How does OFDMA differ from OFDM?
Answer : C
OFDM vs. OFDMA:
OFDM (Orthogonal Frequency-Division Multiplexing):Divides a channel into multiple subcarriers for data transmission.
OFDMA (Orthogonal Frequency-Division Multiple Access):Extends OFDM by allowing multiple users to share subcarriers simultaneously, improving efficiency and spectral utilization.
References
OFDM:https://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexing
OFDMA:https://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiple_access
What is a common characteristic of Industrial IoT (IIoT) devices that is not a characteristic of all IoT devices?
Answer : A
IIoT Environments:Industrial IoT (IIoT) often involves deployment in harsh environments (factories, plants, outdoor sites) with:
Extreme temperatures
Dust & Vibrations
Exposure to chemicals or moisture
Ruggedization:IIoT devices are designed to withstand these conditions, ensuring reliability and longevity.
References
IIoT:https://en.wikipedia.org/wiki/Industrial_Internet_of_things
Rugged Devices:Articles on ruggedized electronics will emphasize their importance in industrial settings.
A Wi-Fi enabled weight scale is an example of what kind of health IoT device?
Answer : C
Health IoT Device Categories:
Wearable:Devices worn on the body (smartwatches, fitness trackers).
Non-wearable:Devices used without being worn (smart scales, connected medical equipment).
Implantable:Surgically inserted devices (pacemakers, glucose monitors).
References
Health IoT:Resources on healthcare + IoT will illustrate device types.
How is ASK modulation different from FSK modulation?
Answer : A
Key Modulation Differences:
ASK (Amplitude Shift Keying):Digital data is represented by changes in the amplitude (strength) of a carrier wave.
FSK (Frequency Shift Keying):Digital data is represented by changes in the frequency of a carrier wave.
References
ASK:https://en.wikipedia.org/wiki/Amplitude-shift_keying
FSK:https://en.wikipedia.org/wiki/Frequency-shift_keying
Which one of the following location tracking technologies is most energy efficient in typical implementations?
Answer : A
BLE Beacon Power Efficiency:Bluetooth Low Energy (BLE) beacons are designed for low power consumption.Their primary function is to periodically broadcast short data packets (advertising their presence).
Other Technologies:
Cellular:More power-hungry due to long-range communication and complex protocols.
GPS:Power intensive,especially when actively tracking location.
Wi-Fi:
You are implementing a smart office wireless solution for a small business. The business owner indicates that It is acceptable to use consumer-targeted wireless devices. What is a common negative attribute of consumer-targeted smart home or smart office devices?
Answer : B
Consumer Smart Devices Limitation:Many consumer-oriented smart devices are designed for simplicity and cost-effectiveness, leading to reliance on the crowded 2.4 GHz band.
Consequences:
High Interference:Increased potential for interference from Wi-Fi and other 2.4 GHz devices.
Limited scalability:Performance and reliability may degrade in busy wireless environments.
You must ensure proper security controls are in place for a wireless solution. The solution allows for the use of groups to grant access to resources and capabilities. What is the term used to describe a situation where an individual is granted more access than required because of inclusion in a group?
Answer : C
Privilege Creep Defined:Gradual accumulation of excessive permissions over time, often due to users changing roles or access needs not being adjusted accordingly.
Other Terms:
Privilege Escalation: A malicious act of obtaining higher-than-authorized access.
Improper Delegation/Grouping: Faulty permission assignment, but not the gradual accretion aspect.
References:
Principle of Least Privilege:Security best practice emphasizing the need to minimize access to only what's necessary.
Access Control Models:Discussions of how privilege creep can violate security principles.