--> Sayadasite: Digital Fluency important questions part 3

Multiple Ads

Search

Menu Bar

Digital Fluency important questions part 3

101.IoT devices are naturally vulnerable to                            threats

a)     Sensors

b)    Heterogeneity

c)      Security  

d)    Connectivity.

102.IoT is a paradigm that involves ubiquitous presence in the environment

a)     True 

b)    False


103.What are copies of the physical objects that are accurate enough to let their owners experiment and predict the operation of their assets called?

a)        Digital Sons

b)       Digital Siblings

c)        Digital Twins 

104.Which of the following IIoT elements can be used in factories to tackle manufacturing challenges, such as machine failure, problems in control systems, etc.? A. Installing sensors throughout the factory to monitor production flow in real time to eliminate waste B. Creating predictive models based on the data gathered with the help of IoT devices.

a)     Only A

b)    Only B

c)      Both A and B 

105.Which of the following are the biggest users of IIoT? A. Automotive Fleet Management B. Manufacturing C. Media and Entertainment.

d)    A and B 

e)    B and C

f)        A and C

106.DDoS attacks are real threats to IIoT.

a)     True 

b)    False

107.What are the risks associated with industrial IoT?

a)  Ransomware infections denying access to critical systems                           

b)    Not much awareness about internet and smart devices.

c)      Loss Of employment by skilled workers

108.Which of the following are the top benefits of IIoT in manufacturing?

A. Improvement of operational performance B. Ensuring safety and compliance

C. Increasing flexibility and agility a) A and B

c)  A, B and C

b) B and C

109.Which one of these are not one of the big names in the FinTech cloud computing sector?

a)     Amazon Web Services

b)    Microsoft Silverlight  

c)      Google Virtual Cloud

d)    Microsoft Azure

110.The resilience of Cloud deployments:

e)    Increases Uptime

f)        Simplifies Disaster Recovery

g)     Both of the above 

111.An example of PaaS is:

h)    Rackspace Cloud

i)          Mosso

j)          Amazon EC2

k)     Gmail

112.Which cloud service model is the most widely used in the world?

l)          SaaS 

m)                  PaaS

n)    IaaS

o)    All of them.

113.Amazon Elastic MapReduce offers a    framework   to   process   large amounts of data.

a)               R

b)              Hadoop

c)                Python

d)              None of the above.

114.SaaS is also known as hosted software or on-demand software.

a)     True 

b)    False

115.The PaaS service delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.

a)     True 

b)    False

116.Grunge Computing is about moving local computing to local devices in a highly distributed system, typically as a layer around a cloud computing core.

c)      True

d)    False 

117.iPaaS offerings in the cloud from which providers let users implement data mapping, transformations is/are:

e)    Apache Spark

f)        Dell Boomi  

g)     WorkFusion

118.Infrastructure as a Service and Hardware as a Service are two completely different things.

h)    True

i)         False 

 

119.                                  uses software and hardware methods to tackle external threats that can arise in the development stage of an application.

a)     Disaster Recovery

b)    Application Security  

c)      Information Security

d)    Endpoint Security

120.Critical Infrastructure does not include

a)     Electricity Grid

b)    Water Purification

c)      Traffic Lights

d)    Cooking Gas Lines

121.The full form of SEG is

a)  Secure Email Gateway  

b)    Secure Ecommerce Gateway

c)      Security Email Gateway

d)    Secure Email Gate.

122.Application security uses software and hardware methods to tackle external threats

a)     True

b)    False.

123.Who alongside the FDA recently launched a joint initiative to “increase coordination in dealing with threats related to medical devices?

 

c)      HHS

d)    DHS 

e)    LHS

f)        AHS

124.Hackers are always looking for opportunities to invade privacy and steal data that’s of crucial importance

a)     True

b)    False.

125.A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems

c)      True

d)    False

126.One of the easiest ways your information can become hacked is through easy-to-guess passwords

e)    True

f)        False

127.Which attack involves using IP spoofing and the ICMP to saturate a target network with traffic?

g)     Smurf attack 

h)    Teardrop attack

i)          Replay attack

128.Botnets are the millions of systems infected with malware under hacker control in order to carry out DDoS attacks

j)          True

k)     False

129.Reactive machines use past experiences to determine future actions.

a)     True

b)    False

130.Self-driving cars usually use Limited Memory technology to:

a)     Store data 

b)    Automate

c)      Detect Motion

131.Which of these is NOT an application of AI?

d)    Language Translation

e)    Voice Recognition

f)        Robotics

d) Obtain massive training data sets         

132.Which of the following are examples of Weak AI?

a)     Siri, Alexa & Advanced Chess Programs 

b)    Siri & Alexa

c)      Advanced Chess Programs

133.Predictive maintenance, an application of AI, prevents unplanned downtime.

d)    True

e)    False


134.Big Data Analytics is a complete process of examining large sets of data through varied tools and processes in order to discover unknown patterns, hidden correlations, meaningful trends, and other insights for making data-driven decisions in the pursuit of better results.

a)     True

b)    False

135.Which type of analytics ensures that the path is predicted for the future course of action?

a)     Predictive Analytics 

b)    Prescriptive Analytics

c)      Diagnostic Analytics

136.Customer Segmentation and Differential Pricing Strategy can be easily achieved through Big Data Analytics.

d)    True

e)    False

137.Which data analysis fails to cope with the advent of Big Data which is essentially huge data, both structured and unstructured?

f)        Traditional 

g)     New

h)    Low

138.Healthcare big data refers to collecting, analyzing and leveraging consumer, patient, physical, and clinical data that is too vast or complex to be understood by traditional means of data processing.

i)          True

j)          False

139.You're hosting a party in your home and your guests have arrived. The smart security camera will-

a)               Detect the number of people who have entered the home, report to the AI

Control Center and automatically turn on the lights                         

b)              Wait to receive the instructions from the owner of the house to turn on the lights

140.The latest advances of Technology have tremendous potential to:

a)     Impact the jobs of the people

b)    Benefit people by increasing efficiency and reducing waste 

141.IoT can analyze mall traffic so that stores located in malls, can make the necessary adjustments that enhance the customer’s shopping experience while reducing overhead.

c)      True

d)    False

142.The IoT is a network of Internet-linked devices, vehicles, and appliances that can collect and share data without the need of human interaction

e)    True

f)        False

143.Statistics estimate the ever-growing world population to reach nearly:

a)     5 billion by the year 2050

b)    15 billion by the year 2050

c)  10 billion by the year 2050            

144.Cloud Computing can store a tremendous amount of data which can also help:

a)     Big Data Analytics 

b)    Action Items

c)      Cloud Networks

145.Disaster Recovery is one of the major benefits of Cloud Computing.

a)     True

b)    False

146.Cloud Computing in e-commerce refers to the hosting and delivering of information through computer device on the internet via a network of servers.

c)      True

d)    False

147. Cloud computing architect also depends on:

a)  Information, Technology, and Application           

b)    Information, Bandwidth, and Application

c)      Type, Security, and Application

148.Cloud Computing is believed to facilitate greater collaboration and enhance the learning opportunities.

a)     True

b)    False

149.Prioritizing simple security strategies is the best way to defeat evolving security threats

a)     True

b)    False

150.The easiest way for attackers to gain network access is to:

a)     Leverage existing vulnerabilities 

b)    Creating new vulnerabilities

c)      Send Spam mails


No comments: