Which wireless IoT technology is best suited for long-range, low-power communication?
Which wireless IoT technology is best suited for long-range, low-power communication?A . Wi-FiB . LoRaWANC . BluetoothD . NFCView AnswerAnswer: B
Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)
Which upper-layer protocols are commonly used in IoT applications for communication? (Select two)A . CoAPB . TCPC . MQTTD . FTPView AnswerAnswer: AC
Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?
Which of the following is a security protocol designed specifically for low-power, constrained IoT devices?A . WPA2B . TLSC . DTLSD . IPSecView AnswerAnswer: C
Which protocol is used for constrained devices and supports lightweight communication in IoT networks?
Which protocol is used for constrained devices and supports lightweight communication in IoT networks?A . MQTTB . HTTPC . CoAPD . FTPView AnswerAnswer: C
In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?
In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?A . High signal-to-noise ratioB . Congested frequency channelsC . Use of encryptionD . Low bandwidth usageView AnswerAnswer: B
Which IoT security challenge is most directly addressed by implementing mutual authentication?
Which IoT security challenge is most directly addressed by implementing mutual authentication?A . Data integrityB . Device identity verificationC . Secure data storageD . Network latencyView AnswerAnswer: B
Which responsibilities are associated with the PHY layer in a wireless IoT network? (Select two)
Which responsibilities are associated with the PHY layer in a wireless IoT network? (Select two)A . Modulating and demodulating data signalsB . Encrypting data for transmissionC . Managing frequency channelsD . Addressing devices in the networkView AnswerAnswer: AC
What protocol is responsible for providing MAC layer security in IEEE 802.15.4 networks?
What protocol is responsible for providing MAC layer security in IEEE 802.15.4 networks?A . Advanced Encryption Standard (AES)B . IP Security (IPsec)C . Transport Layer Security (TLS)D . Wi-Fi Protected Access (WPA2)View AnswerAnswer: A
Which of the following is a primary advantage of Wi-Fi HaLow over traditional Wi-Fi for IoT applications?
Which of the following is a primary advantage of Wi-Fi HaLow over traditional Wi-Fi for IoT applications?A . Higher data ratesB . Longer range and lower power consumptionC . Improved security featuresD . Compatibility with all existing IoT protocolsView AnswerAnswer: B
Which techniques are used by the MAC layer to improve security in wireless IoT networks? (Select two)
Which techniques are used by the MAC layer to improve security in wireless IoT networks? (Select two)A . Data encryptionB . Address filteringC . Address filteringD . Time slottingView AnswerAnswer: AB