IOT MCQ With Answer - 1
IOT MCQ
Internet Of Things (IOT) MCQ With Answer
1. _________ allows us to control electronic components
a) RETful APIb) UDP
c) HTTP
d) MQTT
2. MQTT stands for _____________
a) MQ Telemetry Thingsb) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport
3. MQTT is _________ protocol.
a) Machine to Machineb) Internet of Things
c) Machine to Machine and IOT
d) Machine Things
4. Which protocol is lightweight?
a) MQTTb) HTTP
c) CoAP
d) SPI
5. _________ specifies the function that will be called when there is a new message received from the channel.
a) Reconnectb) Error
c) Connect
d) Callback
6. The core element is operated by ________
a) PaaSb) IoT service Provider
c) SaaS
d) IaaS
7. IoT promotes the creation of IoT terminal industry ________
a) Devicesb) Network
c) Clusters
d) Things
8. Which protocol is used to link all the devices in the IoT?
a) TCP/IPb) Network
c) UDP
d) HTTP
9. The number of elements in the Open IoT Architecture?
a) 6 elementsb) 8 elements
c) 7 elements
d) 3 elements
10. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called?
a) Bluetoothb) WiMax
c) Weightless
d) Zigbee
11. What is the sensor/protocol used in GSN?
a) HTTP protocolb) CoAP protocol
c) MQTT protocol
d) XMPP protocol
12. . ___________ is a community that is working together to establish an IoT architecture
a) Eclipse IoTb) Red Hat
c) Intercloud
d) Bot 2 Bot
13. _________ an open source stack for gateways and the edge.
a) Eclipse Kapuab) Red Hat
c) Intercloud
d) Eclipse Kura
14. Which is the core wrapper of GSN?
a) Serialb) UDP
c) GPSTest
d) ZeroMQWrapper
15. What is ESP8266?
a) WIFI moduleb) Sensor
c) Board
d) USB cable
16. How many pins does temperature sensor have?
a) 5 legsb) 2 legs
c) 4 legs
d) 3 legs
17. Monnit temperature sensor is used for what?
a) Accurate resultsb) To measure the temperature at high degree
c) Temperature sensor
d) Pressure sensor
18. Electric motor protection has which sensor?
a) Pressure sensorb) Touch sensor
c) Temperature sensor
d) Humidity sensor
19. Which of the following component of Web service describes interfaces to web services?
A. UDDIB. WSDL
C. SOAP
D. None of the above.
20. Which of the following layer in Web Service Protocol Stack is responsible for centralizing services into a common registry and providing easy publish/find functionality?
A. Service TransportB. XML Messaging
C. Service Description
D. Service Discovery
21. Which of the following layer in Web Service Protocol Stack is responsible for encoding messages in a common XML format so that messages can be understood at either end?
A. Service TransportB. XML Messaging
C. Service Description
D. Service Discovery
22. What SOAP stands for?
A. State Access Object ProtocolB. State Allied Object Protocol
C. Simple Access Object Protocol
D. Simple Allied Object Protocol
23. How response is sent in XML-RPC?
A. XML responses are appended to the url of the HTTP response.B. XML responses are embedded in the body of the HTTP response.
C. Both of the above.
D. None of the above.
24. Which of the following is correct about SOAP?
A. SOAP is an XML-based protocol for exchanging information between computers.B. SOAP is a communication protocol.
C. SOAP is for communication between applications.
D. All of the above.
25. The first line of HTTP request message is called _____________
a) Request lineb) Header line
c) Status line
d) Entity line
26. Which among the following indicates the correct expansion of WiFS?"
a) Wide Field Sensorb) Wireless Fidelity Sensor
c) Wide Fidelity Sensor
27. IRS P3 satellite uses which of the following sensors?
a) PANb) LISS-III
c) MOS
d) LISS-II
28. The sensor used in the digital elevation model can identify contour heights greater than _____
a) 5 mb) 30 m
c) 20 m
d) 10 m
29. IRS 1A and 1B satellites can carry which of the following sensors?"
a) LISS-IVb) LISS-III
c) LISS-I
d) LISS-V
30. What is the default user in Debain on Raspberry Pi?
a) Defaultb) User
c) Pi
d) Root
31. Bluetooth allows the station to define a quality of
A. Time LevelB. Service Level
C. Data Level
D. Segment Level
32. In TDMA, the primary and secondary devices communicate with each other using
A. Full-duplex modeB. Half-Duplex mode
33. A Bluetooth network is called
A. Wireless NetworkB. WAN
C. Piconet
D. LAN
34. Bluetooth has used a sophisticated version of
A. CSKB. FSK
C. TDMA
D. CDMA
35. Bluetooth network consists of one primary device and up to
A. 5 DevicesB. 7 Devices
C. 9 Devices
D. 11 Devices
36. In the version field of IPv4 header, when the machine is using some other version of IPv4 then the datagram is
A. DiscardedB. Accepted
C. Interpreted
D. Interpreted incorrectly
37. The header of the datagram in the IPv4 has
A. 0 to 20 bytesB. 20 to 40 bytes
C. 20 to 60 bytes
D. 20 to 80 bytes
38. In the IPv4 layer, the datagram is of
A. Fixed lengthB. Variable length
C. Global length
D. 0 length
39. In IPv4, the service type of the service in the header field, the first 3 bits are called
A. Type of serviceB. Code bits
C. Sync bits
D. Precedence bits
40. An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and
A. TCPB. CDM protocols
C. ATM protocols
D. IEEE protocols
41. which of the following tag is used to mark a beginning of paragraph ?
TDbr
P
TR
42. Networking Hardware Address is referred with ________
a) IP addressb) MAC address
c) NIC
d) Organizationally Unique
43. On wireless networks ________ filtering is the security measure.
a) OUIb) IP
c) NIC
d) MAC
44. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMAb) CSMA/CA
c) ALOHA
d) CSMA/CD
45. What is the format of IP address?
a) 34 bitb) 64 bit
c) 16 bit
d) 32 bit
46. Many desktops and operating systems include which protocol?
a) IPv6 protocolb) IPv4 protocol
c) Both IPv6 and IPv4 protocol
d) IPv3 protocol
47. The design of the Internet protocol suites adhere to the ________ principle.
a) Data corruptionb) Connection oriented
c) End to End principle
d) Reliability
48. ___________ adjusts the segment size to be smaller than MTU.
a) Internet Protocol 6b) User Datagram Protocol
c) Internet Protocol 4
d) Transmission Control Protocol
49. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum number of hosts per subnet?
10221023
2046
2047
50. The size of an IP address in IPv6 is _________
a) 4 bytesb) 128 bits
c) 8 bytes
d) 100 bits
51. The header length of an IPv6 datagram is ___________
a) 10bytesb) 25bytes
c) 30bytes
d) 40bytes
52. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation fieldb) Fast-switching
c) ToS field
d) Option field
53. IPv6 does not use _________ type of address.
a) broadcastb) multicast
c) anycast
d) unicast
54. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentationb) Header checksum
c) Options
d) Anycast address
55. The _________ field determines the lifetime of IPv6 datagram
a) Hop limitb) TTL
c) Next header
d) Type of traffic
56. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
a) 96 to 127b) 0 to 63
c) 80 to 95
d) 64 to 79
57. The application layer protocol used by a Telnet application is ________
a) Telnetb) FTP
c) HTTP
d) SMTP
58. _______ allows you to connect and login to a remote computer
a) Telnetb) FTP
c) HTTP
d) SMTP
59. Telnet is used for _______
a) Television on netb) Network of Telephones
c) Remote Login
d) Teleshopping site
60. WPA2 is used for security in _______
a) Ethernetb) Bluetooth
c) Wi-Fi
d) Email
61. An attempt to make a computer resource unavailable to its intended users is called ______
a) Denial-of-service attackb) Virus attack
c) Worms attack
d) Botnet process
Post a Comment