On This Page

This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on Cloud Computing Set 44

Q1 | ________ tags needs an external source to wake up the battery.
  • Acitve RFID
  • Passive RFID
  • Battery-assisted passive RFID
  • Battery-assisted active RFID
Q2 | The three major components of RFID hardware based on functionality include :
  • RFID Reader
  • Reader Antenna
  • Reader
  • All of the above
Q3 | Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor
  • i, ii, iii
  • i, ii, iii, iv
  • ii, iii, iv
  • i, ii, iv
Q4 | Even with two-factor authentication, users may still be vulnerable to_____________attacks.
  • Scripting
  • Cross attack
  • Man-in-the-middle
  • Radiant
Q5 | What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?
  • Making infrastructure vulnerable to malware
  • Potential for noncompliance
  • Data Loss
  • All of the above
Q6 | Which of the following terms indicates that information is to be read only by those people for whom it is intended?
  • Availability
  • Accounting
  • Integrity
  • Confidentiality
Q7 | What is the full form of SCADA?
  • Supervisory Control and Document Acquisition
  • Supervisory Control and Data Acquisition
  • Supervisory Column and Data Assessment
  • Supervisory Column and Data Assessment
Q8 | DCS is a ________
  • Distributed Control System
  • Data Control System
  • Data Column System
  • Distributed Column System
Q9 | What is SCADA?
  • Software
  • Process
  • System
  • Hardware
Q10 | Which of the following is not the component of a SCADA system?
  • Database server
  • I/O system
  • PLC controller
  • Sparger controller
Q11 | Which of the following is not involved in working of IoT?
  • RFID
  • Sensor
  • Nano tech
  • Server
Q12 | M2M is a term introduced by
  • IoT service providers
  • Fog computing service providers
  • Telecommunication service providers
  • None of these
Q13 | Which of these statements regarding sensors is TRUE?
  • Sensors are input devices.
  • Sensors can be analog as well as digital
  • Sensors respond to some external stimuli.
  • All of these
Q14 | Smart Dust can be used to measure the
  • Temperature of the industrial lathe machine
  • Heat inside a computer’s CPU
  • Chemical in the soil
  • Strength of a solid material
Q15 | Request field is present in which message format?
  • Request message
  • Response message
  • Both request and response
  • Neither request nor response
Q16 | CoAP provides which of the following requirements?
  • Multicast support and simplicity
  • Low overhead and multicast support
  • Simplicity and low overhead
  • Multicast support, Low over head, and simplicity
Q17 | CoAP is a specialized _________ protocol.
  • Web Transfer
  • Power
  • Application
  • Resource
Q18 | Which of the following IEEE standards provides the lowest level of the ZigBee software stack?
  • IEEE 802.11.
  • IEEE 802.15.1.
  • IEEE 802.15.3.
  • IEEE 802.15.4.
Q19 | Which of the following layers are defined by the ZigBee stack?
  • Transport layer
  • Physical layer.
  • Application Support sub-layer.
  • Medium Access layer
Q20 | _ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
  • Cross-site scoring scripting
  • Cross-site request forgery
  • Two-factor authentication
  • Cross-site scripting
Q21 | Representational State Transfer (REST) is the standard interface between
  • Two machines in a LAN
  • HTTP client and user
  • HTTP client and servers
  • None of the above
Q22 | Which of the following is not a messaging mode in CoAP?
  • Confirmable
  • Separate
  • Direct
  • Piggyback
Q23 | Which of the following is the full form of XMPP?
  • Extension Messaging and Presence Protocol
  • Extensible Messaging and Presence Protocol
  • Extension Messaging and Privacy Protocol
  • Extensible Messaging and Privacy Protocol
Q24 | In 6LoWPAN address, how many bits are globally unique?
  • 16 bits
  • 32 bits
  • 64 bits
  • 128 bits
Q25 | IEEE 802.15.4 uses which of the following for accessing the channel?
  • Carrier sense multiple access (CSMA)
  • Carrier sense multiple access with collision detection (CSMA‐CD)
  • Carrier sense multiple access with collision avoidance (CSMA‐CA)
  • None of these