Saturday , July 27 2024
Breaking News

Foundations of IoT Quiz Answers | Jigsaw

Quiz 1 :

Quiz – IOT for beginners

Question 1: Which communication protocols are expected to dominate IoT deployment in the years to come?

  • Bluetooth
  • Zigbee
  • Cellular (3G, 4G/LTE, 5G)
  • Cellular and LPWAN

Question 2: Which of the following is a private IP address?

  • 12.0.0.1
  • 168.172.19.39
  • 172.15.14.36
  • 192.168.24.43

Question 3: What layer in the TCP/IP stack is equivalent to the Transport Layer of the OSI mode?

  • Application / Process
  • Host-to-host
  • Internet
  • Network access

Question 4: Bluetooth supports

  • Point-to-point connections
  • Point-to-multipoint connections
  • Both Point-to-point connections and Point-to-multipoint connections
  • None of the above

Question 5: What is the Internet of Things?

  • Collection of websites
  • Network of physical objects embedded with electronics, software, sensors and connectivity
  • Series of physical things embedded with electronics, software, sensors and connectivity
  • None of the above

Question 6: What is the most common current deployment of IoT technologies?

  • Home automation devices
  • Smart metering
  • Sensor networks
  • Connected cars

Question 7: Bluetooth uses

  • Frequency-hopping spread spectrum
  • Orthogonal frequency-division multiplexing
  • Time-division multiplexing
  • None of the above

Question 8: Gathering data from multiple devices is called

  • Data harvesting
  • Data analysis
  • Data storage
  • None of the above

Question 9: A number of devices connected to the IoT have to connect automatically. How is this done?

  • Bot-to-bot communication
  • Skynet
  • Machine-to-machine communication
  • Intercloud

Question 10: Bluetooth is the wireless technology for

  • Local area network
  • Personal area network
  • Both Local area network and Personal area network
  • None of the above

Question 11: Which of the following services uses TCP?

  • HTTP
  • SMTP
  • FTP
  • All of the above

Question 12: Zigbee’s extended addressing  is

  • 16 bit
  • 32 bit
  • 64 bit
  • 128 bit

Quiz 2:

Quiz IOT for Security

Question 1: Boot loader consists of ____ number of components.

  • 4 components
  • 2 components
  • 3 components
  • 5 components

Question 2: Process of identifying any individual

  • Auditing
  • Authorisation
  • Authentication
  • Accounting

Question 3: ___ is where you falsely direct the hackers or attackers to different nodes than hitting the original servers.

  • Honeypot
  • Botnet
  • Stuxnet
  • Man-in the middle

Question 4: In the security parlance the fundamental three pillars of security are

  • Cognition, integration and application
  • Confidentiality, integrity and application
  • Confidentiality, integrity and availability
  • Cognition, integration and availability

Question 5: ____ gives an exact, up to the second state of all devices on a network.

  • Signaling
  • Security
  • Presence detection
  • Power consumption

Question 6: Which of the following is not the component of IoT Endpoint

  • Sensor
  • Gateway
  • Communication Module
  • MCU

Question 7: Which of the following is not a correct way to secure communication layer

  • Cloud initiated communication
  • TLS/SSL
  • IPS(Intrusion Prevention System)
  • Firewalls

Question 8: What is the first line of defence when setting up a network?

  • Physically secure a network
  • Configure an authentication
  • Configure encryption
  • Configure an ACL

Question 9: The issue with IOT devices are that they are networked and data is very open and can be manipulated because:

  • work on low communications with no low intensity of data
  • connecting legacy assets not inherently designed for IoT connectivity
  • it is challenging to implement cryptography and encryption techniques to secure the data
  • none of the above

Question 10: What are the major Privacy and Security Issues in case of Internet Of Things (IoT)?

  • Privacy compromise leading to exfiltration of identifying or other sensitive information
  • Adapting to regulatory requirements and improving performance
  • Intelligent connection of people, process, data, and things.
  • Cloud integration and process improvement

Question 11 : What kind of electronic document contains a public key?

  • SMTP
  • Digital certificate
  • PAN
  • Biometrics

Question 12 : ______ protocol is used to establish a strongly secured network based communication as it provides strong authentication for client as well as server.

  • SSL
  • Kerberos
  • SFTP
  • HTTPS

Question 13 : In cryptography, what is cipher?

  • encrypted message
  • both algorithm for performing encryption and decryption and encrypted message
  • algorithm for performing encryption and decryption
  • none of the above

About Clear My Certification

Check Also

Infosys Springboard Fundamentals of Information Security Answers

Apply for Fundamentals of Information Security Here Q1 of 15 How many keys are required …

Leave a Reply

Your email address will not be published. Required fields are marked *