Cloud Computing MCQ Quiz Set 10

cloud computing mcq
Quiz Set12345678910111213

Question 1. When did the SCADA start?

(A) 1980s

(B) 1990s

(C) 1970s

(D) 1960s

View Answer
(B) 1990s 

Question 2. Out of the following which is not element of threat modelling?

(A) Asset

(B) Vulnerability

(C) Threat

(D) Time

View Answer
(D) Time

Question 3. The control in SCADA is ________.

(A) Online control

(B) Direct control

(C) Supervisory control

(D) Automatic control

View Answer
(C) Supervisory control

Question 4. Which of the following makes sure that data is not changed when it not supposed to be?

(A) Integrity

(B) Availability

(C) Confidentiality

(D) Accounting

View Answer
(A) Integrity 

Question 5. Process of identifying any individual?

(A) Auditing

(B) Authorisation

(C) Authentication

(D) Accounting

View Answer
(C) Authentication 

Question 6. Which of the following is not the component of a SCADA system?

(A) Database server

(B) I/O system

(C) PLC controller

(D) Sparger controller

View Answer
(D) Sparger controller

Question 7. In threat modeling, what methodology used to perform risk analysis?

(A) DREAD

(B) OWASP

(C) STRIDE

(D) DAR

View Answer
(A) DREAD 

Question 8. What is SCADA?

(A) Software

(B) Process

(C) System

(D) Hardware

View Answer
(B) Process

Question 9. Which of the following is not the component of IoT Endpoint?

(A) Sensor

(B) Gateway

(C) Communication Module

(D) MCU

View Answer
(B) Gateway 

Question 10. Even with two-factor authentication, users may still be vulnerable to________attacks.

(A) Scripting

(B) Cross attack

(C) Man-in-the-middle

(D) Radiant

View Answer
(C) Man-in-the-middle 

Question 11. Which of the following is the heart of a SCADA system?

(A) PLC

(B) HMI

(C) Alarm task

(D) I/O task

View Answer
(D) I/O task

Question 12. Smart Dust can be used to measure the?

(A) Temperature of the industrial lathe machine

(B) Heat inside a computer’s CPU

(C) Chemical in the soil

(D) Strength of a solid material

View Answer
(C) Chemical in the soil 

Question 13. DCS is a _______.

(A) Distributed Control System

(B) Data Control System

(C) Data Column System

(D) Distributed Column System

View Answer
(A) Distributed Control System  

Question 14. Which of the following is not a correct way to secure communication layer?

(A) Cloud initiated communication

(B) TLS/SSL

(C) IPS (Intrusion Prevention System)

(D) Firewalls

View Answer
(A) Cloud initiated communication

Question 15. Types of Zigbee devices are available as follows:

  • i. ZigBee Coordinator
  • ii. ZigBee Router
  • iii. ZigBee End Device
  • iv. ZigBee Accesso

(A) i, ii, iii

(B) i, ii, iii, iv

(C) ii, iii, iv

(D) i, ii, iv

View Answer
(A) i, ii, iii 

Question 16. RFID stands for _________.

(A) Random frequency identification

(B) Radio frequency identification

(C) Random frequency information

(D) Radio frequency information

View Answer
(B) Radio frequency identification

Question 17. Which of these statements regarding sensors is TRUE?

(A) Sensors are input devices

(B) Sensors can be analog as well as digital

(C) Sensors respond to some external stimuli

(D) All of these

View Answer
(D) All of these 

Question 18. What is the full form of SCADA?

(A) Supervisory Control and Document Acquisition

(B) Supervisory Control and Data Acquisition

(C) Supervisory Column and Data Assessment

(D) Supervisory Column and Data Assessment

View Answer
(B) Supervisory Control and Data Acquisition

Question 19. What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? 

(A) Making infrastructure vulnerable to malware

(B) Potential for noncompliance

(C) Data Loss

(D) All of the above

View Answer
(D) All of the above 

Question 20. The three major components of RFID hardware based on functionality include?

(A) RFID Reader

(B) Reader Antenna

(C) Reader

(D) All of the above

View Answer
(D) All of the above 

Question 21. Which of the following is not involved in working of IoT?

(A) RFID

(B) Sensor

(C) Nano tech

(D) Server

View Answer
(D) Server 

Question 22. M2M is a term introduced by?

(A) IoT service providers

(B) Fog computing service providers

(C) Telecommunication service providers

(D) None of these

View Answer
(C) Telecommunication service providers

Question 23. Which of the following terms indicates that information is to be read only by those people for whom it is intended?

(A) Availability

(B) Accounting

(C) Integrity

(D) Confidentiality

View Answer
(D) Confidentiality 

Question 24. Process that prevents someone from denying that she accessed resource?

(A) Accounting

(B) Non-repudiation

(C) Sniffing

(D) Authorisation

View Answer
(B) Non-repudiation 

Question 25. ________ tags needs an external source to wake up the battery. 

(A) Acitve RFID

(B) Passive RFID

(C) Battery-assisted passive RFID

(D) Battery-assisted active RFID

View Answer
(C) Battery-assisted passive RFID 
Quiz Set12345678910111213