On This Page

This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 10

Q1 | Even with two-factor authentication, users may still be vulnerableto attacks.
  • scripting
  • cross attack
  • man-in-the-middle
  • radiant
Q2 | Process of identifying any individual
  • auditing
  • authorisation
  • authentication
  • accounting
Q3 | Process that prevents someone from denying that she accessed resource
  • accounting
  • non-repudiation
  • sniffing
  • authorisation
Q4 | What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
  • making infrastructure vulnerable to malware
  • potential for noncompliance
  • data loss
  • all of the above
Q5 | Which of the following is not a correct way to secure communication layer
  • cloud initiated communication
  • tls/ssl
  • ips(intrusion prevention system)
  • firewalls
Q6 | Which of the following is not the component of IoT Endpoint
  • sensor
  • gateway
  • communicationmodule
  • mcu
Q7 | Which of the following makes sure that data is not changed when it notsupposed to be?
  • integrity
  • availability
  • confidentiality
  • accounting
Q8 | Which of the following terms indicates that information is to be read only bythose people for whom it is intended?
  • availability
  • accounting
  • integrity
  • confidentiality
Q9 | What is the full form of SCADA?
  • supervisory control and document acquisition
  • supervisory control and data acquisition
  • supervisory column and data assessment
  • supervisory column and data assessment
Q10 | DCS is a                  
  • distributed controlsystem
  • data control system
  • data column system
  • distributed columnsystem
Q11 | What is SCADA?
  • software
  • process
  • system
  • hardware
Q12 | The control in SCADA is
  • online control
  • direct control
  • supervisory control
  • automatic control
Q13 | When did the SCADA start?
  • 1980s
  • 1990s
  • 1970s
  • 1960s
Q14 | Which of the following is not the component of a SCADA system?
  • database server
  • i/o system
  • plc controller
  • sparger controller
Q15 | Which of the following is the heart of a SCADA system?
  • plc
  • hmi
  • alarm task
  • i/o task
Q16 | RFID stands for?
  • random frequencyidentification
  • radio frequencyidentification
  • random frequencyinformation
  • radio frequencyinformation
Q17 | Which of the following is not involved in working of IoT?
  • rfid
  • sensor
  • nano tech
  • server
Q18 | M2M is a term introduced by
  • iot service providers
  • fog computingservice providers
  • telecommunicationservice providers
  • none of these
Q19 | Which of these statements regarding sensors is TRUE?
  • sensors are input devices.
  • sensors can be analog as well as digital
  • sensors respond to some external stimuli.
  • all of these
Q20 | Smart Dust can be used to measure the
  • temperature of theindustrial lathe machine
  • heat inside a computer’s cpu
  • chemical in the soil
  • strength of a solid material
Q21 | In threat modeling, what methodology used to perform risk analysis
  • dread
  • owasp
  • stride
  • dar
Q22 | Out of the following which is not element of threat modelling
  • asset
  • vulnerability
  • threat
  • time
Q23 | Request field is present in which message format?
  • request message
  • response message
  • both request andresponse
  • neither request norresponse
Q24 | CoAP is specialized for
  • internet applications
  • device applications
  • wireless applications
  • wired applications
Q25 | Which layer is CoAP?
  • control layer
  • transport layer
  • service layer
  • application layer