Which of the following methods can be used to protect wireless IoT networks from Denial of Service (DoS) attacks?

Which of the following methods can be used to protect wireless IoT networks from Denial of Service (DoS) attacks?A . Implementing firewallsB . Using low power modesC . Reducing signal strengthD . Disabling encryptionView AnswerAnswer: A

March 12, 2025 No Comments READ MORE +

What are common troubleshooting techniques for dealing with intermittent IoT device connectivity? (Select two)

What are common troubleshooting techniques for dealing with intermittent IoT device connectivity? (Select two)A . Reducing the number of connected devicesB . Rebooting the gatewayC . Analyzing signal interferenceD . Disabling firewallsView AnswerAnswer: BC

March 4, 2025 No Comments READ MORE +

Which transport layer protocol is typically used for real-time IoT applications where low-latency is critical?

Which transport layer protocol is typically used for real-time IoT applications where low-latency is critical?A . TCPB . UDPC . HTTPD . ICMPView AnswerAnswer: B

March 3, 2025 No Comments READ MORE +

Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)

Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)A . ZigbeeB . LoRaWANC . BluetoothD . Wi-FiView AnswerAnswer: AB

February 22, 2025 No Comments READ MORE +

Which of the following is a common threat to wireless IoT networks?

Which of the following is a common threat to wireless IoT networks?A . Physical damageB . EavesdroppingC . OverheatingD . Data redundancyView AnswerAnswer: B

February 20, 2025 No Comments READ MORE +

Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?

Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?A . Data Link LayerB . Network LayerC . Transport LayerD . Application LayerView AnswerAnswer: C

February 19, 2025 No Comments READ MORE +

Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?

Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?A . Data encryptionB . Modulation and demodulationC . Packet framing and error checkingD . Carrier sense and collision avoidanceView AnswerAnswer: D

February 16, 2025 No Comments READ MORE +

Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)

Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)A . BLEB . Wi-Fi 6C . NB-IoTD . 5GView AnswerAnswer: AC

February 12, 2025 No Comments READ MORE +

Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)

Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)A . ZigbeeB . Wi-Fi 6C . LoRaWAND . ThreadView AnswerAnswer: AD

February 11, 2025 No Comments READ MORE +

Which of the following are key principles of IoT security? (Select two)

Which of the following are key principles of IoT security? (Select two)A . ConfidentialityB . IntegrityC . Data replicationD . Signal strengthView AnswerAnswer: AB

February 10, 2025 No Comments READ MORE +