Questionmark Perception
Oct 17 2021 |
Logged in as : candidate
Change font size

Introduction

Introduction

This is the EXIN CCC Internet of Things Foundation (IOTF.EN) sample exam. The Rules and Regulations for EXIN’s examinations apply to this exam.

This exam consists of 40 multiple-choice questions. Each multiple-choice question has a number of possible answers, of which only one is correct.

The maximum number of points that can be obtained for this exam is 40. Each correct answer is worth 1 point. You need 26 points or more to pass the exam.

The time allowed for this exam is 60 minutes.

Good luck!



Copyright © Cloud Credential Council 2021. All rights reserved.
Copyright © EXIN Holding B.V. 2021. All rights reserved.
EXIN® is a registered trademark.

Question

1  of 40
What does IoE stand for?

Question

2  of 40
What is the full form of the OSI model on which the IoT Protocol stack is based?

Question

3  of 40
Identify the Online Transaction Processing (OLTP) database.

Question

4  of 40
What is the technology maturity for "Business Applications" in the markets for the IoT Technology layers?

Question

5  of 40
Security is one of the main obstacles of IoT.

What is the other?

Question

6  of 40
What is an example of WWAN (LPWAN) network protocol?

Question

7  of 40
What is the critical success factor for the "service revenue" monetization model?

Question

8  of 40
What technology is used to develop and deploy software robots or bots for automation purposes?

Question

9  of 40
Which statement about sensors is true?

Question

10  of 40
Insecure Web, Cloud, and Mobile Interfaces have been combined together to form only a single threat.

What is this single group called?

Question

11  of 40
Identify the invalid action involved in a Digital Twin concept.

Question

12  of 40
Identify the incorrect stage of an IoT working cycle.

Question

13  of 40
Identify the incorrect statement about the Machine-to-Machine (M2M) communication.

Question

14  of 40
Which OWASP's top 10 is mitigated by ensuring that there is a proper and trusted anti-rollback mechanism in place?

Question

15  of 40
In what case is data processed without the need to be transferred or transmitted anywhere?

Question

16  of 40
Identify the correct order to follow for MAXIMUM value in the IoT value chain.

Question

17  of 40
Identify the invalid characteristic of "things" in IoT.

Question

18  of 40
Which statement is true about wired and wireless networks?

Question

19  of 40
What is the purpose of the "Monitoring" capability of smart and connected products?

Question

20  of 40
By 2025, which sector is potentially expected to have the least impact on account of IoT?

Question

21  of 40
Identify the valid Proximity Network category protocol.

Question

22  of 40
Where should historical data be ideally analyzed?

Question

23  of 40
Which IoT analytics model is suitable for smart parking applications?

Question

24  of 40
In which communication model, does the application software act as an intermediary between an IoT device and a cloud service?

Question

25  of 40
By 2026, LTE-M and NB-IoT is expected to capture around 60% of the LPWAN connections.

Which two other technologies will capture most of the remaining 40%?

Question

26  of 40
Which generic factor of a sensor indicates a measure of how consistent it responds to the same input conditions?

Question

27  of 40
In which stage of the IIoT maturity model, do connected objects provide reactive form of interaction and communication?

Question

28  of 40
Which IoT Stack layer contains the 6LoWPAN protocol?

Question

29  of 40
Which IoT challenge is unable to be solved by Quantum Computing?

Question

30  of 40
Identify the valid domain of intelligent systems which pave ways to a smarter world.

Question

31  of 40
Under which threat category does Fires belong?

Question

32  of 40
Where are transactions stored in Blockchain?

Question

33  of 40
Which statement about IT processors is true?

Question

34  of 40
What is optional when combining IoT with Artificial Intelligence to achieve greater impact and efficiency?

Question

35  of 40
Under which security level does 'Secure Booting' belong?

Question

36  of 40
Under which category of Baseline IoT Security Recommendations does 'Security by Design' fall?

Question

37  of 40
What is an invalid perception element of the next-generation hyperconnected IoT world?

Question

38  of 40
What feature of 5G should be as low as possible?

Question

39  of 40
Which WPAN network utilizes energy harvesting technology to draw energy from its surroundings?

Question

40  of 40
In the IoT Shared Responsibility Framework, identify the valid characteristic for manufacturer behavior.