This set of MCQ(multiple choice questions) focuses on the Introduction To Internet Of Things Week 8 Solutions.
Course layout (All week answers link)
Week 0
Week 1: Introduction to IoT
Week 2: Basics of Networking
Week 3: Communication Protocols
Week 4:Â Sensor Networks
Week 5:Â Interoperability in IoT
Week 6: Introduction to Python programming
Week 7:Â Implementation of IoT with Raspberry Pi (contd), Introduction to SDN, SDN for IoT
Week 8:Â SDN for IoT (contd), Data Handling and Analytics, Cloud Computing
Week 9:Â Cloud Computing(contd), Sensor-Cloud
Week 10:Â Fog Computing, Smart Cities and Smart Homes
Week 11: Connected Vehicles, Smart Grid, Industrial IoT
Week 12: Industrial IoT (contd), Case Study: Agriculture, Healthcare, Activity Monitoring
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Introduction To Internet Of Things Week 8 Solutions” contains 15 questions.
Now, start attempting the quiz.
Introduction To Internet Of Things Week 8 Solutions
Q1. Traditional Wireless Mobile Networks are cost expensive in terms of _____________?
a) Only CAPEX
b) Only OPEX
c) Both CAPEX and OPEX
d) Neither CAPEX and OPEX
Answer: c)
Q2. High mobility of users is one of the key challenges in rule placement for software defined wireless mobile networks.
a) True
b) False
Answer: a)
Q3. Which among the following is a solution for mobility-aware flow rule placement in SDIoT?
a) Mobility-Flow
b) Mobile-Flow
c) Mobi-Flow
d) M-Flow
Answer: c)
Q4. Cloud, Utility, Grid and ______________________ have been the major trends in computing
a) Clone
b) Cluster
c) Closure
d) Cloud
Answer: b)
Q5. Cloud computing models allow different users to share the same physical resources?
a) True
b) False
Answer: a)
Q6. As per NIST Visual Model of Cloud Computing, ‘Hybrid Cloud’ model and PaaS model both fall in the same category.
a) True
b) False
Answer: b)
Q7. When you are accessing Google docs or Microsoft Word online for accessing the features of a document writing software from your browser without specifically installing them, which among the following cloud service models is the most appropriate one that you are using.
a) SaaS
b) PaaS
c) IaaS
d) DaaS
Answer: a)
Q8. An organization A wants to deploy a cloud infrastructure, whereby it wants to push majority of the data to a cloud whose servers can be situated anywhere within the globe, but it wants certain private data to be pushed only to cloud servers that are present on-premise and are accessible by only authenticated members of the organization. In this context which among the following deployment model should be used?
a) Private Cloud
b) Public Cloud
c) Hybrid Cloud
d) Any of these
Answer: c)
Q9. Cloud services and resources should be rapidly ______________ in order to achieve their required performance
a) entrusted
b) elastic
c) enterprise
d) None of the given
Answer: b)
Q10. Suppose that a start-up wants to enter into online book delivery business. It wants to create the user interface and the application by itself, but it does not have any networking or storage facility, so it wants to adopt the cloud computing practice. In this respect, which among the following cloud service models is most suitable for the start-up.
a) Only SaaS
b) Neither PaaS nor IaaS
c) Both PaaS and IaaS can be adopted
d) Neither SaaS, PaaS or IaaS
Answer: c)
Q11. Data security and client authentication is an issue in which of the following cloud service models??
a) SaaS
b) SaaS and PaaS
c) IaaS
d) All of them
Answer: d)
Q12. Network, ___________________ and application level securities are the three aspects of cloud infrastructure securities.
a) Client
b) Web
c) Host
d) Wireless
Answer: c)
Q13. When a new user logs into a cloud framework, the first thing that needs to be done is ______________________________.
a) User should be authenticated
b) User should immediately be granted all the resources
c) User should log off
d) User should be penalized
Answer: a)
Q14. Service Level Agreements (SLAs) are mutually agreed by the client (customer) and cloud service provider (CSP) at the beginning. With respect to SLAs, what are the views that SLAs provide?
a) Customer Point of View
b) CSP Point of View
c) Both Customer and CSP Point of View
d) Neither Customer nor CSP Point of View
Answer: c)
Q15. CloudAnalyst simulation tool provides GUI and is written on top of CloudSim modules.
a) Yes
b) No
Answer: a)
Introduction To Internet Of Things Week 8 Solutions
Q1. The process of abstracting physical network hardware and resources from the network services and use cases are known as
a) Network Splitting
b) Network Virtualization
c) Network Scaling
d) None of these
Answer: b) Network Virtualization
Q2. ODIN is one of the proposed solutions towards Software Defined WSN and mobility management. As per the architecture of ODIN, which component of ODIN is placed on top of the controller.
a) ODIN master
b) ODIN agent
c) Both ODIN master and agent
d) Neither ODIN master and agent
Answer: a) ODIN master
Q3. Shared pool of resources with easy configurability are important aspects of cloud computing.
a) True
b) False
Answer: a) True
Q4. In cloud computing, the users have specific knowledge about the exact physical location of the computing hardware with respect to the cloud services.
a) True
b) False
Answer: b) False
Q5. Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the cloud of A free of cost whereas only employees of organization B can access the cloud of B. Also organization B has set up its cloud for only its own needs. With respect to the type of cloud infrastructure provided by A and B, which among the following is true
a) A: Private Cloud, B: Public Cloud
b) A: Public Cloud, B: Private Cloud
c) A: Public Cloud, B: Public Cloud
d) A: Private Cloud, B: Private Cloud
Answer: b) A: Public Cloud, B: Private Cloud
Q6. Which among the following can be considered as a potential service model for cloud computing.
a) Software as a Service
b) Database as a Service
c) Platform as a Service
d) All of these
Answer: d) All of these
Q7. Which of the following component can be considered as optional for a sensor node?
a) Sensing unit
b) Transceiver
c) Location finding unit
d) None of the above
Answer: c) Location finding unit
Q8. You have bought a spreadsheet processing software in the form of a CD-ROM which you would need to install yourself on your computer to run and then manage. Is it an example of SaaS in cloud computing?
a) Yes
b) No
Answer: b) No
Q9. Suppose two persons A and B both wish to access a particular SaaS feature from a cloud service provider through their respective personal computers. Both of them log into the cloud at the same time. Then which among the following is true.
a) Neither A nor B will be able to access the services
b) A will be able to access the services but not B
c) B will be able to access the services but not A.
d) Both A and B will be able to access the services.
Answer: d) Both A and B will be able to access the services.
Q10. Along with Accounting, which among the following is an essential component of cloud service management.
a) Virtualization
b) Billing
c) Deployment
d) None of these
Answer: b) Billing
Q11. Which among the following security paradigms is concerned with securing the in-transit data between the users and the cloud through the Internet.
a) Network Level Security
b) Host Level Security
c) Application Level Security
d) None of these.
Answer: a) Network Level Security
Q12. “Cloud Security ensures that _______ users can access their data after proper ______________”
Choose which among the following should be the correct order of words to be filled in the blanks.
a) legitimate, authentication
b) illegitimate, authentication
c) malicious, inaction
d) malicious, attack
Answer: a) legitimate, authentication
Q13. Which among the following should be protected with proper access control in cloud computing
a) Database access
b) Server access
c) Virtual resource access
d) All of these
Answer: d) All of these
Q14. Before launching your cloud services as a product to customers, it is always a good idea to test your cloud applications on a cloud simulator first in the pre-deployment phase.
a) True
b) False
Answer: a) True
Q15. With respect to virtualization in cloud computing, which among the following can be considered as suitable virtualization paradigms.
a) Storage virtualization
b) Hardware virtualization
c) Application virtualization
d) All of these
Answer: d) All of these
Previous Course – NPTEL Week 8 Solutions
Q1. Which of the following is an issue prevalent for communication in wireless sensor networks?
a) Diffusion
b) Interference
c) Diffraction
d) Inheritance
Answer: b) Interference
Q2. In a cloud computing paradigm, the user does not have availability to on-demand services.
a) True
b) False
Answer: b) False
Q3. Which among the following can be rented as a utility service by a client remotely in Cloud Computing?
a) Hardware
b) Software
c) Memory and storage
d) All of these
Answer: d) All of these
Q4. When you are accessing Google docs or Microsoft Word online for accessing the features of a document writing software from your browser without specifically installing them, which cloud service model you are using?
a) SaaS
b) PaaS
c) lass
d) DaaS
Answer: a) SaaS
Q5. In cloud computing service model, what does ‘XaaS’ stand for?
a) Security-as-a-Service
b) Connectivity-as-a-Service
c) Network-as-a-Service
d) Anything-as-a-Service
Answer: d) Anything-as-a-Service
Q6. Microsoft Azure is an example of ____________ service provider.
a) SDN
b) Cloud computing
c) Batch computing
d) Operating System
Answer: b) Cloud computing
Q7. No virtualization is used in cloud service provisioning.
a) True
b) False
Answer: b) False
Q8. What does DBaaS stand for in cloud computing service model?
a) Disk-as-a-Service.
b) Database-as-a-Service
c) Distribution-as-a-Service
d) Data buffering-as-a-Service
Answer: b) Database-as-a-Service
Q9. Suppose a hospital that deals with sensitive patient data wants to have cloud support for all of its computers, but it wants to set up its own secure cloud infrastructure. This is an example of which of the following models?
a) Public cloud
b) Hybrid cloud
c) Private cloud
d) None of these
Answer: c) Private cloud
Q10. What does ‘CIA’ in cloud data security stand for?
a) Confidentiality, Integrity, Availability
b) Confidentiality, Inheritance, Automation
c) Congestion, Integrity, Authentication
d) Criticality, Integrity, Accountability
Answer: a) Confidentiality, Integrity, Availability
Q11. In virtualization, a hypervisor is responsible for orchestration between the underlying physical hardware and the virtual machines being installed.
a) True
b) False
Answer: a) True
Q12. For a secure cloud deployment, which among the following are needed to be considered?
a) Network Level Security
b) Host Level Security
c) Application Level Security
d) All of these
Answer: d) All of these
Q13. CloudSim is a type of
a) Cloud network
b) Cloud simulator
c) Cloud enhancement
d) Cloud model
Answer: b) Cloud simulator
Q14. Before cloud computing provisioning, the client is provided with the details of the various warranties in which of the following documents?
a) Service Level Authentication
b) Service Level Agreement
c) Software Level Agreement
d) Software Level Authentication
Answer: b) Service Level Agreement
Q15. Amazon Web Services (AWS) is an example of
a) Open source cloud
b) Deployment cloud
c) Commercial cloud
d) Not a cloud platform
Answer: c) Commercial cloud
<< Pre- Introduction To Internet Of Things Week 7 solutions
>> Next- Introduction To Internet Of Things Week 9 Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.