Professional Documents
Culture Documents
anilkumar.palarapu@gmail.com ▼
Unit 10 -
Case studies
Register for
Certification Week 8 Assessment
exam
Due date for this assignment: 2019-03-27, 23:59 IST.
Your last recorded submission was on 2019-03-25, 07:44 IST
Course
outline 1) Which among the following pose a challenge in first responder’s 1 point
network?
How to
access the
Maintenance of a network
portal Routing through the network
Localizing the victim and first responder indoor
MATLAB None of the above
Online
Access and 2) In
first responder networks, which of the following considerations 1 point
Learning
Modules
has to be taken into account while implementing machine to machine
technologies?
Localization
in IoT - Part 1
Low power
Data rate
Localization Security and device sophistication
in IoT - Part 2 All of these
Sensors and 3) Which of the following is true in SDP access authorization 1 point
protocols for workflow?
next
generation Initiating SDP host directly connects to all accepting SDP host
automobiles
Initiating SDP host connects to the accepting SDP host which is of
Automotive interest to it
IoT Initiating SDP host connects to a list of authorized accepting hosts
determined by the SDP controller on line
Speech to Initiating SDP host connects to an accepting SDP host after
text
processing receiving a connect request from them
https://onlinecourses.nptel.ac.in/noc19_ee28/unit?unit=89&assessment=95 1/3
3/25/2019 Advanced IoT Applications - - Unit 10 - Case studies
Air quality
Cost involved in implementation
monitoring Controlling them in zone of flight
Landing and charging
Case studies All of these
Introduction 5) In
the SDP framework a device authentication is more important 1 point
to First
Responder
than network authentication
networks
True
First False
Responders
- 6) In SDP approach,when is the IP address of SDP host known? 1 point
Applications
- Part 1 IP address is know soon as the authentication
First IP address is known soon as the connection is established
Responders Both are possible
-
Applications 7) The motivation for Software defined perimeter is: 1 point
- Part 2
Cargo
Provide access to data to anyone in the event of an emergency
monitoring Provide access to authorised personnel
for tamper
No access to data until password is entered
detection
Part 1 You may submit any number of times before the due date. The final submission will
Cargo be considered for grading.
monitoring Submit Answers
for tamper
detection
Part 2
Quiz : Week
8 Previous Page End
Assessment
Text
Transcripts
DOWNLOAD
VIDEO
Interaction
Session
https://onlinecourses.nptel.ac.in/noc19_ee28/unit?unit=89&assessment=95 2/3
3/25/2019 Advanced IoT Applications - - Unit 10 - Case studies
Funded by
Powered by
https://onlinecourses.nptel.ac.in/noc19_ee28/unit?unit=89&assessment=95 3/3