Top 350+ Solved Ubiquitous Computing System (UCS) MCQ Questions Answer
Q. ZigBee developed under ..............
a. ieee 802.15.1.
b. ieee 802.15.2.
c. ieee 802.15.3.
d. ieee 802.15.4.
Q. A Body Area Network or BAN consists ...............
a. wireless devices to connect to a wirednetwork
b. set of mobile and compact sensors
c. sensors & communicationdevices
d. wearable device & sensors
Q. Body Area Network requirements..........
a. low powerconsumption & interoperability
b. self-healing & security
c. low latency
d. all of the above
Q. Find out wrong stament of Body Area Network...............
a. sensors are put on patient’s body to monitor heart rate, blood pressure and ecg.
b. provides healthcare services over a long distance with the help of it and communication.
c. sensors can be used to measure navigation, timer, distance, pulse rate and bodytemperature.
d. allowing transmission of data, voice and video via a computer
Q. Which of the following standard committee specifies Bluetooth and other Personal Area Networks(PAN)?
a. ieee 802.11b
b. ieee 802.15.2.
c. ieee 802.11g
d. ieee 802.16
Q. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
a. chock point
b. meeting point
c. firewall point
d. secure point
Q. A proxy firewall filters at
a. physical layer
b. data link layer
c. network layer
d. application layer
Q. A firewall needs to be so that it can grow proportionally with the network that it protects.
a. robust
b. expansive
c. fast
d. scalable
Q. provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected tothe private network.
a. visual private network
b. virtual protocol network
c. virtual protocol networking
d. virtual private network
Q. Which of the statements are not true to classify VPN systems?
a. protocols used for tunnelling the traffic
b. whether vpns are providing site-to-site or remote accessconnection
c. securing the network from bots andmalwares
d. levels of security provided for sending and receiving dataprivately
Q. What types of protocols are usedin VPNs?
a. application levelprotocols
b. tunnellingprotocols
c. networkprotocols
d. mailing protocols
Q. Which types of VPNs are used for corporate connectivity across companies residing in differentgeographical location?
a. remote access vpns
b. site-to-site vpns
c. peer-to-peer vpns
d. country-to-country vpns