Q 21. In distributed systems, link and site failure is detected by . . . . . . . .
A. polling
B. token passing
C. handshaking
D. none of the mentioned
Show Answer
Answer:-C. handshakingExplanation
The correct answer is Option C: Handshaking, as it is the most reliable and commonly used method in distributed systems for detecting link and site failures.Q 22. Dynamic content presented in Google . . . . . . . . crawling isn’t normally indexed.
A. ajax
B. java
C. javascript
D. all of the mentioned
Show Answer
Answer:-C. javascriptExplanation
The correct answer is Option C: JavaScript, as it is the most significant factor in dynamic content that may not be indexed by Google’s crawlers without proper handling.Q 23. Which of the following is not a messaging mode in CoAP?
A. Confirmable
B. Separate
C. Direct
D. Piggyback
Show Answer
Answer:-C. DirectExplanation
The correct answer is Option C: Direct, as it is not a valid messaging mode in CoAP, unlike the other options, which are part of the CoAP messaging system.Q 24. AMIs are operating systems running on the . . . . . . . . virtualization hypervisor.
A. Yen
B. Xen
C. Ben
D. Multi-Factor Authentication
Show Answer
Answer:-B. XenExplanation
The correct answer is Option B: Xen, as it is the virtualization hypervisor used by AWS to run AMIs. The other options are unrelated to hypervisors or AMIs.Q 25. Which of the following aspect of the service is abstracted away?
A. data escrow
B. user interaction
C. adoption drivers
D. none of the mentioned
Show Answer
Answer:-B. user interactionExplanation
The correct answer is Option B: User interaction, as it is the aspect of the service that is often abstracted away to provide a simplified experience for users, while the other options either remain visible to the user or are not relevant in the context of abstraction.Q 26. Which of the following instance class is best used for applications that are processor or compute-intensive?
A. standard instances
B. high memory instances
C. high cpu instances
D. none of the mentioned
Show Answer
Answer:-C. high cpu instancesExplanation
The correct answer is Option C: High CPU instances, as they are the best choice for applications that are processor or compute-intensive, providing the necessary resources to handle demanding workloads effectively.27. The message in pub/sub is an opaque blob of . . . . . . . .
A. bits
B. bytes
C. word
D. nibble
Show Answer
Answer:-B. bytesExplanation
The correct answer is Option B: Bytes, as messages in pub/sub systems are typically described as opaque blobs of bytes, providing a flexible and efficient way to handle various types of data without interpretation by the messaging system.Q 28. CNS stands for . . . . . . . .
A. consumption near sweet-spot
B. continuous network system
C. compact neural system
D. compound near sweet-sp0t
Show Answer
Answer:-A. consumption near sweet-spotExplanation
None of the options accurately define CNS in the context of cloud computing. However, if the question aims to refer to a term often associated with network optimization, Option A might be the closest in concept, but it is still incorrect. The acronym CNS is generally understood to refer to “Cloud Networking Services,” which is not listed here. Therefore, the question may require clarification, as none of the provided options are standard definitions for CNS.Q 29. URI and content type support is which protocol feature?
A. http
B. udp
C. coap
D. Both A and C
Show Answer
Answer:-D. Both A and CExplanation
The correct answers are Option A: HTTP and Option C: CoAP, as both protocols support URI and content type features.Q 30. Processes on the remote systems are identified by . . . . . . . .
A. host id
B. host name and identifier
C. identifier
D. process id
Show Answer
Answer:-D. process idExplanation
Conclusion: The correct answer is Option D: Process ID, as it accurately represents how processes on remote systems are identified. Process IDs are essential for managing and monitoring processes effectively, making them the most relevant choice in this context.Q 31. Point out the wrong statement.
A. unmanaged storage is reliable
B. managed storage is relatively cheap to use
C. most of the user-based applications that work with cloud storage are of unmanaged type
D. none of the mentioned
Show Answer
Answer:-A. unmanaged storage is reliableExplanation
The wrong statement is Option A: Unmanaged storage is reliable, as it suggests a level of reliability that unmanaged storage may not inherently possess due to the user’s responsibility for managing their own data.Q 32. . . . . . . . . is the central application in the AWS portfolio.
A. Amazon Simple Queue Service
B. Amazon Simple Notification Service
C. Amazon Elastic Compute Cloud
D. All of the above
Show Answer
Answer:-C. Amazon Elastic Compute CloudExplanation
The most accurate answer is Option B: Amazon Elastic Compute Cloud, as it is widely regarded as the central application in the AWS portfolio, serving as the backbone for many cloud computing operations and services.Q 33. Which one of the statement is generally NOT correct for Microkernelized Hypervisor?
A. drivers run within guests
B. simple partitioning functionality
C. increase reliability and minimize lowest level of the tcb
D. contains its own drivers model
Show Answer
Answer:-D. contains its own drivers modelExplanation
The statement that is generally NOT correct for Microkernelized Hypervisors is Option D: Contains its own drivers model, as microkernelized hypervisors rely on guest operating systems to manage drivers rather than implementing their own dedicated driver model.Q 34. Does publish() method accepts arbitrary arguments.
A. TRUE
B. FALSE
Show Answer
Answer:-A. TRUEExplanation
The correct answer is Option A: TRUE, as many implementations of the publish() method are designed to accept arbitrary arguments to accommodate various data types and payloads. However, it is essential to refer to the specific documentation for the publish() method in the context being used to confirm its behavior, as this can vary across different frameworks.Q 35. IEEE 802.15.4 uses which of the following for accessing the channel?
A. Carrier sense multiple access with collision avoidance (CSMA-CA)
B. Carrier sense multiple access with collision detection (CSMA-CD)
C. Carrier sense multiple access (CSMA)
D. None of these
Show Answer
Answer:-A. Carrier sense multiple access with collision avoidance (CSMA-CA)Explanation
The correct answer is Option C: Carrier sense multiple access with collision avoidance (CSMA-CA), as IEEE 802.15.4 employs this method to manage access to the communication channel effectively, minimizing the potential for collisions in wireless environments.Q 36. In threat modeling, what methodology used to perform risk analysis
A. dread
B. stride
C. owasp
D. dar
Show Answer
Answer:-B. strideExplanation
The most appropriate answer for the methodology used to perform risk analysis in threat modeling is Option C: stride, as it provides a comprehensive framework for identifying and categorizing various threats effectively.Q 37. The advantages of Ajax is . . . . . . . .
A. Bandwidth utilization
B. More interactive
C. Speeder retrieval of data
D. All of these
Show Answer
Answer:-D. All of theseExplanation
The correct answer is Option D: All of these, as Ajax provides multiple advantages, including better bandwidth utilization, enhanced interactivity, and speedier data retrieval, making it a powerful tool for modern web development.Q 38. The . . . . . . . . property states that the system must have a mechanism to recover from committed transactions should that be necessary.
A. atomicity
B. consistency
C. durability
D. isolation
Show Answer
Answer:-C. durabilityExplanation
The correct answer is Option D: durability, as it specifically relates to the requirement for a system to have mechanisms to recover from committed transactions if necessary.Q 39. Publishing an application’s data as a REST service requires.
A. @requestmapping
B. @pathvariable
C. all of the mentioned
D. none
Show Answer
Answer:-C. all of the mentionedExplanation
The correct answer is Option C: all of the mentioned, as both @RequestMapping and @PathVariable are necessary for effectively publishing an application’s data as a REST service.Q 40. client() class provides . . . . . . . . to create topics.
A. methods
B. classes
C. software
D. batch
Leave a Reply