Home Certification Foundations of IoT Quiz Answers | Jigsaw

Foundations of IoT Quiz Answers | Jigsaw

4668
0
Jigsaw Iot Quiz Answers

Quiz 1 :

Quiz – IOT for beginners

Question 1: Which communication protocols are expected to dominate IoT deployment in the years to come?

  • Bluetooth
  • Zigbee
  • Cellular (3G, 4G/LTE, 5G)
  • Cellular and LPWAN

Question 2: Which of the following is a private IP address?

  • 12.0.0.1
  • 168.172.19.39
  • 172.15.14.36
  • 192.168.24.43

Question 3: What layer in the TCP/IP stack is equivalent to the Transport Layer of the OSI mode?

  • Application / Process
  • Host-to-host
  • Internet
  • Network access

Question 4: Bluetooth supports

  • Point-to-point connections
  • Point-to-multipoint connections
  • Both Point-to-point connections and Point-to-multipoint connections
  • None of the above

Question 5: What is the Internet of Things?

  • Collection of websites
  • Network of physical objects embedded with electronics, software, sensors and connectivity
  • Series of physical things embedded with electronics, software, sensors and connectivity
  • None of the above

Question 6: What is the most common current deployment of IoT technologies?

  • Home automation devices
  • Smart metering
  • Sensor networks
  • Connected cars

Question 7: Bluetooth uses

  • Frequency-hopping spread spectrum
  • Orthogonal frequency-division multiplexing
  • Time-division multiplexing
  • None of the above

Question 8: Gathering data from multiple devices is called

  • Data harvesting
  • Data analysis
  • Data storage
  • None of the above

Question 9: A number of devices connected to the IoT have to connect automatically. How is this done?

  • Bot-to-bot communication
  • Skynet
  • Machine-to-machine communication
  • Intercloud

Question 10: Bluetooth is the wireless technology for

  • Local area network
  • Personal area network
  • Both Local area network and Personal area network
  • None of the above

Question 11: Which of the following services uses TCP?

  • HTTP
  • SMTP
  • FTP
  • All of the above

Question 12: Zigbee’s extended addressing  is

  • 16 bit
  • 32 bit
  • 64 bit
  • 128 bit

Quiz 2:

Quiz IOT for Security

Question 1: Boot loader consists of ____ number of components.

  • 4 components
  • 2 components
  • 3 components
  • 5 components

Question 2: Process of identifying any individual

  • Auditing
  • Authorisation
  • Authentication
  • Accounting

Question 3: ___ is where you falsely direct the hackers or attackers to different nodes than hitting the original servers.

  • Honeypot
  • Botnet
  • Stuxnet
  • Man-in the middle

Question 4: In the security parlance the fundamental three pillars of security are

  • Cognition, integration and application
  • Confidentiality, integrity and application
  • Confidentiality, integrity and availability
  • Cognition, integration and availability

Question 5: ____ gives an exact, up to the second state of all devices on a network.

  • Signaling
  • Security
  • Presence detection
  • Power consumption

Question 6: Which of the following is not the component of IoT Endpoint

  • Sensor
  • Gateway
  • Communication Module
  • MCU

Question 7: Which of the following is not a correct way to secure communication layer

  • Cloud initiated communication
  • TLS/SSL
  • IPS(Intrusion Prevention System)
  • Firewalls

Question 8: What is the first line of defence when setting up a network?

  • Physically secure a network
  • Configure an authentication
  • Configure encryption
  • Configure an ACL

Question 9: The issue with IOT devices are that they are networked and data is very open and can be manipulated because:

  • work on low communications with no low intensity of data
  • connecting legacy assets not inherently designed for IoT connectivity
  • it is challenging to implement cryptography and encryption techniques to secure the data
  • none of the above

Question 10: What are the major Privacy and Security Issues in case of Internet Of Things (IoT)?

  • Privacy compromise leading to exfiltration of identifying or other sensitive information
  • Adapting to regulatory requirements and improving performance
  • Intelligent connection of people, process, data, and things.
  • Cloud integration and process improvement

Question 11 : What kind of electronic document contains a public key?

  • SMTP
  • Digital certificate
  • PAN
  • Biometrics

Question 12 : ______ protocol is used to establish a strongly secured network based communication as it provides strong authentication for client as well as server.

  • SSL
  • Kerberos
  • SFTP
  • HTTPS

Question 13 : In cryptography, what is cipher?

  • encrypted message
  • both algorithm for performing encryption and decryption and encrypted message
  • algorithm for performing encryption and decryption
  • none of the above

LEAVE A REPLY

Please enter your comment!
Please enter your name here