Cloud Computing Solved MCQs Set 5


1. Which of the following can be considered as a distributed caching system?




D. All of the mentioned

Answer: B. CDN

2. Amazon Relational Database Service is a variant of the   which 5.1 database system.

A. Oracle


C. SQL Server

D. All of the mentioned

Answer: B. MySQL

3. What are the different types of instances?

A. General Purpose

B. Compute Optimized

C. Storage Optimized

D. All of the above

Answer: D. All of the above

4. The types of AMI provided by AWS are:

A. Instance store backed

B. EBS backed

C. Both A & B

D. None of the above

Answer: C. Both A & B

5. Storage classes available with Amazon S3 are –

A. Amazon S3 standard

B. Amazon S3 standard- infrequent access

C. Amazon Glacier

D. All of the above

Answer: D. All of the above

6. IBM’s Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as

A. Web sphere

B. Tivoli

C. Nebula

D. Altix

Answer: B. Tivoli

7. Cloud system from SGI is functionally considered as an

A. On-demand cloud computing service

B. On-demand cloud storage service

C. On-demand cloud accessing service

D. On-demand

Answer: A. On-demand cloud computing service

8. Cyclone is available in two service models as follows:

A. PaaS and IaaS

B. SaaS and PaaS

C. SaaS and IaaS

D. All of the above

Answer: C. SaaS and IaaS

9. NASA created _______ which can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

A. Nebula cloud

B. Cyclone cloud

C. cloud

D. CERN cloud

Answer: A. Nebula cloud

10. To establish scalability for the analysis of huge research data, CERN uses LSFi.e. a ______ grid and workload management solution of cloud computing platform

A. Load setting facility

B. Load sharing facility

C. Load setting faculty

D. Load assigning faculty

Answer: B. Load sharing facility

11. One of the reasons of widespread of cloud is its ability to provide resource allocation dynamically from a pool of VM resources. State True or False.

A. True

B. False

Answer: A. True

12. A mashup cloud can be designed by utilizing the Scalability of AWS andof GAE platforms

A. Accessibility

B. Mobility

C. Agility

D. Scalability

Answer: C. Agility

13. The Cloudlets have a ______ ownership unlike that of Clouds.

A. Centralized

B. Decentralized

C. Global

D. None of the above

Answer: B. Decentralized

14. The Data-Intensive Scalable Computing(DISC) utilizes which data-center clusters to gather and maintain data.





Answer: A. HTC

15. Performance metrics for HPC/HTC systems include :

A. Multitasking Scalability

B. Security index

C. Cost effectiveness

D. All of the above

Answer: D. All of the above

16. [π=n/Ttotal=n⁄[kTo+Te(n,m)]
The above equation calculates the value of which of the following?

A. Scalability

B. Throughput

C. Availability

D. Effectiveness

Answer: B. Throughput

17. What refers to an increase in the performance by the addition of moreresources along the service layers

A. Horizontal scalability

B. Vertical scalability

C. Diagonal scalability

D. None of the above

Answer: B. Vertical scalability

18. The percentage of time the system is up and running smoothly is referred as.

A. System up time

B. System scalability

C. System availability

D. System efficiency

Answer: C. System availability

19. Which is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry


B. Cloud

C. IoT


Answer: C. IoT

20. RFID stands for ______

A. Rangeable Frequency Identification

B. Radio Fragment Identification

C. Radio Frequency Identification

D. Rangeable Fragment Identification

Answer: C. Radio Frequency Identification

21. The architecture of IoT consists of different layers including which of the following? i. Application Layer ii. Sensing Layer iii. Combination Layer iv. Network Layer

A. i, ii, iv

B. i, iii, iv

C. ii, iii, iv

D. ii, iii, iv

Answer: A. i, ii, iv

22. Which tags contain battery and transmit signals autonomously

A. Active RFID

B. Passive RFID

C. Battery-assisted passive RFID

D. Battery-assisted RFID

Answer: A. Active RFID

23. Which tags needs an external source to wake up the battery.

A. Active RFID

B. Passive RFID

C. Battery-assisted passive RFID

D. Battery-assisted active RFID

Answer: C. Battery-assisted passive RFID

24. The three major components of RFID hardware based on functionality include:

A. RFID reader

B. Reader antenna

C. Reader

D. All of the above

Answer: D. All of the above

25. Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor

A. i, ii, iii

B. i, ii, iii, iv

C. ii, iii, iv

D. i, ii, iv

Answer: A. i, ii, iii

26. Even with two-factor authentication, users may still be vulnerableto attacks.

A. Scripting

B. Cross attack

C. Man-in-the-middle

D. Radiant

Answer: C. Man-in-the-middle

27. Process of identifying any individual

A. Auditing

B. Authorisation

C. Authentication

D. Accounting

Answer: C. Authentication

28. Process that prevents someone from denying that she accessed resource

A. Accounting

B. Non-repudiation

C. Sniffing

D. Authorization

Answer: B. Non-repudiation

29. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A. Making infrastructure vulnerable to malware

B. Potential for noncompliance

C. Data loss

D. All of the above

Answer: D. All of the above

30. Which of the following is not a correct way to secure communication layer

A. Cloud initiated communication


C. IPS(Intrusion Prevention System)

D. Firewalls

Answer: A. Cloud initiated communication

31. Which of the following is not the component of IoT Endpoint

A. Sensor

B. Gateway

C. Communication module


Answer: B. Gateway

32. Which of the following makes sure that data is not changed when it notsupposed to be?

A. Integrity

B. Availability

C. Confidentiality

D. Accounting

Answer: A. Integrity

33. Which of the following terms indicates that information is to be read only bythose people for whom it is intended?

A. Availability

B. Accounting

C. Integrity

D. Confidentiality

Answer: D. Confidentiality

34. What is the full form of SCADA?

A. Supervisory Control And Document Acquisition

B. Supervisory Control And Data Acquisition

C. Supervisory Column And Data Assessment

D. Supervisory Column And Data Assessment

Answer: B. Supervisory Control And Data Acquisition

35. DCS is a                  

A. Distributed Control System

B. Data Control System

C. Data Column System

D. Distributed Column System

Answer: A. Distributed Control System

36. What is SCADA?

A. Software

B. Process

C. System

D. Hardware

Answer: B. Process

37. The control in SCADA is

A. Online control

B. Direct control

C. Supervisory control

D. Automatic control

Answer: C. Supervisory control

38. When did the SCADA start?

A. 1980s

B. 1990s

C. 1970s

D. 1960s

Answer: B. 1990s

39. Which of the following is not the component of a SCADA system?

A. Database server

B. I/O system

C. PLC controller

D. Sparger controller

Answer: D. Sparger controller

40. Which of the following is the heart of a SCADA system?



C. Alarm task

D. I/O task

Answer: D. I/O task

41. RFID stands for?

A. Random Frequency Identification

B. Radio Frequency Identification

C. Random Frequency Information

D. Radio Frequency Information

Answer: B. Radio Frequency Identification

42. Which of the following is not involved in working of IoT?


B. Sensor

C. Nanotech

D. Server

Answer: D. Server

43. M2M is a term introduced by

A. IoT service providers

B. Fog computing service providers

C. Telecommunication service providers

D. None of these

Answer: C. Telecommunication service providers

44. Which of these statements regarding sensors is TRUE?

A. Sensors are input devices.

B. Sensors can be analog as well as digital

C. Sensors respond to some external stimuli.

D. All of these

Answer: D. All of these

45. Smart Dust can be used to measure the

A. Temperature of the industrial lathe machine

B. Heat inside a computer’s CPU

C. Chemical in the soil

D. Strength of a solid material

Answer: C. Chemical in the soil

46. In threat modeling, what methodology used to perform risk analysis

A. Dread

B. Owasp

C. Stride

D. Dar

Answer: A. Dread

47. Out of the following which is not element of threat modelling

A. Asset

B. Vulnerability

C. Threat

D. Time

Answer: D. Time

48. Request field is present in which message format?

A. Request message

B. Response message

C. Both request and response

D. Neither request nor response

Answer: A. Request message

49. CoAP is specialized for

A. Internet applications

B. Device applications

C. Wireless applications

D. Wired applications

Answer: A. Internet applications

50. Which layer is CoAP?

A. Control layer

B. Transport layer

C. Service layer

D. Application layer

Answer: C. Service layer