Which of the following are characteristics of Zigbee in IoT applications? (Select two)

Which of the following are characteristics of Zigbee in IoT applications? (Select two)A . Low power consumptionB . High bandwidthC . Short rangeD . Long rangeView AnswerAnswer: AC

May 18, 2025 No Comments READ MORE +

What type of attack involves an unauthorized device impersonating a legitimate IoT device to gain network access?

What type of attack involves an unauthorized device impersonating a legitimate IoT device to gain network access?A . Man-in-the-middle attackB . Replay attackC . Spoofing attackD . Denial of Service (DoS) attackView AnswerAnswer: C

May 16, 2025 No Comments READ MORE +

Which strategies help mitigate connectivity issues in wireless IoT networks? (Select two)

Which strategies help mitigate connectivity issues in wireless IoT networks? (Select two)A . Reducing transmission powerB . Deploying more access pointsC . Optimizing network bandwidthD . Disabling encryptionView AnswerAnswer: BC

May 16, 2025 No Comments READ MORE +

In the context of Zigbee networks, what role does the MAC layer play?

In the context of Zigbee networks, what role does the MAC layer play?A . Defining network encryption protocolsB . Managing power consumptionC . Scheduling access to the communication mediumD . Modulating data for transmissionView AnswerAnswer: C

May 15, 2025 No Comments READ MORE +

Which of the following factors directly affects the data rate of a wireless IoT connection?

Which of the following factors directly affects the data rate of a wireless IoT connection?A . FrequencyB . Signal strengthC . Modulation techniqueD . All of the aboveView AnswerAnswer: D

May 10, 2025 No Comments READ MORE +

Which wireless IoT technology is best suited for long-range, low-power communication?

Which wireless IoT technology is best suited for long-range, low-power communication?A . Wi-FiB . LoRaWANC . BluetoothD . NFCView AnswerAnswer: B

May 8, 2025 No Comments READ MORE +

Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)

Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)A . CoAPB . TCPC . MQTTD . FTPView AnswerAnswer: AC

May 7, 2025 No Comments READ MORE +

Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?

Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?A . WPA2B . TLSC . DTLSD . IPSecView AnswerAnswer: C

May 7, 2025 No Comments READ MORE +

Which protocol is used for constrained devices and supports lightweight communication in IoT networks?

Which protocol is used for constrained devices and supports lightweight communication in IoT networks?A . MQTTB . HTTPC . CoAPD . FTPView AnswerAnswer: C

May 5, 2025 No Comments READ MORE +

In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?

In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?A . High signal-to-noise ratioB . Congested frequency channelsC . Use of encryptionD . Low bandwidth usageView AnswerAnswer: B

May 5, 2025 No Comments READ MORE +