Week 10
Week 10
Correct Answer: c
Justification: Refer to slide 2, lecture 1, week 10
______________________________________________________________________________
2. Which of the following is NOT a component of SD-Edge IIoT Architecture?
a. Cluster Head
b. Industrial Cloud
c. Edge Network
d. Standalone Firewall
Correct Answer: d
Justification: Refer to slide 12, lecture 1, week 10
______________________________________________________________________________
3. Which of the following is NOT a key attribute of trustworthy IIoT?
a. Reliability
b. Security
c. Unlimited network access
d. Privacy
Correct Answer: c
Justification: Refer to slide 4, lecture 2, week 10
______________________________________________________________________________
4. Which of the following is an example of an IIoT attack at the physical layer?
a. SQL injection
b. Device tampering
c. Traffic flooding
d. Man-in-the-middle attack
Correct Answer: b
Justification: Refer to slide 14, lecture 2, week 10
___________________________________________________________________________
5. What does the STRIDE threat model in IIoT security stand for?
a. Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation
of Privilege
b. Secure Transmission, Reliable Data, Industrial Deployment, Encryption
c. Software, Tracking, Response, Integration, Data, Encryption
d. Security Threats, Risk Identification, Detection, Evaluation
Correct Answer: a
Justification: Refer to slide 10, lecture 2, week 10
___________________________________________________________________________
6. Which of the following is an attack vector in the network layer of IIoT?
a. SQL injection
b. Traffic flooding
c. Jamming attack
d. Data spoofing
Correct Answer: b
Justification: Refer to slide 13, lecture 2, week 10
_____________________________________________________________________________
7. Which of the following is NOT a building block of IIoT security?
a. Cloud security
b. Data protection
c. Physical network topologies
d. Communication Protection
Correct Answer: c
Justification: Refer to slide 4, lecture 3, week 10
______________________________________________________________________________
8. Which of the following standards is related to Industrial automation and control systems
security?
a. ISO/IEC 154083
b. IEC 62443
c. ISO 27017
d. NIST SP 800-144
Correct Answer: b
Justification: Refer to slide 21, lecture 3, week 10
_____________________________________________________________________________
9. Which of the following is NOT a key principle of data protection in IIoT?
a. Confidentiality
b. Integrity
c. Availability
d. Unrestricted access
Correct Answer: d
Justification: Refer to slide 12, lecture 3, week 10
______________________________________________________________________________
10. State true or false. Caterpillar’s AR app generates an end-to-end view of the factory floor,
enabling machine operators to detect tool replacement needs and send instructions for
replacement.
a. True
b. False
Correct Answer: a
Justification: Refer to slide 12, lecture 4, week 10
______________________________________________________________________________
11. Which of the following is NOT a key feature of a Smart Factory?
a. Continuous real-time data
b. Prediction of future outcomes for taking preventive actions
c. High manual operation
d. Flexibility and adaptability
Correct Answer: c
Justification: Refer to slide 5, lecture 4, week 10
______________________________________________________________________________
12. Which of the following statements is INCORRECT about Fanuc – Zero Downtime System?
a. Is a robot maker
b. Uses predictive maintenance to reduce downtime
c. Does not predict component failure
d. Performs cloud-based analytics with the help of in-built sensors
Correct Answer: c
Justification: Refer to slide 15, lecture 4, week 10
_____________________________________________________________________________
13. What is the purpose of SmartLabel in the food industry?
a. To provide consumers with product-related information via QR codes
b. To remove ingredient details from food packaging
c. To eliminate allergen warnings for consumers
d. To prevent transparency in the food supply chain
Correct Answer: a
Justification: Refer to slide 11, lecture 5, week 10
______________________________________________________________________________
14. Which of the following devices is primarily used to detect the presence of microbial disease
in food?
a. Diagenetix-BioRanger
b. Eskesso–The Cooking Sorcery
c. Intellicup–Smart Cups
d. Intellicup–The Cooking Sorcery
Correct Answer: a
Justification: Refer to slides 17-19, lecture 5, week 10
______________________________________________________________________________
15. What is the unique feature of Spinn Inc.’s smart coffee machines?
a. They connect with Amazon Echo and have an auto-order feature
b. They remove automation from coffee brewing
c. They require manual input for all brewing processes
d. They prevent connectivity with IoT platforms
Correct Answer: a
Justification: Refer to slides 22, lecture 5, week 10
______________________________________________________________________________