Question 1. Which layer is CoAP?
(A) Control layer
(B) Transport layer
(C) Service layer
(D) Application layer
Question 2. CoAP is a specialized _________ protocol.
(A) Web Transfer
(B) Power
(C) Application
(D) Resource
Question 3. CoAP provides which of the following requirements?
(A) Multicast support and simplicity
(B) Low overhead and multicast support
(C) Simplicity and low overhead
(D) Multicast support, Low over head, and simplicity
Question 4. What is the full form of WLAN?
(A) Wide Local Area Network
(B) Wireless Local Area Network
(C) Wireless Land Access Network
(D) Wireless Local Area Node
Question 5. URI and content type support is which protocol feature?
(A) Http
(B) UDP
(C) CoAP
(D) SPI
Question 6. Which of the following is not a characteristic of a ZigBee network?
(A) Low power consumption
(B) Easy installation
(C) High data rates
(D) Unlicensed radio bands
Question 7. Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?
(A) IEEE 802.16
(B) IEEE 802.3
(C) IEEE 802.11
(D) IEEE 802.15
Question 8. Which of the following IEEE standards provides the lowest level of the ZigBee software stack?
(A) IEEE 802.11.
(B) IEEE 802.15.1
(C) IEEE 802.15.3
(D) IEEE 802.15.4.
Question 9. What is the typical range of transmission distance in a ZigBee network?
(A) 5 m.
(B) 50 m.
(C) 500 m.
(D) 5 km
Question 10. Which of the following layers are defined by the ZigBee stack?
(A) Transport layer
(B) Physical layer
(C) Application Support sub-layer.
(D) Medium Access layer
Question 11. Representational State Transfer (REST) is the standard interface between?
(A) Two machines in a LAN
(B) HTTP client and user
(C) HTTP client and servers
(D) None of the above
Question 12. Which of the following is the full form of XMPP?
(A) Extension Messaging and Presence Protocol
(B) Extensible Messaging and Presence Protocol
(C) Extension Messaging and Privacy Protocol
(D) Extensible Messaging and Privacy Protocol
Question 13. _____ is an attack that forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
(A) Cross-site scoring scripting
(B) Cross-site request forgery
(C) Two-factor authentication
(D) Cross-site scripting
Question 14. Which of the following is not a messaging mode in CoAP?
(A) Confirmable
(B) Separate
(C) Direct
(D) Piggyback
Question 15. IEEE 802.15.4 uses which of the following for accessing the channel?
(A) Carrier sense multiple access (CSMA)
(B) Carrier sense multiple access with collision detection (CSMA-CD)
(C) Carrier sense multiple access with collision avoidance (CSMA-CA)
(D) None of these
Question 16. The social circles are loosely coupled if there is ________ stringency of direct contact.
(A) Less
(B) More
(C) Equal
(D) No
Question 17. In 6LoWPAN address, how many bits are globally unique?
(A) 16 bits
(B) 32 bits
(C) 64 bits
(D) 128 bits
Question 18. In case of ________, the GPS works as a receiver, not a transmitter.
(A) Active tracking
(B) Passive tracking
(C) Assisted tracking
(D) Receiver tracking
Question 19. Three parts of GPS include _________.
(A) Space segment
(B) Control segment
(C) User segment
(D) All of the above
Question 20. CoAP is specialized for __________.
(A) Internet applications
(B) Device applications
(C) Wireless applications
(D) Wired applications
Question 21. The number of binding of a node to other actors of the graph in the graprepresentation of a network is called as ________.
(A) Node degree
(B) Path length
(C) Social circle
(D) Bridge
Question 22. ________ is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system.
(A) Cloud-Physical System
(B) Cyber-Space System
(C) Cyber-Physical System
(D) None of the above
Question 23. ________ is the degree to which nodes have a common set of connections to other nodes.
(A) Structural hole
(B) Structural equivalence
(C) Structural cohesion
(D) None of the abov
Question 24. The degree to which actors are directly linked to one another through cohesive bonds is called as ________.
(A) Closeness
(B) Cohesion
(C) Centralized
(D) Path length
Question 25. Request field is present in which message format?
(A) Request message
(B) Response message
(C) Both request and response
(D) Neither request nor response