0% found this document useful (0 votes)
189 views

IoT Quiz

The document contains 57 multiple choice questions related to networking, IoT, and programming. The questions cover topics such as networking protocols and standards, IoT technologies, machine learning, analytics, wireless networking, programming in Arduino and Python, and network security. Each question is followed by 4 possible answer choices with one correct answer.

Uploaded by

sharad pareek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views

IoT Quiz

The document contains 57 multiple choice questions related to networking, IoT, and programming. The questions cover topics such as networking protocols and standards, IoT technologies, machine learning, analytics, wireless networking, programming in Arduino and Python, and network security. Each question is followed by 4 possible answer choices with one correct answer.

Uploaded by

sharad pareek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Name:

Roll Number
Branch
Section:

1. Is MQTT a Standard?
o Yes
o No

Ans :

2. IANA stands for:


o a. Internal Assessment Numerical Access
o b. Internet Association Numbers Authority
o c. International Aid for Network Automation
o d. Internet Assigned Numbers Authority
Ans :

3. Standard port number for secure MQTT is:


o a. 1883
o b. 8000
o c. 8883
o d. 8888
Ans :

4. Is CoAP a IETF standard?


o True
o False
Ans :

5. Bluetooth 5.0 promises:


o a. 4x Speed, 2x Range, 2x Data
o b. 6x Speed, 3x Range, 3x Data
o c. 2x Speed, 4x Range, 8x Data
o d. 3x Speed, 4x Range, 8x Data
Ans :

Check-out our free tutorials on IOT (Internet of Things):

6. Terms SSL and TLS stand for:


o a. Secure Socket Layers and Transport Layer Session
o b. Secure Socket Layers and Transport Layer Security
o c. Secure Socket Layout and Transport Level Session
o d. Session Socket Layers and Transport Layer Session
Ans :

7. Which one out of these is not a data link layer technology:


o a. Bluetooth
o b. UART
o c. WiFi
o d. HTTP
Ans :

8. Which transport layer protocols is used by DHCP?


o a. RSVP
o b. TCP
o c. DCCP
o d. UDP
Ans :
9. Which layer is called a port layer in OSI model:
o a. Session
o b. Application
o c. Presentation
o d. Transport
Ans :

10. What is a firewall in computer networks:


o a. A system designed to prevent unauthorized access
o b. A web browser
o c. The physical boundary of network
o d. The Network Operating System
Ans :

11. Router operate at ............ layer of OSI reference model?


o a. Layer 2 (Data Link)
o b. Layer 3 (Network)
o c. Layer 1 (Physical)
o d. Layer 4 (Transport)
Ans :

12. Each IP packet must contain:


o a. Only Destination IP Address
o b. Only Source IP Address
o c. None of Above
o d. Source and destination IP Addresses
Ans :

13. Which one of this is not a networking device:


o a. Router
o b. Switch
o c. Bridge
o d. Traffic Analyzer
Ans :

14. What is the standard length of MAC address:


o a. 16 bits
o b. 32 bits
o c. 48 bits
o d. 64 bits
Ans :

15. What is the use of Ping command:


o a. To know network speed
o b. None of the above
o c. To test a host on the network is reachable
o d. To test storage device
Ans :

16. What is Secure Shell (SSH):


o a. A router
o b. A firewall
o c. A network protocol
o d. Python Shell
Ans :

17. What does VNC stand for:


o a. Various Network computers
o b. Virtual Network Computing
o c. None of the above
o d. Virtual Network Communication
Ans :

18. What is the purpose of bin directory in Linux environment:


o a. Contains essential device files
o b. Contains essential binary commands
o c. Containing configuration files
o d. Contains user home directories
Ans :

19. What is Inter Integrated Communication(I2C):


o a. An application layer protocol
o b. A networking communication protocol for multi-master support
o c. An OS for distributed network communication
o d. A cellular communication protocol
Ans :

20. How many wires does SPI protocol use:


o a. 2
o b. 3
o c. 1
o d. 4
Ans :

21. What does LTE stand for:


o a. Long Term Errors
o b. Long Term Evolution
o c. Lengthy Terminal Estimation
o d. Long Term Estimates
Ans :
22. Which one out of these is not LPWAN technologies:
o a. SigFox
o b. WiFi
o c. NB-IoT
o d. LoRa
Ans :

23. Frequency band used by 802.11 ah standard is:


o a. 60 GHz
o b. 2.4 GHz
o c. Sub 1 GHz
o d. 5 GHz
Ans :

24. Fuzzy Logic is a form of:


o a. Hexa state logic
o b. Two-valued logic
o c. Binary set logic
o d. Many valued logic
Ans :

25. _________ involves predicting a response with meaningful magnitude,


such as quantity sold, stock price, or return on investment.
o a. Summarization
o b. Clustering
o c. All of the mentioned
o d. Regression
Ans :
26. Which of the following language is preferred for IoT analytics ?
o a. Python
o b. S
o c. R
o d. All of the mentioned
Ans :

27. Which one is simplest form of analytics


o a. Predictive
o b. Descriptive
o c. All of the mentioned
o d. Prescriptive
Ans :

28. The method by which companies analyze customer data or other types
of information in an effort to identify patterns and discover relationships
between different data elements is often referred to as:
o
o a. Customer data management
o b. Data mining
o c. Data digging
o d. None of the above
Ans :

29. A collection of lines that connects several devices is called ..............


o a. Bus
o b. Cable
o c. Power line
o d. Transmission Line
Ans :
30. A start bit in UART communication is always:
o a. 1
o b. Neither of these
o c. 0
Ans :

31. Machine learning is


o a. The selective acquisition of knowledge through the use of manual
programs
o b. The autonomous acquisition of knowledge through the use of manual
programs
o c. The selective acquisition of knowledge through the use of computer
programs
o d. The autonomous acquisition of knowledge through the use of
computer programs
Ans :

32. HTTP resources are located by


o a. unique resource locator
o b. unique resource identifier
o c. none of the mentioned
o d. uniform resource identifier
Ans :

33. What is the TCP name for a transport service access point
o a. none of the mentioned
o b. node
o c. pipe
o d. port
Ans :
34. A Denial of Service attack is:
o a. Connection flooding
o b. Bandwidth flooding
o c. All of the mentioned
o d. Vulnerability attack
Ans :

35. A packet sniffer is


o a. Active receiver
o b. Both of the mentioned
o c. Passive receiver
o d. None of the mentioned
Ans :

36. IPSec provides security at:


o a. Physical Layer
o b. Network Layer
o c. Transport Layer
o d. Session Layer
Ans :

37. WPA is a security mechanism in


o a. WiFi
o b. Cloud
o c. Bluetooth
o d. Ethernet
Ans :
38. Network topology with a central hub or switch is
o a. Mesh
o b. Token ring
o c. Star
o d. Token bus
Ans :

39. Internet domain name and hostname are translated into IP address by
o a. Domain name system
o b. Domain name database
o c. Router
o d. Domain information system
Ans :

40. Which protocol allows user at one site to establish connection to


another site and pass keystroke from local to remote host:
o a. Telnet
o b. FTP
o c. IP
o d. HTTP
Ans :

41. How many times setup function runs in Arduino IDE:


o a. None of the above
o b. 10
o c. 2
o d. 1
Ans :

42. How many times loop function runs in Arduino IDE:


o a. 4
o b. forever
o c. 1
o d. 5
Ans :

43. What error occurs when you execute?


x = abc
o a. NameError
o b. SyntaxError
o c. ValueError
o d. TypeError
Ans :

44. PWM stands for:


o a. None of the above
o b. Pulse Width Mode
o c. Pulse With Modulation
o d. Pulse Width Modulation
Ans :

45. Raspbian is:


o a. Assembler
o b. Language
o c. Compiler
o d. OS
Ans :

46. CGI stands for:


o a. Common Gateway Interest
o b. Common Gateway Interrupt
o c. Common Gate Interference
o d. Common Gateway Interface
Ans :

47. MQTT is:


o
o a. Based on client-server architecture
o b. Based on publish-subscribe architecture
o c. Based on both of the above
o d. Based on none of the above
Ans :

48. What is the access point (AP) in wireless LAN?


o a. none of the mentioned
o b. wireless devices itself
o c. both (a) and (b)
o d. device that allows wireless devices to connect to a wired network
Ans :

49. In wireless ad-hoc network


o a. none of the mentioned
o b. access point is not required
o c. nodes are not required
o d. access point is must
Ans :

50. Which multiple access technique is used by IEEE 802.11 standard for
wireless LAN?
o a. ALOHA
o b. CSMA/CA
o c. CDMA
o d. none of the mentioned
Ans :

51. Which is the correct operator for power(x^y)?


o a. x^y
o b. x^^y
o c. x**y
o d. None of the mentioned
Ans :

52. What is WPA?


o a. wi-fi protected access
o b. wired process access
o c. wired protected access
o d. wi-fi process access
Ans :

53. The answer of 2+3L is:


o a. 5.0
o b. 5L
o c. 5
o d. Error
Ans :

54. An interconnected collection of piconet is called


o a. micronet
o b. scatternet
o c. mininet
o d. none of the mentioned
Ans :

55. In a piconet, there can be up to _____ parked nodes in the net.


o a. 511
o b. 63
o c. 255
o d. 127
Ans :

56. Secure shell (SSH) network protocol is used for


o a. remote command-line login
o b. remote command execution
o c. all of the mentioned
o d. secure data communication
Ans :

57. The network layer concerns with


o a. bits
o b. frames
o c. none of the mentioned
o d. packets
Ans :

58. Ethernet frame consists of


o a. none of the mentioned
o b. IP address
o c. both (a) and (b)
o d. MAC address
Ans :

59. What is internet?


o a. interconnection of local area networks
o b. a vast collection of different networks
o c. a single network
o d. none of the mentioned
Ans :

60. DNS database contains


o a. hostname aliases
o b. hostname-to-address records
o c. all of the mentioned
o d. name server records
Ans :

You might also like