Site icon T4Tutorials.com

IoT architecture and protocols – MCQs – EE

1. The Internet of Things (IoT) architecture typically consists of:

(A) Two layers


(B) Three layers


(C) Five layers


(D) Ten layers



2. The three basic layers of IoT architecture are:

(A) Hardware, software, and control layers


(B) Perception, network, and application layers


(C) Power, signal, and logic layers


(D) Data, cloud, and user layers



3. The perception layer in IoT is responsible for:

(A) Data sensing and collection


(B) Data transmission


(C) Data storage


(D) Decision-making



4. The network layer in IoT handles:

(A) Data communication and transmission


(B) Data visualization


(C) Power management


(D) Sensor calibration



5. The application layer in IoT provides:

(A) User interfaces and services


(B) Power supply


(C) Sensor data conversion


(D) Physical connections



6. The extended five-layer IoT architecture includes:

(A) Perception, transport, processing, application, and business layers


(B) Data, logic, control, security, and service layers


(C) Sensor, motor, logic, and feedback layers


(D) None of the above



7. The processing layer in IoT is mainly responsible for:

(A) Storing and analyzing data


(B) Transmitting data


(C) Power regulation


(D) Physical sensing



8. The business layer in IoT deals with:

(A) Managing overall IoT systems and user privacy policies


(B) Data transmission


(C) Sensing temperature


(D) Communication errors



9. Which of the following is a machine-to-machine (M2M) communication protocol?

(A) MQTT


(B) HTTP


(C) SMTP


(D) POP3



10. The MQTT protocol is best suited for:

(A) Low-bandwidth and high-latency networks


(B) High-speed local area networks


(C) File transfers


(D) Video streaming



11. The CoAP (Constrained Application Protocol) is designed for:

(A) Resource-constrained IoT devices


(B) Desktop computers


(C) Data centers


(D) Smart TVs only



12. CoAP operates over:

(A) UDP


(B) TCP


(C) FTP


(D) SMTP



13. MQTT operates over:

(A) TCP/IP


(B) UDP


(C) Serial bus


(D) Modbus



14. The HTTP protocol is:

(A) Connectionless and unreliable


(B) Reliable but not lightweight


(C) Only used for SMS transmission


(D) Used for email transfer



15. The DDS (Data Distribution Service) protocol is commonly used for:

(A) Real-time and distributed IoT applications


(B) Web browsing


(C) Email communication


(D) Local storage



16. The AMQP (Advanced Message Queuing Protocol) is suitable for:

(A) Message-oriented middleware and enterprise IoT applications


(B) Sensor calibration


(C) File encryption


(D) Power management



17. The 6LoWPAN protocol enables:

(A) IPv6 communication over low-power wireless networks


(B) High-speed fiber communication


(C) Ethernet data transmission


(D) Satellite control systems



18. The ZigBee protocol is based on:

(A) IEEE 802.15.4 standard


(B) IEEE 802.11 standard


(C) Bluetooth standard


(D) Ethernet standard



19. ZigBee is commonly used in:

(A) Home automation and smart energy systems


(B) Long-distance communication


(C) Cloud computing


(D) Wired networks



20. LoRaWAN stands for:

(A) Long Range Wide Area Network


(B) Local Radio Wireless Access Network


(C) Low Resistance Wireless Application Network


(D) Logical Range Wired Area Network



21. LoRaWAN is mainly used for:

(A) Long-range, low-power IoT communications


(B) High-speed internet


(C) Data encryption only


(D) Wired devices



22. The Bluetooth Low Energy (BLE) protocol is suitable for:

(A) Short-range IoT communication


(B) High-voltage transmission


(C) Fiber-optic systems


(D) Data centers



23. The IPv6 protocol is preferred in IoT because it:

(A) Provides a large address space for billions of devices


(B) Reduces packet sizes


(C) Uses analog signaling


(D) Works offline only



24. The REST architecture in IoT is based on:

(A) HTTP methods like GET, POST, PUT, and DELETE


(B) FTP commands


(C) Serial communication


(D) UDP-only messaging



25. The publish/subscribe communication model is used in:

(A) MQTT and DDS


(B) HTTP and CoAP


(C) FTP and SMTP


(D) POP3 and TCP



26. In IoT, edge computing processes data:

(A) Near the data source


(B) Only in cloud servers


(C) At remote data centers


(D) After long transmission delays



27. The IoT gateway acts as:

(A) A bridge between local devices and the cloud


(B) A data storage unit


(C) A power amplifier


(D) A cooling system



28. The lightweight M2M (LwM2M) protocol is developed by:

(A) OMA (Open Mobile Alliance)


(B) IEEE


(C) IETF


(D) ISO



29. The core function of IoT protocols is to:

(A) Enable communication and data exchange between devices


(B) Generate power


(C) Provide sensor calibration


(D) Manage mechanical systems



30. A secure IoT architecture must include:

(A) Authentication, encryption, and access control


(B) Manual password entry only


(C) Open communication


(D) Unencrypted transmission



Exit mobile version