FREL2 PRELIM EXAM - Set01
FREL2 PRELIM EXAM - Set01
FREL2 PRELIM EXAM - Set01
SET A
True/False
Indicate whether the statement is true or false.
1. Digital Sensors produce an analog output i.e. a continuous output signal with respect to the quantity being measured.
2. Analog Sensors, work with discrete or digital data. The data in digital sensors, which is used for conversion and transmission,
is digital in nature.
3. A Transmissive Type IR Sensor, the IR Transmitter (usually an IR LED) and the IR Detector (usually a Photo Diode) are
positioned adjacent to each other facing the object so that when an object passes between them, the sensor detects the object.
4. In a Reflective Type IR Sensor, the transmitter and the detector are positioned facing each other. When an object comes in
front of the sensor, the sensor detects the object.
5. An Ultrasonic Sensor is a non-contact type device that can be used to measure distance as well as velocity of an object.
6. Proximity Sensors can be implemented using different techniques like Optical (like Infrared or Laser), Ultrasonic, Hall
Effect, Capacitive, etc.
7. Businesses need to process huge amounts of data. This requires less amounts of processing power, sophisticated software and
human analytical skills.
8. IT governance is a catchall category for the daily work of an IT department. This includes providing tech support, network
maintenance, security testing and device management duties.
9. Physiological and behavioral characteristics are used to identify an individual and the science behind this is known as
Biometrics.
10. Some of the means of detection used in sensors are Electric, Biological, Chemical, Radioactive etc.
Multiple Choice
Choose the letter that best completes the statement or answers the following statements. Write your answers in UPPERCASE form.
1. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices
to communicate in a standard fashion?
a. Security
b. Privacy
c. Compliance
d. Interoperability
2. Which one of the following is NOT a market driver for the Internet of Things (IoT)?
a. Smaller and faster computing
b. Growth of cloud computing
c. Global adoption of non-IP networking
d. Advancement in data analytics
3. Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the
system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?
a. Platform as a Service (PaaS)
b. SaaS (SaaS)
c. Communications as a Service (CaaS)
d. Infrastructure as a Service (IaaS)
5. Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity
and includes provisions that Gwen should implement before accepting credit card transactions?
a. Health Insurance Portability and Accountability Act (HIPAA)
b. Family Educational Rights and Privacy Act (FERPA)
6. Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select
customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron
implement to include the requirements and security controls for this arrangement?
a. Privacy
b. Acceptable use
c. Bring Your Own Device (BYOD)
d. Data classification
8. With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to
the MN's current network?
a. Home agent
b. Foreign agent
c. Care of address
d. Correspondent note
9. Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security
vulnerabilities into a network while still meeting business requirements?
a. Applying security updates promptly
b. Turning IoT devices off when not in use
c. Removing IoT devices from the network
d. Using encryption for communications
10. From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet
of Things (IoT)?
a. Security risks will decrease.
b. Security risks will increase.
c. Security risks will stay the same.
d. Security risks will be eliminated.
11. It is defined as an input device which provides an output (signal) with respect to a specific physical quantity (input).
a. Bluetooth
b. Wi-Fi
c. Sensor
d. Infrared
12. The main technological difference that distinguishes 3G technology from 2G technology is the use of
a. circuit switching for data transmission.
b. half-duplex mode
c. full-duplex mode
d. packet switching for data transmission.
15. It is a computer network, and it allows communication between computer devices close to a person.
a. WAN
b. VPN
c. PAN
d. LAN
19. When the data is transmitted from a large information system to a small information system is known as
a. network architecture
b. network technology
c. network topology
d. network diagram
20. It includes a set of rules, formats & procedures to communicate with two or many devices through a network.
a. Network Security
b. Network Scalability
c. Network Topology
d. Network protocol
Identification.
Provide the best answer for each of the given statements. Write your answers in SMALL CASE format.
2. Providing the user an insight into the workings of the whole system and offering ways to interact with it, the main task of the
application layer is to visualize the information received from the software and present it in a user-friendly way.
3. It is concern about deploying the IoT Platform technology in order to give the possibility to be deployed in the cloud or, in an
on-site server to ensure greater privacy of data.
4. This criterion includes the encryption of the information transmitted between the devices and the server via a variety of
communication channels, the control of user access as well as the ownership of the processed data.
5. These are machines, sensors, actuators or other connected gear intended to perform given actions.
6. An element of IoT which allows connected devices to 'talk' about what they sense or where they are.
7. Hosted in the cloud or on an on-site server, the software collects the data sent by the devices, analyses it and makes
independent decisions about actions to be performed within the IoT system.
8. Based on telecommunication networks, this is the channel through which the devices ‘talk’ to one another and communicate
with / receive commands from the server/cloud.
10. It refers to handling of a variety of hardware and software communication protocols which is essential in every professional
IoT deployment.
11. This is essential for all developers who need to customize some of the functions of the device and its applications or, on the
contrary, develop additional modules.
12. An indispensable element of the IoT which considers any objects we can imagine.
13. The IoT element which allows the things the ability to 'think' and act.
14. It is an IoT element which enables the end user to interact and takes control when the self-management capabilities of the
system are exhausted.
15. It is a type of sensor which do not require any external power signal and directly generates output response.
Enumeration.
Specify the answers for each of the given set of statements.
H. Two types of Biometric operations that can be performed using the images captured by Biometric Sensors
1.
2.