Cloud Computing MCQ Quiz Set 11

cloud computing mcq

Question 1. Which layer is CoAP? 

(A) Control layer

(B) Transport layer

(C) Service layer

(D) Application layer

View Answer
(C) Service layer  

Question 2. CoAP is a specialized _________ protocol.

(A) Web Transfer

(B) Power

(C) Application

(D) Resource

View Answer
(A) Web Transfer 

Question 3. CoAP provides which of the following requirements?

(A) Multicast support and simplicity

(B) Low overhead and multicast support

(C) Simplicity and low overhead

(D) Multicast support, Low over head, and simplicity

View Answer
(D) Multicast support, Low over head, and simplicity

Question 4. What is the full form of WLAN?

(A) Wide Local Area Network

(B) Wireless Local Area Network

(C) Wireless Land Access Network

(D) Wireless Local Area Node

View Answer
(B) Wireless Local Area Network 

Question 5. URI and content type support is which protocol feature? 

(A) Http


(C) CoAP


View Answer
(C) CoAP 

Question 6. Which of the following is not a characteristic of a ZigBee network? 

(A) Low power consumption

(B) Easy installation

(C) High data rates

(D) Unlicensed radio bands

View Answer
(C) High data rates 

Question 7. Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

(A) IEEE 802.16

(B) IEEE 802.3

(C) IEEE 802.11

(D) IEEE 802.15

View Answer
(C) IEEE 802.11

Question 8. Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

(A) IEEE 802.11.

(B) IEEE 802.15.1

(C) IEEE 802.15.3

(D) IEEE 802.15.4.

View Answer
(D) IEEE 802.15.4. 

Question 9. What is the typical range of transmission distance in a ZigBee network?

(A) 5 m.

(B) 50 m.

(C) 500 m.

(D) 5 km

View Answer
(B) 50 m. 

Question 10. Which of the following layers are defined by the ZigBee stack?

(A) Transport layer

(B) Physical layer

(C) Application Support sub-layer.

(D) Medium Access layer

View Answer
(D) Medium Access layer

Question 11. Representational State Transfer (REST) is the standard interface between?

(A) Two machines in a LAN

(B) HTTP client and user

(C) HTTP client and servers

(D) None of the above

View Answer
(C) HTTP client and servers

Question 12. Which of the following is the full form of XMPP? 

(A) Extension Messaging and Presence Protocol

(B) Extensible Messaging and Presence Protocol

(C) Extension Messaging and Privacy Protocol

(D) Extensible Messaging and Privacy Protocol

View Answer
(B) Extensible Messaging and Presence Protocol

Question 13. _____ is an attack that forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. 

(A) Cross-site scoring scripting

(B) Cross-site request forgery

(C) Two-factor authentication

(D) Cross-site scripting

View Answer
(D) Cross-site scripting 

Question 14. Which of the following is not a messaging mode in CoAP? 

(A) Confirmable

(B) Separate

(C) Direct

(D) Piggyback

View Answer
(C) Direct 

Question 15. IEEE 802.15.4 uses which of the following for accessing the channel?

(A) Carrier sense multiple access (CSMA)

(B) Carrier sense multiple access with collision detection (CSMA-CD)

(C) Carrier sense multiple access with collision avoidance (CSMA-CA)

(D) None of these

View Answer
(C) Carrier sense multiple access with collision avoidance (CSMA-CA) 

Question 16. The social circles are loosely coupled if there is ________ stringency of direct contact.

(A) Less

(B) More

(C) Equal

(D) No

View Answer
(A) Less

Question 17. In 6LoWPAN address, how many bits are globally unique? 

(A) 16 bits

(B) 32 bits

(C) 64 bits

(D) 128 bits

View Answer
(C) 64 bits 

Question 18. In case of ________, the GPS works as a receiver, not a transmitter.

(A) Active tracking

(B) Passive tracking

(C) Assisted tracking

(D) Receiver tracking

View Answer
(B) Passive tracking 

Question 19. Three parts of GPS include _________.

(A) Space segment

(B) Control segment

(C) User segment

(D) All of the above

View Answer
(D) All of the above 

Question 20. CoAP is specialized for __________.

(A) Internet applications

(B) Device applications

(C) Wireless applications

(D) Wired applications

View Answer
(A) Internet applications 

Question 21. The number of binding of a node to other actors of the graph in the graprepresentation of a network is called as ________.

(A) Node degree

(B) Path length

(C) Social circle

(D) Bridge

View Answer
(A) Node degree 

Question 22. ________ is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system.

(A) Cloud-Physical System

(B) Cyber-Space System

(C) Cyber-Physical System

(D) None of the above

View Answer
(C) Cyber-Physical System 

Question 23. ________ is the degree to which nodes have a common set of connections to other nodes.

(A) Structural hole

(B) Structural equivalence

(C) Structural cohesion

(D) None of the abov

View Answer
(C) Structural cohesion 

Question 24. The degree to which actors are directly linked to one another through cohesive bonds is called as ________.

(A) Closeness

(B) Cohesion

(C) Centralized

(D) Path length

View Answer
(B) Cohesion

Question 25. Request field is present in which message format?

(A) Request message

(B) Response message

(C) Both request and response

(D) Neither request nor response

View Answer
(A) Request message