Smart Grid A. B.: SI. No Questions 1. ?
Smart Grid A. B.: SI. No Questions 1. ?
Questions
No
1. Fog Computing implements in?
. Smart Grid
a. Start Traffic Light
b. Connected Vehicles
c. None of the above
2. Identify the correct statement(s) about Cloudlet?
. It increases latency by using multi-hop network
a. It consumes low battery power
b. It uses broadband wireless
c. It uses short-range radio wireless
3. Match the following tables related to MCC Key components:
Table – I Table – II
1. Profiler i. Collects results of split execution and combine, and make the
2. Solver execution details transparent to the user
3. ii. Monitors application execution to collect data about execution time,
Synchronizer power consumption, network traffic
iii. The task of selecting which parts of an app runs on mobile and
cloud
15. Which of the following is/are the challenge(s) of the Geospatial Cloud?
. Scaling of Spatial Databases
a. Policy management among the tenants
b. Implementation of Spatial Databases
c. None of the above
16. Which of the following is/are true about the Geospatial Cloud Model?
. It integrates data from homogeneous back-end data services
a. Data services can be inside and/or outside the cloud environment
b. Data services inside cloud can be run through SaaS service model
c. None of the above
19. _________ ensures the ability to exchange / obtain the information to be “consumed”.
. Data Level Interoperability
a. Security Level Interoperability
b. Service Level Interoperability
c. None of the above
20. Which of the following statements is false about Code offloading using cloudlet?
Statement 1: The architecture reduces latency by using multi-hop network. Statement 2: It
potentially lowers battery consumption by using short range radio.
. Statement 1 is correct but Statement 2 is incorrect
a. Statement 2 is correct but Statement 1 is incorrect
b. Both the statements are correct
c. Both the statements are incorrect
21. Docker Hub is a registry used to host various docker images.
. True
a. False
22. __________ enables different networks, spreads in a huge geographical area to connect
together and be employed simultaneously by multiple users on demand.
. Serverless
a. IoT Cloud
b. Sensor Cloud
c. Green Cloud
23. Virtual machines get virtual access to host resources through a ________
. Containers
a. Hypervisor
b. Both a and b
c. Images
24. Sensor data can be easily shared by different groups of users without any extra effort/
measure.
. True
a. False
25. Statement 1: Sensor-Cloud proxy exposes sensor resources as cloud services.
Statement 2: Sensor network is still managed from the Sensor-Cloud Interface via Sensor
Network Proxy
. Statement 1 is True and Statement 2 is False
a. Statement 2 is True and Statement 1 is False
b. Both statements are True
c. Both statements are False
26. For sensor resources that do not have direct connection to the cloud, sensor network proxy
provides the connection.
. True
a. False
27. What does “ps” signify as per Container terminology?
. List of all containers
a. List of all running containers
b. List of all stopped containers
c. List of all warm containers
28. Which of the following statements is/are true about Docker?
Statement 1: Docker hub is used for building docker images and creating docker
containers.
Statement 2: Docker compose is a registry used to host various docker images.
. Statement 1 is correct but Statement 2 is incorrect
a. Statement 2 is correct but Statement 1 is incorrect
b. Both the statements are correct
c. Both the statements are incorrect.
29. Choose the most appropriate option.
Statement 1: An image is a lightweight, stand-alone, executable package that includes
everything to run a piece of software.
Statement 2:Container is a run time instance of an image.
. Statement 1 is correct but Statement 2 is incorrect
a. Statement 2 is correct but Statement 1 is incorrect
b. Both the statements are correct
c. Both the statements are incorrect.
30. An IoT platform’s basic building blocks is/ are (choose the correct option(s)).
. Gateway
a. Images
b. Network and Cloud
c. Containers
31. Virtual machines take up less space than Containers
. True
a. False
32. In IoT based vehicular data clouds, vehicles providing their networking and data
processing capabilities to other vehicles through the cloud is best identified with which of
the following services?
. SaaS
a. PaaS
b. IaaS
c. BaaS
33. Each container can not run as an isolated process in user space.
. True
a. False
35. In the context of Green Cloud Computing, the Power Usage Effectiveness is defined as
. Power Delivered/Overall Power
a. Overall Power/ Power Delivered
b. Overall Power * Power Delivered
c. None of these
36. --- runs completely isolated from the host environment by default, only accessing host
files and ports if configured to do so.
. Image
a. Container
b. Compose
c. None of these
37. --- is a lightweight, stand-alone, executable package that includes everything needed to run
a piece of software, including the code, a runtime, libraries, environment variables etc.
. Container
a. Hypervisor
b. Image
c. None of these
38. Docker rmi is used to delete a local ----
. image
a. container
b. volume
c. node
39. A green broker can perform scheduling of applications to reduce energy consumption.
. True
a. False
40. For sensor resources that do not have direct connection to the cloud, sensor network proxy
provides the connection.
. True
a. False
41. --- is a formal contract between a service provider and a service consumer.
. SLA
a. SLO
b. KPI
c. Utility Premium
42. When load increases, VM management can be done by
. Schedule new VMs to new nodes
a. Shutdown unused nodes
b. All of these
c. None of these
43. ---- is determining when an activity should start or end, depending on its
duration, predecessor activities etc.
. Resource estimation
a. Resource brokering
b. Resource scheduling
c. None of the above
53. Average resource demand is 45 units,Baseline (owned) unit cost is 200 units,Time is 10
hours,Peak
resource demand is 100 units. If the cloud is cheaper than owning of computer
infrastructures, the
utility premium is
. Greater than 2.22
a. Less than 2.22
b. Atleast 4.45
c. Atmost 4.45
54. The ________ takes a series of key/value pairs, processes each, and generates zero or
more output.
. map function
a. partition function
b. reduce function
c. None of these
55. Which among the following is/are logical resource(s)?
. Network
a. Computer
b. Database
c. Execution
56. When load decreases, VM management can be done by
. Live migrate VMs to more utilized nodes
a. Shutdown unused nodes
b. Migrate VMs to less utilized nodes
c. None of these
57. Multiple KPIs are aggregated to SLA.
. TRUE
a. FALSE
59. A third party application runs in the cloud for 12 hours/day. At the end of one month [30
days], it was found that the cloud service suffered 5 outages of durations: 1 hour 30
minutes, 30 minutes, 2 hours 15 minutes, 1 hour 45 minutes and T hours, each on different
days over the service period.
Suppose a cloud guarantees service availability for 97% of time. What are the possible
value(s) of T that SLA negotiation gets honored in terms of service availability?
. 3 hours
a. 6 hours
b. 12 hours
c. 8 hours
60. Which of the following is/are the objective(s) of Resource Management?
. Improved Quality of Service (QoS)
a. Scalability
b. Increased overhead
c. Increased throughput
61. Which of the following is/ are the goal(s) of security?
. Detect attackers’ violation of security policy
a. Continue to function correctly even if attack succeeds
b. Stop attack, assess and repair damage
c. None of the above
62. Statement I: Release of message contents means that the opponent can determine the
location and
identity of communicating hosts, and observe the frequency and length of messages being
exchanged
Statement II: Traffic analysis is desirable to prevent the opponent from learning the
contents of
the transmission.
Which of the options are correct?
. Statement I is TRUE and Statement II is FALSE
a. Statement II is TRUE and Statement I is FALSE
b. Both are TRUE
c. Both are FALSE
63. In full-virtualization, VMs run on hypervisor that interacts with the hardware
. True
a. False
64. Choose the option(s) which is/are not a passive attack?
. Traffic Analysis
a. Release of message contents
b. Denial of service
c. Replay
65. Which of the following is/are example(s) of passive attack?
. Replay
a. Denial of service
b. Traffic analysis
c. Masquerade
66. Interception is an attack on integrity
. TRUE
a. FALSE
67. Which of the folloWing Open-source tools is/are used for retrieving web pages in Amazon
EC2
platform?
. Wget
a. hping
b. ifconfig
c. nmap
68. In a cyber-attack, if one entity is pretending to be another one, then it is called.
. Denial of Service
a. Replay
b. Masquerade
c. Modification
69. Interception is an attack on:
. Integrity
a. Availability
b. Confidentiality
c. Authenticity
70. In full virtualization, VMs interact with the host OS.
. True
a. False
71. When selecting the most suitable cloud provider satisfying customer’s QoS requirements
using a
fuzzy inference engine, if the “Degree of SLA Satisfaction” is greater than the “Threshold
for a
cloud service provider”, the customer should migrate to a different provider.
. True
a. False
72. Which of the following Open-source tools is/are used to perform TCP connect probes in
Amazon
EC2 platform?
. wget
a. nmap
b. ifconfig
c. hping
73. Find the correct statement(s):
. Different types of cloud computing service models provide different levels of
security services
a. Adapting your on-premises systems to a cloud model requires that you
determine what security mechanisms are required and mapping those to controls
that exist in your chosen cloud service provider
b. Data should be transferred and stored in an encrypted format for security
purpose
c. All are incorrect statements
74. Spoofing is not an example of
. Deception
a. Disclosure
b. Usurpation
c. Disruption
75. Which of the options is/are considered as the basic components of security?
. Confidentiality
a. Integrity
b. Reliability
c. Efficiency
76. Side channel exploitation has the potential to extract RSA & AES secret keys
. True
a. False
77. Statement I: Intrusion Detection System (IDS) scans the incoming messages, and creates
alerts when suspected scans/attacks are in progress.
Statement II: Authentication is the identification of legitimate users.
(a) Attacker sending huge amounts of requests to a certain service and causing denial of
service.
(b) Browser-based security issues.
(c) Introduce malicious code to change the course of execution.
(d) Malicious reengineering of Web Services’ metadata description.