Deck 25: RFID, SCADA, IoT, and Networking Protocols

ملء الشاشة (f)
exit full mode
سؤال
________ tags needs an external source to wake up the battery.

A)Acitve RFID
B)Passive RFID
C)Battery-assisted passive RFID
D)Battery-assisted active RFID
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The three major components of RFID hardware based on functionality include :

A)RFID Reader
B)Reader Antenna
C)Reader
D)All of the above
سؤال
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor

A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
سؤال
Even with two-factor authentication, users may still be vulnerable to_____________attacks.

A)Scripting
B)Cross attack
C)Man-in-the-middle
D)Radiant
سؤال
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A)Making infrastructure vulnerable to malware
B)Potential for noncompliance
C)Data Loss
D)All of the above
سؤال
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)Availability
B)Accounting
C)Integrity
D)Confidentiality
سؤال
What is the full form of SCADA?

A)Supervisory Control and Document Acquisition
B)Supervisory Control and Data Acquisition
C)Supervisory Column and Data Assessment.
D)Supervisory Column and Data Assessment
سؤال
DCS is a ________

A)Distributed Control System
B)Data Control System
C)Data Column System
D)Distributed Column System
سؤال
What is SCADA?

A)Software
B)Process
C)System
D)Hardware
سؤال
Which of the following is not the component of a SCADA system?

A)Database server
B)I/O system
C)PLC controller
D)Sparger controller
سؤال
Which of the following is not involved in working of IoT?

A)RFID
B)Sensor
C)Nano tech
D)Server
سؤال
M2M is a term introduced by

A)IoT service providers
B)Fog computing service providers
C)Telecommunication service providers
D)None of these
سؤال
Which of these statements regarding sensors is TRUE?

A)Sensors are input devices.
B)Sensors can be analog as well as digital
C)Sensors respond to some external stimuli.
D)All of these
سؤال
Smart Dust can be used to measure the

A)Temperature of the industrial lathe machine
B)Heat inside a computer's CPU
C)Chemical in the soil
D)Strength of a solid material
سؤال
Request field is present in which message format?

A)Request message
B)Response message
C)Both request and response
D)Neither request nor response
سؤال
CoAP provides which of the following requirements?

A)Multicast support and simplicity
B)Low overhead and multicast support
C)Simplicity and low overhead
D)Multicast support, Low over head, and simplicity
سؤال
CoAP is a specialized _________ protocol.

A)Web Transfer
B)Power
C)Application
D)Resource
سؤال
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A)IEEE 802.11.
B)IEEE 802.15.1.
C)IEEE 802.15.3.
D)IEEE 802.15.4.
سؤال
Which of the following layers are defined by the ZigBee stack?

A)Transport layer
B)Physical layer.
C)Application Support sub-layer.
D)Medium Access layer
سؤال
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A)Cross-site scoring scripting
B)Cross-site request forgery
C)Two-factor authentication
D)Cross-site scripting
سؤال
Representational State Transfer (REST) is the standard interface between

A)Two machines in a LAN
B)HTTP client and user
C)HTTP client and servers
D)None of the above
سؤال
Which of the following is not a messaging mode in CoAP?

A)Confirmable
B)Separate
C)Direct
D)Piggyback
سؤال
Which of the following is the full form of XMPP?

A)Extension Messaging and Presence Protocol
B)Extensible Messaging and Presence Protocol
C)Extension Messaging and Privacy Protocol
D)Extensible Messaging and Privacy Protocol
سؤال
In 6LoWPAN address, how many bits are globally unique?

A)16 bits
B)32 bits
C)64 bits
D)128 bits
سؤال
IEEE 802.15.4 uses which of the following for accessing the channel?

A)Carrier sense multiple access (CSMA)
B)Carrier sense multiple access with collision detection (CSMA?CD)
C)Carrier sense multiple access with collision avoidance (CSMA?CA)
D)None of these
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 25: RFID, SCADA, IoT, and Networking Protocols
1
________ tags needs an external source to wake up the battery.

A)Acitve RFID
B)Passive RFID
C)Battery-assisted passive RFID
D)Battery-assisted active RFID
Battery-assisted passive RFID
2
The three major components of RFID hardware based on functionality include :

A)RFID Reader
B)Reader Antenna
C)Reader
D)All of the above
All of the above
3
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor

A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
i, ii, iii
4
Even with two-factor authentication, users may still be vulnerable to_____________attacks.

A)Scripting
B)Cross attack
C)Man-in-the-middle
D)Radiant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A)Making infrastructure vulnerable to malware
B)Potential for noncompliance
C)Data Loss
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)Availability
B)Accounting
C)Integrity
D)Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is the full form of SCADA?

A)Supervisory Control and Document Acquisition
B)Supervisory Control and Data Acquisition
C)Supervisory Column and Data Assessment.
D)Supervisory Column and Data Assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
DCS is a ________

A)Distributed Control System
B)Data Control System
C)Data Column System
D)Distributed Column System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is SCADA?

A)Software
B)Process
C)System
D)Hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is not the component of a SCADA system?

A)Database server
B)I/O system
C)PLC controller
D)Sparger controller
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is not involved in working of IoT?

A)RFID
B)Sensor
C)Nano tech
D)Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
M2M is a term introduced by

A)IoT service providers
B)Fog computing service providers
C)Telecommunication service providers
D)None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of these statements regarding sensors is TRUE?

A)Sensors are input devices.
B)Sensors can be analog as well as digital
C)Sensors respond to some external stimuli.
D)All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Smart Dust can be used to measure the

A)Temperature of the industrial lathe machine
B)Heat inside a computer's CPU
C)Chemical in the soil
D)Strength of a solid material
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Request field is present in which message format?

A)Request message
B)Response message
C)Both request and response
D)Neither request nor response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
CoAP provides which of the following requirements?

A)Multicast support and simplicity
B)Low overhead and multicast support
C)Simplicity and low overhead
D)Multicast support, Low over head, and simplicity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
CoAP is a specialized _________ protocol.

A)Web Transfer
B)Power
C)Application
D)Resource
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A)IEEE 802.11.
B)IEEE 802.15.1.
C)IEEE 802.15.3.
D)IEEE 802.15.4.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following layers are defined by the ZigBee stack?

A)Transport layer
B)Physical layer.
C)Application Support sub-layer.
D)Medium Access layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A)Cross-site scoring scripting
B)Cross-site request forgery
C)Two-factor authentication
D)Cross-site scripting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Representational State Transfer (REST) is the standard interface between

A)Two machines in a LAN
B)HTTP client and user
C)HTTP client and servers
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is not a messaging mode in CoAP?

A)Confirmable
B)Separate
C)Direct
D)Piggyback
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is the full form of XMPP?

A)Extension Messaging and Presence Protocol
B)Extensible Messaging and Presence Protocol
C)Extension Messaging and Privacy Protocol
D)Extensible Messaging and Privacy Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
In 6LoWPAN address, how many bits are globally unique?

A)16 bits
B)32 bits
C)64 bits
D)128 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
IEEE 802.15.4 uses which of the following for accessing the channel?

A)Carrier sense multiple access (CSMA)
B)Carrier sense multiple access with collision detection (CSMA?CD)
C)Carrier sense multiple access with collision avoidance (CSMA?CA)
D)None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.