Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Network bottlenecks occur when              data sets must be transferred

A. large
B. small
C. big
D. all of the mentioned
Answer» B. small
2.

Amazon AWS Consists of following services

A. iaas
B. paas
C. saas
D. all of above
Answer» E.
3.

RDS is a type of database

A. sql
B. nonsql
C. simple storage
D. all of above
Answer» B. nonsql
4.

Dynamodb is type of storage

A. nonsql
B. sql
C. simple storage
D. all of above
Answer» B. sql
5.

Cloud                  are standardized in order to appeal to the majority of its audience.

A. svas
B. slas
C. sals
D. none of the mentioned
Answer» C. sals
6.

                   computing refers to applications and services that run on a distributed network using virtualized resources.

A. distributed
B. cloud
C. soft
D. parallel
Answer» C. soft
7.

The reputation for cloud computing services for the quality of those services is shared by

A. replicas
B. shards
C. tenants
D. all of the mentioned
Answer» D. all of the mentioned
8.

                       is a function of the particular enterprise and application in an on- premises deployment.

A. vendor lock
B. vendor lock-in
C. vendor lock-ins
D. none of the mentioned
Answer» C. vendor lock-ins
9.

.                  as a utility is a dream that dates from the beginning of the computing industry itself

A. model
B. computing
C. software
D. all of the mentioned
Answer» C. software
10.

Point out the wrong statement

A. applications benefit from deployment in the cloud
B. start very small and become big very fast
C. technology it is built on is evolutionary
D. none of the mentioned
Answer» D. none of the mentioned
11.

Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

A. iaas
B. paas
C. saas
D. all of the mentioned
Answer» B. paas
12.

Which of the following is essential concept related to Cloud?

A. reliability
B. productivity
C. abstraction
D. all of the mentioned
Answer» D. all of the mentioned
13.

The three major components of RFID hardware based on functionality include :

A. rfid reader
B. reader antenna
C. reader
D. all of the above
Answer» E.
14.

Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor

A. i, ii, iii
B. i, ii, iii, iv
C. ii, iii, iv
D. i, ii, iv
Answer» B. i, ii, iii, iv
15.

Even with two-factor authentication, users may still be vulnerable to attacks.

A. scripting
B. cross attack
C. man-in-the-middle
D. radiant
Answer» D. radiant
16.

Process of identifying any individual

A. auditing
B. authorisation
C. authentication
D. accounting
Answer» D. accounting
17.

Process that prevents someone from denying that she accessed resource

A. accounting
B. non-repudiation
C. sniffing
D. authorisation
Answer» C. sniffing
18.

Which of the following is not a correct way to secure communication layer

A. cloud initiated communication
B. tls/ssl
C. ips(intrusion prevention system)
D. firewalls
Answer» B. tls/ssl
19.

Which of the following is not the component of IoT Endpoint

A. sensor
B. gateway
C. communication module
D. mcu
Answer» C. communication module
20.

Which of the following makes sure that data is not changed when it not supposed to be?

A. integrity
B. availability
C. confidentiality
D. accounting
Answer» B. availability
21.

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A. availability
B. accounting
C. integrity
D. confidentiality
Answer» E.
22.

When did the SCADA start?

A. 1980s
B. 1990s
C. 1970s
D. 1960s
Answer» C. 1970s
23.

RFID stands for?

A. random frequency identification
B. radio frequency identification
C. random frequency information
D. radio frequency information
Answer» C. random frequency information
24.

Which of the following is not involved in working of IoT?

A. rfid
B. sensor
C. nano tech
D. server
Answer» E.
25.

Which of these statements regarding sensors is TRUE?

A. sensors are input devices.
B. sensors can be analog as well as digital
C. sensors respond to some external stimuli.
D. all of these
Answer» E.
26.

M2M is a term introduced by

A. iot service providers
B. fog computing service providers
C. telecommunication service providers
D. none of these
Answer» D. none of these
27.

In threat modeling, what methodology used to perform risk analysis

A. dread
B. owasp
C. stride
D. dar
Answer» B. owasp
28.

Out of the following which is not element of threat modelling

A. asset
B. vulnerability
C. threat
D. time
Answer» E.
29.

Smart Dust can be used to measure the

A. temperature of the industrial lathe machine
B. heat inside a computer’s cpu
C. chemical in the soil
D. strength of a solid material
Answer» D. strength of a solid material
30.

Request field is present in which message format?

A. request message
B. response message
C. both request and response
D. neither request nor response
Answer» B. response message
31.

CoAP is specialized for

A. internet applications
B. device applications
C. wireless applications
D. wired applications
Answer» B. device applications
32.

Which layer is CoAP?

A. control layer
B. transport layer
C. service layer
D. application layer
Answer» D. application layer
33.

CoAP provides which of the following requirements?

A. multicast support and simplicity
B. low overhead and multicast support
C. simplicity and low overhead
D. multicast support, low over head, and simplicity
Answer» E.
34.

CoAP is a specialized protocol.

A. web transfer
B. power
C. application
D. resource
Answer» B. power
35.

URI and content type support is which protocol feature?

A. http
B. udp
C. coap
D. spi
Answer» D. spi
36.

Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A. ieee 802.16
B. ieee 802.3
C. ieee 802.11
D. ieee 802.15
Answer» D. ieee 802.15
37.

What is the full form of WLAN?

A. wide local area network
B. wireless local area network
C. wireless land access network
D. wireless local area node
Answer» C. wireless land access network
38.

Which of the following is not a characteristic of a ZigBee network?

A. low power consumption
B. easy installation.
C. high data rates.
D. unlicensed radio bands.
Answer» D. unlicensed radio bands.
39.

Which of the following layers are defined by the ZigBee stack?

A. transport layer
B. physical layer.
C. application support sub-layer.
D. medium access layer
Answer» E.
40.

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A. ieee 802.11.
B. ieee 802.15.1.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» E.
41.

What is the typical range of transmission distance in a ZigBee network?

A. 5 m.
B. 50 m.
C. 500 m.
D. 5 km
Answer» C. 500 m.
42.

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. cross-site scoring scripting
B. cross-site request forgery
C. two-factor authentication
D. cross-site scripting
Answer» E.
43.

Representational State Transfer (REST) is the standard interface between

A. two machines in a lan
B. http client and user
C. http client and servers
D. none of the above
Answer» D. none of the above
44.

In 6LoWPAN address, how many bits are globally unique?

A. 16 bits
B. 32 bits
C. 64 bits
D. 128 bits
Answer» D. 128 bits
45.

IEEE 802.15.4 uses which of the following for accessing the channel?

A. carrier sense multiple access (csma)
B. carrier sense multiple access with collision detection (csma-cd)
C. carrier sense multiple access with collision avoidance (csma-ca)
D. none of these
Answer» D. none of these
46.

Which of the following is not a messaging mode in CoAP?

A. confirmable
B. separate
C. direct
D. piggyback
Answer» D. piggyback
47.

Three parts of GPS include:

A. space segment
B. control segment
C. user segment
D. all of the above
Answer» E.
48.

                 is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A. cloud-physical system
B. cyber-space system
C. cyber-physical system
D. none of the above
Answer» D. none of the above
49.

                 is the degree to which nodes have a common set of connections to other nodes

A. structural hole
B. structural equivalence
C. structural cohesion
D. none of the above
Answer» D. none of the above
50.

The social circles are loosely coupled if there is                   stringency of direct contact.

A. less
B. more
C. equal
D. no
Answer» B. more