101.IoT devices are naturally vulnerable to threats
a)
Sensors
b)
Heterogeneity
c)
Security
d)
Connectivity.
102.IoT is a paradigm that involves ubiquitous presence in
the environment
a)
True
b)
False
103.What are
copies of the physical objects that are accurate enough to let their owners
experiment and predict the operation of their assets called?
a)
Digital Sons
b)
Digital Siblings
104.Which
of the following IIoT elements can be used in factories to tackle manufacturing
challenges, such as machine failure, problems in control systems, etc.? A.
Installing sensors throughout the factory to monitor production flow in real
time to eliminate waste B. Creating predictive models based on the data
gathered with the help of IoT devices.
a)
Only A
b)
Only B
c)
Both A and B
105.Which of
the following are the biggest users of IIoT? A. Automotive Fleet Management B.
Manufacturing C. Media and Entertainment.
d)
A and B
e)
B and C
f)
A and C
106.DDoS attacks are real threats to IIoT.
a)
True
b)
False
107.What are the risks associated with industrial IoT?
a) Ransomware infections denying access to
critical systems
b)
Not much awareness about internet and smart devices.
c)
Loss Of employment by skilled workers
108.Which
of the following are the top benefits of IIoT in manufacturing?
A.
Improvement of operational performance B. Ensuring safety and compliance
C.
Increasing flexibility and agility a) A and B
c) A, B and C
b) B and C
109.Which
one of these are not one of the big names in the FinTech cloud computing
sector?
a)
Amazon Web Services
b)
Microsoft Silverlight
c)
Google Virtual Cloud
d)
Microsoft Azure
110.The resilience of Cloud deployments:
e)
Increases Uptime
f)
Simplifies Disaster Recovery
g)
Both of the above
111.An example of PaaS is:
h)
Rackspace Cloud
i)
Mosso
j)
Amazon EC2
k)
Gmail
112.Which cloud service model is the most widely used in the
world?
l)
SaaS
m)
PaaS
n)
IaaS
o)
All of them.
113.Amazon
Elastic MapReduce offers a framework to
process large amounts of data.
a)
R
b)
Hadoop
c)
Python
d)
None of the above.
114.SaaS is also known as hosted
software or on-demand software.
a)
True
b)
False
115.The
PaaS service delivery model allows a customer to rent virtualized servers and associated
services used to run existing applications, or to design, develop, test, deploy
and host applications.
a)
True
b)
False
116.Grunge
Computing is about moving local computing to local devices in a highly
distributed system, typically as a layer around a cloud computing core.
c)
True
d)
False
117.iPaaS
offerings in the cloud from which providers let users implement data mapping,
transformations is/are:
e)
Apache Spark
f)
Dell Boomi
g)
WorkFusion
118.Infrastructure
as a Service and Hardware as a Service are two completely different things.
h)
True
119. uses software
and hardware methods to tackle external threats that can arise in the
development stage of an application.
a)
Disaster Recovery
b)
Application Security
c)
Information Security
d)
Endpoint Security
120.Critical Infrastructure does not include
a)
Electricity Grid
b)
Water Purification
c)
Traffic Lights
d)
Cooking Gas Lines
121.The full form of SEG is
a) Secure Email Gateway
b)
Secure Ecommerce Gateway
c)
Security Email Gateway
d)
Secure Email Gate.
122.Application
security uses software and hardware methods to tackle external threats
a)
True
b)
False.
123.Who
alongside the FDA recently launched a joint initiative to “increase
coordination in dealing with threats related to medical devices?
c)
HHS
d)
DHS
e)
LHS
f)
AHS
124.Hackers
are always looking for opportunities to invade privacy and steal data that’s of
crucial importance
a)
True
b)
False.
125.A
cyber attack is any type of offensive action that targets computer information
systems, infrastructures, computer networks or personal computer devices, using
various methods to steal, alter or destroy data or information systems
c)
True
d)
False
126.One of
the easiest ways your information can become hacked is through easy-to-guess
passwords
e)
True
f)
False
127.Which
attack involves using IP spoofing and the ICMP to saturate a target network
with traffic?
g)
Smurf attack
h)
Teardrop attack
i)
Replay attack
128.Botnets
are the millions of systems infected with malware under hacker control in order
to carry out DDoS attacks
j)
True
k)
False
129.Reactive machines use past
experiences to determine future actions.
a)
True
b)
False
130.Self-driving cars usually use Limited Memory technology
to:
a)
Store data
b)
Automate
c)
Detect Motion
131.Which of these is NOT an application of AI?
d)
Language Translation
e)
Voice Recognition
f)
Robotics
d)
Obtain massive training data sets
132.Which of the following are examples of Weak AI?
a)
Siri, Alexa & Advanced Chess Programs
b)
Siri & Alexa
c)
Advanced Chess Programs
133.Predictive maintenance, an application of AI, prevents
unplanned downtime.
d)
True
e)
False
134.Big Data
Analytics is a complete process of examining large sets of data through varied
tools and processes in order to discover unknown patterns, hidden correlations,
meaningful trends, and other insights for making data-driven decisions in the
pursuit of better results.
a)
True
b)
False
135.Which
type of analytics ensures that the path is predicted for the future course of
action?
a)
Predictive Analytics
b)
Prescriptive Analytics
c)
Diagnostic Analytics
136.Customer
Segmentation and Differential Pricing Strategy can be easily achieved through
Big Data Analytics.
d)
True
e)
False
137.Which
data analysis fails to cope with the advent of Big Data which is essentially
huge data, both structured and unstructured?
f)
Traditional
g)
New
h)
Low
138.Healthcare big data refers to
collecting, analyzing and leveraging consumer, patient, physical, and clinical
data that is too vast or complex to be understood by traditional means of data
processing.
i)
True
j)
False
139.You're
hosting a party in your home and your guests have arrived. The smart security
camera will-
a)
Detect the number of people who have entered
the home, report to the AI
Control
Center and automatically turn on the lights
b)
Wait to receive the instructions from the owner of the house
to turn on the lights
140.The latest advances of Technology have tremendous
potential to:
a)
Impact the jobs of the people
b)
Benefit people by increasing efficiency and
reducing waste
141.IoT can analyze mall traffic so
that stores located in malls, can make the necessary adjustments that enhance
the customer’s shopping experience while reducing overhead.
c)
True
d)
False
142.The IoT
is a network of Internet-linked devices, vehicles, and appliances that can
collect and share data without the need of human interaction
e)
True
f)
False
143.Statistics estimate the ever-growing world population to
reach nearly:
a)
5 billion by the year 2050
b)
15 billion by the year 2050
c) 10 billion by the year 2050
144.Cloud Computing can store a tremendous amount of data
which can also help:
a)
Big Data Analytics
b)
Action Items
c)
Cloud Networks
145.Disaster Recovery is one of the major benefits of Cloud
Computing.
a)
True
b)
False
146.Cloud Computing in e-commerce refers to the hosting and
delivering of information through computer device on the internet via a network
of servers.
c)
True
d)
False
147. Cloud computing architect also depends on:
a) Information, Technology, and Application
b)
Information, Bandwidth, and Application
c)
Type, Security, and Application
148.Cloud
Computing is believed to facilitate greater collaboration and enhance the
learning opportunities.
a)
True
b)
False
149.Prioritizing
simple security strategies is the best way to defeat evolving security threats
a)
True
b)
False
150.The easiest way for attackers to gain network access is
to:
a)
Leverage existing vulnerabilities
b)
Creating new vulnerabilities
c)
Send Spam mails
No comments:
Post a Comment