Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)

Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)A . ZigbeeB . LoRaWANC . BluetoothD . Wi-FiView AnswerAnswer: AB

February 22, 2025 No Comments READ MORE +

Which of the following is a common threat to wireless IoT networks?

Which of the following is a common threat to wireless IoT networks?A . Physical damageB . EavesdroppingC . OverheatingD . Data redundancyView AnswerAnswer: B

February 20, 2025 No Comments READ MORE +

Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?

Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?A . Data Link LayerB . Network LayerC . Transport LayerD . Application LayerView AnswerAnswer: C

February 19, 2025 No Comments READ MORE +

Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?

Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?A . Data encryptionB . Modulation and demodulationC . Packet framing and error checkingD . Carrier sense and collision avoidanceView AnswerAnswer: D

February 16, 2025 No Comments READ MORE +

Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)

Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)A . BLEB . Wi-Fi 6C . NB-IoTD . 5GView AnswerAnswer: AC

February 12, 2025 No Comments READ MORE +

Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)

Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)A . ZigbeeB . Wi-Fi 6C . LoRaWAND . ThreadView AnswerAnswer: AD

February 11, 2025 No Comments READ MORE +

Which of the following are key principles of IoT security? (Select two)

Which of the following are key principles of IoT security? (Select two)A . ConfidentialityB . IntegrityC . Data replicationD . Signal strengthView AnswerAnswer: AB

February 10, 2025 No Comments READ MORE +

Which wireless IoT technologies use the IEEE 802.15.4 MAC standard? (Select two)

Which wireless IoT technologies use the IEEE 802.15.4 MAC standard? (Select two)A . ZigbeeB . Wi-FiC . ThreadD . LoRaWANView AnswerAnswer: AC

February 9, 2025 No Comments READ MORE +

Which MAC layer protocols are used in wireless IoT communication? (Select two)

Which MAC layer protocols are used in wireless IoT communication? (Select two)A . CSMA/CAB . AES-256C . FHSSD . TDMAView AnswerAnswer: AD

February 7, 2025 No Comments READ MORE +

When planning a wireless IoT solution for a large industrial site, what is a key consideration for ensuring reliable connectivity?

When planning a wireless IoT solution for a large industrial site, what is a key consideration for ensuring reliable connectivity?A . Using only low-power communication protocolsB . Placing wireless access points to ensure complete coverage and redundancyC . Minimizing the number of devices connected to the networkD . Reducing the...

January 31, 2025 No Comments READ MORE +