Which of the following methods can be used to protect wireless IoT networks from Denial of Service (DoS) attacks?
Which of the following methods can be used to protect wireless IoT networks from Denial of Service (DoS) attacks?A . Implementing firewallsB . Using low power modesC . Reducing signal strengthD . Disabling encryptionView AnswerAnswer: A
What are common troubleshooting techniques for dealing with intermittent IoT device connectivity? (Select two)
What are common troubleshooting techniques for dealing with intermittent IoT device connectivity? (Select two)A . Reducing the number of connected devicesB . Rebooting the gatewayC . Analyzing signal interferenceD . Disabling firewallsView AnswerAnswer: BC
Which transport layer protocol is typically used for real-time IoT applications where low-latency is critical?
Which transport layer protocol is typically used for real-time IoT applications where low-latency is critical?A . TCPB . UDPC . HTTPD . ICMPView AnswerAnswer: B
Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)
Which wireless IoT technologies utilize spread spectrum techniques for communication? (Select two)A . ZigbeeB . LoRaWANC . BluetoothD . Wi-FiView AnswerAnswer: AB
Which of the following is a common threat to wireless IoT networks?
Which of the following is a common threat to wireless IoT networks?A . Physical damageB . EavesdroppingC . OverheatingD . Data redundancyView AnswerAnswer: B
Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?
Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?A . Data Link LayerB . Network LayerC . Transport LayerD . Application LayerView AnswerAnswer: C
Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?
Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?A . Data encryptionB . Modulation and demodulationC . Packet framing and error checkingD . Carrier sense and collision avoidanceView AnswerAnswer: D
Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)
Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)A . BLEB . Wi-Fi 6C . NB-IoTD . 5GView AnswerAnswer: AC
Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)
Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)A . ZigbeeB . Wi-Fi 6C . LoRaWAND . ThreadView AnswerAnswer: AD
Which of the following are key principles of IoT security? (Select two)
Which of the following are key principles of IoT security? (Select two)A . ConfidentialityB . IntegrityC . Data replicationD . Signal strengthView AnswerAnswer: AB