R4RIN
Articles
Java 8
MCQS
Cloud Computing MCQ Quiz Hub
Cloud Computing Mcq Set 5
Choose a topic to test your knowledge and improve your Cloud Computing skills
1. Amazon Web Services falls into which of the following cloud-computingcategory?
platform as a service
software as a service
infrastructure as aservice
back-end as a service
2. Which of the following should be used considering factors shown in thefigure?
simpledb
rds
amazon ec2
All of the mentioned
3. Point out the wrong statement.
amazon machine instances are sized at various levels and rented on a computing/hour basis
the metrics obtained by cloudwatch may be used to enable a feature called auto scaling
a number of tools are used to support ec2 services
None of the mentioned
4. Which of the following metrics are used to support Elastic Load Balancing?
cloudwatch
amazon elastic blockstore
aws import/export
All of the mentioned
5. AMIs are operating systems running on the virtualization hypervisor.
yen
xen
ben
multi-factorauthentication
6. Which of the following operation retrieves the newest version of the object?
put
get
post
copy
7. Which of the following is relational database service provided by Amazon?
simpledb
sql server
oracle
rds
8. Which of the following can be considered as a distributed caching system?
cnd
cdn
cwd
All of the mentioned
9. Cloud system from SGI is functionally considered as an
on-demand cloudcomputing service
on-demand cloudstorage service
on-demand cloudaccessing service
on-demand
10. NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
nebula cloud
cyclone cloud
force.com cloud
cern cloud
11. The Data-Intensive Scalable Computing(DISC) utilizes a data-centerclusters to gather and maintain data.
htc
hpc
hcc
hac
12. Process that prevents someone from denying that she accessed resource
accounting
non-repudiation
sniffing
authorisation
13. Which of the following is not a correct way to secure communication layer
cloud initiated communication
tls/ssl
ips(intrusion prevention system)
firewalls
14. What is SCADA?
software
process
system
hardware
15. When did the SCADA start?
1980s
1990s
1970s
1960s
16. Which of the following is the heart of a SCADA system?
plc
hmi
alarm task
i/o task
17. Which of the following is not involved in working of IoT?
rfid
sensor
nano tech
server
18. Which of these statements regarding sensors is TRUE?
sensors are input devices.
sensors can be analog as well as digital
sensors respond to some external stimuli.
All of the above
19. Out of the following which is not element of threat modelling
asset
vulnerability
threat
time
20. CoAP is specialized for
A. internet applications
device applications
wireless applications
wired applications
21. CoAP is a specialized protocol.
web transfer
power
application
resource
22. URI and content type support is which protocol feature?
http
udp
coap
spi
23. What is the full form of WLAN?
wide local areanetwork
wireless local areanetwork
wireless land accessnetwork
wireless local areanode
24. Which of the following is not a characteristic of a ZigBee network?
low powerconsumption
easy installation.
high data rates
unlicensed radiobands
25. Which of the following layers are defined by the ZigBee stack?
transport layer
physical layer
application supportsub-layer.
medium access layer
26. What is the typical range of transmission distance in a ZigBee network? A. 5 m. B. C. D.
5 m.
50 m.
500 m.
5 km
27. Representational State Transfer (REST) is the standard interface between
two machines in alan
http client and user
http client andservers
None of the above
28. Which of the following is not a messaging mode in CoAP?
confirmable
separate
direct
piggyback
29. Which of the following is the full form of XMPP?
extension messaging and presenceprotocol
extensible messaging and presenceprotocol
extension messaging and privacy protocol
extensible messaging and privacy protocol
30. In 6LoWPAN address, how many bits are globally unique?
16 bits
32 bits
64 bits
128 bits
31. IEEE 802.15.4 uses which of the following for accessing the channel?
carrier sense multiple access (csma)
carrier sense multiple access with collision detection (csma-cd)
carrier sense multiple access with collision avoidance (csma-ca)
None of These
32. Three parts of GPS include:
space segment
control segment
user segment
All of the above
33. In case of , the GPS works as a receiver, not a transmitter.
active tracking
passive tracking
assisted tracking
receiver tracking
34. is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system
cloud-physical system
cyber-space system
cyber-physical system
None of the above
35. The number of binding of a node to other actors of the graph in the graphrepresentation of a network is called as .
node degree
path length
social circle
bridge
36. is the degree to which nodes have a common set of connections toother nodes
structural hole
structuralequivalence
structural cohesion
none of the above
37. The degree to which actors are directly linked to one another throughcohesive bonds is called as .
closeness
cohesion
centralized
path length
38. The social circles are loosely coupled if there is stringency of direct contact.
less
more
equal
no
39. The measures of centrality include:
betweenness
closeness
degree
All of the above
40. Arrange the stages in supply chain management: i. Material and Equipment Supplies ii. Delivery of Products iii. After Sale Service and Returns iv. Planning and Coordination v. Manufacturing and Testing
iv, v, i, ii, iii
iv, i, v, iii, ii
iv, i, v, ii, iii
i, ii, iv, v, ii
41. Nodes in the network analysis graph represent the and the edges represent the relationships between nodes.
actors
nodes
users
both a and b
42. JOES stands for
joint expensive operating system
just expensive operating system
just enough operating system
joined environmental operating system
43. Responsibility of OS developers to add new feature in existing OS are
more reliability
convenience and security
compatibility
All of the above
44. In future, companies wont worry about the capital for large data center because of
saas solution
paas solution
iaas solution
none of the above
45. is an autonomic cloud engine whose basic aim is to realize a virtual component of cloud with computing capability
cometcloud
asteroidcloud
starcloud
planetcloud
46. CometCloud supports policy based autonomic and
cloudbursting
cloudbridging
none
both a and b
47. Which are the three conceptual layers in CometCloud?
development, application, physical
infrastructure, dynamic, static
transport, network, programming
programming, service, infrastructure
48. In Comet, a tuple is a simple string
java
python
xml
html
49. Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?
deadline-based
budget-based
quality-based
workload-based
50. The cloud media services are:
cloud gaming
experiencing multi-screens
image processing
all of the above
51. KPI stands for
key practices in industry
key performance index
key performance indicators
key parameters in information
52. SEEP is used in
energy optimization
multimedia
information leakage
cost reduction
53. SEEP stands for
system end to end protocol
static environmental execution process
symbolic execution and energy profiles
state execution and energy profiles
54. Keywords in Docker are
develop, ship, run anywhere
create, export
transport, cloud
user, data, privacy
55. Docker can simplify both, and
process, state
behavior, aspect
workflows, communication
all of the above
56. Basic approach of Docker as a company is:
“batteries included but removable”
batteries included but non-removable”
batteries but chargeable
“battery less execution”
57. Which containers are used by Docker severs?
windows
android
linux
mac
58. Two main components in Docker are:
master, slave
client, server
client, master
All of the above
59. . Docker is generally configured to use TCP port while executing unencrypted traffic
3306
53378
2375
2376
60. Docker is generally configured to use TCP port while managing encrypted traffic.
3306
53378
2375
2376
61. The examples of deployment tools are:
docker’s storm
new relic’s centurion
spotify’s helios
All of the above
62. The examples of deployment tools are:
docker’s storm
new relic’s centurion
spotify’s helios
All of the above
63. CNS stands for
consumption near sweet-spot
continuous network system
compact neural system
compound near sweet-sp0t
64. systems used to track and identify the location of objects in real time
geolocation
geographical information system (gis)
wireless application protocol (wap)
real-time location system (rtls)
65. gateway to the Internet optimized for mobility
voice portal
wimax
mobile enterprise
mobile portal
66. automatically identifying a Web user's location
voice portal
geolocation
sensor network
wimax
67. Computing capabilities embedded into objects around us (mobile and stationary)
pervasive computing
ubiquitous computing (ubicom)
context-aware computing
geolocation
68. Computing capabilities embedded in the environment but typically not mobile
mobile portal
pervasive computing
context-aware computing
voice portal
69. Vehicle mount solutions • Handheld solutions • Hands-free and voice solutions
mobile enterprise
wireless wide area network (wwan)
typical mobile devices used in warehouses
interactive voice response (ivr)
70. A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
voice portal
mobile portal
geolocation
sensor network
71. short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers
network-based positioning
real-time location system (rtls)
radio frequency identification (rfid)
wireless wide area network (wwan)
72. a technology that offers Internet browsing from wireless devices
real-time location system (rtls)
wireless wide area network (wwan)
wireless local area network (wlan)
wireless application protocol (wap)
73. The output of the reduce task is typically written to the FileSystem via
outputcollector.collect
outputcollector.get
outputcollector.receive
outputcollector.put
74. Which type of Hypervisor is shown in the following figure?
type 1
type 2
type 3
All of the mentioned
75. Point out the wrong statement.
load balancing virtualizes systems and resources by mapping a logical address to a physical address
multiple instances of various google applications are running on different hosts
google uses hardware virtualization
all of the mentioned
76. Which of the following provide system resource access to virtual machines?
vmm
vmc
vnm
None of the mentioned
77. An operating system running on a Type VM is full virtualization.
1
2
3
None of the mentioned
78. Which of the following is Type 2 VM?
virtuallogix vlx
vmware esx
xen
lynxsecure
79. Which of the following will be the host operating system for Windows Server?
virtuallogix vlx
microsoft hyper-v
xen
All of the mentioned
80. Which of the following should be placed in second lowermost layer for the following figure?
host operating system
software
vm
None of the mentioned
81. Point out the correct statement.
with paas, the goal is to create hosted scalable applications that are used in a software as a service model
applications built using paas tools need to be standards-based
in wolf, the data and transaction management conforms to the business rules you create
All of the mentioned
82. Based on PageRank algorithm, Google returns for a query that is parsed for its keywords.
sep
sap
serp
business objects build
83. Point out the wrong statement.
wolf frameworks uses a c# engine and supports both microsoft sql server and mysql database
applications built in wolf are 50-percent browser-based and support mashable and multisource overlaid content
google applications are cloud-based applications
None of the mentioned
84. Which of the following is not provided by “Deep Web”?
database generated web pages
private or limited access web pages
pages without links
All of the mentioned
85. Dynamic content presented in Google crawling isn’t normally indexed.
ajax
java
javascript
All of the mentioned
Submit