0% found this document useful (0 votes)
115 views

Assignment-3 Solution

This document contains an 15 question multiple choice quiz on Internet of Things topics like wireless communication protocols, IoT network layers, and security issues. The questions cover standards like IEEE 802.15.4, differences between Wired and Wireless HART, MAC layer protocols, Bluetooth and Zigbee technologies, ISA 100.11A specifications, and common IoT security attacks. Detailed explanations are provided for each answer. The quiz is worth a total of 15 marks.

Uploaded by

Sheeba S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views

Assignment-3 Solution

This document contains an 15 question multiple choice quiz on Internet of Things topics like wireless communication protocols, IoT network layers, and security issues. The questions cover standards like IEEE 802.15.4, differences between Wired and Wireless HART, MAC layer protocols, Bluetooth and Zigbee technologies, ISA 100.11A specifications, and common IoT security attacks. Detailed explanations are provided for each answer. The quiz is worth a total of 15 marks.

Uploaded by

Sheeba S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Introduction to
Internet of Things
Assignment-Week 3
TYPE OF QUESTION:MCQ/MSQ
Number ofquestions:15 Total mark: 15 X 1= 15

QUESTION 1:

Which of the following is the standard for the Wireless-HART protocol?


a. IEEE 802.16
b. IEEE 802.15.4
c. IEEE 802.15.6
d. IEEE 802.15.2

Correct Answer: b. IEEE 802.15.4


Detailed Solution:HART and Wireless-HART are derived from the IEEE 802.15.4
standard.
See lecture 11@ 1:55

QUESTION 2:

Which of the following lacks a network layer?


a. HART
b. Wireless HART
c. Wired HART
d. None of these
Correct Answer: c. Wired HART
Detailed Solution:Wired HART lacks a network layer. The main differences between
Wireless & Wired HART lie in the physical, datalink, and network layers.
See lecture 11@ 5:25

QUESTION 3:

By employing 15 channels of the ISM band, physical layer of HART achieves which one of the
following?
a. Reliability
b. Reachability
c. Security
d. Scalability
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

Correct Answer: a. Reliability


Detailed Solution: HART physical layer employs and exploits 15 channels of the ISM
band to increase the network reliability.
See lecture 11@ 6:10

QUESTION 4:

Which of the following layers does not differentiate between Wireless HART and Wired HART?
a. Application layer
b. Network layer
c. Data Link Layer
d. Physical Layer

Correct Answer: a. Application layer


Detailed Solution: The application layer is seamless and does not differentiate between the
wireless and wired versions of HART.
See lecture 11@ 10:30

QUESTION5:

At the MAC layer, which protocol applies CSMA channel access mode?
a. ZigBee
b. Bluetooth
c. HART
d. Wireless HART
Correct Answer: a. Zigbee
Detailed Solution: ZigBee utilizes CSMA-CD or CSMA-CA at the MAC layer.
See lecture 11@15:15

QUESTION6:

Which of the following principles does Near-field communication (NFC) protocol operate?
a. Electromagnetic field
b. Magnetic induction
c. Capacitive coupling
d. Electric field
Correct Answer: b. Magnetic induction
Detailed Solution: Near-field communication (NFC) protocol is based on the principle of
magnetic induction.
See lecture 11@ 20:05
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

QUESTION7:

Which of the following technology is based on Ad-hoc Piconets?


a. RFID
b. NFC
c. ZigBee
d. Bluetooth
Correct Answer: d. Bluetooth
Detailed Solution: Bluetooth technology helps in forming ad-hoc networks. It is based
upon ad-hoc technology or ad-hoc piconets.
See lecture 12@ 04:05
QUESTION8:

Which protocol is used for replacing traditionally used serial cables?


a. Radio Frequency Communications (RFCOMM)
b. Service Discovery Protocol (SDP)
c. Logical link control and adaptation protocol (L2CAP)
d. None of these
Correct Answer: a. Radio Frequency Communications (RFCOMM)
Detailed Solution: Radio Frequency Communications (RFCOMM) that runs on top of
L2CAP is a cable replacement protocol used for generating a virtual serial data stream.
See lecture 12@ 13:30

QUESTION9:

In India, Z-wave operates in which frequency range?


a. 2.4 GHz
b. 865.2 MHz
c. 919.8 MHz
d. 922–926 MHz

Correct Answer: b. 865.2 MHz


Detailed Solution: It operates at 865.2 MHz in India.
See lecture 13@ 06:10

QUESTION 10:

Which of the following is correct for Z-wave and Zigbee?


a. Both uses 2.4GHz frequency range
b. Both uses Direct Sequence Spread Spectrum (DSSS) modulation
c. Both technologies are mesh networks
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

d. Both uses Gaussian Frequency-Shift Keying modulation (FSK)

Correct Answer: c. Both technologies are mesh networks


Detailed Solution: Both technologies are mesh networks. Z-Wave uses frequency-shift
keying modulation (FSK), whereas Zigbee modulation is carried out through direct
sequence spread spectrum (DSSS). Zigbee uses the 2.4GHz ISM frequency band, whereas
Z-Wave uses an 800-900 MHz radio frequency range.
See lecture 13@ 07:00

QUESTION 11:

The physical layer in ISA 100.11A is derived from _______


a. IEEE 802.15.4
b. IEEE 802.11g
c. IEEE 802.11a
d. IEEE 802.15.6
Correct Answer: a. IEEE 802.15.4
Detailed Solution:Both the physical and MAC layers in ISA 100.11A are based upon IEEE
802.15.4.
See lecture 13@ 15:55

QUESTION 12:

Which security mechanism is followed by ISA 100.11A?


a. 3DES
b. DES-56 encryption
c. AES-256 encryption
d. AES-128 encryption
Correct Answer: d. AES-128 encryption
Detailed Solution: ISA 100.11A follows AES-128 encryption, along with different keys in
the data link layer (hop-to-hop security) and the transport layer (end-to-end security).
See lecture 13@ 18:35

QUESTION 13:

Why nodes use a “watchdog” mechanism in a wireless ad hoc and sensor network scenario?
a. To detect misbehaving nodes
b. To ensure if other nodes do relay data packets
c. To ensure avoidance of malicious nodes
d. All of these
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

Correct Answer: d. All of these


Detailed Solution:A “watchdog” mechanism is used in reputation-based wireless ad hoc
and sensor network system to detect misbehaving nodes, whether other nodes do relay data
packets and avoid malicious nodes in the route selection.
See lecture 14@ 28:30

QUESTION 14:

The security attack “eavesdropping” is a threat to which of the following layers?


a. Physical layer
b. Data link layer
c. Transport layer
d. Application layer
Correct Answer: a. Physical layer
Detailed Solution: Eavesdropping is a passive attack in the physical layer, which means
secretly capturing the data packets from the network.
See lecture 14@ 29:20

QUESTION15:

“Denial of service” is mainly exhibited by which of the following nodes?


a. Failed nodes
b. Badly failed nodes
c. Malicious nodes
d. Selfish nodes

Correct Answer: c. Malicious nodes


Detailed SolutionA malicious node is the one that denies services to other nodes in the
network. It deliberately disrupts the correct operation of the routing protocol.
See lecture 15@ 05:10

************END***********

You might also like