IOT Multiple Choice Questions on “Addressing Reliability”.
1. There are efficiency gains from ________ all sorts of equipment.
a) Implementation
b) Analogous
c) Evolution
d) Digitization
Answer: d
Clarification: There are efficiency gains from digitization of all sorts of equipment and measures that used to be analog and disconnected.
2. Business values can be Daunting Proposition to figure out how to best harness all this data.
a) True
b) False
Answer: a
Clarification: Across every industry, organization is looking at ways they can derive business value from IoT. While some benefits will be relative clear cut, it can be a Daunting Proposition to figure out how to best harness all this data.
3. The availability of ________ is the cloud services provider who will host video and data for end users.
a) Devices
b) Memory
c) Security system
d) Objects
Answer: c
Clarification: The availability of cloud based security is the cloud services provider who will host video and data for end users, as providers are solely responsible for ensuring the availability and reliability of this data.
4. SLA stands for ____________
a) Service Level Agreement
b) Security Level Agreement
c) System Local Area
d) Service Local Area
Answer: a
Clarification: Not all cloud service providers service level agreement offer that level of guarantee.
5. A provider which produces 99 percent uptime ________
a) Security issues
b) Network Issues
c) Programming issue
d) Memory issue
Answer: b
Clarification: Among the exceptions that release a provider from providing 99 percent uptime are network issues not within their direct control, client negligence, “acts of god,” scheduling maintenance and more.
6. With physical security, the stakes are incredibly ________
a) Very high
b) Low
c) Very low
d) High
Answer: d
Clarification: With physical security, the stakes are incredibly high, so even if you are working with a limited budget, cloud services are not an area where you should shop for a bargain.
7. Issue with connecting to data stored have anything to do with data centers.
a) True
b) False
Answer: a
Clarification: The reality is that any issues with connecting to data stored in the cloud rarely have anything to do with the service provider’s data center.
8. The most likely culprit is ________
a) Things
b) Network
c) Device
d) Internet connectivity
Answer: d
Clarification: The most likely culprit is internet connectivity, leaving end users unable to access their hosted data or even perform management functions.
9. ________ are designed to protect data and servers.
a) Physical walls
b) Logical firewalls
c) Both Physical and logical
d) Neither physical nor logical
Answer: c
Clarification: Physical and logical firewalls measure are designed to protect data and the servers where it is stored from theft. Sabotage and damage caused by natural disasters.
10. Communication between ________ and ________ is encrypted for security.
a) Cloud and device
b) End user and data center
c) Network and device
d) Cloud and Network
Answer: b
Clarification: Communication between end user sites and data centre is encrypted according to industry standards to further improve system security.
11. Undertaking the intervention over an extended period of time would enhance the change of gaining access.
a) True
b) False
Answer: a
Clarification: Undertaking the intervention over an extended period of time would enhance the change of gaining access to revelation about the thinking of biology teachers.
12. ________ phase starts with the construction of spanning tree for ordinary routing information.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
Answer: a
Clarification: Initialization phase starts with the construction of spanning tree for ordinary routing information. A level corresponds to the hop distance of the node from the sink and data will be transmitted.
13. In which phase packets are forwarded hop by hop to get closer to the sink?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
Answer: b
Clarification: Packets are forwarded hop by hop to get closer to the sink. Intermediate nodes keep the packetId in their buffer during Tcol corresponding to the maximum delay allowed to transmit.
14. ________ is achieved using over hearing mechanism.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
Answer: d
Clarification: The lost message detection is achieved by over hearing mechanism. Upon sensing the channel, if node A does not hear node B transmitting the packet packetId to its next hop, it becomes aware that the packet has been lost and that are transmission is required.
15. What is the last step in algorithm for reliable data transfer?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection
Answer: c
Clarification: Once a packet is detected, the AJIA mechanism relies on its routing metric to choose the best next hop for the packet re transmission.