IOT MCQ With Answer - 1

IOT MCQ

SPOS MCQ

Internet Of Things (IOT) MCQ With Answer

1. _________ allows us to control electronic components

a) RETful API
b) UDP
c) HTTP
d) MQTT

2. MQTT stands for _____________

a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport

3. MQTT is _________ protocol.

a) Machine to Machine
b) Internet of Things
c) Machine to Machine and IOT
d) Machine Things

4. Which protocol is lightweight?

a) MQTT
b) HTTP
c) CoAP
d) SPI

5. _________ specifies the function that will be called when there is a new message received from the channel.

a) Reconnect
b) Error
c) Connect
d) Callback

6. The core element is operated by ________

a) PaaS
b) IoT service Provider
c) SaaS
d) IaaS

7. IoT promotes the creation of IoT terminal industry ________

a) Devices
b) Network
c) Clusters
d) Things

8. Which protocol is used to link all the devices in the IoT?

a) TCP/IP
b) Network
c) UDP
d) HTTP

9. The number of elements in the Open IoT Architecture?

a) 6 elements
b) 8 elements
c) 7 elements
d) 3 elements

10. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called?

a) Bluetooth
b) WiMax
c) Weightless
d) Zigbee

11. What is the sensor/protocol used in GSN?

a) HTTP protocol
b) CoAP protocol
c) MQTT protocol
d) XMPP protocol

12. . ___________ is a community that is working together to establish an IoT architecture

a) Eclipse IoT
b) Red Hat
c) Intercloud
d) Bot 2 Bot

13. _________ an open source stack for gateways and the edge.

a) Eclipse Kapua
b) Red Hat
c) Intercloud
d) Eclipse Kura

14. Which is the core wrapper of GSN?

a) Serial
b) UDP
c) GPSTest
d) ZeroMQWrapper

15. What is ESP8266?

a) WIFI module
b) Sensor
c) Board
d) USB cable

16. How many pins does temperature sensor have?

a) 5 legs
b) 2 legs
c) 4 legs
d) 3 legs

17. Monnit temperature sensor is used for what?

a) Accurate results
b) To measure the temperature at high degree
c) Temperature sensor
d) Pressure sensor

18. Electric motor protection has which sensor?

a) Pressure sensor
b) Touch sensor
c) Temperature sensor
d) Humidity sensor

19. Which of the following component of Web service describes interfaces to web services?

A. UDDI
B. WSDL
C. SOAP
D. None of the above.

20. Which of the following layer in Web Service Protocol Stack is responsible for centralizing services into a common registry and providing easy publish/find functionality?

A. Service Transport
B. XML Messaging
C. Service Description
D. Service Discovery

21. Which of the following layer in Web Service Protocol Stack is responsible for encoding messages in a common XML format so that messages can be understood at either end?

A. Service Transport
B. XML Messaging
C. Service Description
D. Service Discovery

22. What SOAP stands for?

A. State Access Object Protocol
B. State Allied Object Protocol
C. Simple Access Object Protocol
D. Simple Allied Object Protocol

23. How response is sent in XML-RPC?

A. XML responses are appended to the url of the HTTP response.
B. XML responses are embedded in the body of the HTTP response.
C. Both of the above.
D. None of the above.

24. Which of the following is correct about SOAP?

A. SOAP is an XML-based protocol for exchanging information between computers.
B. SOAP is a communication protocol.
C. SOAP is for communication between applications.
D. All of the above.

25. The first line of HTTP request message is called _____________

a) Request line
b) Header line
c) Status line
d) Entity line

26. Which among the following indicates the correct expansion of WiFS?"

a) Wide Field Sensor
b) Wireless Fidelity Sensor
c) Wide Fidelity Sensor

27. IRS P3 satellite uses which of the following sensors?

a) PAN
b) LISS-III
c) MOS
d) LISS-II

28. The sensor used in the digital elevation model can identify contour heights greater than _____

a) 5 m
b) 30 m
c) 20 m
d) 10 m

29. IRS 1A and 1B satellites can carry which of the following sensors?"

a) LISS-IV
b) LISS-III
c) LISS-I
d) LISS-V

30. What is the default user in Debain on Raspberry Pi?

a) Default
b) User
c) Pi
d) Root

31. Bluetooth allows the station to define a quality of

A. Time Level
B. Service Level
C. Data Level
D. Segment Level

32. In TDMA, the primary and secondary devices communicate with each other using

A. Full-duplex mode
B. Half-Duplex mode

33. A Bluetooth network is called

A. Wireless Network
B. WAN
C. Piconet
D. LAN

34. Bluetooth has used a sophisticated version of

A. CSK
B. FSK
C. TDMA
D. CDMA

35. Bluetooth network consists of one primary device and up to

A. 5 Devices
B. 7 Devices
C. 9 Devices
D. 11 Devices

36. In the version field of IPv4 header, when the machine is using some other version of IPv4 then the datagram is

A. Discarded
B. Accepted
C. Interpreted
D. Interpreted incorrectly

37. The header of the datagram in the IPv4 has

A. 0 to 20 bytes
B. 20 to 40 bytes
C. 20 to 60 bytes
D. 20 to 80 bytes

38. In the IPv4 layer, the datagram is of

A. Fixed length
B. Variable length
C. Global length
D. 0 length

39. In IPv4, the service type of the service in the header field, the first 3 bits are called

A. Type of service
B. Code bits
C. Sync bits
D. Precedence bits

40. An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and

A. TCP
B. CDM protocols
C. ATM protocols
D. IEEE protocols

41. which of the following tag is used to mark a beginning of paragraph ?

TD
br
P
TR

42. Networking Hardware Address is referred with ________

a) IP address
b) MAC address
c) NIC
d) Organizationally Unique

43. On wireless networks ________ filtering is the security measure.

a) OUI
b) IP
c) NIC
d) MAC

44. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD

45. What is the format of IP address?

a) 34 bit
b) 64 bit
c) 16 bit
d) 32 bit

46. Many desktops and operating systems include which protocol?

a) IPv6 protocol
b) IPv4 protocol
c) Both IPv6 and IPv4 protocol
d) IPv3 protocol

47. The design of the Internet protocol suites adhere to the ________ principle.

a) Data corruption
b) Connection oriented
c) End to End principle
d) Reliability

48. ___________ adjusts the segment size to be smaller than MTU.

a) Internet Protocol 6
b) User Datagram Protocol
c) Internet Protocol 4
d) Transmission Control Protocol

49. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?

1022
1023
2046
2047

50. The size of an IP address in IPv6 is _________

a) 4 bytes
b) 128 bits
c) 8 bytes
d) 100 bits

51. The header length of an IPv6 datagram is ___________

a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes

52. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field

53. IPv6 does not use _________ type of address.

a) broadcast
b) multicast
c) anycast
d) unicast

54. Which among the following features is present in IPv6 but not in IPv4?

a) Fragmentation
b) Header checksum
c) Options
d) Anycast address

55. The _________ field determines the lifetime of IPv6 datagram

a) Hop limit
b) TTL
c) Next header
d) Type of traffic

56. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______

a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79

57. The application layer protocol used by a Telnet application is ________

a) Telnet
b) FTP
c) HTTP
d) SMTP

58. _______ allows you to connect and login to a remote computer

a) Telnet
b) FTP
c) HTTP
d) SMTP

59. Telnet is used for _______

a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site

60. WPA2 is used for security in _______

a) Ethernet
b) Bluetooth
c) Wi-Fi
d) Email

61. An attempt to make a computer resource unavailable to its intended users is called ______

a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process

Your review for this post?