Explore topic-wise MCQs in Internet of things (IoT).

This section includes 301 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.

51.

In internetwork, the network layer at the destination is responsible for

A. Address Authentication
B. Address Node
C. Address format
D. Address Verification
Answer» E.
52.

An option that is used by the source to predetermine a route for the datagram as it travels through the Internet is known as

A. Strict Source
B. Strict Source Header
C. Strict Source Route
D. Strict Source Data
Answer» D. Strict Source Data
53.

IPv6 has the large address

A. Protocol
B. Link
C. Space
D. Stations
Answer» D. Stations
54.

An agent contributes to the management process by warning the manager of an

A. unusual situation
B. unusual station
C. unusual database
D. unusual Protocol
Answer» B. unusual station
55.

The first 3 codes in IPv4 Addresses, the telephone networks defines the

A. IP code
B. Local Code
C. Area Code
D. Block Code
Answer» D. Block Code
56.

Network Address Translation (NAT) is used mostly by

A. DSLs
B. ADSL
C. ISPs
D. IPs
Answer» D. IPs
57.

Multicast addresses in Ipv6 starts with

A. 1111
B. 11110000
C. 11111111
D. 0
Answer» D. 0
58.

IPv6 is designed to allow the extension of the

A. Protocol
B. DataSet
C. Headers
D. Routes
Answer» B. DataSet
59.

The value 0000001 of the prefix of the IPv6 address shows the type of

A. Multicast address
B. Unicast address
C. Reserved
D. ISO network addresses
Answer» E.
60.

When the IPv4 protocol sends a datagram, it copies the current value of the counter to the identification field and increments the counter by

A. 1
B. 0
C. -1
D. 2
Answer» B. 0
61.

In IPv6 addresses, the addresses start with eight 0s are called

A. Unicast addresses
B. Multicast addresses
C. Anycast addresses
D. Reserved addresses
Answer» E.
62.

An application-level protocol in which a few manager stations control a set of agents, known as

A. HTML
B. TCP
C. SNMP
D. SNMP/IP
Answer» D. SNMP/IP
63.

The responsibility of Physical and data link layers on the network is

A. Data Delivery
B. Data Flow
C. Data Sync
D. All of the above
Answer» B. Data Flow
64.

The network layer at the source is responsible for creating a packet from the data coming from another

A. Station
B. Link
C. Node
D. Protocol
Answer» E.
65.

An IPv4 address is a

A. 8 bit address
B. 16 bit address
C. 32bit address
D. 48 bit address
Answer» D. 48 bit address
66.

In classfull addressing, several networks are combined to create a

A. Classnet
B. Internet
C. Subnet
D. Supernet
Answer» E.
67.

In IPv4, the code point subfield can be used in

A. 2 different ways
B. 2 samilar Stations
C. 2 similar activities
D. Same format
Answer» B. 2 samilar Stations
68.

The class of the IP addresses 208.34.54.12 will be

A. Class A
B. Class B
C. Class C
D. Class E
Answer» D. Class E
69.

In IPv6, the base header has the

A. 10 Fields
B. 09 Fields
C. 08 Fields
D. 07 Fields
Answer» D. 07 Fields
70.

All the outgoing packets go through NAT router, which replaces the source address in the packet with

A. Destination address
B. Global NAT address
C. Local NAT address
D. Absolute NAT address
Answer» C. Local NAT address
71.

In Type Identifier of Unicast address, the 3 bit-field defines the address as

A. Provider-base.d address.
B. Provider-base.a address.
C. Provider-base.h address.
D. Provider-base.e address.
Answer» B. Provider-base.a address.
72.

Which of the following technique is used for Time-To-Live (TTL)?

A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
C. a technique used in best-effort delivery system to avoid endlessly looping packets.
D. all of the above
Answer» D. all of the above
73.

In fragmentation of IPv4, the 13-bit field that shows the relative position of the fragment with respect to the whole datagram is called

A. Identification field
B. flag field
C. Fragmentation offset field
D. None of the given
Answer» D. None of the given
74.

In IPv4 Addresses, the reserved addresses of the Internet are unique

A. Globally
B. Locally
C. Regionally
D. None of the Above
Answer» C. Regionally
75.

In classful addressing, the length of netid and hostid is predetermined, we can use it as

A. IP Code
B. Mask
C. Unicode
D. Numeric Id code
Answer» C. Unicode
76.

In Congestion Controlled Traffic, it is understood that packets may arrive

A. On Time
B. Before time
C. Delayed
D. Both a and b
Answer» D. Both a and b
77.

Using the form of abbreviation in IPv6 address, 3210 can be written as

A. 321
B. Cannot be abbreviated
C. 32
D. 3021
Answer» C. 32
78.

A system is responsible for detecting, isolating, correcting and recording faults in

A. Reactive Fault Management
B. Stored Fault Management
C. Report Fault Management
D. Reserved Fault Management
Answer» B. Stored Fault Management
79.

In the subcategories of reserved address in the IPv6, the address that is used by a host to test itself without going into the network is called

A. Unspecified address
B. Loopback address
C. Compatible address
D. Mapped address
Answer» C. Compatible address
80.

In IPv6 Addresses, the leading zeros of a section can be omitted in the

A. Hexadecimal colon notation
B. Binary notation
C. Dotted decimal IPv6 notation
D. Abbreviated IPv6 addresses
Answer» E.
81.

An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and

A. TCP
B. CDM protocols
C. ATM protocols
D. IEEE protocols
Answer» B. CDM protocols
82.

In the old time, a user was connected to the Internet with a

A. ISP
B. ADSL
C. DSL
D. dial up line
Answer» E.
83.

Structure of Management Information (SMI), is the guideline of

A. HTTP
B. SNMP
C. URL
D. MIB
Answer» C. URL
84.

The private network in the NAT is transparent to the rest of the

A. Stations
B. Blocks
C. Internet
D. All of the above
Answer» D. All of the above
85.

To enhance reliability, IPv4 must be paired with a reliable protocol such as

A. TCP/IP
B. UDP
C. TCP
D. IEEE protocols
Answer» D. IEEE protocols
86.

In the multicast address of the IPv6, a transient group address, is used

A. Permanently
B. Globally
C. Temporarily
D. Locally
Answer» D. Locally
87.

The Internet has chosen the datagram approach to switching in the

A. Data Link Layer
B. Network Layer
C. Physical Layer
D. Presentation Layer
Answer» C. Physical Layer
88.

The IP packet that carries an IGMP packet has a value of _______ in its protocol field.

A. 3
B. 2
C. 1
D. none of the above
Answer» C. 1
89.

In IPv4 Addresses, organizational networks are connected to the Internet via a

A. Mask
B. Router
C. Bridge
D. BUS
Answer» C. Bridge
90.

Three strategies used to handle the transition from version 4 to version 6 are dual stack, tunneling and

A. Header Switching
B. Header Translation
C. Header transfer
D. Header Transmission
Answer» C. Header transfer
91.

In Network Management System, Fault management is closely related to

A. Performance Management
B. Security Management
C. Active Management
D. Reserved Management
Answer» B. Security Management
92.

The server program running on the agent can check the

A. Information
B. Environment
C. Database
D. SNMP Protocol
Answer» C. Database
93.

When HEADER LENGTH field of the IPv4 header is at its maximum size, the value of the field willl be

A. 5
B. 15
C. 20
D. 60
Answer» C. 20
94.

The IPv4 addressing is also called the classful addressing because it uses the concept of

A. Classes
B. Segments
C. Chips
D. Both b and c
Answer» B. Segments
95.

In internetwork, the frames does not carry any

A. Flow
B. Error
C. Links
D. Information
Answer» E.
96.

When two computers using IPv6 want to communicate with each other, the strategy is used known as

A. Tunneling
B. Drilling
C. Packaging
D. Curving
Answer» B. Drilling
97.

A few leftmost bits in each address of the IPv6 address define its category,is known as

A. Prefix type
B. Postfix type
C. Reserved type
D. Local type
Answer» B. Postfix type
98.

The Encrypted Security Payload (ESP) is an extension that provides

A. Stability
B. Availibilty
C. Reliability
D. Confidentiality
Answer» E.
99.

An IPv6 address is

A. 8 bits long
B. 16 bits long
C. 32 bits long
D. 128 bits long.
Answer» E.
100.

In IPv6 Addresses, the 5-bit field in the prefixes for provider-based unicast address indicates the agency that has registered the address is

A. Type identifier
B. Registry identifier
C. Provider identifier
D. Subscriber Identifier
Answer» C. Provider identifier