Explore topic-wise MCQs in Internet of things (IoT).

This section includes 254 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.

1.

FTP differs form other client-server applications because it establishes ______ connections between hosts.

A. only one
B. two
C. three
D. four
Answer» C. three
2.

Consider the set of activities related to e-mailA : Send an e-mail from a mail client to mail serverB : Download e-mail headers from mail box and retrieve mails from server to a cacheC : Checking e-mail through a web browserThe application level protocol used for each activity in the same sequence is

A. SMTP, HTTPS, IMAP
B. SMTP, POP, IMAP
C. SMTP, IMAP, HTTPS
D. SMTP, IMAP, POP
Answer» D. SMTP, IMAP, POP
3.

Match the following:a)UDPi)Message Transfer Protocolb)OSPFii)Bit-oriented Protocolc)SMTPiii)Interior Gateway Routing Protocold) HDLCiv) Connectionless Transport Protocol

A. a-iii, b-iv, c-ii, d-i
B. a-iv, b-iii, c-ii, d-i
C. a-iv, b-iii, c-i, d-ii
D. a-iii, b-iv, c-i, d-ii
Answer» D. a-iii, b-iv, c-i, d-ii
4.

Mechanism that is used to convert domain name into IP address is known as _________.

A. URL
B. DNS
C. FTP
D. HTTP
Answer» C. FTP
5.

Match the following protocols with their descriptions.1. httpA. Used to log in over a TCP/IP connection2. FTP B. This Protocol used in the file transfer on the Internet and within private networks3. telnetC. It is the application protocol used for distributed and collaborative hypermedia information system

A. 1 - C, 2 - B, 3 - A
B. 1 - A, 2 - B, 3 - C
C. 1 - A, 2 - C, 3 - B
D. 1 - B, 2 - A, 3 - C
Answer» B. 1 - A, 2 - B, 3 - C
6.

A graphical HTML browser resident at a network client machine Q accesses a static HTML webpage from a HTTP server S. The static HTML page has exactly one static embedded image which is also at S. Assuming no caching, which one of the following is correct about the HTML webpage loading (including the embedded image)?

A. Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP connection to server S
B. Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is sufficient
C. A single HTTP request from Q to S is sufficient, and a single TCP connection between Q and S is necessary for this
D. A single HTTP request from Q to S is sufficient, and this is possible without any TCP connection between Q and S
Answer» C. A single HTTP request from Q to S is sufficient, and a single TCP connection between Q and S is necessary for this
7.

FTP uses ______ number of connections for transferring files.

A. 4
B. 2
C. 1
D. 3
Answer» C. 1
8.

___________ command is used by the receiving server in order to verify whether the given username is valid or not.

A. Verify
B. Data
C. Size
D. EXPN
Answer» B. Data
9.

_______ Transfer messages from sender’s mail servers to the recipient’s mail severs using ____ connections.

A. POP3; UDP
B. POP3; TCP
C. SMTP; HTTP
D. SMTP; TCP
Answer» E.
10.

LDAP works on the ________ layer of OSI Model

A. Physical
B. Network
C. Application
D. Transport
Answer» D. Transport
11.

A layer which is above the Presentation layer in OSI model is

A. Data Link Layer
B. Physical Layer
C. Application Layer
D. Session Layer
Answer» D. Session Layer
12.

______ possible labels are allowed in the first level of generic domain.

A. 10
B. 12
C. 16
D. none of the options
Answer» E.
13.

A _______ shows the time a packet was produced relative to the first or previous packet.

A. timestamp
B. playback buffer
C. sequence number
D. none of the above
Answer» B. playback buffer
14.

__________ encoding is based on the science of psychoacoustics, which is the study of how people perceive sound.

A. Predictive
B. Perceptual
C. both a and b
D. none of the above
Answer» C. both a and b
15.

File Transfer Protocol (FTP), uses the same operation used by

A. ICMP
B. STMP
C. TCP
D. FSK
Answer» D. FSK
16.

PPP handles ....................

A. Error detection
B. Error creation
C. Application
D. Automation
Answer» B. Error creation
17.

Using IMAP, the e-mails are stored at ....................

A. User's PC
B. Router
C. Gateway
D. Server
Answer» E.
18.

__________ is the protocol designed to handle real-time traffic on the Internet.

A. TCP
B. UDP
C. RTP
D. none of the above
Answer» D. none of the above
19.

INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI.

A. MIB
B. SNMP
C. ASN.1
D. none of the above
Answer» D. none of the above
20.

The _______ field in the SNMP PDU reports an error in a response message.

A. community
B. enterprise
C. error status
D. none of the above
Answer» D. none of the above
21.

In the architecture of e-mail, we can have

A. 2 Scenarios
B. 3 Scenarios
C. 4 Scenarios
D. 6 Scenarios
Answer» E.
22.

MTA stands for

A. Message transmission agent
B. Message transfer agents
C. Message transmission align
D. Message transfer again
Answer» C. Message transmission align
23.

_______ are used to number the packets of a real-time transmission.

A. Timestamps
B. Playback buffers
C. Sequence numbers
D. none of the above
Answer» D. none of the above
24.

To translate the message semantics from one format to other, ............... is used.

A. application gateway
B. transport gateway
C. session gateway
D. network gateway
Answer» B. transport gateway
25.

In a real-time video conference, data from the server is _______ to the client sites.

A. unicast
B. multicast
C. broadcast
D. none of the above
Answer» C. broadcast
26.

In electronic mail, the MTA transfers the mail across the Internet via

A. LAN
B. WAN
C. MAN
D. both a and b
Answer» E.
27.

SMI uses another standard, ___________, to encode data to be transmitted over the network.

A. MIB
B. ANS.1
C. BER
D. none of the above
Answer» D. none of the above
28.

What is the port number for (Post Office Protocol) POP3?

A. 21
B. 110
C. 120
D. 90
Answer» C. 120
29.

For transmission FTP requires

A. 2 connections
B. 3 connections
C. 4 connections
D. 5 connections
Answer» B. 3 connections
30.

Mail access starts with the client when the user needs to download e-mail from the

A. Mail Box
B. Mail Server
C. Mail Host
D. Internet
Answer» B. Mail Server
31.

_________ is not suitable for interactive multimedia traffic because it retransmits packets in case of errors.

A. UDP
B. TCP
C. both a and b
D. none of the above
Answer» C. both a and b
32.

A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance.

A. less than 10
B. more than 10
C. exactly 10
D. none of the above
Answer» C. exactly 10
33.

Most TELNET implementations operate in one of the modes

A. Default mode
B. Character mode
C. Line mode
D. All of them
Answer» E.
34.

SMI defines two structured data types: ________ and _________.

A. sequence; atomic
B. sequence; sequence of
C. a sequence of; array
D. none of the above
Answer» C. a sequence of; array
35.

An SNMP agent can send _______ messages.

A. GetRequest
B. SetRequest
C. Trap
D. none of the above
Answer» D. none of the above
36.

_______ runs the SNMP client program; _______ runs the SNMP server program.

A. A manager; a manager
B. An agent; an agent
C. A manager; an agent
D. An agent; a manager
Answer» D. An agent; a manager
37.

What is the port number for (Trivial File Transfer Protocol) TFTP?

A. 65
B. 67
C. 63
D. 69
Answer» E.
38.

We can divide audio and video services into _______ broad categories.

A. three
B. two
C. four
D. none of the above
Answer» B. two
39.

All objects managed by SNMP are given an object identifier. The object identifier always starts with _______.

A. 1.3.6.1.2.1
B. 1.3.6.1.2.2
C. 1.3.6.1.2.3
D. none of the above
Answer» B. 1.3.6.1.2.2
40.

________ audio/video refers to on-demand requests for compressed audio/video files.

A. Streaming live
B. Streaming stored
C. Interactive
D. none of the above
Answer» C. Interactive
41.

We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________.

A. SMNP
B. MIB
C. SMI
D. none of the above
Answer» D. none of the above
42.

In Remote Logging, a user logs into a local timesharing system, it is called

A. local log-in
B. local log-out
C. local login Code
D. local log-off code
Answer» B. local log-out
43.

If the sender wants an option enabled by the receiver, it sends a _______ command.

A. WILL
B. DO
C. WONT
D. none of the above
Answer» C. WONT
44.

If the sender wants an option disabled by the receiver, it sends a _______ command.

A. WILL
B. DO
C. DONT
D. none of the above
Answer» D. none of the above
45.

If the sender wants to disable an option, it sends a _______ command.

A. WILL
B. DO
C. WONT
D. none of the above
Answer» D. none of the above
46.

What is the port number for SSH Remote login service?

A. 22
B. 23
C. 26
D. 29
Answer» B. 23
47.

SNMP defines the ___________________ to be sent from a manager to an agent and vice versa.

A. format of the packets
B. encoding of the packets
C. number of packets
D. none of the above
Answer» B. encoding of the packets
48.

To prevent _________, we can timestamp the packets and separate the arrival time from the playback time.

A. error
B. jitter
C. either a or b
D. none of the above
Answer» C. either a or b
49.

A _______ adds signals from different sources to create a single signal.

A. timestamp
B. sequence number
C. mixer
D. none of the above
Answer» D. none of the above
50.

To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure.

A. linear
B. tree
C. graph
D. none of the above
Answer» C. graph