Cloud Computing Set 10
On This Page
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 10
Q1 | Even with two-factor authentication, users may still be vulnerableto attacks.
- scripting
- cross attack
- man-in-the-middle
- radiant
Q2 | Process of identifying any individual
- auditing
- authorisation
- authentication
- accounting
Q3 | Process that prevents someone from denying that she accessed resource
- accounting
- non-repudiation
- sniffing
- authorisation
Q4 | What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
- making infrastructure vulnerable to malware
- potential for noncompliance
- data loss
- all of the above
Q5 | Which of the following is not a correct way to secure communication layer
- cloud initiated communication
- tls/ssl
- ips(intrusion prevention system)
- firewalls
Q6 | Which of the following is not the component of IoT Endpoint
- sensor
- gateway
- communicationmodule
- mcu
Q7 | Which of the following makes sure that data is not changed when it notsupposed to be?
- integrity
- availability
- confidentiality
- accounting
Q8 | Which of the following terms indicates that information is to be read only bythose people for whom it is intended?
- availability
- accounting
- integrity
- confidentiality
Q9 | What is the full form of SCADA?
- supervisory control and document acquisition
- supervisory control and data acquisition
- supervisory column and data assessment
- supervisory column and data assessment
Q10 | DCS is a
- distributed controlsystem
- data control system
- data column system
- distributed columnsystem
Q11 | What is SCADA?
- software
- process
- system
- hardware
Q12 | The control in SCADA is
- online control
- direct control
- supervisory control
- automatic control
Q13 | When did the SCADA start?
- 1980s
- 1990s
- 1970s
- 1960s
Q14 | Which of the following is not the component of a SCADA system?
- database server
- i/o system
- plc controller
- sparger controller
Q15 | Which of the following is the heart of a SCADA system?
- plc
- hmi
- alarm task
- i/o task
Q16 | RFID stands for?
- random frequencyidentification
- radio frequencyidentification
- random frequencyinformation
- radio frequencyinformation
Q17 | Which of the following is not involved in working of IoT?
- rfid
- sensor
- nano tech
- server
Q18 | M2M is a term introduced by
- iot service providers
- fog computingservice providers
- telecommunicationservice providers
- none of these
Q19 | Which of these statements regarding sensors is TRUE?
- sensors are input devices.
- sensors can be analog as well as digital
- sensors respond to some external stimuli.
- all of these
Q20 | Smart Dust can be used to measure the
- temperature of theindustrial lathe machine
- heat inside a computer’s cpu
- chemical in the soil
- strength of a solid material
Q21 | In threat modeling, what methodology used to perform risk analysis
- dread
- owasp
- stride
- dar
Q22 | Out of the following which is not element of threat modelling
- asset
- vulnerability
- threat
- time
Q23 | Request field is present in which message format?
- request message
- response message
- both request andresponse
- neither request norresponse
Q24 | CoAP is specialized for
- internet applications
- device applications
- wireless applications
- wired applications
Q25 | Which layer is CoAP?
- control layer
- transport layer
- service layer
- application layer