Top 1000+ Solved Cloud Computing MCQ Questions Answer

From 46 to 60 of 960

Q. In threat modeling, what methodology used to perform risk analysis

a. dread

b. owasp

c. stride

d. dar

  • a. dread

Q. Out of the following which is not element of threat modelling

a. asset

b. vulnerability

c. threat

d. time

  • d. time

Q. Request field is present in which message format?

a. request message

b. response message

c. both request andresponse

d. neither request norresponse

  • a. request message

Q. CoAP is specialized for

a. internet applications

b. device applications

c. wireless applications

d. wired applications

  • a. internet applications

Q. Which layer is CoAP?

a. control layer

b. transport layer

c. service layer

d. application layer

  • c. service layer

Q. CoAP provides which of the following requirements?

a. multicast support and simplicity

b. low overhead and multicast support

c. simplicity and low overhead

d. multicast support,low over head, and simplicity

  • d. multicast support,low over head, and simplicity

Q. CoAP is a specialized protocol.

a. web transfer

b. power

c. application

d. resource

  • a. web transfer

Q. URI and content type support is which protocol feature?

a. http

b. udp

c. coap

d. spi

  • c. coap

Q. What is the full form of WLAN?

a. wide local areanetwork

b. wireless local areanetwork

c. wireless land accessnetwork

d. wireless local areanode

  • b. wireless local areanetwork

Q. Which of the following is not a characteristic of a ZigBee network?

a. low powerconsumption

b. easy installation.

c. high data rates.

d. unlicensed radiobands.

  • c. high data rates.

Q. Which of the following IEEE standards provides the lowest level of the ZigBeesoftware stack?

a. ieee 802.11.

b. ieee 802.15.1.

c. ieee 802.15.3.

d. ieee 802.15.4.

  • d. ieee 802.15.4.

Q. Which of the following layers are defined by the ZigBee stack?

a. transport layer

b. physical layer.

c. application supportsub-layer.

d. medium access layer

  • d. medium access layer

Q. What is the typical range of transmission distance in a ZigBee network?

a. 5 m.

b. 50 m.

c. 500 m.

d. 5 km

  • b. 50 m.

Q. _ is an attack which forces an end user to execute unwanted actions on aweb application in which he/she is currently authenticated.

a. cross-site scoringscripting

b. cross-site requestforgery

c. two-factorauthentication

d. cross-site scripting

  • d. cross-site scripting
Subscribe Now

Get All Updates & News