Which of the following are characteristics of Zigbee in IoT applications? (Select two)
Which of the following are characteristics of Zigbee in IoT applications? (Select two)A . Low power consumptionB . High bandwidthC . Short rangeD . Long rangeView AnswerAnswer: AC
What type of attack involves an unauthorized device impersonating a legitimate IoT device to gain network access?
What type of attack involves an unauthorized device impersonating a legitimate IoT device to gain network access?A . Man-in-the-middle attackB . Replay attackC . Spoofing attackD . Denial of Service (DoS) attackView AnswerAnswer: C
Which strategies help mitigate connectivity issues in wireless IoT networks? (Select two)
Which strategies help mitigate connectivity issues in wireless IoT networks? (Select two)A . Reducing transmission powerB . Deploying more access pointsC . Optimizing network bandwidthD . Disabling encryptionView AnswerAnswer: BC
In the context of Zigbee networks, what role does the MAC layer play?
In the context of Zigbee networks, what role does the MAC layer play?A . Defining network encryption protocolsB . Managing power consumptionC . Scheduling access to the communication mediumD . Modulating data for transmissionView AnswerAnswer: C
Which of the following factors directly affects the data rate of a wireless IoT connection?
Which of the following factors directly affects the data rate of a wireless IoT connection?A . FrequencyB . Signal strengthC . Modulation techniqueD . All of the aboveView AnswerAnswer: D
Which wireless IoT technology is best suited for long-range, low-power communication?
Which wireless IoT technology is best suited for long-range, low-power communication?A . Wi-FiB . LoRaWANC . BluetoothD . NFCView AnswerAnswer: B
Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)
Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)A . CoAPB . TCPC . MQTTD . FTPView AnswerAnswer: AC
Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?
Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?A . WPA2B . TLSC . DTLSD . IPSecView AnswerAnswer: C
Which protocol is used for constrained devices and supports lightweight communication in IoT networks?
Which protocol is used for constrained devices and supports lightweight communication in IoT networks?A . MQTTB . HTTPC . CoAPD . FTPView AnswerAnswer: C
In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?
In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?A . High signal-to-noise ratioB . Congested frequency channelsC . Use of encryptionD . Low bandwidth usageView AnswerAnswer: B