Assessment Test


1. 

What are the two primary types of energy fields used in RFID communication? (Select two options.)

  1. The electric field

  2. The magnetic field

  3. The playing fields

  4. The circularly polarized field

image from book

2. 

High-frequency (HF) RFID is best suited for which of the following applications? (Select two options.)

  1. Animal tracking

  2. Container tracking

  3. Item-level pharmaceutical

  4. Toll booth

image from book

3. 

The magnetic field created by an electric current flowing through a straight wire ___________________.

  1. flows from the end of the wire in the direction of the electric current (the north pole), out into space, and back into the other end of the wire (the south pole)

  2. flows from the end of the wire in the opposite direction of the electric current (the north pole), out into space, and back into the other end of the wire (the south pole)

  3. flows around the wire in concentric circles in a direction following the right-hand rule

  4. flows around the wire in concentric circles in a direction following the left-hand rule

image from book

4. 

What kind of interface do interrogators not usually provide?

  1. USB

  2. Serial RS-232

  3. Ethernet RJ-45

  4. RS-485

image from book

5. 

What are the parts of the interrogator? (Select three options.)

  1. Transmitter

  2. Receiver

  3. Light stack

  4. Processor

  5. RFID portal

image from book

6. 

What is the listen-before-talk technique used for?

  1. When frequency hopping, the interrogator has to listen for whether the channel it intends to use is available.

  2. Active tags use this technique when communicating with an interrogator.

  3. It is used only when writing to the tags.

  4. It is used in conjunction with sessions.

image from book

7. 

Which commands are supported by Generation 2 interrogators? (Select two options.)

  1. Kill command

  2. Select command

  3. Secure command

  4. Unkill command

image from book

8. 

What is ambient environmental noise (AEN)?

  1. Soft music usually played in the background during test sessions

  2. Other electronic transmissions that are taking place in a facility and that may interfere with an RFID network

  3. The static electricity caused by routing power cords too close to each other in an RFID rack

  4. The type of signal from a poorly tuned antenna

image from book

9. 

What is the primary purpose of using blueprints when designing an RFID network deployment?

  1. To see how old the building is

  2. To determine the overall square footage of the facility

  3. To determine location of the RFID portals and associated electrical and local area network (LAN) connections

  4. None of the above

image from book

10. 

What is the proper test equipment for an adequate site survey?

  1. Packet sniffer

  2. Oscilloscope

  3. E-field probe

  4. Spectrum analyzer and signal generator

image from book

11. 

What type of chip-attachment method is the most suitable for handling very small chips?

  1. Flip-chip method

  2. Strap-attachment method

  3. Self-adhesive method

  4. A and B

image from book

12. 

Which type of tag has the longest read ranges?

  1. Active tags

  2. Passive UHF tags

  3. Semi-passive tags

  4. Passive microwave tags

image from book

13. 

What is the maximum expected read rate of Gen 2 tags in the United States?

  1. 150 tags per second

  2. 1,500 tags per second

  3. 150 kilobits per second

  4. 1,500 kilobits per second

image from book

14. 

What is the difference between an ultra-high-frequency (UHF) tag and a high-frequency (HF) tag?

  1. UHF has two chips, and HF has only one.

  2. UHF uses the strap-attachment method, and HF uses the flip-chip.

  3. UHF usually uses a dipole antenna (conductive material attached to the chip), and HF uses multiple loops of antenna material attached to the chip.

  4. A, B

image from book

15. 

A tag has concentric rings of conductive ink attached to a single chip and is read about six inches from the reader, what type of tag is it most likely?

  1. A SAW tag

  2. A UHF dual dipole tag

  3. A CHS pipe tag

  4. An HF inductively coupled tag

image from book

16. 

When testing for ambient environmental noise (EAN) how long should you run the spectrum analyzer for the most effective results?

  1. 24 hours

  2. 12 hours

  3. 6 hours

  4. 1 hour

image from book

17. 

The differential time of arrival is related to which of the following?

  1. Diverters

  2. Real-time location system

  3. Smart label applicators

  4. Advanced shipping notice

image from book

18. 

Light stacks are used mainly for what?

  1. For signaling that the interrogation was triggered

  2. In conjunction with label applicators, signaling that the label was placed on a product

  3. In conjunction with RFID printers, signaling that the label was printed

  4. For providing feedback about valid or invalid tags at the verification point

image from book

19. 

Why does a printer have to know the location of the RFID inlay within a label?

  1. So that it does not print over the inlay.

  2. Inlay position indicates the type of tag.

  3. So that it knows how long it will take to print one label.

  4. In order to encode the tag properly and avoid damage to the chip.

image from book

20. 

What do you need to make sure of when installing an interrogator? (Select two options.)

  1. That it is protected from dust and environmental conditions

  2. That you attach the interrogator to a wall with nails used for concrete

  3. That you always use a protective enclosure such as NEMA

  4. That it has enough space around for cables, access, and ventilation

image from book

21. 

What do you need to do in order not to delay the installation?

  1. Do not worry about people logistics, as long as the equipment is on-site.

  2. Do not worry about the equipment, as long as your installers are on-site.

  3. Establish communication channels, make sure that everyone has travel plans and will be on-site and ready to go, and have the equipment tested and ready to be put in.

  4. Establish chain of command, and make sure that everyone has accommodations and will bring the equipment needed for installation when coming on-site.

image from book

22. 

What is the first step you should take to troubleshoot an RFID network?

  1. Check the manual for the reader.

  2. Set up a signal generator with a frequency equal to the center frequency of the interrogator and attach the reader's antenna to the signal generator.

  3. Reboot the reader.

  4. Flash the firmware.

image from book

23. 

Which type of cable connecting an antenna to a reader would exhibit the lowest loss?

  1. LMR-240

  2. LMR-400

  3. Declonian

  4. B and C

image from book

24. 

What primary role does middleware play on an RFID reader?

  1. Filters and smooths data

  2. Determines which protocols are read

  3. Monitors performance of each reader

  4. Provides operational awareness

image from book

25. 

What is the main purpose of tag data protocols?

  1. Standardize tag data formatting

  2. Standardize tag anticollision procedures

  3. Specify frequency allocations for tag operation

  4. Standardize the tag construction

image from book

26. 

What does the ISO/IEC 14443 specify?

  1. Air interface protocol for UHF tags

  2. Guidelines for animal identification

  3. Guidelines for proximity cards

  4. Guidelines for freight containers

image from book

27. 

What is the most important concern when installing an RFID system?

  1. Equipment protection

  2. Personnel safety

  3. Protection of safety devices

  4. Protection of hearing

image from book

Answers

1. 

A, B. Electromagnetic waves form the basis for near-field and far-field communication using RFID. An electromagnetic field is made up of both an electric field and a magnetic field. For more information, see Chapter 1.

2. 

A, C. HF has a shorter range than UHF, microwave, or active tags, so it is best suited for close-range applications, particularly if metal or liquids are involved. For more information, see Chapter 1.

3. 

C. The current flowing through a straight wire does not create a magnetic north pole and south pole. The current creates a magnetic field that forms concentric circles around the wire. The right-hand rule is used to determine the direction of the magnetic field. For more information, see Chapter 1.

4. 

D. RS-485 is not usually provided by the interrogators. The most common interfaces are serial, Ethernet, USB, and I/O control. For more information, see Chapter 2.

5. 

A, B, D. An interrogator includes a transmitter, a receiver, and a processor. It does not include a light stack, which is usually connected to the interrogator as an I/O device through an I/O port. An RFID portal is the implemented structure, including the interrogator, antennas, mounts, and possible I/O devices. For more information, see Chapter 2.

6. 

A. A listen-before-talk (LBT) technique can be used during frequency hopping. The reader has to listen for whether any other reader transmits on the chosen channel; only after it determines that the channel is available can it start using this channel for communication. If the channel is being used by another reader, the listening reader has to switch to another channel in order to transmit. For more information, see Chapter 2.

7. 

A, B. The Select and Kill commands are supported by Generation 2 interrogators. The commands Secure and Unkill do not exist (yet). For more information, see Chapter 2.

8. 

B. The site survey and full Faraday cycle analysis are performed to determine whether there are any other systems in place that may interfere with the performance of an RFID network. Some of these systems include barcode scanners, alarm sensors, communication systems, and air traffic control radar. For more information, see Chapter 3.

9. 

C. The blueprints are your canvas to lay out the RFID network based on business process flows identified in the project planning phase. You cannot install an RFID reader without adequate power and some sort of connectivity. The blueprints will tell you what is in place already, and where you will need to install portal racks, receptacles, or LAN connections. For more information, see Chapter 3.

10. 

D. The spectrum analyzer is the most widely used testing tool in RFID, because it allows understanding and viewing of invisible waves in the local atmosphere. The signal generator adds to the functionality by allowing you to specifically replicate transmission of a reader and then test its behavior. For more information, see Chapter 3.

11. 

B. The most suitable method for handling very small chips is the strap-attachment method. A chip is placed on a conductive and the strap is then attached to an antenna. The strap provides a larger surface to connect to the antenna than the chip by itself. For more information, see Chapter 4.

12. 

A. Active tags have the longest read ranges because of their ability to broadcast a signal to the environment. They carry a battery to power the chip's circuitry as well as its transmitter and other components. For more information, see Chapter 4.

13. 

B. Theoretical read rates for Gen 2 tags are around 1,500 tags per second in the United States and 600 tags per second in Europe because of regulatory restrictions. For more information, see Chapter 4.

14. 

C. An HF tag is easily recognized by the multiple loops of antenna that circle around the chip, usually for five or six turns. This is so it can couple with the near field. The UHF tag has a single antenna, usually on either side of the chip. For more information, see Chapter 5.

15. 

D. If there is inductive coupling, a loop of some conductive metal like copper or silver or conductive ink needs to be looped several times to successful get power to the chip. This is the easiest way to tell an HF tag from a UHF tag. For more information, see Chapter 4.

16. 

A. The spectrum analyzer should be run for an entire business cycle, this is part of a full Faraday cycle analysis which looks at the environmental changes over all shifts of a business. There may be night-time security systems, adjacent radar facilities, communications gear, all which change their state at different times of the day. A 24-hour investigation is the only way to accurately detect those interferers. For more information, see Chapter 3.

17. 

B. The differential time of arrival is one of the principles used in real-time location systems. This principle is based on the difference in time it takes the signal to travel from the tag to each of the access points (RFID readers). For more information, see Chapter 6.

18. 

D. Light stacks are used mainly at the verification points to provide feedback as to whether a tag placed on a product functions correctly. For more information, see Chapter 6.

19. 

D. Knowing the location of the RFID inlay embedded in a label is important for proper reading, encoding, and verification. A best practice is also to avoid printing over the RFID chip because that can damage it. For more information, see Chapter 6.

20. 

D. When you are mounting an interrogator, you have to make sure that it has enough space for proper connections to antennas, network, and power, as well as for ventilation and possible troubleshooting. It also has to be protected from various environmental conditions including dust, rain, snow, heat, and others. For more information, see Chapter 7.

21. 

C. To prevent delays in installation, you must follow a project plan and not forget to establish communication channels. Do not underestimate people logistics or equipment logistics, including hardware certification and preassembly. For more information, see Chapter 7.

22. 

C. Sometimes readers will overload their processing capability and freeze, much like a laptop. The simplest first step after you've checked to see whether the power is on is to reboot the reader and see whether that fixes the problem. For more information, see Chapter 8.

23. 

B. LMR is most frequently used for RFID networks. The higher the number after "LMR," the better the insulation. So LMR-400 will have the least loss and should be used for the longer runs. For more information, see Chapter 8.

24. 

A. Middleware is at its basic level a very simple tool for filtering and smoothing data being captured by each RFID reader. As the name implies, it sits between the reader and the application-in the middle-and needs to be specifically written for each reader. It usually sends out data in an XML format to applications such as SAP, Oracle, and other business applications. For more information, see Chapter 8.

25. 

A. Tag data protocols specify the size and structure of the tag memory; tag data formatting and length; and the means of storing, accessing, and transferring information. For more information, see Chapter 9.

26. 

C. ISO/IEC 14443 provides guidelines for RF power, signal interface, transmission protocol, and physical characteristics of proximity cards. Guidelines for animal identifications are set by ISO 11784, ISO 11785, and ISO 14223. The air interface protocol for UHF tags is defined in ISO/IEC 18000-6, and the guidelines for freight containers in ISO 10374. For more information, see Chapter 9.

27. 

B. The most important concern when installing any system should be personnel safety. When you are installing a system, make sure that you appropriately connect and safeguard the electrical equipment so that it cannot harm anyone or cause any trip, fall, or injury hazards. You cannot block any safety devices or exit doors. For more information, see Chapter 9.




CompTIA RFID+ Study Guide Exam RF0-101, includes CD-ROM
CompTIA RFID+ Study Guide Exam RF0-101, includes CD-ROM
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net