Quiz 2 Information Security Fundamentals

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?

Applying security updates promptly

Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?

Bring Your Own Device (BYOD)

With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?

Care of address (COA) < wrong answer Correspondent node (CN) wrong answer

Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?

Collaboration

In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?

Correspondent node (CN)

Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data in aggregate?

Deidentification

Which of the following is NOT one of the four fundamental principles outlined by the Internet Society that will drive the success of Internet of Things (IoT) innovation?

Secure

From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet of Things (IoT)?

Security risks will increase.

Which one of the following is an advantage that the Internet of Things (IoT) brings to economic development for countries?

Technical and industry development

Which one of the following is NOT an example of store-and-forward messaging?

Telephone call

Using Mobile IP, users can move between segments on a local area network (LAN) and stay connected without interruption.

True

Which one of the following is NOT an area of critical infrastructure where the Internet of Things (IoT) is likely to spur economic development in less developed countries?

Water supply management E-commerce <<< Agriculture

A bricks-and-mortar strategy includes marketing and selling goods and services on the Internet.

False

Bricks-and-mortar stores are completely obsolete now.

False

Connectivity is one of the five critical challenges that the Internet of Things (IoT) has to overcome.

False

IoT devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.

False

Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can benefit from traffic-monitoring applications.

False

Store-and-forward communications should be used when you need to talk to someone immediately.

False

The auto industry has not yet implemented the Internet of Things (IoT).

False

Which compliance obligation includes security requirements that apply specifically to federal government agencies in the United States?

Federal Information Security Management Act (FISMA)

Which one of the following governs the use of Internet of Things (IoT) by healthcare providers, such as physicians and hospitals?

Health Insurance Portability and Accountability Act (HIPAA)

Which one of the following is an example of a business-to-consumer (B2C) application of the Internet of Things (IoT)?

Health monitoring ****** Supply chain management

Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?

Interoperability

Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?

Platform as a Service (PaaS) wrong answer

Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

Payment Card Industry Data Security Standard (PCI DSS)

Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.

True

Cars that have Wi-Fi access and onboard computers require software patches and upgrades from the manufacturer.

True

Devices that combine the capabilities of mobile phones and personal digital assistants (PDAs) are commonly called smartphones.

True

E-commerce systems and applications demand strict confidentiality, integrity, and availability (CIA) security controls.

True

Each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.

True

In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.

True

IoT technology has a significant impact on developing economies, given that it can transform countries into e-commerce-ready nations.

True

Metadata of Internet of Things (IoT) devices can be sold to companies seeking demographic marketing data about users and their spending habits.

True

One of the first industries to adopt and widely use mobile applications was the healthcare industry.

True

Some vending machines are equipped with a cellular phone network antenna for secure credit card transaction processing.

True

Unified messaging allows you to download both voice and email messages to a smartphone or tablet.

True


Kaugnay na mga set ng pag-aaral

Language Arts 908 self test 1 study guide

View Set

Health and Human Development Final

View Set

English 12B Unit 4: Imitation of Life (Victorian Period, 1837-1901)

View Set

NU271 Week 6 PrepU: Cellular Regulation

View Set

Business Data Communications & Networking final review

View Set

Hematology Physiology Amboss Q&A

View Set