Fundamentals of Agile Process MCQ
1. What is the primary focus of the Agile Manifesto? a) Comprehensive documentationb) Following a strict planc) Responding to change and delivering working softwared) Adhering … Read more
1. What is the primary focus of the Agile Manifesto? a) Comprehensive documentationb) Following a strict planc) Responding to change and delivering working softwared) Adhering … Read more
1. Which algorithm is an example of a hierarchical clustering algorithm?a) Apriorib) DBSCANc) FP growthd) BIRCH Answer: d) BIRCH Explanation: BIRCH (Balanced Iterative Reducing and … Read more
1. Which of the following algorithms is NOT considered a statistical-based algorithm in classification? a) Naive Bayes b) Logistic Regression c) k-Nearest Neighbors d) Decision … Read more
1. What are the different types of data in data mining? A) Numeric, categorical, textualB) Structured, unstructured, semi-structuredC) Primary, secondary, tertiaryD) Quantitative, qualitative, ordinal Answer: … Read more
1. What is OLAP? a) Online Longitudinal Analytical Processingb) Online Analytical Processingc) Offline Analytical Processd) Overlooked Analytical Platform Answer: b) Online Analytical ProcessingExplanation: OLAP is … Read more
1. What is the purpose of data preprocessing in the context of data warehousing? a) To enhance data securityb) To prepare raw data for analysisc) … Read more
1. Which tool can be used for spoofing ARP packets on a network? a) Arpingb) Wiresharkc) TCPViewd) Steganos Answer: a) Arping Explanation: Arping is a … Read more
1. What is a common threat in network security that involves an attacker intercepting sensitive information transmitted over a network? a) Phishingb) Spoofingc) Man-in-the-middle (MITM) … Read more
1. Which cryptographic technique ensures the integrity and authenticity of a message by appending a unique code generated with a private key?a) Message Authentication Code … Read more
1. What is the underlying principle behind the Advanced Encryption Standard (AES)? a) Public key encryptionb) Symmetric key encryptionc) Elliptic curve cryptographyd) Quantum cryptography Answer: … Read more