Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?
Which layer is responsible for ensuring reliable communication between IoT devices and applications in wireless IoT?A . Data Link LayerB . Network LayerC . Transport LayerD . Application LayerView AnswerAnswer: C
Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?
Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?A . Data encryptionB . Modulation and demodulationC . Packet framing and error checkingD . Carrier sense and collision avoidanceView AnswerAnswer: D
Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)
Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)A . BLEB . Wi-Fi 6C . NB-IoTD . 5GView AnswerAnswer: AC
Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)
Which wireless IoT technologies utilize the IEEE 802.15.4 PHY standard? (Select two)A . ZigbeeB . Wi-Fi 6C . LoRaWAND . ThreadView AnswerAnswer: AD
Which of the following are key principles of IoT security? (Select two)
Which of the following are key principles of IoT security? (Select two)A . ConfidentialityB . IntegrityC . Data replicationD . Signal strengthView AnswerAnswer: AB
Which wireless IoT technologies use the IEEE 802.15.4 MAC standard? (Select two)
Which wireless IoT technologies use the IEEE 802.15.4 MAC standard? (Select two)A . ZigbeeB . Wi-FiC . ThreadD . LoRaWANView AnswerAnswer: AC
Which MAC layer protocols are used in wireless IoT communication? (Select two)
Which MAC layer protocols are used in wireless IoT communication? (Select two)A . CSMA/CAB . AES-256C . FHSSD . TDMAView AnswerAnswer: AD
When planning a wireless IoT solution for a large industrial site, what is a key consideration for ensuring reliable connectivity?
When planning a wireless IoT solution for a large industrial site, what is a key consideration for ensuring reliable connectivity?A . Using only low-power communication protocolsB . Placing wireless access points to ensure complete coverage and redundancyC . Minimizing the number of devices connected to the networkD . Reducing the...
Which of the following are common threats in wireless IoT networks? (Select two)
Which of the following are common threats in wireless IoT networks? (Select two)A . Man-in-the-middle attacksB . Data compressionC . EavesdroppingD . Signal boostingView AnswerAnswer: AC
What strategies can help mitigate risks in wireless IoT networks? (Select two)
What strategies can help mitigate risks in wireless IoT networks? (Select two)A . Disabling device firmware updatesB . Using encryption for data transmissionC . Regularly auditing network accessD . Minimizing authentication checksView AnswerAnswer: BC