Chapter 02 Quiz
Which of the following enables businesses to transform themselves into an Internet of Things (IoT) service offering?
Anything as a Service (AaaS) delivery model
Which action is the best step toward protecting Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
Applying security updates promptly
Ron is the IT director at a medium-sized company. He frequently gets requests from employees who want to select customized mobile devices. He decides to allow them to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?
Bring Your Own Device (BYOD)
In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?
Correspondent node (CN)
What term describes data that has been stripped of personally identifiable information for privacy reasons?
De-identified
Which term best describes the sale of goods and services on the Internet, whereby online customers buy those goods and services from a vendor's website and enter private data and checking account or credit card information to pay for them?
E-commerce
True or False? Facility automation uses Internet of Things (IoT) to integrate automation into business functions to reduce reliance on machinery.
False
True or False? Internet of Things (IoT) devices are typically physically secure.
False
True or False? Internet of Things (IoT) devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.
False
True or False? Store-and-forward communications should be used when you need to talk to someone immediately.
False
Which compliance obligation includes security requirements that apply specifically to the European Union?
General Data Protection Regulation (GDPR)
Which of the following would govern the use of Internet of Things (IoT) by health care providers, such as physicians and hospitals?
Health Insurance Portability and Accountability Act (HIPAA)
Which of the following is an example of a business-to-consumer (B2C) application of the Internet of Things (IoT)?
Health monitoring
With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?
Home agent (HA)
Which organization pursues standards for Internet of Things (IoT) devices and is widely recognized as the authority for creating standards on the Internet?
Internet Engineering Task Force (IETF)
Which term best describes how a wide variety of objects, devices, sensors, and everyday items can connect and be accessed?
Internet of Things (IoT)
What is key to implementing a consistent Internet of Things (IoT) device, connectivity, and communications environment?
Interoperability and standards
Gwen's company is planning to accept credit cards over the Internet. What governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?
Payment Card Industry Data Security Standard (PCI DSS)
From a security perspective, what should organizations expect will occur as they become more dependent on the Internet of Things (IoT)?
Security risks will increase.
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?
Software as a Service (SaaS)
Which of the following is not an example of store-and-forward messaging?
Telephone call
With the use of Mobile IP, which device is responsible for assigning each mobile node (MN) a local address?
The FA is a router connected to a network other than the HA network that assigns the MN a local address.
Which of the following is not a market driver for the Internet of Things (IoT)? Smaller and faster computing A decline in cloud computing Advancements in data analytics
There are five key drivers for the IoT: the global adoption of IP-based networking, connectivity everywhere, smaller and faster computing, the growth of cloud computing, and data analytics.
Which of the following is not a market driver for the Internet of Things (IoT)? X Global adoption of Internet Protocol (IP) networking X Smaller and faster computing A decline in cloud computing Advancements in data analytics
There are five key drivers for the IoT: the global adoption of IP-based networking, connectivity everywhere, smaller and faster computing, the growth of cloud computing, and data analytics.
True or False? A challenge created by the Internet of Things (IoT) is how to protect personal identity and private data from theft or unauthorized access.
True
True or False? Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.
True
True or False? Bring Your Own Device (BYOD) often replaces the need for the organization to procure limited mobile device model options and issue them to employees for individual use.
True
True or False? Bring Your Own Device (BYOD) opens the door to considerable security issues.
True
True or False? E-commerce systems and applications demand strict confidentiality, integrity, and availability (C-I-A) security controls.
True
True or False? Each 5G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.
True
True or False? In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.
True
True or False? Internet of Things (IoT) upgrades can be difficult to distribute and deploy, leaving gaps in the remediation of IoT devices or endpoints.
True
True or False? Metadata of Internet of Things (IoT) devices is sometimes sold to companies seeking demographic marketing data about users and their spending habits.
True
True or False? Posting a comment on social media is an example of real-time communication.
True
True or False? Smart cities can monitor and report on real-time traffic conditions using Internet of Things (IoT) technology.
True
True or False? The ownership of Internet of Things (IoT) data, as well as the metadata of that data, is sometimes in question.
True
True or False? Using Mobile IP, users can move between segments on a local area network (LAN) and stay connected without interruption.
True
True or False? Utility companies are incorporating Internet-connected sensors into their business functions.
True
True or False? Vehicles that have Wi-Fi access and onboard computers require software patches and upgrades from the manufacturer.
True
True or False? Vendors or service providers that have remote access to an Internet of Things (IoT) device may be able to pull information or data from your device without your permission.
True