In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?
- A . High signal-to-noise ratio
- B . Congested frequency channels
- C . Use of encryption
- D . Low bandwidth usage
Which of the following wireless IoT technologies support mesh networking? (Select two)
- A . Zigbee
- B . LTE-M
- C . Bluetooth Mesh
- D . Wi-Fi
What strategies can help mitigate risks in wireless IoT networks? (Select two)
- A . Disabling device firmware updates
- B . Using encryption for data transmission
- C . Regularly auditing network access
- D . Minimizing authentication checks
Which of the following are common threats in wireless IoT networks? (Select two)
- A . Man-in-the-middle attacks
- B . Data compression
- C . Eavesdropping
- D . Signal boosting
Which responsibilities are associated with the PHY layer in a wireless IoT network? (Select two)
- A . Modulating and demodulating data signals
- B . Encrypting data for transmission
- C . Managing frequency channels
- D . Addressing devices in the network
Which of the following are key principles of IoT security? (Select two)
- A . Confidentiality
- B . Integrity
- C . Data replication
- D . Signal strength
Which wireless IoT technologies use the IEEE 802.15.4 MAC standard? (Select two)
- A . Zigbee
- B . Wi-Fi
- C . Thread
- D . LoRaWAN
What is the main advantage of using sub-1 GHz frequencies for IoT devices?
- A . Higher data rates
- B . Longer range and better penetration
- C . Increased security
- D . Lower energy consumption
Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?
- A . Data encryption
- B . Modulation and demodulation
- C . Packet framing and error checking
- D . Carrier sense and collision avoidance
Which techniques are used by the MAC layer to improve security in wireless IoT networks? (Select two)
- A . Data encryption
- B . Address filtering
- C . Address filtering
- D . Time slotting
Which wireless IoT technology is best suited for long-range, low-power communication?
- A . Wi-Fi
- B . LoRaWAN
- C . Bluetooth
- D . NFC
Which of the following is a common threat to wireless IoT networks?
- A . Physical damage
- B . Eavesdropping
- C . Overheating
- D . Data redundancy
Which of the following IoT technologies provide multiple modulation schemes to enhance performance? (Select two)
- A . LoRaWAN
- B . Zigbee
- C . LTE-M
- D . Sigfox
Which transport layer protocol is typically used for real-time IoT applications where low-latency is critical?
- A . TCP
- B . UDP
- C . HTTP
- D . ICMP
In the context of Zigbee networks, what role does the MAC layer play?
- A . Defining network encryption protocols
- B . Managing power consumption
- C . Scheduling access to the communication medium
- D . Modulating data for transmission
Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?
- A . WPA2
- B . TLS
- C . DTLS
- D . IPSec
Which security protocols are commonly used in wireless IoT networks? (Select two)
- A . WPA2
- B . AES
- C . DTLS
- D . FTP
Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?
- A . Data Link Layer
- B . Network Layer
- C . Transport Layer
- D . Application Layer
Which MAC layer protocols are used in wireless IoT communication? (Select two)
- A . CSMA/CA
- B . AES-256
- C . FHSS
- D . TDMA
Which tools are commonly used to troubleshoot network issues in wireless IoT solutions? (Select two)
- A . Spectrum analyzer
- B . Firewall
- C . Network sniffer
- D . Web browser
Which IoT security challenge is most directly addressed by implementing mutual authentication?
- A . Data integrity
- B . Device identity verification
- C . Secure data storage
- D . Network latency
What type of attack involves an unauthorized device impersonating a legitimate IoT device to gain network access?
- A . Man-in-the-middle attack
- B . Replay attack
- C . Spoofing attack
- D . Denial of Service (DoS) attack
Which protocol is used for constrained devices and supports lightweight communication in IoT networks?
- A . MQTT
- B . HTTP
- C . CoAP
- D . FTP
Which of the following factors directly affects the data rate of a wireless IoT connection?
- A . Frequency
- B . Signal strength
- C . Modulation technique
- D . All of the above
When planning a wireless IoT solution for a large industrial site, what is a key consideration for ensuring reliable connectivity?
- A . Using only low-power communication protocols
- B . Placing wireless access points to ensure complete coverage and redundancy
- C . Minimizing the number of devices connected to the network
- D . Reducing the frequency of data transmission
Which of the following IoT wireless technologies operates in the unlicensed 2.4 GHz band?
- A . Sigfox
- B . Zigbee
- C . LoRaWAN
- D . 5G
Which features enhance the security of IoT devices? (Select two)
- A . Secure boot
- B . Mutual authentication
- C . Data redundancy
- D . Shorter packet transmission times
Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)
- A . Zigbee
- B . LoRaWAN
- C . Bluetooth
- D . Wi-Fi
Which of the following IoT connectivity technologies is most commonly used in industrial environments due to its high reliability and deterministic nature?
- A . Zigbee
- B . Wi-Fi
- C . ISA100
- D . Bluetooth
Which of the following are characteristics of Zigbee in IoT applications? (Select two)
- A . Low power consumption
- B . High bandwidth
- C . Short range
- D . Long range
Which strategies help mitigate connectivity issues in wireless IoT networks? (Select two)
- A . Reducing transmission power
- B . Deploying more access points
- C . Optimizing network bandwidth
- D . Disabling encryption
What is the first step in troubleshooting an IoT device that fails to connect to a wireless network?
- A . Restart the device
- B . Check the network signal strength
- C . Perform a firmware update
- D . Replace the device battery
Which of the following methods can be used to protect wireless IoT networks from Denial of Service (DoS) attacks?
- A . Implementing firewalls
- B . Using low power modes
- C . Reducing signal strength
- D . Disabling encryption
Which of the following is a primary advantage of Wi-Fi HaLow over traditional Wi-Fi for IoT applications?
- A . Higher data rates
- B . Longer range and lower power consumption
- C . Improved security features
- D . Compatibility with all existing IoT protocols
Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)
- A . CoAP
- B . TCP
- C . MQTT
- D . FTP
What are common troubleshooting techniques for dealing with intermittent IoT device connectivity? (Select two)
- A . Reducing the number of connected devices
- B . Rebooting the gateway
- C . Analyzing signal interference
- D . Disabling firewalls
Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)
- A . BLE
- B . Wi-Fi 6
- C . NB-IoT
- D . 5G
Which features are essential for an IoT communication protocol at the upper layers? (Select two)
- A . Low power consumption
- B . Data encryption
- C . Lightweight data transmission
- D . Network address translation
What protocol is responsible for providing MAC layer security in IEEE 802.15.4 networks?
- A . Advanced Encryption Standard (AES)
- B . IP Security (IPsec)
- C . Transport Layer Security (TLS)
- D . Wi-Fi Protected Access (WPA2)
Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)
- A . Zigbee
- B . Wi-Fi 6
- C . LoRaWAN
- D . Thread