You are on page 1of 38

1.

Which of the
following is the java
extension file in IoT?
A..exe B..py C..c D. .jar Q2.
Which of the following
class handles Publishing
messages? A.Publish()
B.Server() C. Client()
D.Batch() Q3. What is the
full form of IaaS?
A.Internet as a Software
B.Internet as a Service
C.Infrastructure as a Software
D. Infrastructure as a
Service Q4. What is the
minimum value which
an application shall
exceed to be offloaded?
A.Static value B. Threshold
value
C.Dynamic value D.Critical
value Q5. Which of the
following process has to
support the definition of
application topologies in
various formats? A.Top-
down and bottom-up
B.Management and
Configuration C. Enrichment
of Topology specification
D.Support of different
Migration types Q6.
Software that address
the data protection is
divided into.............. A.1
segment B.2 segments C. 3
segments D.4 segments
Q7.............types of voice
communications are in
IoT environment. A.2 B.
3 C.4 D.5 Q8. IoT devices
can easily lead to
catastrophe
without...............
A.Software B.Devices
C.Cloud D. Management
system Q9. Which of the
following category is
used for business to
consumer process?
A.Group IoT B.Community
IoT C.Personal IoT D.
Industrial IoT
Q10. Which is the future
application of IoT?
A.QoS in communication B.
Role of green IoT system
C.Secure communication
D.Multimedia communication
Q11. Which of the
following option allows
us to monitor the
application? A. Boot
B.Endpoints C.Actuators
D.Hypermedia Q12. Which
of the following is not a
data link layer
technology? A.UART
B.Bluetooth C. HTTP D.WiFi
Q13. Which of the
following layer is called
a port layer in OSI
model? A.Application
B.Presentation C. Session
D.Transport Q14. Which of
the following is not a
networking device?
A.Switch B. Traffic Analyzer
C.Router D.Bridge
Q15...........is the
standard length of MAC
address?
A.8 bits B.16 bits C.32 bits D.
48 bits Q16. What is the
full form of VNC? A.
Virtual Network
Computing B.Various
Network computers C.Virtual
Network Communication
D.None of the above Q17.
Which of the following is
not LPWAN
technologies? A.SigFox
B.NB-IoT C.LoRa D. WiFi
Q18. Which language is
preferred for IoT
analytics ? A.C ++ B.
Python C.HTML D.PHP
Q19. What does CGI
stands for in IOT?
A.Common Gateway Interest
B.Common Gateway Interface
C.Common Gate Interference
D. Computer Generated
Imagery Q20. Which of
the following is
Raspbian? A . O S
B.Assembler C.Language
D.Compiler Q21. What is
the full form of IoT? A.
Internet of Things
B.Internet of Tracking
C.Interaction of Things
D.None of above Q22.
What is the role of
Gateway in smart grid
architecture of IoT?
A.Security B.Store data C.
Collect data D.Manage data
Q23. Which of the
following is not an
advantage of IoT? A.
Security B.Reduced Waste
C.Enhanced Data Collection
D.Improved Customer
Engagement Q24. The IoT
platforms are mainly
divided into..................
A.2 types B.3 types C. 4 types
D.5 types Q25. The core
element is operated
by................. A.IaaS B.PaaS
C.SaaS D. IoT service
Provider

A.system

B.devices

C.network

D.multi homing

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
No explanation is given for this question Let's Discuss on Board
2.

What is the default user in Debain on Raspberry Pi?


A.default

B.user

C.pi

D.root

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
No explanation is given for this question Let's Discuss on Board
3.

Using which customized endpoint will be accessed


over HTTP?
A.id and enabled

B.enabled

C.sensitive

D.id

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
No explanation is given for this question Let's Discuss on Board
4.

6LoWPAN Adaption layer contains?


A.header compressio n

B.fragmentat ion

C.layer 2 forwarding

D.header compressio n, fragmentat ion, and layer 2 forwarding

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
No explanation is given for this question Let's Discuss on Board
5.

Who will use their own IoT business models?


A.paas

B.saas

C.iaas

D.service provider

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
A.

system
B.

devices
C.

network
D.

multi homing
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D
No explanation is given for this question Let's Discuss on Board
2.
A.

default
B.

user
C.

pi
D.

root
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option C
No explanation is given for this question Let's Discuss on Board
3.
A.

id and enabled
B.

enabled
C.

sensitive
D.

id
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D
No explanation is given for this question Let's Discuss on Board
4.
A.
header compressio n
B.

fragmentat ion
C.

layer 2 forwarding
D.

header compressio n, fragmentat ion, and layer 2 forwarding


Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D
No explanation is given for this question Let's Discuss on Board
5.
A.

paas
B.

saas
C.

iaas
D.

service provider
Answer & Solution Discuss in Board Save for Later
Answer & Solution
Answer: Option D

1. What is the full form of IANA?


1.

A. Internal Assessment Numerical Access

B. Internet Association Numbers Authority

C. International Aid For Network Automation

D. Internet Assigned Numbers Authority

Answer:- D
2. IoT stands for:
1.

A. Internet of Tech

B. Incorporation of Things

C. Internet of Things

D. Incorporation of Technology

Answer:- C
3. Which of the following can not be considered an IoT device?
1.

A. Smartwatch

B. Andriod Phone

C. Laptop

D. Tubelight

Answer:- D
4. Which is not an IoT platform?
1.

A. Xiaomi Cloud
B. GoogleCloud

C. Myntra

D. AWS(Amazon Web Services)

Answer:- C
Explanation: AWS, Google Cloud, and Xiaomi Cloud deliver cloud computing IoT services. But
Myntra is an e-commerce website that supplies goods.

5. Which of the following can not be considered an IoT device?


1.

A. Smartwatch

B. Andriod Phone

C. Laptop

D. Tubelight

Answer:- D
6. IoT is based on ______ technology.
1.

A. Hardware

B. Software

C. None

D. Both of these

Answer:- D
7. What is the standard form of RFID?
1.

A. Radio Frequency Identification

B. Radio Waves Frequency Identification

C. Radio Frequency InterDependent

D. Radio Wave Frequency Independent

Answer:- A
8. What is considered the standard length for a MAC Address?
1.
A. 8 bits

B. 32 bits

C. 48 bits

D. None of these

Answer:- C
9. What “bit” represents the address bit in the control register?
1.

A. MML

B. ML

C. MX

D. MM

Answer:- C
10. What is mandatory for an IP Packet to contain?
1.

A. Destination IP Address

B. Source IP Address

C. Both of these

D. None of these

Answer:- C
Explanation: Each IP Packet must contain source and destination IP addresses.

11. At which level does the router operate in the OSI reference model?
1.

A. Data Link

B. Network

C. Physical

D. None of these

Answer:- B
12. What is an IoT network?
1.

A. a collection of networked devices

B. a collection of Interconnected devices

C. a collection of signalled devices

D. None of the above

Answer:- B
Explanation: IoT is a massive network of devices that are connected with each other. These devices
collect and transmit data to each other.

13. Full form of MQTT?


1.

A. Message Queue Telemetry Transport

B. Messanger Queue Telemetry Transport

C. Message Queuery Telemetry Transport

D. None of these

Answer:- A
14. Full-Form of VNC:
1.

A. Virtual network of computers

B. Very network of computers

C. Virtual network for communication

D. Virtual network computing

Answer:- D
15. What is the java extension file used in IoT?
1.

A. .jar

B. .obj

C. .cpp

D. .exe
Answer:-A
16. Which one out of these is not a Data Link Layer Technology?
1.

A. Bluetooth

B. Wifi

C. HTTP

D. Mobile Hotspot

Answer:- C
17. What is the standard form of LLN?
1.

A. Lower Lossy Network

B. Low Power Lossy Network

C. Lossy Low Power Network

D. Low Lossy Powered Network

Answer:- B
18. What type of interface is used by fingerprint sensors to collect data?
1.

A. IPI interface

B. UART interface

C. I2P interface

D. None

Answer:- B
19. How many wires does the SPI protocol use?
1.

A. 3

B. 4

C. 2

D. More than 4
Answer:- B
20. Which of the following things is mandatory for the IoT gateway to provide?
1.

A. Simple and secure installation

B. Data network and storage

C. Software Security

D. Protocol abstraction

Answer:- D
Explanation: An IoT gateway must provide a few things like Protocol abstraction, Computing, I/O
performance, and Integration communication capability to enhance the security of the user.

21. In which of the following way, data is associated with an IoT device:
1.

A. Internet

B. Network connection

C. Cables

D. Cloud

Answer:- D
22. Full form of HART:
1.

A. Highway Address Remote Transmitter

B. Highway Addressable Remote Transducer

C. Highway Addressable Router Transmitter

D. Highway Address Remote Transmitter

Answer:- B
23. Full form of LPWAN:
1.

A. Low Power Wide Area Network

B. Lower Power Wide Area of Network

C. Low Protocol Wide Area of Network


D. Long Protocol Wider Area Network

Answer:- A
24. What do API systems enable?
1.

A. Networks service portability is allowed by API

B. Systems service portability is allowed by API

C. Device service portability is allowed by API

D. All of these

Answer:- B
Explanation: API systems enable the portability of Systems Service.

25. What do RETful API systems allow the user?


1.

A. to enhance security

B. to modify communication capability

C. to control electronic components

D. All of these

Answer:- C
26. In IoT, does the _____ layer help in end-to-end communication?
1.

A. security

B. transport

C. data communication

D. logical

Answer:- B
Explanation: The transport layer is used to provide end-to-end communication in IoT.

27. LTE stands for:


1.

A. Long Terminal evolution


B. Lower Terminal evolution

C. Long Term evolution

D. None

Answer:- C
28. Many-Valued Logic is formed because of:
1.

A. binary logic

B. Hexa logic

C. fuzzy logic

D. All of these

Answer:- C
29. The collection of ____ that connects several devices is called the bus.
1.

A. network

B. lines

C. cables

D. None of these

Answer:- B
Explanation: A collection of lines that connects several devices is called bus.

30. ____ is a security mechanism used in WiFi.


1.

A. WPA

B. HTTP

C. MLA

D. None of these

Answer:- A
31. The main purpose of the web of things(WoT) in IoT is:
1.
A. to increase the cost

B. to improve security

C. to improve the usability and interoperability

D. All of these

Answer:- C
Explanation: Web of things(WoT) is used to improve the usability and interoperability of IoT.

32. The storage is _____ in IoT.


1.

A. limited

B. unlimited

C. not available

D. All of these

Answer:- A
Explanation: The storage in IoT is very limited.

33. At what rate can NFC transmit data?


1.

A. 424 Kbps

B. 1106 Kbps

C. 216 Kbps

D. All of these

Answer:- D
Explanation: The NFC can transfer data at any speed of either 212, 1106, or 424 Kbps.

34. The standard form of ICT is:


1.

A. Inter Connected Technology

B. International Connection Technology

C. Inter Communication Technology


D. Information and Communication Technology

Answer:- D
35. Which of the following uses Java Language?
1.

A. GSN

B. MMQT

C. GAN

D. None of these

Answer:- A
Explanation: GSN(Global Sensor Network) uses Java as it is more portable than other languages
like C++, Python, etc.

36. Domain Name System is used to:


1.

A. provide system security

B. enhance network communication

C. increase data and speed

D. obtain IP Address

Answer:- D
37. The standard form of CGI is:
1.

A. Common Gateway of Interest

B. Common Gate Interfere

C. Common Gateway Interdependent

D. None

Answer:- D
Explanation: CGI stands for Common Gateway Interface.

38. Which of the following is not a short-range wireless network?


1.

A. Bluetooth
B. VPN

C. Wifi

D. Hotspot

Answer:- B
Explanation: Those wireless networks having a short-range like Bluetooth and Wifi are called short-
range wireless networks. These are suitable for working in the local environment.

39. A _____ is the component that executes a program in an IoT system.


1.

A. micro converter

B. microcontroller

C. microsensor

D. None

Answer:- B
Explanation: A Microcontroller is a component that executes a program in an IoT system. It consists
of a command unit, storage memory, timers, etc., that are used to handle the execution of a
program.

40. Which of the following is not LPWAN Technologies?


1.

A. LORA

B. SIGFOX

C. NB-IoT

D. Bluetooth

Answer:- D
41. With two-factor Authentication, which attack can be users vulnerable to?
1.

A. Ransome ware Attack

B. Man-in-the-middle attack

C. Cross Attack

D. Radiant Attack
Answer:- B
Explanation: Users may be vulnerable to a man-in-the-middle attack even after two-factor
authentication.

42. Which one out of these is in a format which is not readable by the user?
1.

A. Encryption

B. Passwords

C. .text

D. None of these

Answer:- A
Explanation: Encryption is converting data into a specific form that is unreadable to any other user.

2.

The number of elements in the Open IoT


Architecture?
A.6 elements

B.8 elements

C.7 elements

D.3 elements

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The Open IoT Architecture is typically composed of 7 elements that
collectively form the framework for building IoT solutions. These
elements are:
1. Devices: Physical objects or sensors that gather data from the
environment.

2. Gateway: An intermediary between devices and the cloud,


responsible for data aggregation and preprocessing.
3. Network: The communication infrastructure facilitating data
exchange between devices, gateways, and the cloud.
4. Data Processing: Involves analyzing and processing collected data to
extract valuable insights.
5. Data Storage: Refers to storing processed data in databases or other
storage systems.
6. Application Enablement: Allows the creation of applications utilizing
data and insights from IoT devices.
7. Security: Encompasses measures to ensure the security of IoT data,
communications, and devices.

Hence, the correct answer is Option C: 7 elements. While there may


be variations or additional sub-elements in different interpretations,
the most commonly accepted categorization includes 7 main
elements in the Open IoT Architecture. Options A (6 elements), B (8
elements), and D (3 elements) are not accurate representations of
the commonly accepted elements.

4.

The IoT platforms are mainly divided into how many


types
A.3 types

B.5 types

C.4 types
D.2 types

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
IoT platforms are categorized into four main types based on their
functionalities and capabilities. These types are:
1. Connectivity Management Platforms: These platforms primarily focus
on managing the connectivity between IoT devices and the network.
They handle tasks such as device onboarding, provisioning, and
ensuring seamless communication.

2. Device Management Platforms: These platforms are responsible for


managing the lifecycle of IoT devices. This includes tasks like device
registration, configuration, monitoring, firmware updates, and
troubleshooting.

3. Data Management Platforms: These platforms deal with the collection,


storage, processing, and analysis of the data generated by IoT
devices. They often integrate with data analytics tools to extract
valuable insights.

4. Application Enablement Platforms: These platforms facilitate the


development and deployment of applications that utilize the data
and capabilities of IoT devices. They provide APIs, tools, and services
for building custom IoT applications.

3.

a cellular network is expensive, especially with many


IoT devices.
A.signaling

B.security

C.bandwidth

D.power consumption

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
In the context of Internet of Things (IoT), the use of a cellular network can be
costly, particularly when dealing with a large number of IoT devices. One of the
significant contributing factors to this expense is the power consumption of the
devices. Cellular communication requires energy for transmitting and receiving
data, which can drain the limited power resources of IoT devices, especially
those with small batteries or located in remote areas.

This power consumption issue often necessitates frequent battery replacements


or recharging, leading to increased operational costs and maintenance efforts. In
scenarios where IoT devices are deployed on a massive scale, managing their
power needs becomes a critical concern to ensure the sustainability and cost-
effectiveness of the IoT deployment.

Therefore, the correct answer is Option D: power consumption. Options A


(signaling), B (security), and C (bandwidth) are also relevant factors to consider
in IoT deployments but are not directly linked to the statement about the
costliness of cellular networks for IoT devices.
4.

The IoT platforms are mainly divided into how many


types
A.3 types

B.5 types

C.4 types

D.2 types

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
IoT platforms are categorized into four main types based on their
functionalities and capabilities. These types are:
1. Connectivity Management Platforms: These platforms primarily focus on
managing the connectivity between IoT devices and the network. They handle
tasks such as device onboarding, provisioning, and ensuring seamless
communication.

2. Device Management Platforms: These platforms are responsible for


managing the lifecycle of IoT devices. This includes tasks like device
registration, configuration, monitoring, firmware updates, and troubleshooting.

3. Data Management Platforms: These platforms deal with the collection,


storage, processing, and analysis of the data generated by IoT devices. They
often integrate with data analytics tools to extract valuable insights.

4. Application Enablement Platforms: These platforms facilitate the


development and deployment of applications that utilize the data and
capabilities of IoT devices. They provide APIs, tools, and services for building
custom IoT applications.
5.

empowers IoT by bringing together everyday objects.


A.intelligence

B.connectivity

C.dynamic nature

D.enormous scale

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The concept of the Internet of Things (IoT) is based on connectivity, which
empowers IoT by bringing together everyday objects into a networked
environment. Through connectivity, these objects are able to communicate,
share data, and interact with each other over the internet. This
interconnectedness allows for the collection of data from various sources,
enabling better understanding, control, and automation of processes.

Options A (intelligence), C (dynamic nature), and D (enormous scale) are


important aspects of IoT as well, but connectivity is the foundational element
that enables these other aspects to come into play. While intelligence enhances
the ability of devices to process and analyze data, dynamic nature refers to the
adaptability of IoT systems, and enormous scale highlights the widespread
deployment of connected devices, connectivity is what initially makes all these
possibilities achievable.

Hence, the correct answer is Option B: connectivity. It's the element that enables
the networking of everyday objects to create the IoT ecosystem.
6.

IoT devices are naturally vulnerable to . . . . . . . .


threats.
A.sensors

B.heterogeneity

C.security

D.connectivity

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
IoT devices are inherently susceptible to various security threats due to their
interconnected and often resource-constrained nature. The interconnectedness of
these devices exposes them to potential vulnerabilities that malicious actors can
exploit to gain unauthorized access, manipulate data, or disrupt operations. As
IoT devices collect and transmit sensitive data, inadequate security measures
can result in data breaches and privacy violations.

Option A: Sensors are components of IoT devices that gather data from the
environment. While they can be exploited in some attack scenarios, they are not
the main reason for IoT device vulnerability.
Option B: Heterogeneity refers to the diversity of devices and technologies in
IoT ecosystems. While it can complicate security measures, it is not the primary
cause of vulnerability.
Option D: Connectivity is a fundamental aspect of IoT but is not inherently a
threat. However, the way devices are connected can introduce vulnerabilities if
not properly secured.

Therefore, the correct answer is Option C: security. IoT devices are naturally
vulnerable to security threats due to their interconnected and resource-limited
nature.
7.
IoT is a paradigm that involves ubiquitous presence
in the environment
A.TRUE

B.FALSE

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The statement is true. IoT (Internet of Things) is indeed a paradigm that
involves the ubiquitous presence of interconnected devices in the environment.
In IoT, various objects, sensors, devices, and even everyday items are equipped
with sensors, software, and connectivity, allowing them to collect and exchange
data over the internet. This interconnectedness creates an environment where
devices and objects can communicate, share information, and collaborate to
provide enhanced functionality and services.

Therefore, the correct answer is Option A: TRUE. IoT is characterized by its


widespread and pervasive presence in the environment through interconnected
devices. Option B is incorrect as the statement is true.
8.

What is the java extension file in IoT?


A..jar

B..c

C..exe

D..py
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The Java extension file commonly used in the context of IoT (Internet of
Things) is .jar. A .jar file, which stands for Java Archive, is a compressed file
format that contains Java class files, resources, and metadata. It is used to
package and distribute Java applications and libraries. In IoT, Java is a popular
programming language for developing applications that run on various IoT
devices and platforms.

Options B (.c), C (.exe), and D (.py) represent file extensions for programming
languages other than Java. .c is for C programming language, .exe is for
executable files in Windows, and .py is for Python programming language.

Hence, the correct answer is Option A: .jar. It is the extension commonly


associated with Java files used in IoT development.
9.

What is the role of Cloud in smart grid architecture


of IoT?
A.store data

B.manage data

C.collect data

D.security

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option B
Solution:
In the smart grid architecture of IoT (Internet of Things), the role of
the Cloud goes beyond just storing or collecting data. While the Cloud can
certainly store data, its primary role is to manage data in a way that enables
efficient processing, analysis, and utilization of the vast amount of data
generated by smart grid devices.

The Cloud in smart grid architecture serves as a centralized platform for


aggregating, processing, and analyzing data collected from various IoT-enabled
devices within the grid. It provides the computational resources needed to
handle the data influx, perform real-time analytics, and generate insights that
help optimize grid operations, energy distribution, and consumption patterns.

Options A (store data), C (collect data), and D (security) are relevant aspects of
IoT and smart grid architecture, but Option B (manage data) specifically
highlights the Cloud's crucial role in handling and processing the data collected
from smart grid devices.

Hence, the correct answer is Option B: manage data. The Cloud manages and
processes data to derive meaningful insights and enhance the efficiency of the
smart grid architecture in IoT.
10.

When we hear about IoT, we think of our


A.microphone

B.speaker

C.thermostat

D.transmitter

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
When we hear about IoT (Internet of Things), we often associate it with
devices that are part of our daily lives and surroundings. The thermostat is a
prime example of an IoT device. IoT encompasses the interconnection of
various objects, devices, and sensors to the internet, enabling them to gather and
exchange data, and in the case of a thermostat, control and regulate
environmental conditions.

Option A: While microphones can be part of IoT devices, they are not the most
common or typical representation of IoT in our minds.
Option B: Similar to microphones, speakers can also be connected to IoT
systems, but they do not symbolize IoT as prominently as other devices.
Option D: Transmitters are used for communication, but they are not as
strongly associated with the concept of IoT as a thermostat.

Therefore, the correct answer is Option C: thermostat. When we think of IoT,


devices like thermostats that offer smart control and automation capabilities
often come to mind, as they exemplify the connectivity and convenience that
IoT technology brings to our everyday lives.

You might also like