Filters
Question type

Study Flashcards

Which of the following is not the component of a SCADA system?


A) Database server
B) I/O system
C) PLC controller
D) Sparger controller

Correct Answer

verifed

verified

Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor


A) i, ii, iii
B) i, ii, iii, iv
C) ii, iii, iv
D) i, ii, iv

Correct Answer

verifed

verified

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.


A) Cross-site scoring scripting
B) Cross-site request forgery
C) Two-factor authentication
D) Cross-site scripting

Correct Answer

verifed

verified

Representational State Transfer (REST) is the standard interface between


A) Two machines in a LAN
B) HTTP client and user
C) HTTP client and servers
D) None of the above

Correct Answer

verifed

verified

Which of the following is not involved in working of IoT?


A) RFID
B) Sensor
C) Nano tech
D) Server

Correct Answer

verifed

verified

The three major components of RFID hardware based on functionality include :


A) RFID Reader
B) Reader Antenna
C) Reader
D) All of the above

Correct Answer

verifed

verified

DCS is a ________


A) Distributed Control System
B) Data Control System
C) Data Column System
D) Distributed Column System

Correct Answer

verifed

verified

Which of the following is not a messaging mode in CoAP?


A) Confirmable
B) Separate
C) Direct
D) Piggyback

Correct Answer

verifed

verified

CoAP is a specialized _________ protocol.


A) Web Transfer
B) Power
C) Application
D) Resource

Correct Answer

verifed

verified

Even with two-factor authentication, users may still be vulnerable to_____________attacks.


A) Scripting
B) Cross attack
C) Man-in-the-middle
D) Radiant

Correct Answer

verifed

verified

CoAP provides which of the following requirements?


A) Multicast support and simplicity
B) Low overhead and multicast support
C) Simplicity and low overhead
D) Multicast support, Low over head, and simplicity

Correct Answer

verifed

verified

M2M is a term introduced by


A) IoT service providers
B) Fog computing service providers
C) Telecommunication service providers
D) None of these

Correct Answer

verifed

verified

What is the full form of SCADA?


A) Supervisory Control and Document Acquisition
B) Supervisory Control and Data Acquisition
C) Supervisory Column and Data Assessment.
D) Supervisory Column and Data Assessment

Correct Answer

verifed

verified

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?


A) IEEE 802.11.
B) IEEE 802.15.1.
C) IEEE 802.15.3.
D) IEEE 802.15.4.

Correct Answer

verifed

verified

D

Which of the following layers are defined by the ZigBee stack?


A) Transport layer
B) Physical layer.
C) Application Support sub-layer.
D) Medium Access layer

Correct Answer

verifed

verified

D

IEEE 802.15.4 uses which of the following for accessing the channel?


A) Carrier sense multiple access (CSMA)
B) Carrier sense multiple access with collision detection (CSMA?CD)
C) Carrier sense multiple access with collision avoidance (CSMA?CA)
D) None of these

Correct Answer

verifed

verified

Smart Dust can be used to measure the


A) Temperature of the industrial lathe machine
B) Heat inside a computer's CPU
C) Chemical in the soil
D) Strength of a solid material

Correct Answer

verifed

verified

Which of the following terms indicates that information is to be read only by those people for whom it is intended?


A) Availability
B) Accounting
C) Integrity
D) Confidentiality

Correct Answer

verifed

verified

Request field is present in which message format?


A) Request message
B) Response message
C) Both request and response
D) Neither request nor response

Correct Answer

verifed

verified

A

What is SCADA?


A) Software
B) Process
C) System
D) Hardware

Correct Answer

verifed

verified

Showing 1 - 20 of 25

Related Exams

Show Answer