QUESTIONS WITH CORRECT DETAILED ANSWERS ||
100% GUARANTEED PASS <RECENT VERSION>
DEX IOT Final Exam (2026) - Study Guide
1. The primary goal of Distributed Edge Computing (DEX) in an IoT context is to:
A. Centralize all data processing in a cloud data center.
B. Process data closer to its source to reduce latency and bandwidth.
C. Eliminate the need for network connectivity in IoT devices.
D. Increase the cost of IoT infrastructure. ✓
2. Which of the following is a key characteristic of an IoT device?
A. High power consumption and large form factor.
B. Limited processing power and connectivity. ✓
C. Requires direct human interaction for every operation.
D. Runs a full desktop operating system.
3. In the MQTT protocol, the component that receives messages from publishers and
distributes them to subscribers is called the:
A. Broker ✓
B. Router
C. Gateway
D. Agent
4. A "Thing" in the Internet of Things can be best defined as:
A. Only a sensor that collects data.
B. Only an actuator that performs an action.
C. Any physical object embedded with electronics and connectivity. ✓
D. Exclusively a smartphone or tablet computer.
5. The communication model where an IoT device sends data to a central server at regular
intervals is known as:
A. Request-Response
B. Publish-Subscribe
C. Push-Pull
D. Telemetry ✓
,6. Which layer of the IoT architecture is responsible for data storage and advanced analytics?
A. Perception Layer
B. Network Layer
C. Processing Layer ✓
D. Application Layer
7. The primary purpose of a gateway in an IoT network is to:
A. Generate electrical power for sensors.
B. Act as a bridge between different network protocols. ✓
C. Replace the cloud for all computing tasks.
D. Provide a user interface for end-users.
8. Which cryptographic method is most suitable for ensuring the integrity of data transmitted
by an IoT sensor?
A. Symmetric Encryption
B. Asymmetric Encryption
C. Hashing ✓
D. Steganography
9. LoRaWAN is an example of a protocol designed for:
A. High-bandwidth, real-time video streaming.
B. Short-range, personal area networks (e.g., Bluetooth).
C. Long-range, low-power wide-area networks (LPWAN). ✓
D. Wired industrial control systems.
10. The concept of a "Digital Twin" refers to:
A. A backup copy of an IoT device's firmware.
B. A virtual representation of a physical object or system. ✓
C. Two identical IoT devices for redundancy.
D. The user's profile in an IoT application.
11. Which of the following is a significant security challenge specific to IoT devices?
A. Lack of a graphical user interface (GUI).
B. Limited processing power for robust security protocols. ✓
C. Inability to connect to the internet.
D. High cost of hardware components.
12. The Constrained Application Protocol (CoAP) is designed to be used with:
A. Resource-constrained devices and networks. ✓
B. Only high-performance cloud servers.
,C. Legacy mainframe systems.
D. Fiber-optic backbone networks.
13. In a DEX architecture, "fog computing" typically operates:
A. Between the end devices and the cloud. ✓
B. Only within the cloud data center.
C. Directly on the sensor hardware.
D. On the end-user's smartphone.
14. An actuator in an IoT system is responsible for:
A. Measuring physical quantities from the environment.
B. Converting a digital signal into a physical action. ✓
C. Transmitting data over a wireless network.
D. Storing historical data logs.
15. The main advantage of using a Publish-Subscribe model (like MQTT) over a Request-
Response model (like HTTP) for IoT is:
A. Lower latency and reduced network overhead for frequent data updates. ✓
B. Built-in video conferencing capabilities.
C. Stronger encryption by default.
D. It eliminates the need for a network connection.
16. Which type of IoT network topology allows all devices to communicate directly with each
other?
A. Star Topology
B. Mesh Topology ✓
C. Bus Topology
D. Ring Topology
17. OTA (Over-The-Air) updates are crucial in IoT for:
A. Manually replacing device hardware.
B. Remotely deploying software and security patches. ✓
C. Increasing the device's physical range.
D. Charging the device's battery wirelessly.
18. The primary role of a hypervisor in edge computing is to:
A. Connect different types of sensor networks.
B. Create and manage multiple virtual machines on a single physical host. ✓
C. Translate between MQTT and HTTP protocols.
D. Act as a firewall for the entire network.
, 19. Which programming language is widely used for resource-constrained IoT devices due to
its low-level control and efficiency?
A. Python
B. Java
C. C/C++ ✓
D. HTML
20. A "side-channel attack" on an IoT device targets:
A. The main application software.
B. Physical characteristics like power consumption or timing. ✓
C. The device's user manual.
D. The wireless signal's frequency band.
21. The process of extracting meaningful patterns and insights from raw IoT data is known as:
A. Data Acquisition
B. Data Analytics ✓
C. Data Transmission
D. Data Encryption
22. Which organization is a leading standards body for IoT?
A. IEEE ✓
B. NASA
C. IETF
D. Both A and C
23. Docker containers are often preferred over full virtual machines at the edge because they:
A. Provide stronger hardware isolation.
B. Are lighter weight and have less overhead. ✓
C. Require a specialized operating system.
D. Cannot be updated remotely.
24. The "last mile" problem in IoT connectivity refers to:
A. Connecting the core internet to the local gateway or device. ✓
B. The final stage of data processing in the cloud.
C. The battery life of a device on its last charge.
D. The user's interaction with the application.
25. An example of a short-range wireless IoT communication technology is:
A. Satellite
B. Zigbee ✓