Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M4 R5: Internet of Things (IoT) and Its Applications
IoT Security and Challenges | Soft Skills
Set 1
25
See Explanation !
1
IoT security management includes ________
IoT सुरक्षा प्रबंधन में ________ शामिल हैं
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Next Question
25
See Explanation !
2
What is Artificial Intelligence
आर्टिफिशियल इंटेलिजेंस क्या है?
Putting your intelligence into computer
Programming with you own intelligence
Making a machine intelligence
Putting more memory into computer
Previous Question
Next Question
25
See Explanation !
3
What is a private key
एक निजी कुंजी क्या है
A key on your key chain
A key given to the public
A key not to be given to the public
A key that opens a secret door
Previous Question
Next Question
25
See Explanation !
4
Which one is not an element of IoT
कौन सा IoT का एक तत्व नहीं है
Security
Process
People
Things
Previous Question
Next Question
25
See Explanation !
5
The device connected to the internet of things have to communicate automatically, not via humans. What is this called
चीजों के इंटरनेट से जुड़े डिवाइस को मनुष्यों के माध्यम से नहीं, बल्कि स्वचालित रूप से संवाद करना होगा। इसे क्या कहा जाता है
Bot-to-Bot(B2B)
Machine-to-Machine (M2M)
InterCloud
Skynet
Previous Question
Next Question
25
See Explanation !
6
Who created Bitcoin
बिटकॉइन किसने बनाया
Satoshi Nakamoto
Samsung
John Macfee
Chaina
Previous Question
Next Question
25
See Explanation !
7
What is blockchain
ब्लॉकचेन क्या है
A distributed ledger on a peer-to-peer network
A type of Cryptocurrency
An exchange
A centralized ledger
Previous Question
Next Question
25
See Explanation !
8
The poor security practices could include(s)
खराब सुरक्षा प्रथाओं में शामिल हो सकते हैं
No system hardening
No mechanism for updating software
Default or hardcoded passwords
All of the above
Previous Question
Next Question
25
See Explanation !
9
The term bot comes from robot. An internet bot may also known as
बॉट शब्द रोबोट से आया है। एक इंटरनेट बॉट को............ के रूप में भी जाना जा सकता है
Web robot
WWW robot
Both (A) and (B)
None of these
Previous Question
Next Question
25
See Explanation !
10
Which statement(s) are true about a brute force attack
ब्रूट फोर्स अटैक के बारे में कौन से कथन(कथन) सही हैं
Crack a password or username
Find a hidden web page
find the key used to encrypt a message
All of the above
Previous Question
Next Question
25
See Explanation !
11
Dictionary attacks is a kind of
शब्दकोश हमले एक प्रकार का
Injection Attack
Brute force attack
Session Hijacking
None of these
Previous Question
Next Question
25
See Explanation !
12
Bonet is often used to launch _____ attack
बोनेट का उपयोग अक्सर _____ हमले को शुरू करने के लिए किया जाता है
DoS
DDoS
Brute Force
Passive
Previous Question
Next Question
25
See Explanation !
13
To secure your data on IoT devices
IoT डिवाइस पर अपना डेटा सुरक्षित करने के लिए
Keep changing your password
Update your every device
Avoid using devices that are risky
All of the above
Previous Question
Next Question
25
See Explanation !
14
Which of the following is threat to IoT Device ?
IoT डिवाइस के लिए निम्नलिखित में से कौन सा खतरा है?
Virus
Natural Disaster
Spoofing
All of the above
Previous Question
Next Question
25
See Explanation !
15
Which of the following is used for risk analysis?
निम्नलिखित में से किसका उपयोग जोखिम विश्लेषण के लिए किया जाता है?
DREAD
OWASP
STRIDE
DAR
Previous Question
Next Question
25
See Explanation !
16
Which of the following is not an element of threat modelling?
निम्नलिखित में से कौन खतरे के मॉडलिंग का एक तत्व नहीं है?
Asset
Vulnerability
Threat
Time
Previous Question
Next Question
25
See Explanation !
17
Which of following is/are suggested time management technique(s)?
निम्नलिखित में से कौनसी समय प्रबंधन तकनीक(तकनीकों) का सुझाव दिया गया है/हैं?
Make good use of technology
Clean up and get organized
Concentrate on one key task at a time
All of the above
Previous Question
Next Question
25
See Explanation !
18
coap://localhost:4589/Temperature/temp 1, here the 4589 is:
coap :// localhost:4589/Temperature/temp 1, यहाँ 4589 है:
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
Previous Question
Next Question
25
See Explanation !
19
Identity the challenge coming under securing the information.
जानकारी हासिल करने के दौरान आने वाली चुनौती की पहचान करें।
Security
Signaling
Power Consumption
Presence Detection
Previous Question
Next Question
25
See Explanation !
20
Which of the following must be present in a microcontroller?
निम्नलिखित में से कौन सा माइक्रोकंट्रोलर में मौजूद होना चाहिए?
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Previous Question
Next Question
25
See Explanation !
21
Which of the following helps to collaborate in loT development?
निम्न में से कौन LoT विकास में सहयोग करने में मदद करता है?
physical computing
chemical computing
mechanism
cloud computing
Previous Question
Next Question
25
See Explanation !
22
Which of the following challenge arises when we use many devices on the same network?
जब हम एक ही नेटवर्क पर कई उपकरणों का उपयोग करते हैं तो निम्नलिखित में से कौन सी चुनौती उत्पन्न होती है?
Signaling
Security
Power Detection
Power Consunmption
Previous Question
Next Question
25
See Explanation !
23
Which one is the most discussed challenge in IOT
IOT में सबसे अधिक चर्चा की जाने वाली चुनौती कौन सी है
Standard
Security
Regulation
Internet
Previous Question
Next Question
25
See Explanation !
24
Reports are usually utilized to present the outcome of:
रिपोर्ट का उपयोग आमतौर पर इन परिणामों को प्रस्तुत करने के लिए किया जाता है:
Experiment
Inquiry
Investigation
All of these
Previous Question
Next Question
25
See Explanation !
25
Major Component of loT is/are
एलओटी का प्रमुख घटक है/हैं
Sensors
Actuators
Smart Applications
All of the Above
Previous Question