IoT Connecting Things 2.0 – Chapter 4 Quiz Answers

1. What is data in motion?

  • value extracted from data while it is being generated
  • data stored in mobile devices
  • data generated by an IoT device that is moving
  • data transferred from an IoT device to the cloud
Show Answer/Explanation
Correct Answer: value extracted from data while it is being generated
Explanation: The term data in motion refers to the process of extracting value from data while it is being generated. It is considered in motion because it may or may not eventually be stored.

2. Which statement is an accurate description of 4G and 5G wireless technologies?

  • Both 4G and 5G technologies use a low-energy, low-power, low-data rate for wireless personal-area networks.
  • They require a wireless WAN connection to power constricted devices.
  • They are both cellular-based technologies for covering large geographic areas.
  • They both require a 2.4 GHz short-range radio frequency band for industrial, scientific, and medical applications.
Show Answer/Explanation
Correct Answer: They are both cellular-based technologies for covering large geographic areas.
Explanation: 4G and 5G are fourth and fifth generation cellular-based technologies for transferring data over large geographic areas. Both provide high bandwidth and are capable of supporting voice, mobile Internet access, video calling, and high-definition mobile TV.

3. Fill in the blank.
The three Vs that distinguish data from big data are velocity, volume, and ___

Show Answer/Explanation
Correct Answer: variety
Explanation: The three Vs that distinguish data from big data are velocity, volume, and variety. Velocity is the rate at which data is generated. Volume is the amount of data transported and stored. Variety is the various types of data generated.

4. What are three characteristics that distinguish big data from data? (Choose three.)

  • amount of data being transported and stored
  • rate at which data is generated
  • type of data that is generated
  • where the data is stored
  • how the data is collected
  • who is authorized to access the data
Show Answer/Explanation
Correct Answer:

  • amount of data being transported and stored
  • rate at which data is generated
  • type of data that is generated

Explanation: Big data is characterized by the three Vs of big data: volume, which is the amount of data generated; velocity, which is the rate at which data is generated; and variety, which is the type of data generated.

5. Which wireless technology has low-power and data rate requirements making it popular in home automation applications?

  • LoRaWAN
  • 5G
  • Wi-Fi
  • ZigBee
Show Answer/Explanation
Correct Answer: ZigBee
Explanation: ZigBee is an IEEE 802.15.4 wireless standard designed for creating personal-area networks. Low energy, power, and data rate requirements make Zigbee a popular protocol for connecting home automation devices.

6. Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?

  • data analytics
  • fog computing
  • network connectivity
  • application enhancement platform
Show Answer/Explanation
Correct Answer: fog computing
Explanation: The Cisco IoT System consists of six pillars to describe foundational elements, (1) network connectivity, (2) fog computing, (3) security (cyber and physical), (4) data analytics, (5) management and automation, and (6) an application enablement platform. The fog computing pillar covers software and hardware that extends IoT applications to the network edge.

7. Match the wireless technology with the description.

ZigBee –> popular in IoT applications such as home automation

4G/5G –> cellular-based technology for transferring data over large geographic areas

LoRaWAN –> uses a gateway to relay messages between end-devices and a central network server

Show Answer/Explanation
Correct Answer: ___
Explanation: ___

8. Which wireless technology can be used to provide a metropolitan area with up to 100 Mbps of bandwidth?

  • Bluetooth
  • 5G
  • LoRaWAN
  • ZigBee
Show Answer/Explanation
Correct Answer: 5G
Explanation: 5G is a fifth generation cellular-based technology for transferring data over large geographic areas. 5G provides high bandwidth and is capable of data rates of 100 Mbps.

9. Which cloud service provides an app development platform and a backend service for apps?

  • Built.io
  • Zapier
  • IFTTT
  • ZigBee
Show Answer/Explanation
Correct Answer: Built.io
Explanation: Built.io is a cloud service that is an app development platform and is a useful resource for IoT systems that require a mobile app.

10. Match the type of media with the transmission technology.

copper wires –> electrical impulses

fiber optic cable –> pulses of light

wireless –> radio waves

Other Incorrect Match Options:
sound waves

11. What are two protocols developed by the Wi-Fi Alliance to secure wireless networks? (Choose two.)

  • WPA
  • 802.1x
  • WPA2
  • LoRaWAN
  • IPsec
Show Answer/Explanation
Correct Answer:

  • WPA
  • WPA2

Explanation: Wireless communications are inherently insecuer and require encryption to protect the data being transmitted. The Wi-Fi Alliance developed WPA and WPA2 as protocols to secure wireless networks. WPA is the older of the two protocols and considered vulnerable to hacking attacks, and therefore WPA2 is recommended.

12. Match the network component category with the description.

end devices –> source or destination of a message

intermediate devices –> determine best path for packets

media –> physical channel to carry messages

services –> network applications

13. Which type of payment model is typically used to purchase cloud services?

  • annual subscription fee
  • lump-sum payment in advance
  • pay-as-you-go system
  • calculation based on bandwidth
Show Answer/Explanation
Correct Answer: pay-as-you-go system
Explanation: Cloud services are usually provided as a pay-as-you-go service much like a utility.

14. What are rules governing communication between network devices?

  • processes
  • protocols
  • services
  • architectures
Show Answer/Explanation
Correct Answer: protocols
Explanation: Before devices on a network can communicate to each other, they must agree on a common set of communication rules. These rules are called protocols.

What measure should be taken to secure IoT devices?

  • install self-encrypting hard drives
  • disconnect from the Internet
  • keep firmware updated
  • implement the security through obscurity model
Show Answer/Explanation
Correct Answer: keep firmware updated
Explanation: IoT devices are typically too small and inexpensive to run complex security algorithms. This makes the devices vulnerable to security threats. To mitigate these threats, the firmware on the devices should be upgradesd to the latest version.

What is the goal of fog computing?

  • to store all data on a single server for processing
  • to send data immediately to the cloud for secure storage
  • to analyze data as close to the source as possible
  • to permanently store data on the local device
Show Answer/Explanation
Correct Answer: to analyze data as close to the source as possible
Explanation: The fog computing model involves real-time analysis of data as close to where it is created as possible.

17. Fill in the blank.
A ___ area network is usually administered by multiple service providers.​

Show Answer/Explanation
Correct Answer:

  • WAN
  • wide
  • wide area network
  • wide area

Explanation: Wide-area networks, or WANs, are characterized by a large geographic scope and that they are administered by multiple service providers. WANs do not connect individual end devices together, but connect networks to the Internet.​​

18. Fill in the blank.
A ___ area network is a network infrastructure that interconnects end devices in a limited area.​

Show Answer/Explanation
Correct Answer:

  • LAN
  • Local
  • Local area network
  • local area

Explanation: Local-area networks, or LANs, are geographically small, usually limited to a building, home, or campus, and administrated by a single organization or individual.​

What is the role of routing on data networks?

  • to determine the best paths for packets through the network
  • to provide a physical channel for packets to travel through the network​
  • to ensure availability of services and resources on the network​
  • to provide an architecture for data exchange
Show Answer/Explanation
Correct Answer: to determine the best paths for packets through the network
Explanation: On a network, packets must travel between source and destination along one of many paths. Routing is used on the network to calculate which path is the best path for packets to take.

Related Articles

guest
0 Comments
Inline Feedbacks
View all comments