O Level Exam : Student Portal
Email address
Password
Remember me
Forgot password?
Sign In
Google
Facebook
Don't have an account?
Register now
O Level Online Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Projects
MCQ : SECURITY AND FUTURE OF IOT ECOSYSTEM For NIELIT O Level Exam
SECURITY AND FUTURE OF IOT ECOSYSTEM For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 50
Report Bug
Bookmark
______________is a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information
________________ एक प्रकार की सोशल इंजीनियरिंग है जहां एक हमलावर एक धोखाधड़ी भेजता है संवेदनशील जानकारी प्रकट करने के लिए किसी व्यक्ति को धोखा देने के लिए डिज़ाइन किया गया संदेश
A.
Phishing
Phishing
B.
Surfing
Surfing
C.
DDoS
DDoS
D.
Revealing
Revealing
Question No# :
02
out of 50
Report Bug
Bookmark
Which of the following is not an element of threat modelling?
निम्नलिखित में से कौन-सा थ्रेट मॉडलिंग का तत्व नहीं है?
A.
Asset
एसेट
B.
Vulnerability
सुभेद्यता
C.
Threat
थ्रेट
D.
Time
समय
Question No# :
03
out of 50
Report Bug
Bookmark
Which among the following terms is related to network security ?
निम्नलिखित में से कौन सा शब्द नेटवर्क सुरक्षा से संबंधित है?
A.
DSL
डीएसएल
B.
W3C
डब्ल्यू3सी
C.
MIT
एमआईटी
D.
Firewall
फ़ायरवॉल
Question No# :
04
out of 50
Report Bug
Bookmark
In IoT security, what does the term "Biometric Authentication" involve?
A.
Verifying identity using physical characteristics
B.
Using two-factor authentication
C.
Encrypting data with biometric algorithms
D.
Authenticating devices based on IP addresses
Question No# :
05
out of 50
Report Bug
Bookmark
What does the "Quick Mask Mode" in Adobe Photoshop 7 allow you to do?
A.
Apply quick filters to an image
B.
Create selections using a red overlay
C.
Change the image resolution
D.
Adjust the canvas size
Question No# :
06
out of 50
Report Bug
Bookmark
Which IoT application involves connecting everyday objects to the internet to gather and share data?
A.
Industrial IoT (IIoT)
B.
Consumer IoT (CIoT)
C.
IoT in Healthcare
D.
IoT in Agriculture
Question No# :
07
out of 50
Report Bug
Bookmark
Which IoT security measure focuses on ensuring that data is not altered or tampered with during transmission?
A.
Authentication
B.
Authorization
C.
Encryption
D.
Firewall
Question No# :
08
out of 50
Report Bug
Bookmark
Which IoT connectivity option is designed for low-power, short-range communication between devices within a personal area network (PAN)?
A.
Zigbee
B.
Bluetooth
C.
LoRaWAN
D.
Sigfox
Question No# :
09
out of 50
Report Bug
Bookmark
What is the purpose of the "Clone Stamp" tool in Photoshop 7?
A.
Blurring the edges of an image
B.
Copying one area of an image to another
C.
Adding text to images
D.
Adjusting color balance
Question No# :
10
out of 50
Report Bug
Bookmark
What is the effect of performing AND operation of R with 0xFE ?
0xFE के साथ आर का प्रदर्शन और संचालन का क्या प्रभाव पड़ता है ?
A.
Setting a selected bit of R
R का एक सिलेक्टेड बिट सेट करना
B.
Clearing a selected bit of R
R के सिलेक्टेड बिट को क्लियर करना
C.
Complement selected bit of R
R के सिलेक्टेड बिट को कॉम्प्लीमेंट करना
D.
None of these
इनमे से कोई नहीं
Question No# :
11
out of 50
Report Bug
Bookmark
Which tool is used for blurring or sharpening specific areas of an image in Photoshop 7?
A.
Blur Tool
B.
Sharpen Tool
C.
Clone Stamp Tool
D.
Sponge Tool
Question No# :
12
out of 50
Report Bug
Bookmark
What do you call the scope that hacker can use to break into a system
आप उस स्कोप को क्या कहते हैं जिसका उपयोग हैकर किसी सिस्टम में सेंध लगाने के लिए कर सकता है
A.
Principle of least privilege
कम से कम विशेषाधिकार का सिद्धांत
B.
Defence in depth
गहन सुरक्षा
C.
Attack surface
अटैक की सतह
D.
None of the above
उपर्युक्त में से कोई नहीं
Question No# :
13
out of 50
Report Bug
Bookmark
Which IoT connectivity option is known for its high data transfer rates and is commonly used for multimedia applications?
A.
Zigbee
B.
Bluetooth
C.
LoRaWAN
D.
Wi-Fi
Question No# :
14
out of 50
Report Bug
Bookmark
Which of the following is a challenge associated with the deployment of large-scale IoT networks?
A.
Limited device diversity
B.
Low energy consumption
C.
Scalability issues
D.
Standardized protocols
Question No# :
15
out of 50
Report Bug
Bookmark
Which IoT security measure involves granting specific permissions and access rights to users or devices?
A.
Authentication
B.
Authorization
C.
Encryption
D.
Firewall
Question No# :
16
out of 50
Report Bug
Bookmark
Which of the following is a benefit of using Edge Computing in IoT systems?
A.
Reduced latency
B.
Increased cloud server load
C.
Higher device power consumption
D.
Centralized data processing only
Question No# :
17
out of 50
Report Bug
Bookmark
What does the "Eraser Tool" do in Adobe Photoshop 7?
A.
Adds color to an image
B.
Removes unwanted portions of an image
C.
Adjusts image saturation
D.
Applies special effects to an image
Question No# :
18
out of 50
Report Bug
Bookmark
What does the "Brush Tool" do in Adobe Photoshop 7?
A.
Adjusts image brightness and contrast
B.
Paints colors onto an image
C.
Adds text to images
D.
Selects areas based on color
Question No# :
19
out of 50
Report Bug
Bookmark
What is the purpose of the "Pen Tool" in Adobe Photoshop 7?
A.
Drawing freehand shapes
B.
Making precise selections based on color
C.
Creating paths and shapes
D.
Adjusting image brightness
Question No# :
20
out of 50
Report Bug
Bookmark
Which IoT communication protocol is known for its lightweight and efficient nature, making it suitable for constrained devices with low power and limited bandwidth?
A.
HTTP
B.
CoAP
C.
MQTT
D.
TCP
Question No# :
21
out of 50
Report Bug
Bookmark
What does the "Brush Tool" do in Adobe Photoshop 7?
A.
Adjusts image brightness and contrast
B.
Paints colors onto an image
C.
Adds text to images
D.
Selects areas based on color
Question No# :
22
out of 50
Report Bug
Bookmark
What is the primary role of a light sensor in an IoT-based lighting control system?
A.
Measure humidity
B.
Monitor air quality
C.
Detect ambient light levels
D.
Measure distance
Question No# :
23
out of 50
Report Bug
Bookmark
In IoT security, what does the term "Security Patch" refer to?
A.
A physical layer of security
B.
A software update to fix security vulnerabilities
C.
Biometric authentication
D.
A secure communication protocol
Question No# :
24
out of 50
Report Bug
Bookmark
How can you create a new layer in Photoshop 7?
A.
Press Ctrl + N (Windows) or Command + N (Mac)
B.
Click on the "New Layer" button in the Layers panel
C.
Select "File > New" from the menu
D.
Press Ctrl + C (Windows) or Command + C (Mac)
Question No# :
25
out of 50
Report Bug
Bookmark
What is the primary purpose of a pressure sensor in an IoT-based weather monitoring system?
A.
Measure humidity
B.
Detect changes in temperature
C.
Monitor atmospheric pressure
D.
Measure air quality
Question No# :
26
out of 50
Report Bug
Bookmark
Which of the following IoT applications involves the use of sensors and devices for monitoring and managing traffic and transportation systems?
A.
Smart Cities
B.
Smart Agriculture
C.
Smart Healthcare
D.
Smart Transportation
Question No# :
27
out of 50
Report Bug
Bookmark
Bonet is often used to launch _____ attack
A.
DoS
DoS
B.
DDoS
DDoS
C.
Brute Force
Brute Force
D.
Passive
Passive
Question No# :
28
out of 50
Report Bug
Bookmark
Which IoT security measure focuses on verifying the identity of a user or device before granting access?
A.
Authentication
B.
Authorization
C.
Encryption
D.
Firewalls
Question No# :
29
out of 50
Report Bug
Bookmark
In IoT, what does the term "Fog Computing" refer to?
A.
Processing data on the cloud server
B.
Processing data on the IoT device itself
C.
Decentralized processing at the network edge
D.
Transmitting data over a foggy environment
Question No# :
30
out of 50
Report Bug
Bookmark
Secret words or numbers used for protection of devices is called
उपकरणों की सुरक्षा के लिए प्रयुक्त गुप्त शब्द या अंक कहलाते हैं
A.
Biometric Data
बायोमेट्रिक डेटा
B.
Passwords
पासवर्ड
C.
Private data
निजी डाटा
D.
backup
बैकअप
Question No# :
31
out of 50
Report Bug
Bookmark
What is the role of a UV (Ultraviolet) sensor in an IoT device?
A.
Measure air pressure
B.
Detect changes in temperature
C.
Monitor UV radiation levels
D.
Measure humidity
Question No# :
32
out of 50
Report Bug
Bookmark
What does the "Crop" tool do in Adobe Photoshop 7?
A.
Adjusts the image's brightness and contrast
B.
Removes unwanted portions of an image
C.
Adds a border around the image
D.
Applies artistic filters
Question No# :
33
out of 50
Report Bug
Bookmark
To secure your data on IoT devices
IoT उपकरणों पर अपना डेटा सुरक्षित करने के लिए
A.
Keep changing your password
Keep changing your password
B.
Update your every device
Update your every device
C.
Avoid using devices that are risky
Avoid using devices that are risky
D.
All of the above
All of the above
Question No# :
34
out of 50
Report Bug
Bookmark
What is the primary purpose of a Digital Signal Processor (DSP) in IoT devices?
A.
Process analog signals
B.
Provide internet connectivity
C.
Perform digital signal processing tasks
D.
Control power consumption
Question No# :
35
out of 50
Report Bug
Bookmark
What is a private key
प्राइवेट की क्या होती है
A.
A key on your key chain
A key on your key chain
B.
A key given to the public
A key given to the public
C.
A key not to be given to the public
A key NOT to be given to the public
D.
A key that opens a secret door
A key that opens a secret door
Question No# :
36
out of 50
Report Bug
Bookmark
In Photoshop 7, what is the purpose of the "Dodge Tool"?
A.
Darkens areas of an image
B.
Lightens areas of an image
C.
Blurs the edges of an image
D.
Converts color images to grayscale
Question No# :
37
out of 50
Report Bug
Bookmark
How can you undo the last action in Photoshop 7?
A.
Ctrl + Z (Windows) or Command + Z (Mac)
B.
Ctrl + X (Windows) or Command + X (Mac)
C.
Ctrl + C (Windows) or Command + C (Mac)
D.
Ctrl + V (Windows) or Command + V (Mac)
Question No# :
38
out of 50
Report Bug
Bookmark
What is the primary function of a tilt sensor in an IoT device?
A.
Measure air pressure
B.
Detect changes in humidity
C.
Monitor angular position or tilt
D.
Measure light intensity
Question No# :
39
out of 50
Report Bug
Bookmark
What is the purpose of the "Text Tool" in Adobe Photoshop 7?
A.
Adds text to images
B.
Adjusts image saturation
C.
Creates custom shapes
D.
Blurs the background of an image
Question No# :
40
out of 50
Report Bug
Bookmark
______________is a program which enters computer system by secretly attaching itself with valid computer program and later steals information.
______________ एक प्रोग्राम है जो गुप्त रूप से अटैच होकर कंप्यूटर सिस्टम में प्रवेश करता है स्वयं वैध कंप्यूटर प्रोग्राम के साथ और बाद में जानकारी चुरा लेता है।
A.
Phishing
Phishing
B.
Surfing
Surfing
C.
Trojan horse
Trojan horse
D.
Wamp
Wamp
Question No# :
41
out of 50
Report Bug
Bookmark
Which menu option is used for adjusting the color balance in Adobe Photoshop 7?
A.
Filter
B.
View
C.
Image
D.
Layer
Question No# :
42
out of 50
Report Bug
Bookmark
Which wireless communication protocol is commonly used in IoT devices for short-range communication?
A.
Bluetooth
B.
Wi-Fi
C.
Zigbee
D.
LTE
Question No# :
43
out of 50
Report Bug
Bookmark
In IoT terminology, what does the acronym LPWAN stand for?
A.
Low Power Wide Area Network
B.
Long Processing Window for Authentication Network
C.
Large Payload Wireless Access Network
D.
Low-Profile Wireless Antenna Network
Question No# :
44
out of 50
Report Bug
Bookmark
What is the purpose of the "Histogram" in Adobe Photoshop 7?
A.
Adjusting the image's saturation
B.
Viewing a graphical representation of the tonal distribution in an image
C.
Applying artistic filters to an image
D.
Creating custom shapes
Question No# :
45
out of 50
Report Bug
Bookmark
Which IoT security measure involves creating a secure tunnel for transmitting data over an untrusted network?
A.
Authentication
B.
Authorization
C.
VPN (Virtual Private Network)
D.
Encryption
Question No# :
46
out of 50
Report Bug
Bookmark
What is the primary purpose of a moisture sensor in an IoT-based agriculture system?
A.
Measure air pressure
B.
Detect changes in temperature
C.
Monitor soil moisture levels
D.
Measure humidity
Question No# :
47
out of 50
Report Bug
Bookmark
What is the purpose of the "Lasso Tool" in Adobe Photoshop 7?
A.
Making rectangular selections
B.
Making elliptical selections
C.
Making freehand selections
D.
Drawing straight lines
Question No# :
48
out of 50
Report Bug
Bookmark
Which tool is used for blurring or sharpening specific areas of an image in Photoshop 7?
A.
Blur Tool
B.
Sharpen Tool
C.
Clone Stamp Tool
D.
Sponge Tool
Question No# :
49
out of 50
Report Bug
Bookmark
What indicates to the reader the purpose of a letter?
पाठक को पत्र का उद्देश्य क्या इंगित करता है?
A.
Subject
विषय
B.
Body
प्रधान भाग
C.
Address
पता
D.
Salutation
अभिवादन
Question No# :
50
out of 50
Report Bug
Bookmark
What is the role of a sensor in an IoT device?
A.
Perform actions based on received data
B.
Connect devices to the cloud
C.
Measure and collect data from the environment
D.
Encrypt communication between devices
Latest Current Affairs 2025
Online Exam Quiz for One day Exam
Online Typing Test
CCC Online Test
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Online MBA 2 years
Online MCA
Online BCA
Best Website and Software Company in Allahabad