IOT Questions and Answers – Addressing Reliability

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Addressing Reliability”.

1. There are efficiency gains from ________ all sorts of equipment.
a) Implementation
b) Analogous
c) Evolution
d) Digitization
View Answer

Answer: d
Explanation: There are efficiency gains from digitization of all sorts of equipment and measures that used to be analog and disconnected.

2. Business values can be Daunting Proposition to figure out how to best harness all this data.
a) True
b) False
View Answer

Answer: a
Explanation: Across every industry, organization is looking at ways they can derive business value from IoT. While some benefits will be relative clear cut, it can be a Daunting Proposition to figure out how to best harness all this data.

3. The availability of ________ is the cloud services provider who will host video and data for end users.
a) Devices
b) Memory
c) Security system
d) Objects
View Answer

Answer: c
Explanation: The availability of security system in the cloud services provider who will host video and data for end users is necessary as providers are solely responsible for ensuring the availability and reliability of this data.
advertisement
advertisement

4. SLA stands for ____________
a) Service Level Agreement
b) Security Level Agreement
c) System Local Area
d) Service Local Area
View Answer

Answer: a
Explanation: A service level agreement (SLA) is a documented agreement between a service provider and a customer that identifies both the services required and the expected level of service.

5. A provider which produces 99 percent uptime ________
a) Security issues
b) Network Issues
c) Programming issue
d) Memory issue
View Answer

Answer: b
Explanation: Among the exceptions that release a provider from providing 99 percent uptime are network issues not within their direct control, client negligence, “acts of god,” scheduling maintenance and more.

6. With physical security, the stakes are incredibly ________
a) Very high
b) Low
c) Very low
d) High
View Answer

Answer: d
Explanation: With physical security, the stakes are incredibly high, so even if you are working with a limited budget, cloud services are not an area where you should shop for a bargain.

7. Issue with connecting to data stored have anything to do with data centers.
a) True
b) False
View Answer

Answer: a
Explanation: The reality is that any issues with connecting to data stored in the cloud rarely have anything to do with the service provider’s data center.
advertisement

8. The most likely culprit is ________
a) Things
b) Network
c) Device
d) Internet connectivity
View Answer

Answer: d
Explanation: The most likely culprit is internet connectivity, leaving end users unable to access their hosted data or even perform management functions.

9. ________ are designed to protect data and servers.
a) Physical walls
b) Logical firewalls
c) Both Physical and logical
d) Neither physical nor logical
View Answer

Answer: c
Explanation: Physical and logical firewalls measure are designed to protect data and the servers where it is stored from theft. Sabotage and damage caused by natural disasters.
advertisement

10. Communication between ________ and ________ is encrypted for security.
a) Cloud and device
b) End user and data center
c) Network and device
d) Cloud and Network
View Answer

Answer: b
Explanation: Communication between end user sites and data centre is encrypted according to industry standards to further improve system security.

11. Undertaking the intervention over an extended period of time would enhance the change of gaining access.
a) True
b) False
View Answer

Answer: a
Explanation: Undertaking the intervention over an extended period of time would enhance the change of gaining access to revelation about the thinking of biology teachers.

12. ________ phase starts with the construction of spanning tree for ordinary routing information.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer

Answer: a
Explanation: Initialization phase starts with the construction of spanning tree for ordinary routing information. A level corresponds to the hop distance of the node from the sink and data will be transmitted.

13. In which phase packets are forwarded hop by hop to get closer to the sink?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer

Answer: b
Explanation: In Message relaying phase packets are forwarded hop by hop to get closer to the sink. Intermediate nodes keep the packet Id in their buffer during Tcol corresponding to the maximum delay allowed to transmit.

14. ________ is achieved using over hearing mechanism.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer

Answer: d
Explanation: The lost message detection is achieved using over hearing mechanism. Upon sensing the channel, if node A does not hear node B transmitting the packet’s packet Id to its next hop, then it becomes aware that the packet has been lost and which means that transmission is required.

15. What is the last step in algorithm for reliable data transfer?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer

Answer: c
Explanation: Selective Recovery is the last step in an algorithm for reliable data transfer.

Sanfoundry Global Education & Learning Series – IOT.

To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.