Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

» Cloud Computing solved MCQs

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Question:

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A.

Cross-site scoring scripting

B.

Cross-site request forgery

C.

Two-factor authentication

D.

Cross-site scripting

Answer» d. Cross-site scripting

Note: The above multiple-choice question is for all general and Competitive Exams in India

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. Read More »

» Cloud Computing solved MCQs

The technology used to distribute service requests to resources is referred to as _____________

Question:

The technology used to distribute service requests to resources is referred to as _____________

A.

load performing

B.

load scheduling

C.

load balancing

D.

all of the mentioned

Answer» c. load balancing

Note: The above multiple-choice question is for all general and Competitive Exams in India

The technology used to distribute service requests to resources is referred to as _____________ Read More »

» Cloud Computing solved MCQs

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.

Question:

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another.

A.

table caching

B.

geocaching

C.

index caching

D.

windows Media Server

Answer» b. geocaching

Note: The above multiple-choice question is for all general and Competitive Exams in India

CloudFront supports ______ data by performing static data transfers and streaming content from one CloudFront location to another. Read More »

» Cloud Computing solved MCQs

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

Question:

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A.

Making infrastructure vulnerable to malware

B.

Potential for noncompliance

C.

Data Loss

D.

All of the above

Answer» d. All of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India

What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks? Read More »

» Cloud Computing solved MCQs

The three major components of RFID hardware based on functionality include :

Question:

The three major components of RFID hardware based on functionality include :

A.

RFID Reader

B.

Reader Antenna

C.

Reader

D.

All of the above

Answer» d. All of the above

Note: The above multiple-choice question is for all general and Competitive Exams in India

The three major components of RFID hardware based on functionality include : Read More »

» Cloud Computing solved MCQs

Which of the following subject area deals with pay-as-you-go usage model?

Question:

Which of the following subject area deals with pay-as-you-go usage model?

A.

Accounting Management

B.

Compliance

C.

Data Privacy

D.

All of the mentioned

Answer» a. Accounting Management

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following subject area deals with pay-as-you-go usage model? Read More »

» Cloud Computing solved MCQs

Which of the following is Amazon’s technical support and consulting business?

Question:

Which of the following is Amazon’s technical support and consulting business?

A.

Amazon Virtual Private Cloud

B.

AWS Premium Support

C.

Amazon Fulfillment Web Services

D.

All of the mentioned

Answer» b. AWS Premium Support

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following is Amazon’s technical support and consulting business? Read More »

» Cloud Computing solved MCQs

Which of the following is the operational domain of CSA(Cloud Security Alliance)?

Question:

Which of the following is the operational domain of CSA(Cloud Security Alliance)?

A.

Scalability

B.

Portability and interoperability

C.

Flexibility

D.

None of the mentioned

Answer» b. Portability and interoperability

Note: The above multiple-choice question is for all general and Competitive Exams in India

Which of the following is the operational domain of CSA(Cloud Security Alliance)? Read More »

» Cloud Computing solved MCQs

Cloud computing is an abstraction based on the notion of pooling physical resources andpresenting them as a ________ resource.

Question:

Cloud computing is an abstraction based on the notion of pooling physical resources andpresenting them as a ________ resource.

A.

real

B.

virtual

C.

cloud

D.

none of the mentioned

Answer» b. virtual

Note: The above multiple-choice question is for all general and Competitive Exams in India

Cloud computing is an abstraction based on the notion of pooling physical resources andpresenting them as a ________ resource. Read More »

» Cloud Computing solved MCQs