C. workflows, communication

91. Basic approach of Docker as a company is:

Correct : A. “batteries included but removable”

92. Which containers are used by Docker severs?

Correct : C. linux

93. Two main components in Docker are:

Correct : B. client, server

94. Docker is generally configured to use TCP port          while executing unencrypted traffic

Correct : C. 2375

95. Docker is generally configured to use TCP port          while managing encrypted traffic.

Correct : D. 2376

96. Containers require less disk space as compared to virtual machine

Correct : A. true

97. There is no built-in framework in Docker for testing.

Correct : A. true

98. Docker provides simple one-line deployment strategy.

Correct : A. true

99. The examples of deployment tools are:

Correct : D. all of the above

100. CNS stands for

Correct : A. consumption near sweet-spot