Top 1000+ Solved Cloud Computing MCQ Questions Answer
Q. In threat modeling, what methodology used to perform risk analysis
a. dread
b. owasp
c. stride
d. dar
Q. Out of the following which is not element of threat modelling
a. asset
b. vulnerability
c. threat
d. time
Q. Request field is present in which message format?
a. request message
b. response message
c. both request andresponse
d. neither request norresponse
Q. CoAP is specialized for
a. internet applications
b. device applications
c. wireless applications
d. wired applications
Q. CoAP provides which of the following requirements?
a. multicast support and simplicity
b. low overhead and multicast support
c. simplicity and low overhead
d. multicast support,low over head, and simplicity
Q. What is the full form of WLAN?
a. wide local areanetwork
b. wireless local areanetwork
c. wireless land accessnetwork
d. wireless local areanode
Q. Which of the following specifies a set of media access control (MAC) andphysical layer specifications for implementing WLANs?
a. ieee 802.16
b. ieee 802.3
c. ieee 802.11
d. ieee 802.15
Q. Which of the following is not a characteristic of a ZigBee network?
a. low powerconsumption
b. easy installation.
c. high data rates.
d. unlicensed radiobands.
Q. Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?
a. ieee 802.11.
b. ieee 802.15.1.
c. ieee 802.15.3.
d. ieee 802.15.4.
Q. Which of the following layers are defined by the ZigBee stack?
a. transport layer
b. physical layer.
c. application supportsub-layer.
d. medium access layer
Q. What is the typical range of transmission distance in a ZigBee network?
a. 5 m.
b. 50 m.
c. 500 m.
d. 5 km
Q. _ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.
a. cross-site scoringscripting
b. cross-site requestforgery
c. two-factorauthentication
d. cross-site scripting