Deck 25: RFID, SCADA, IoT, and Networking Protocols

Full screen (f)
exit full mode
Question
________ tags needs an external source to wake up the battery.

A)Acitve RFID
B)Passive RFID
C)Battery-assisted passive RFID
D)Battery-assisted active RFID
Use Space or
up arrow
down arrow
to flip the card.
Question
The three major components of RFID hardware based on functionality include :

A)RFID Reader
B)Reader Antenna
C)Reader
D)All of the above
Question
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor

A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
Question
Even with two-factor authentication, users may still be vulnerable to_____________attacks.

A)Scripting
B)Cross attack
C)Man-in-the-middle
D)Radiant
Question
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A)Making infrastructure vulnerable to malware
B)Potential for noncompliance
C)Data Loss
D)All of the above
Question
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)Availability
B)Accounting
C)Integrity
D)Confidentiality
Question
What is the full form of SCADA?

A)Supervisory Control and Document Acquisition
B)Supervisory Control and Data Acquisition
C)Supervisory Column and Data Assessment.
D)Supervisory Column and Data Assessment
Question
DCS is a ________

A)Distributed Control System
B)Data Control System
C)Data Column System
D)Distributed Column System
Question
What is SCADA?

A)Software
B)Process
C)System
D)Hardware
Question
Which of the following is not the component of a SCADA system?

A)Database server
B)I/O system
C)PLC controller
D)Sparger controller
Question
Which of the following is not involved in working of IoT?

A)RFID
B)Sensor
C)Nano tech
D)Server
Question
M2M is a term introduced by

A)IoT service providers
B)Fog computing service providers
C)Telecommunication service providers
D)None of these
Question
Which of these statements regarding sensors is TRUE?

A)Sensors are input devices.
B)Sensors can be analog as well as digital
C)Sensors respond to some external stimuli.
D)All of these
Question
Smart Dust can be used to measure the

A)Temperature of the industrial lathe machine
B)Heat inside a computer's CPU
C)Chemical in the soil
D)Strength of a solid material
Question
Request field is present in which message format?

A)Request message
B)Response message
C)Both request and response
D)Neither request nor response
Question
CoAP provides which of the following requirements?

A)Multicast support and simplicity
B)Low overhead and multicast support
C)Simplicity and low overhead
D)Multicast support, Low over head, and simplicity
Question
CoAP is a specialized _________ protocol.

A)Web Transfer
B)Power
C)Application
D)Resource
Question
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A)IEEE 802.11.
B)IEEE 802.15.1.
C)IEEE 802.15.3.
D)IEEE 802.15.4.
Question
Which of the following layers are defined by the ZigBee stack?

A)Transport layer
B)Physical layer.
C)Application Support sub-layer.
D)Medium Access layer
Question
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A)Cross-site scoring scripting
B)Cross-site request forgery
C)Two-factor authentication
D)Cross-site scripting
Question
Representational State Transfer (REST) is the standard interface between

A)Two machines in a LAN
B)HTTP client and user
C)HTTP client and servers
D)None of the above
Question
Which of the following is not a messaging mode in CoAP?

A)Confirmable
B)Separate
C)Direct
D)Piggyback
Question
Which of the following is the full form of XMPP?

A)Extension Messaging and Presence Protocol
B)Extensible Messaging and Presence Protocol
C)Extension Messaging and Privacy Protocol
D)Extensible Messaging and Privacy Protocol
Question
In 6LoWPAN address, how many bits are globally unique?

A)16 bits
B)32 bits
C)64 bits
D)128 bits
Question
IEEE 802.15.4 uses which of the following for accessing the channel?

A)Carrier sense multiple access (CSMA)
B)Carrier sense multiple access with collision detection (CSMA?CD)
C)Carrier sense multiple access with collision avoidance (CSMA?CA)
D)None of these
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 25: RFID, SCADA, IoT, and Networking Protocols
1
________ tags needs an external source to wake up the battery.

A)Acitve RFID
B)Passive RFID
C)Battery-assisted passive RFID
D)Battery-assisted active RFID
Battery-assisted passive RFID
2
The three major components of RFID hardware based on functionality include :

A)RFID Reader
B)Reader Antenna
C)Reader
D)All of the above
All of the above
3
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor

A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
i, ii, iii
4
Even with two-factor authentication, users may still be vulnerable to_____________attacks.

A)Scripting
B)Cross attack
C)Man-in-the-middle
D)Radiant
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
What security threats do employee-owned devices pose by storing corporate data and accessing corporate networks?

A)Making infrastructure vulnerable to malware
B)Potential for noncompliance
C)Data Loss
D)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)Availability
B)Accounting
C)Integrity
D)Confidentiality
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
What is the full form of SCADA?

A)Supervisory Control and Document Acquisition
B)Supervisory Control and Data Acquisition
C)Supervisory Column and Data Assessment.
D)Supervisory Column and Data Assessment
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
DCS is a ________

A)Distributed Control System
B)Data Control System
C)Data Column System
D)Distributed Column System
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
What is SCADA?

A)Software
B)Process
C)System
D)Hardware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not the component of a SCADA system?

A)Database server
B)I/O system
C)PLC controller
D)Sparger controller
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not involved in working of IoT?

A)RFID
B)Sensor
C)Nano tech
D)Server
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
M2M is a term introduced by

A)IoT service providers
B)Fog computing service providers
C)Telecommunication service providers
D)None of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Which of these statements regarding sensors is TRUE?

A)Sensors are input devices.
B)Sensors can be analog as well as digital
C)Sensors respond to some external stimuli.
D)All of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Smart Dust can be used to measure the

A)Temperature of the industrial lathe machine
B)Heat inside a computer's CPU
C)Chemical in the soil
D)Strength of a solid material
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Request field is present in which message format?

A)Request message
B)Response message
C)Both request and response
D)Neither request nor response
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
CoAP provides which of the following requirements?

A)Multicast support and simplicity
B)Low overhead and multicast support
C)Simplicity and low overhead
D)Multicast support, Low over head, and simplicity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
CoAP is a specialized _________ protocol.

A)Web Transfer
B)Power
C)Application
D)Resource
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A)IEEE 802.11.
B)IEEE 802.15.1.
C)IEEE 802.15.3.
D)IEEE 802.15.4.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following layers are defined by the ZigBee stack?

A)Transport layer
B)Physical layer.
C)Application Support sub-layer.
D)Medium Access layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A)Cross-site scoring scripting
B)Cross-site request forgery
C)Two-factor authentication
D)Cross-site scripting
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Representational State Transfer (REST) is the standard interface between

A)Two machines in a LAN
B)HTTP client and user
C)HTTP client and servers
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is not a messaging mode in CoAP?

A)Confirmable
B)Separate
C)Direct
D)Piggyback
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is the full form of XMPP?

A)Extension Messaging and Presence Protocol
B)Extensible Messaging and Presence Protocol
C)Extension Messaging and Privacy Protocol
D)Extensible Messaging and Privacy Protocol
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
In 6LoWPAN address, how many bits are globally unique?

A)16 bits
B)32 bits
C)64 bits
D)128 bits
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
IEEE 802.15.4 uses which of the following for accessing the channel?

A)Carrier sense multiple access (CSMA)
B)Carrier sense multiple access with collision detection (CSMA?CD)
C)Carrier sense multiple access with collision avoidance (CSMA?CA)
D)None of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.