Oct 17 2021 |
Logged in as : candidate
This is the EXIN CCC Internet of Things Foundation (IOTF.EN) sample exam. The Rules and Regulations for EXIN’s examinations apply to this exam.
This exam consists of 40 multiple-choice questions. Each multiple-choice question has a number of possible answers, of which only one is correct.
The maximum number of points that can be obtained for this exam is 40. Each correct answer is worth 1 point. You need 26 points or more to pass the exam.
The time allowed for this exam is 60 minutes.
Copyright © Cloud Credential Council 2021. All rights reserved.
Copyright © EXIN Holding B.V. 2021. All rights reserved.
EXIN® is a registered trademark.
1 of 40
What does IoE stand for?
Internet of E-Learning
Internet of Edge computing
Internet of Everything
Internet of E-Commerce
2 of 40
What is the full form of the OSI model on which the IoT Protocol stack is based?
Operating System Internal
Open Source Initiative
Online Structured Internet
Open Systems Interconnection
3 of 40
Identify the Online Transaction Processing (OLTP) database.
4 of 40
What is the technology maturity for "Business Applications" in the markets for the IoT Technology layers?
5 of 40
Security is one of the
obstacles of IoT.
What is the other?
6 of 40
What is an example of WWAN (LPWAN) network protocol?
7 of 40
What is the critical success factor for the "service revenue" monetization model?
Enhanced value delivered over traditional product
Having multiple subscription options at varying price points, including free
Managing customer privacy and staying compliant to regulations
Ensuring the platform is equitable to all stakeholders and not just platform promoters
8 of 40
What technology is used to develop and deploy software robots or bots for automation purposes?
Internet of Robotic Things (IoRT)
Robotic Process Automation
9 of 40
Which statement about sensors is
Sensors belong to the category of transducers.
Passive sensors emit their own energy.
A loudspeaker is an example of a sensor.
Sensors convert electrical input to non-electrical signals.
10 of 40
Insecure Web, Cloud, and Mobile Interfaces have been combined together to form only a single threat.
What is this single group called?
Insecure Network Services
Insecure Default Settings
Insecure Ecosystem Interfaces
Insufficient Privacy Protection
11 of 40
action involved in a Digital Twin concept.
12 of 40
stage of an IoT working cycle.
Layers of Embedded Processing Nodes
Remote Cloud-based Processing
13 of 40
statement about the Machine-to-Machine (M2M) communication.
In an M2M communication, human interaction is optional.
M2M Communication is based on wired or wireless channels.
M2M uses sensors to capture events such as temperature and pressure.
Communication between an ATM and the bank computer is an example of M2M.
14 of 40
Which OWASP's top 10 is mitigated by ensuring that there is a proper and trusted anti-rollback mechanism in place?
Lack of Physical Hardening
Insecure Default Settings
Insecure Data Transfer and Storage
Lack of Secure Update Mechanism
15 of 40
In what case is data processed without the need to be transferred or transmitted anywhere?
Edge Computing (on the Device/Sensor itself)
Edge Computing (on the IoT Gateway such as a smartphone)
Fog Computing (on the Fog nodes)
Cloud Computing (on the cloud itself)
16 of 40
order to follow for MAXIMUM value in the IoT value chain.
Technology, Platforms, Organizations, Things, and People
Things, Technology, Platforms, Organizations, and People
People, Things, Organizations, Platforms, and Technology
Organizations, People, Things, Technology, and Platforms
17 of 40
characteristic of "things" in IoT.
High Power Operation
18 of 40
Which statement is
about wired and wireless networks?
Wired networks are more secure.
Wired networks have lower setup cost.
Wireless networks have no RF Interference.
Wireless networks have faster connection speeds.
19 of 40
What is the purpose of the "Monitoring" capability of smart and connected products?
To obtain the overall health of a product's condition and environment.
To apply algorithms and analytics to improve productivity and efficiency.
To use remote commands or algorithms to control smart, connected products.
To self-diagnose a product's own service needs.
20 of 40
By 2025, which sector is potentially expected to have the
impact on account of IoT?
21 of 40
Proximity Network category protocol.
Bluetooth Low Energy (BLE)
22 of 40
Where should historical data be ideally analyzed?
Fog nodes (LAN Gateway)
23 of 40
Which IoT analytics model is suitable for smart parking applications?
Time Series Analytics
24 of 40
In which communication model, does the application software act as an intermediary between an IoT device and a cloud service?
Back-End Data Sharing
25 of 40
By 2026, LTE-M and NB-IoT is expected to capture around 60% of the LPWAN connections.
Which two other technologies will capture
of the remaining 40%?
SigFox and LoRa
Symphony and Weigthless
Ingenu and Symphony
LoRa and Weigthless
26 of 40
Which generic factor of a sensor indicates a measure of how consistent it responds to the same input conditions?
27 of 40
In which stage of the IIoT maturity model, do connected objects provide reactive form of interaction and communication?
28 of 40
Which IoT Stack layer contains the 6LoWPAN protocol?
29 of 40
Which IoT challenge is unable to be solved by Quantum Computing?
30 of 40
domain of intelligent systems which pave ways to a smarter world.
Single point of Failure
31 of 40
Under which threat category does Fires belong?
Failure to meet contractual requirements
32 of 40
Where are transactions stored in Blockchain?
33 of 40
Which statement about IT processors is
Processors consist of microcomputers only.
Microcomputers are specific-purpose devices.
Processors can encrypt/decrypt data.
Arduino is an example of a microcomputer.
34 of 40
when combining IoT with Artificial Intelligence to achieve greater impact and efficiency?
New skills and expertise
Vast amount of data
35 of 40
Under which security level does 'Secure Booting' belong?
36 of 40
Under which category of Baseline IoT Security Recommendations does 'Security by Design' fall?
37 of 40
What is an
perception element of the next-generation hyperconnected IoT world?
38 of 40
What feature of 5G should be as low as possible?
Density of towers to cover a given area
39 of 40
Which WPAN network utilizes energy harvesting technology to draw energy from its surroundings?
40 of 40
In the IoT Shared Responsibility Framework, identify the
characteristic for manufacturer behavior.
Check for user reviews, labels and certifications
Ensure the devices can still function without the Internet
Check resources that help to dispose of IoT devices responsibly
Understand how devices collect, use and share data
Perception license for EXIN Holding