0% found this document useful (0 votes)
2 views3 pages

Week 10 July22

Uploaded by

suganeshz555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views3 pages

Week 10 July22

Uploaded by

suganeshz555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Which of the following is not performed on the control plan of SDIIoT Architecture – Public
Networks?
a. Network monitoring,
b. Management and optimization
c. Data transmission
d. Fault tolerance
Solution: (d)
Justification: Please refer to Slide 4 of Lecture 1 of Week 10.

2. What are the two categories of data stream?


a. Ordinary data stream and Emergent data stream
b. Noised data stream and Emergent data stream
c. Ordinary data stream and Noised data stream
d. None of the above
Solution: (a)
Justification: Please refer to Slide 11 of Lecture 1 of Week 10.

3. What is the long form of DERMS?


a. Decentralized entropy resource management system
b. Decentralized energy resource management system
c. Distributed entropy resource management system
d. Distributed energy resource management system
Solution: (d)
Justification: Please refer to Slide 13 of Lecture 1 of Week 10.

4. What is data confidentiality?


a. Data must not be changed either accidentally or maliciously while transmitted; If
changed, then it must be detected
b. Data make sense only for intended users and garbage to all others
c. Authorized users must get access to data when needed irrespective of any threats and
failure
d. It can mean any of the above three statements
Solution: (b)
Justification: Please refer to Slide 3 of Lecture 2 of Week 10.

5. In the STRIDE threat model, what is “I” stands for?


a. Interruption of network
b. Interruption of service
c. Information disclosure
d. Information retrieval
Solution: (c)
Justification: Please refer to Slide 10 of Lecture 2 of Week 10.
6. Which of the following is an application layer IIoT attack vector?
a. Impersonation attack
b. SQL injection
c. Resource exemption
d. Traffic flooding
Solution: (b)
Justification: Please refer to Slide 12 of Lecture 2 of Week 10.

7. What is/are the challenge in end device protection?


a. Resource constrained
b. Many devices are mobile
c. No support for standard cryptographic protocols
d. All the above
Solution: (d)
Justification: Please refer to Slide 5 of Lecture 3 of Week 10.

8. Which of the following is not included in cloud security?


a. Data privacy
b. Energy efficiency management
c. Identity management
d. Access control
Solution: (b)
Justification: Please refer to Slide 10 of Lecture 3 of Week 10.

9. What are the three components of data protection?


a. Confidentiality, Integrity, and Availability
b. Confidentiality, Integrity, and Authenticity
c. Confidentiality, Authority, and Availability
d. Authenticity, Authority, and Availability
Solution: (a)
Justification: Please refer to Slide 12 of Lecture 3 of Week 10.

10. What are the advantages of smart factories?


a. Increase in efficiency
b. Reduction in overall production cost
c. Enhanced prediction of errors
d. All of the above
Solution: (d)
Justification: Please refer to Pages 168-169 of Chapter 7 of the book Introduction to Industrial
Internet of Things and Industry 4.0.

11. Kuka – IoT Enabled Factory is __________.


a. A German robotics maker
b. A German smart wearable maker
c. A Russian robotics maker
d. None of the above
Solution: (a)
Justification: Please refer to Slide 8 of Lecture 4 of Week 10.

12. Name a smart factory which produce honing machine?


a. DeWalt – Construction Internet of Things
b. Gehring – Connected Manufacturing
c. Caterpillar
d. ABB - YuMi
Solution: (b)
Justification: Please refer to Slide 16 of Lecture 4 of Week 10.

13. What are the impacts of IoT in food Industries?


a. Less wastage
b. Food safety
c. Transparency of the supply chain
d. All the above
Solution: (d)
Justification: Please refer to Slide 4,5 of Lecture 5 of Week 10.

14. Name a service offers by Intellicup – Smart Cups.


a. Detects the presence of microbial disease in food
b. Provides intelligent indoor garden to grow fruits, herbs, vegetables, greens, and edible
flowers
c. Smart cooking
d. Smart beverage vending
Solution: (d)
Justification: Please refer to Slide 20 of Lecture 5 of Week 10.

15. Which of the following food industry produces smart coffee brewing machines?
a. Spinn Inc.
b. FarmSelf
c. Culinary Science Industries
d. Eskesso
Solution: (a)
Justification: Please refer to Slide 22 of Lecture 5 of Week 10.

You might also like