1/407
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which building block is used to move collected IoT data to the central IoT platform?
A) Edge compute
B) Application
C) Gateway
D) Smart device
C
What is the function of soil moisture sensors in a smart agriculture ecosystem?
A) Capturing soil moisture metrics
B) Processing soil moisture metrics
C) Activating sprinklers based on low-soil-moisture metrics
D) Transmitting soil moisture metrics to a central network
A
What moves data from IoT sensor devices to a central network?
A) Gateway
B) Actuator
C) Application server
D) Proxy server
A
Which computation method processes data captured at the sensor device before sending it to a backhaul network?
A) Data analytics
B) Data access
C) Cloud computing
D) Edge computing
D
Which building block of the IoT architecture is responsible for collecting raw data generated by the monitored entity?
A) Actuator
B) Gateway
C) Processor
D) Sensor
D
Which feature characterizes a wireless local area network (WLAN) in an IoT architecture?
A) Limit of battery life of one year
B) Limit of data rate of 1 KB
C) Support for FireWire protocol
D) Support for line-of-sight communication
D
What is the result of switching from the industrial, scientific, and medical (ISM) frequency above 1 GHz to the ISM frequency below 1 GHz?
A) Lower cost
B) Longer range
C) Higher data rate
D) Shorter battery life
B
What is a short-range network technology that supports meshing?
A) Zigbee
B) Bluetooth
C) Sigfox
D) Weightless
A
Which two components provide the connectivity for an IoT architecture?
Choose 2 answers.
1. Access network
2. Gateway
3. Sensor
4. Edge device
A) 1, 3
B) 2, 3
C) 1, 2
D) 2, 4
C
What is the function of the customer edge device in the four-node edge computing model?
A) Provides limited local storage and processing capabilities
B) Performs data aggregation and reduces transmission costs
C) Performs measurements and provides telemetry
D) Provides powerful storage and processing capabilities
A
Which two processor architectures are used by Customer Premises Edge Compute (C-PEC) devices?
Choose 2 answers.
1. x86
2. MIPS
3. ARM
4. Itanium
A) 1, 3
B) 1, 2
C) 2, 3
D) 3, 4
A
Which module in the edge computing framework is used to store IoT data received from sensors or from the cloud?
A) Protocol adapter
B) Information broker
C) Rules engine
D) Case specific
B
A university is testing a smart energy solution and requires a system to monitor the following parameters of power used by its buildings:
- voltage
- phase
- apparent power
- power factor
- frequency
Which device should be used to perform these readings?
A) Intelligent energy device (IED)
B) Smart meter (SM)
C) Power measurement and control (PMC)
D) Phasor measurement unit (PMU)
C
A university is deploying a smart energy solution to its student dormitories and needs to collect power usage data for billing purposes.
Which device should this university use?
A) Power measurement and control (PMC)
B) Smart meter (SM)
C) Intelligent energy device (IED)
D) Phasor measurement unit (PMU)
B
A city plans for an Intelligent Transport System (ITS) that monitors public transport locations, as well as accidents and congestions, to control traffic lights effectively.
Which two items should be used to gather information for the system?
Choose 2 answers.
1. GPS devices
2. Smart CCTV cameras
3. Smart meters
4. Intraocular devices
A) 1, 2
B) 1, 3
C) 2, 3
D) 3, 4
A
An electric utility company needs to increase the speed of the collection and improve the accuracy of the information it manually collects from its meters. The meters are located in the back of residential dwellings.
Which solution meets both requirements?
A) Move meters to the front of every building
B) Have another person verify the data from the meters
C) Install a sensor on meters that can transmit data to a receiver
D) Change the analog meters to a digital display
C
Which IoT device is used in a smart building to determine when rooms are in use?
A) Humidity device
B) Thermo device
C) Smart speaker
D) Smart light
D
Which IoT device can improve emergency responses by monitoring a user's activities at home?
A) Camera
B) Companion robot
C) Air tag
D) Compressor
B
Which type of IoT detection sensor built into electric bulbs minimizes energy usage?
A) Humidity
B) Light
C) Vibration
D) Motion
D
A company plans to adopt IoT into its business operations and then go public. The company is concerned about the financial and reputational impact of increasing the volume of personally identifiable information (PII) that might inadvertently be exposed, which would affect the value of its stock.
Which two considerations should be addressed as part of the adoption strategy?
Choose 2 answers.
1. Governance
2. Privacy
3. Security
4. Standardization
A) 1, 2
B) 1, 3
C) 2, 3
D) 3, 4
C
Which two technology areas affect the networking requirements within the customer IoT landscape?
Choose 2 answers.
1. Smart roads
2. Smart home
3. Sonography
4. Wearables
A) 2, 4
B) 1, 2
C) 2, 3
D) 1, 3
A
How does the processing of IoT data in the cloud change when transitioning from the Lambda architecture to Kappa architecture?
A) The batch layer is removed.
B) The streaming layer is removed.
C) The batch layer replaces the serving layer.
D) The streaming layer replaces the serving layer.
A
Which component in the Lambda architecture acts as the streaming layer in a streaming processing system?
A) Real-time engine
B) Batch engine
C) Serving back-end
D) Data storage
A
Which task does an information consumer perform within an IoT ecosystem?
A) Collects data from their sensors and shares it based on terms and conditions
B) Builds applications that use data from various sources after obtaining consent
C) Identifies risks by communicating with the data owner for risk management
D) Maintains backups of the data collected from the sensors for disaster recovery
B
Which vulnerability do IoT botnets target on IoT devices by applying data found on the internet?
A) Unencrypted communications
B) Default credentials
C) Cleartext passwords
D) Exposed sensors
B
Which two stakeholder groups contribute to addressing the challenges of IoT security?
Choose 2 answers.
1. Governments
2. Universities
3. Standards development bodies
4. Law enforcement organizations
A) 2, 3
B) 1, 2
C) 1, 3
D) 1, 4
C
Which two issues can result from global deployment of insecurely configured IoT devices?
Choose 2 answers.
1. Devices are compromised to provide fake data
2. Device hardware is attacked until destroyed
3. Devices are compromised to form botnets
4. Device software is built into a sandbox environment
A) 2, 3
B) 1, 3
C) 3, 4
D) 2, 4
B
Which type of malware creates a network of remotely controlled IoT devices unknown to the owners?
A) Macro
B) Cross-site scripting
C) Embedded software exploitation
D) Botnet
D
What enables IoT devices to be infected by the Mirai malware?
A) Default passwords
B) Plaintext communication
C) Stolen certificates
D) Cloud storage
A
A company develops a small tracker to be used in parcels to track progress via Global Positioning System (GPS). Testing reveals that the tracker has a Joint Test Action Group (JTAG) port on the circuit board that can be used to overwrite the firmware on the tracker and provide false location data.
Which two Internet of Things Security Foundation (IoTSF) Best Practice Guidelines (BPGs) should this company follow in its design process to ensure security from these forms of attack?
Choose 2 answers.
1. Device secure boot
2. Credential management
3. Physical security
4. Application security
A) 1, 3
B) 1, 2
C) 2, 3
D) 3, 4
A
A company develops an IoT-based security system. The system uses proximity sensors that communicate with a central gateway using a 433 MHZ radio signal. Testing reveals that the traffic can be sniffed with a software-defined radio, and an attacker could spoof the proximity sensor by copying the authentication details from the radio traffic.
Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its design process to ensure the security of the radio data?
A) Device secure boot
B) Physical security
C) Network connections
D) Application security
C
A company hosts a database in a public cloud. Multiple IoT devices are compromised and used to generate a high volume of requests targeting the database to affect its availability.
Which type of attack is this?
A) Cross-site scripting
B) Distributed denial of service (DDoS)
C) Spear phishing
D) Structured Query Language (SQL) injection
B
A company developed an IoT smart photo frame that allows users to upload photos to their device using a web browser. Testing revealed that users can upload files onto the root filesystem.
Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its design process to ensure filesystem permissions are set correctly?
A) Device secure boot
B) Physical security
C) Secure operating system
D) Application security
C
A company uses IoT devices to capture data in the field and transmit it for central processing. The company plans to follow the Internet of Things Security Foundation's (IoTSF) Best Practice Guidelines (BPGs) to ensure that personal data is protected.
Which IoTSF guideline should this company use?
A) Device secure boot
B) Physical security
C) Securing software updates
D) Application security
D
A company is developing a smart speaker. The company wants to review industry standards on device boot and operating system security to improve security in its devices.
Which two resources should this company evaluate?
Choose 2 answers.
1. Code of Practice
2. Best Practice Guidelines
3. Human-in-the-loop
4. Internet of Bodies
A) 1, 2
B) 1, 3
C) 3, 4
D) 2, 4
A
Malware has infected several IoT devices in a company. These devices were using default configurations.
What should the company do to prevent the malware from being installed?
A) Alter the port the devices use to communicate
B) Scan for unusual packets being sent to the devices
C) Change the devices' usernames and passwords
D) Install a firewall limiting communication to the devices
C
What does blockchain implement to ensure reliable data are returned when there are multiple sensors measuring the same data?
A) Mega-merger method
B) Agreed consensus mechanism
C) Shared storage quorum
D) Byzantine Paxos algorithm
B
Which blockchain feature in an IoT application ensures that a transaction is tamperproof once it is validated?
A) Decentralization
B) Immutability
C) Auditability
D) Resilience
B
What is the purpose of the consensus mechanism enabled through blockchain when collecting the same signals from multiple IoT sensors?
A) Ensuring that data from each sensor is treated equally
B) Providing a single version of the truth across all sensor data
C) Identifying a single sensor with the most accurate data
D) Verifying data from sensors by a central authority
B
What are two categories of ethical concern when collecting data through IoT?
Choose 2 answers.
1. Accessing and using data
2. Building applications to store data
3. Control and property rights of data
4. Diagnostics of data quality
A) 2, 3
B) 1, 4
C) 1, 3
D) 2, 4
C
A company is developing a garage door sensor that stores data defining when the owner is home or away and when the garage door is open or closed. The company needs to ensure the data is stored in a secure manner.
What should this company be concerned about regarding the storage of user information?
A) Mishandling stored user information will lead to privacy issues.
B) Securing stored user information will affect the garage door sensor's functionality.
C) Connecting the garage door sensor to private networks will affect stored data.
D) Caching garage door sensor data at the edge will lead to governance issues.
A
Which ethical issue do customers encounter when using social media platforms from their wearable IoT devices to update people about activities?
A) Utilizing freedom of expression at the expense of their privacy
B) Determining who can purchase their demographic information
C) Ensuring personally identifiable information being stored is secure
D) Making sure information is not saved locally in plain text
A
A company requires customers to provide personally identifiable information (PII) when registering an IoT device. The company sells the information. A business school has argued that only people should be able to sell their information and not the IoT company.
Which principle does this argument support?
A) Integrity must remain a high priority.
B) Confidentiality of all data is mandatory.
C) Privacy is a fundamental human right.
D) Availability is essential for data transfer.
C
A manufacturer of proprietary IoT technology is trying to pressure a company into using its technology.
What is the manufacturer infringing on?
A) Fifth Amendment
B) Deidentification
C) Decisional privacy
D) Safe harbor
C
Which framework identifies factors influencing investments?
A) National Institute of Standards and Technology (NIST) Privacy Framework
B) National Institute of Standards and Technology (NIST) Cybersecurity Framework
C) Software Alliance Framework for Security Software (SAFSS)
D) Regulators, Facilitators, and Collaborators (RFC) Framework
D
Which body in the U.S. is responsible for leveling penalties against companies whose cybersecurity is below standard?
A) Federal Communications Commission (FCC)
B) Institute of Electrical and Electronics Engineers (IEEE)
C) Federal Trade Commission (FTC)
D) Internet Engineering Task Force (IETF)
C
Which agency publishes the Cybersecurity Framework (CSF)?
A) Federal Communications Commission (FCC)
B) Federal Trade Commission (FTC)
C) National Institute of Standards and Technology (NIST)
D) American National Standards Institute (ANSI)
C
Which framework prohibits countries from knowingly allowing IoT infrastructure under their control to be used for wrongful acts against other countries?
A) EU Network and Information Security Directive
B) General Data Protection Regulation (GDPR)
C) G7 Declaration on Responsible States Behavior in Cyberspace
D) Fair Information Practice Principles (FIPP)
C
A company implements an IoT 5G smart grid to improve resiliency within its power grid. The company installs the virtual machine cloud machine (vMCM) function.
Why is the vMCM function installed?
A) To monitor devices and cache information about daily consumption
B) To validate device identity to the gateway without mining operations
C) To verify the identity of a device with the OAuth2.0 service
D) To locate devices that provide a specific utility with OpenId Connect
A
A utility company is planning to implement an advanced metering infrastructure (AMI) to transform its legacy network into a smart network.
What is reduced by making this transformation?
A) Capital expenditure
B) Customer turnover
C) Operational costs
D) Power outages
C
A power company integrates 5G in its advanced metering infrastructure as a service (AMIaaS) architecture. The company needs a virtual network function that provides digital ledger functionality.
What should this company use?
A) Virtual mobility management entity (vMME)
B) Virtual authentication, authorization, and accounting (vAAA)
C) Virtual machine cloud machine (vMCM)
D) Virtual blockchain processing (vBCP)
D
How are IoT devices used by the Chinese government to measure its citizens' social credit score?
A) By identifying the brand of products purchased at the market and online
B) By tracking compliance with prescribed social and economic obligations
C) By calculating the personal time taken off from work activities
D) By verifying the number of family members living in a residence
B
A company is developing a self-driving car with IoT technology that will generate up to 6 GB of data per second.
Which component will analyze the data?
A) Centralized server
B) Edge computing
C) Peer-to-peer network
D) Meshed network
B
Which two reductions will occur when autonomous vehicle (AV) usage is widespread?
Choose 2 answers.
1. Car prices
2. Congestion
3. Car ownership
4. Emissions
A) 2, 4
B) 1, 2
C) 2, 3
D) 3, 4
A
A hospital plans to send data from intensive care unit (ICU) sensors to a central recording system. The data should be captured in transit for analysis in a database.
Which component of the system should be used to capture the data?
A) Data agent
B) Data handling unit
C) Network data aggregator
D) Central data store
C
A hospital unit takes care of high-risk patients who require constant monitoring through IoT devices.
Which condition identifies an actual emergency?
A) True positives
B) True negatives
C) False positives
D) False negatives
A
A hospital uses legacy sensors to collect patients' data in its intensive care unit (ICU). The hospital deploys a network data aggregator in accordance with the principles of the openEHR (electronic health record) model.
What is the primary implication of this approach?
A) Eliminates the need to tamper with ICU sensors
B) Introduces the need to tamper with ICU sensors
C) Provides automatic access of patients' data to researchers
D) Transitions ownership of patients' data to researchers
A
A city is evaluating the World Bank's Sustainable Mobility for All (SuM4All) initiative in the development of a road traffic congestion solution.
What are two objectives of the SuM4All initiative?
Choose 2 answers.
1. Security
2. Safety
3. Efficiency
4. Deployment
A) 1, 2
B) 1, 3
C) 2, 3
D) 3, 4
C
Sensors with computer vision intelligence are embedded in a city's access road surfaces and in CCTV systems to enable drivers to find available parking spaces.
Which objective of the World Bank's Sustainable Mobility for All (SuM4All) initiative is being addressed?
A) Efficiency
B) Green mobility
C) Safety
D) Universal access
A
A company is evaluating how to reduce air pollution in places that lack IoT sensors.
Which two technologies can be used?
Choose 2 answers.
1. Gateway device
2. Access network
3. Machine learning
4. Artificial intelligence
A) 1, 2
B) 2, 3
C) 1, 3
D) 3, 4
D
To ensure trust in cyberspace, a new IoT engineer is trying to understand different categories of cyberthreats and the different actors threatening the cyberspace.
Which threat actors use cyberspace to disrupt critical infrastructures to elicit widespread panic and loss of public confidence in the ability of the government to function effectively?
A) Cybercrime
B) Cyberwar
C) Cyber terrorists
D) Cyber espionage
C
An IoT device-manufacturing company recently hired you as a subject matter expert to help their security specialists understand the debates about cyber terminologies. The company felt that a good understanding of these terminologies provides important context as well as the ability to identify and thoughtfully engage with other practitioners, engineers, and policymakers.
Which terminology refers to technologies that generate, store, and process data as binary digits or bits in the form of zeroes and ones?
A) Internet
B) Digital
C) Web
D) Cyber
B
What is the main goal of cybersecurity?
a) To make sure the internet is always accessible
b) To protect information systems, networks, data, and programs from digital attacks
c) To connect all the computers in the world
d) To collect, process, store, and distribute data
B
What does the term "cyberspace" refer to?
a) A global network of satellites
b) A network of interconnected computers, servers, routers, switches, and fiber-optic cables
c) A secure online storage system for data
d) A digital currency platform
B
What does the term "digital" primarily relate to?
a) Technologies that use color palettes and visual effects
b) Technologies that generate, store, and process data as fixed numbers (binary digits or bits)
c) Technologies that focus on audio and video processing
d) Technologies that enable wireless communication
B
What is an information system?
a) A single piece of hardware that processes data
b) A combination of hardware, software, and networks that collect, process, store, and distribute data
c) A software application that manages data processing
d) A group of people who manage data for a company
B
What is the main difference between the internet and the web?
a) The internet is a global network of wired and wireless networks, while the web is an information space consisting of public resources linked together and accessible via the internet
b) The internet is a digital currency platform, while the web is a global network of wired and wireless networks
c) The internet is an information space consisting of public resources, while the web is a network of interconnected computers, servers, routers, switches, and fiber-optic cables
d) The internet is a network of people who manage data, while the web is a combination of hardware, software, and networks that collect, process, store, and distribute data
A
What does the term "consumer IoT" mainly refer to?
a) A global network of wired and wireless networks
b) Users' networks around their personal and home devices
c) Machines and computers used in industrial operations
d) Connected devices that monitor the human body
B
What is the primary focus of industrial IoT?
a) Enabling intelligent industrial operations using advanced data analytics for transformational business outcomes
b) Connecting all users' personal and home devices
c) Generating, storing, and processing data as fixed numbers
d) Monitoring the human body and collecting physiological data
A
What is the main concept behind the Internet of Bodies?
a) Connected devices that monitor the human body, collect physiological, biometric, or behavioral data, and exchange information over a wireless or hybrid network
b) A network of interconnected industrial machines and computers
c) An information space consisting of public resources linked together and accessible via the internet
d) The practice of protecting information systems, networks, data, and programs from digital attacks
A
Which of the following is an example of consumer IoT?
a) A smart thermostat in a home
b) A machine used in a manufacturing plant
c) A cybersecurity software application
d) A public resource accessible via the internet
A
What differentiates the Internet of Bodies from consumer IoT?
a) The Internet of Bodies focuses on connecting personal and home devices, while consumer IoT involves monitoring the human body
b) The Internet of Bodies involves industrial machines and computers, while consumer IoT is about personal and home devices
c) The Internet of Bodies is about monitoring the human body and collecting physiological, biometric, or behavioral data, while consumer IoT involves users' networks around personal and home devices
d) The Internet of Bodies is a global network of wired and wireless networks, while consumer IoT is an information space consisting of public resources
C
How IoT devices communicate with each other and how they connect to the internet will impact global IoT adoption.
Which network allows IoT devices to connect to one another and transfer data over a short distance?
A) Wireless metropolitan area network (WMAN)
B) Wireless local area network (WLAN)
C) Campus area network (CAN)
D) Wireless personal area network (WPAN)
D
There is a wide range of IoT functions, devices, and applications that have the potential to transform so many aspects of our lives, businesses, and government for the better.
Which type of IoT is used in smart homes, personal assistants, and wearables?
A) Infrastructure IoT
B) Consumer IoT
C) Commercial IoT
D) Industrial IoT
B
A home appliance manufacturing company wants to invest in IoT and the management is deliberating on different ways to transform their products into a software service by thinking of them as IoT objects.
How can the company best enable their own IoT capabilities if reduced time to market is a key factor?
A) Create their own software and connectivity systems
B) Leverage IoT platforms of other companies
C) Leverage fundamental IoT building blocks to create their own IoT solutions from scratch
D) Leverage ready-to-use IoT applications
D
You are a CISO with a top federal contracting company. The CTO will be addressing a joint session of Congress and she asked for your help on the major policy challenges affecting cyberspace today.
What are some of the major policy issues affecting cyberspace today?
A) Trust, IoT adoption, and the growth of edge devices
B) Broadband access, governance, and IoT adoption
C) Governance, trust, and IoT adoption
D) Broadband access, governance, and trust
D
Beyond the Internet of Things, which transformed the way people live and work by connecting everyday objects to the internet, there is a wide range of connected devices emerging that could be implanted, swallowed, or simply worn to collect a person's physical data.
Which term best describes these implanted devices?
A) Internet of Things (IoT)
B) Internet of Bodies (IoB)
C) Internet of Devices (IoD)
D) Internet of Everything (IoE)
B
After extensive market and industry research, the home appliance manufacturing company could not find ready-made IoT applications that fit its needs and decided to build its own IoT applications from scratch.
Which approach should the company take to achieve this objective?
A) Leverage IoT platforms of other companies
B) Leverage other companies' hardware, software, connectivity systems, and other fundamental building blocks
C) Create their own software and connectivity systems
D) Leverage ready-to-use IoT applications
unanswered
B
What is the primary function of an actuator?
a) To convert an electrical signal into a corresponding physical quantity such as movement, force, or sound
b) To connect personal and home devices in a network
c) To monitor the human body and collect physiological data
d) To enable intelligent industrial operations using advanced data analytics
A
What does the term "edge processing" refer to?
a) A process of data aggregation, manipulation, bandwidth reduction, and other logic directly on an IoT sensor or device
b) A device that converts an electrical signal into a corresponding physical quantity
c) A set of stakeholders that participate in the deployment of IoT technology
d) A global network of wired and wireless networks
A
What is the main concept of the IoT ecosystem?
a) A set of stakeholders that participate in the deployment of IoT technology and the relationships between them
b) A process of data aggregation, manipulation, and other logic directly on an IoT sensor or device
c) A device that converts an electrical signal into a corresponding physical quantity
d) An information space consisting of public resources linked together and accessible via the internet
A
What is a common application of an actuator in IoT devices?
a) Controlling the temperature in a smart thermostat
b) Transmitting data over a wireless network
c) Reducing bandwidth consumption on an IoT sensor
d) Facilitating relationships between IoT stakeholders
A
How does edge processing benefit IoT devices?
a) By enabling the direct conversion of electrical signals into physical quantities
b) By reducing data transmission latency and conserving bandwidth through local processing
c) By fostering relationships between IoT stakeholders
d) By connecting all users' personal and home devices
B
The concept of incorporating sensors into physical objects and connecting these objects to the internet using wireless networks has evolved over the years and been through different IoT waves.
Which wave of the IoT represented a hardware-related breakthrough that aimed to connect everyday objects to a network?
A) The fourth wave of the IoT
B) The third wave of the IoT
C) The first wave of the IoT
D) The second wave of the IoT
C
After the hardware-related breakthrough that connected physical objects to the internet, new communication technologies and protocols were developed to support the ubiquitous deployment of a wide variety of sensors.
Which wave of the IoT focused on developing new types of sensors and new technologies and protocols to support their deployment?
A) The second wave of the IoT
B) The first wave of the IoT
C) The fourth wave of the IoT
D) The third wave of the IoT
A
What is the primary characteristic of a long-range low-power wide-area network (LP-WAN)?
a) A network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges, often delivered through cellular networks
b) A group of colocated computers or other devices that form a network based on wired connections
c) A network for interconnecting devices centered around an individual person's workspace
d) A network of interconnected industrial machines and computers
A
What is the main feature of a wireless local area network (WLAN)?
a) A group of colocated computers or other devices that form a network based on radio transmissions rather than wired connections
b) A network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges
c) A network for interconnecting devices centered around an individual person's workspace
d) A device that converts an electrical signal into a corresponding physical quantity
A
What does a wireless personal area network (WPAN) primarily focus on?
a) Interconnecting low-bandwidth, battery-powered devices with low bit rates over long ranges
b) Creating a network for colocated computers or other devices based on radio transmissions
c) Forming a network for interconnecting devices centered around an individual person's workspace
d) Connecting all users' personal and home devices in a network
C
Which type of network would be most suitable for connecting IoT devices over long distances with low power requirements?
a) Long-range low-power wide-area network (LP-WAN)
b) Wireless local area network (WLAN)
c) Wireless personal area network (WPAN)
d) Actuator-based network
A
Which type of network is most suitable for connecting devices within a limited space like a home or office?
a) Long-range low-power wide-area network (LP-WAN)
b) Wireless local area network (WLAN)
c) Wireless personal area network (WPAN)
d) IoT ecosystem network
B
A range of technology and networking options is used to connect different devices and sensors used in implementing IoT solutions.
Which technologies could be leveraged in the IoT solution to deliver a short-range, energy-efficient, and high data rate?
A) Bluetooth and ZigBee
B) Sigfox and LoRa
C) Extended Coverage-GSM (EC-GSM) and Narrow Band (NB-IoT)
D) Wi-Fi
A
You are an IoT consultant for a retail store that wants to install sensors to track movements of customers through the store and measure dwell times. The sensors will send data to a central platform where they will be accessed and processed by application and analytics software.
Which type of network will you advise the retailer to implement to meet this requirement?
A) Wi-Fi
B) Bluetooth and ZigBee
C) Extended Coverage-GSM (EC-GSM) and Narrow Band (NB-IoT)
D) Wired networks
D
In the last decade, the focus of IoT has shifted from developing sensors and communication technologies and protocols to data collection, processing, analytics, and management, as well as security, privacy, and trust.
Which wave of the IoT is concerned with data collection, processing, and security?
A) The first wave of the IoT
B) The third wave of the IoT
C) The fourth wave of the IoT
D) The second wave of the IoT
B
From the sensors and actuators that are embedded in physical objects, to the wired and wireless networks that are used to connect these devices to the internet, a number of different stakeholders play one or more roles in the IoT ecosystem.
Which of the stakeholders in the IoT ecosystem owns the sensor deployments?
A) End users
B) Platform providers
C) Application developers
D) Information providers
D
A parking lot management company wants to connect 15,000 parking spaces to the cloud to save drivers valuable time and streamline the entire parking process. The parking spaces will send reports each time a spot becomes available in the parking garage.
Which network is most suitable for this requirement if the company will be using a device that does not consume a lot of power but can send data over a long range?
A) Extended Coverage-GSM (EC-GSM) and Narrow Band (NB-IoT)
B) Bluetooth and ZigBee
C) Sigfox and LoRa
D) Wi-Fi
C
What are Sigfox and LoRa primarily designed for?
a) Delivering long-range, energy-efficient, low data rates as low-power wide-area networks (LP-WANs)
b) Connecting devices within a limited space like a home or office
c) Forming a network for interconnecting devices centered around an individual person's workspace
d) Connecting colocated computers or other devices based on radio transmissions
A
In which of the following scenarios would LP-WANs like Sigfox and LoRa be most suitable?
a) Devices that require short-range and high-power consumption
b) Devices that need long-range and low-power consumption, especially in dense deployments in cities or buildings
c) Devices that focus on high data rates and short-range communication
d) Devices that exclusively use wired connections
B
What is a key advantage of using Sigfox and LoRa in IoT applications?
a) They enable high-speed data transmission for real-time applications
b) They facilitate energy-efficient, long-range communication with low data rates
c) They provide robust, high-bandwidth connections for data-intensive tasks
d) They support direct device-to-device communication without any network infrastructure
B
Which of the following is a common use case for LP-WAN technologies like Sigfox and LoRa?
a) Streaming high-definition video content
b) Gaming with low latency requirements
c) Monitoring and controlling a large number of IoT devices in a city or building
d) Establishing a high-speed wireless local area network (WLAN) in a home or office
C
What is a primary requirement for devices that benefit from Sigfox and LoRa networks?
a) Devices need high data rates and short-range communication
b) Devices require long-range and low-power consumption
c) Devices focus on wired connections and high-speed data transmission
d) Devices operate exclusively within an individual's personal workspace
B