Introduction to Internet of Things

  • 1. What is Sensor Openflow?a. A traditional routing protocol
    b. A queue management protocol
    c. An SDN protocol tailored for IoT devices
    d. A physical connectivity protocol.
  • Answer :- C2.

  • With respect to Mobi-Flow, how does Mobi-Flow fare in comparison to Conventional networking in terms of message overhead?a. Mobi-Flow > Conventional
    b. Mobi-Flow < Conventional
    c. Mobi-Flow = Conventional
    d. None of the given
  • Answer :- B

  • 3. Virtual Machines came before Cloud Computing.a. True
    b. False
  • Answer :- A

  • 4. Private cloud services cannot provide Software-as-a-Service (SaaS).a. True
    b. False
  • Answer :- B

  • 5. Which among the following is a solution for mobility-aware flow rule placement in SDIoT?a. Mobility-Flow
    b. Mobile-Flow
    c. Mobi-Flow
    d. M-Flow
  • Answer :- C

  • 6. An organization A wants to deploy a cloud infrastructure, whereby it wants to push majority of the data to a cloud whose servers can be situated anywhere within the globe, but it wants certain private data to be pushed only to cloud servers that are present on-premise and are accessible by only authenticated members of the organization. In this context which among the following deployment model should be used?a. Private Cloud
    b. Public Cloud
    c. Hybrid Cloud
    d. Any of these
  • Answer :- C

  • 7. Which among the following is the most on-premise cloud deployment model?a. Private Cloud
    b. Public cloud
    c. IaaS
    d. PaaS
  • Answer :- A
  • 8. Which of the following type of client requires constant communication/connection with the cloud server?a. Thin client
    b. Thick client
    c. Both thin and thick clients
    d. None of these
  • Answer :- A

  • 9. What does ‘CIA’ in cloud data security stand for?a. Confidentiality, Integrity, Availability
    b. Confidentiality, Inheritance, Automation
    c. Congestion, Integrity, Authentication
    d. Criticality, Integrity, Accountability
  • Answer :- A

  • 10. When you are accessing Spotify online for listening to music from your browser without specifically installing them, which among the following cloud service models is the most appropriate one that you are using.a. SaaS
    b. PaaS
    c. IaaS
    d. DaaS
  • Answer :- A

  • 11. With respect to Cloud Computing security, which of the following are necessarya. Network Level Security but not Host Level Security
    b. Application Level Security but not Host Level Security
    c. Host Level Security but not Network Level Security
    d. All of Network, Host and Application Level Security.
  • Answer :- D
  • 12. Data security and client authentication is an issue in which of the following cloud service models?a. SaaS
    b. SaaS and PaaS
    c. IaaS
    d. All of them
  • Answer :- D

  • 13. What is the role of a Hypervisor (most probable answer)?a. To facilitate installation of a router
    b. To provide a platform for executing virtual machines
    c. To facilitate sensor fabrication
    d. To communicate between switches themselves.
  • Answer :- B

  • 14. Which of the following is a limitation of SaaS?a. Remote software execution
    b. Platform independence
    c. Centralized control
    d. None of these.
  • Answer :- C
  • 15. Fill in the blank.____________ means independent of device or location.a. Scalable
    b. Reliability
    c. Agile
    d. Ubiquitous
  • Answer :- D

Share:

Categories

Archives

You May Also Like

1) Identify the cost estimation of a query evaluation plan, if 9000 blocks are required to be transferred from the...
Week 8 Answers 1. Work-family conflict is a form of inter-role conflict. Is the statement true? (a) True(b) False Answer...
Week 8 Answers 1) In the context of hubs and authorities, what is the primary role of a hub in a...