1. The Internet of Things (IoT) architecture typically consists of:
(A) Two layers
(B) Three layers
(C) Five layers
(D) Ten layers
2. The three basic layers of IoT architecture are:
(A) Hardware, software, and control layers
(B) Perception, network, and application layers
(C) Power, signal, and logic layers
(D) Data, cloud, and user layers
3. The perception layer in IoT is responsible for:
(A) Data sensing and collection
(B) Data transmission
(C) Data storage
(D) Decision-making
4. The network layer in IoT handles:
(A) Data communication and transmission
(B) Data visualization
(C) Power management
(D) Sensor calibration
5. The application layer in IoT provides:
(A) User interfaces and services
(B) Power supply
(C) Sensor data conversion
(D) Physical connections
6. The extended five-layer IoT architecture includes:
(A) Perception, transport, processing, application, and business layers
(B) Data, logic, control, security, and service layers
(C) Sensor, motor, logic, and feedback layers
(D) None of the above
7. The processing layer in IoT is mainly responsible for:
(A) Storing and analyzing data
(B) Transmitting data
(C) Power regulation
(D) Physical sensing
8. The business layer in IoT deals with:
(A) Managing overall IoT systems and user privacy policies
(B) Data transmission
(C) Sensing temperature
(D) Communication errors
9. Which of the following is a machine-to-machine (M2M) communication protocol?
(A) MQTT
(B) HTTP
(C) SMTP
(D) POP3
10. The MQTT protocol is best suited for:
(A) Low-bandwidth and high-latency networks
(B) High-speed local area networks
(C) File transfers
(D) Video streaming
11. The CoAP (Constrained Application Protocol) is designed for:
(A) Resource-constrained IoT devices
(B) Desktop computers
(C) Data centers
(D) Smart TVs only
12. CoAP operates over:
(A) UDP
(B) TCP
(C) FTP
(D) SMTP
13. MQTT operates over:
(A) TCP/IP
(B) UDP
(C) Serial bus
(D) Modbus
14. The HTTP protocol is:
(A) Connectionless and unreliable
(B) Reliable but not lightweight
(C) Only used for SMS transmission
(D) Used for email transfer
15. The DDS (Data Distribution Service) protocol is commonly used for:
(A) Real-time and distributed IoT applications
(B) Web browsing
(C) Email communication
(D) Local storage
16. The AMQP (Advanced Message Queuing Protocol) is suitable for:
(A) Message-oriented middleware and enterprise IoT applications
(B) Sensor calibration
(C) File encryption
(D) Power management
17. The 6LoWPAN protocol enables:
(A) IPv6 communication over low-power wireless networks
(B) High-speed fiber communication
(C) Ethernet data transmission
(D) Satellite control systems
18. The ZigBee protocol is based on:
(A) IEEE 802.15.4 standard
(B) IEEE 802.11 standard
(C) Bluetooth standard
(D) Ethernet standard
19. ZigBee is commonly used in:
(A) Home automation and smart energy systems
(B) Long-distance communication
(C) Cloud computing
(D) Wired networks
20. LoRaWAN stands for:
(A) Long Range Wide Area Network
(B) Local Radio Wireless Access Network
(C) Low Resistance Wireless Application Network
(D) Logical Range Wired Area Network
21. LoRaWAN is mainly used for:
(A) Long-range, low-power IoT communications
(B) High-speed internet
(C) Data encryption only
(D) Wired devices
22. The Bluetooth Low Energy (BLE) protocol is suitable for:
(A) Short-range IoT communication
(B) High-voltage transmission
(C) Fiber-optic systems
(D) Data centers
23. The IPv6 protocol is preferred in IoT because it:
(A) Provides a large address space for billions of devices
(B) Reduces packet sizes
(C) Uses analog signaling
(D) Works offline only
24. The REST architecture in IoT is based on:
(A) HTTP methods like GET, POST, PUT, and DELETE
(B) FTP commands
(C) Serial communication
(D) UDP-only messaging
25. The publish/subscribe communication model is used in:
(A) MQTT and DDS
(B) HTTP and CoAP
(C) FTP and SMTP
(D) POP3 and TCP
26. In IoT, edge computing processes data:
(A) Near the data source
(B) Only in cloud servers
(C) At remote data centers
(D) After long transmission delays
27. The IoT gateway acts as:
(A) A bridge between local devices and the cloud
(B) A data storage unit
(C) A power amplifier
(D) A cooling system
28. The lightweight M2M (LwM2M) protocol is developed by:
(A) OMA (Open Mobile Alliance)
(B) IEEE
(C) IETF
(D) ISO
29. The core function of IoT protocols is to:
(A) Enable communication and data exchange between devices
(B) Generate power
(C) Provide sensor calibration
(D) Manage mechanical systems
30. A secure IoT architecture must include:
(A) Authentication, encryption, and access control
(B) Manual password entry only
(C) Open communication
(D) Unencrypted transmission