This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Addressing Reliability”.
1. There are efficiency gains from ________ all sorts of equipment.
a) Implementation
b) Analogous
c) Evolution
d) Digitization
View Answer
Explanation: There are efficiency gains from digitization of all sorts of equipment and measures that used to be analog and disconnected.
2. Business values can be Daunting Proposition to figure out how to best harness all this data.
a) True
b) False
View Answer
Explanation: Across every industry, organization is looking at ways they can derive business value from IoT. While some benefits will be relative clear cut, it can be a Daunting Proposition to figure out how to best harness all this data.
3. The availability of ________ is the cloud services provider who will host video and data for end users.
a) Devices
b) Memory
c) Security system
d) Objects
View Answer
Explanation: The availability of security system in the cloud services provider who will host video and data for end users is necessary as providers are solely responsible for ensuring the availability and reliability of this data.
4. SLA stands for ____________
a) Service Level Agreement
b) Security Level Agreement
c) System Local Area
d) Service Local Area
View Answer
Explanation: A service level agreement (SLA) is a documented agreement between a service provider and a customer that identifies both the services required and the expected level of service.
5. A provider which produces 99 percent uptime ________
a) Security issues
b) Network Issues
c) Programming issue
d) Memory issue
View Answer
Explanation: Among the exceptions that release a provider from providing 99 percent uptime are network issues not within their direct control, client negligence, “acts of god,” scheduling maintenance and more.
6. With physical security, the stakes are incredibly ________
a) Very high
b) Low
c) Very low
d) High
View Answer
Explanation: With physical security, the stakes are incredibly high, so even if you are working with a limited budget, cloud services are not an area where you should shop for a bargain.
7. Issue with connecting to data stored have anything to do with data centers.
a) True
b) False
View Answer
Explanation: The reality is that any issues with connecting to data stored in the cloud rarely have anything to do with the service provider’s data center.
8. The most likely culprit is ________
a) Things
b) Network
c) Device
d) Internet connectivity
View Answer
Explanation: The most likely culprit is internet connectivity, leaving end users unable to access their hosted data or even perform management functions.
9. ________ are designed to protect data and servers.
a) Physical walls
b) Logical firewalls
c) Both Physical and logical
d) Neither physical nor logical
View Answer
Explanation: Physical and logical firewalls measure are designed to protect data and the servers where it is stored from theft. Sabotage and damage caused by natural disasters.
10. Communication between ________ and ________ is encrypted for security.
a) Cloud and device
b) End user and data center
c) Network and device
d) Cloud and Network
View Answer
Explanation: Communication between end user sites and data centre is encrypted according to industry standards to further improve system security.
11. Undertaking the intervention over an extended period of time would enhance the change of gaining access.
a) True
b) False
View Answer
Explanation: Undertaking the intervention over an extended period of time would enhance the change of gaining access to revelation about the thinking of biology teachers.
12. ________ phase starts with the construction of spanning tree for ordinary routing information.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Explanation: Initialization phase starts with the construction of spanning tree for ordinary routing information. A level corresponds to the hop distance of the node from the sink and data will be transmitted.
13. In which phase packets are forwarded hop by hop to get closer to the sink?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Explanation: In Message relaying phase packets are forwarded hop by hop to get closer to the sink. Intermediate nodes keep the packet Id in their buffer during Tcol corresponding to the maximum delay allowed to transmit.
14. ________ is achieved using over hearing mechanism.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Explanation: The lost message detection is achieved using over hearing mechanism. Upon sensing the channel, if node A does not hear node B transmitting the packet’s packet Id to its next hop, then it becomes aware that the packet has been lost and which means that transmission is required.
15. What is the last step in algorithm for reliable data transfer?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
View Answer
Explanation: Selective Recovery is the last step in an algorithm for reliable data transfer.
Sanfoundry Global Education & Learning Series – IOT.
To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Get Free Certificate of Merit in IOT
- Participate in IOT Certification Contest
- Become a Top Ranker in IOT
- Take IOT Tests
- Chapterwise Practice Tests: Chapter 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
- Chapterwise Mock Tests: Chapter 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
- Apply for IOT Internship
- Buy Computer Science Books
- Apply for Information Technology Internship
- Practice Programming MCQs
- Practice Computer Science MCQs