Top 1000+ Solved Cloud Computing MCQ Questions Answer
Q. Which of the following terms indicates that information is to be read only by those people for whom it is intended?
a. availability
b. accounting
c. integrity
d. confidentiality
Q. DCS is a
a. distributed control system
b. data control system
c. data column system
d. distributed column system
Q. RFID stands for?
a. random frequency identification
b. radio frequency identification
c. random frequency information
d. radio frequency information
Q. M2M is a term introduced by
a. iot service providers
b. fog computing service providers
c. telecommunication service providers
d. none of these
Q. Smart Dust can be used to measure the
a. temperature of the industrial lathe machine
b. heat inside a computer’s cpu
c. chemical in the soil
d. strength of a solid material
Q. Request field is present in which message format?
a. request message
b. response message
c. both request and response
d. neither request nor response
Q. CoAP provides which of the following requirements?
a. multicast support and simplicity
b. low overhead and multicast support
c. simplicity and low overhead
d. multicast support, low over head, and simplicity
Q. What is the full form of WLAN?
a. wide local area network
b. wireless local area network
c. wireless land access network
d. wireless local area node
Q. Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?
a. ieee 802.16
b. ieee 802.3
c. ieee 802.11
d. ieee 802.15
Q. Which of the following is not a characteristic of a ZigBee network?
a. low power consumption
b. easy installation.
c. high data rates.
d. unlicensed radio bands.
Q. Which of the following IEEE standards provides the lowest level of the ZigBee software stack?
a. ieee 802.11.
b. ieee 802.15.1.
c. ieee 802.15.3.
d. ieee 802.15.4.
Q. Which of the following layers are defined by the ZigBee stack?
a. transport layer
b. physical layer.
c. application support sub-layer.
d. medium access layer
Q. _ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
a. cross-site scoring scripting
b. cross-site request forgery
c. two-factor authentication
d. cross-site scripting
Q. Representational State Transfer (REST) is the standard interface between
a. two machines in a lan
b. http client and user
c. http client and servers
d. none of the above