In threat modeling, what methodology used to perform risk analysis
A) dread
B) owasp
C) stride
D) dar
Correct Answer:
Verified
Q41: RFID stands for?
A)random frequency identification
B)radio frequency identification
C)random
Q42: Which of the following is not involved
Q43: M2M is a term introduced by
A)iot service
Q44: Which of these statements regarding sensors is
Q45: Smart Dust can be used to measure
Q47: Out of the following which is not
Q48: Request field is present in which message
Q49: CoAP is specialized for
A)internet applications
B)device applications
C)wireless applications
D)wired
Q50: Which layer is CoAP?
A)control layer
B)transport layer
C)service layer
D)application
Q51: An application that needed_ storage alone might
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents