D337 - Internet Of Things and Infrastructure

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What does return on investment (RoI) measure? a) The efficiency or profitability of an investment or the comparison of the efficiency of different investments b) The protection and privacy of data in the European Union c) The administration and management of mobile devices in an organization d) The prevention and mitigation of distributed denial-of-service attacks

A

What does the BSI Kitemark represent? a) A recognizable symbol indicating levels of trust, compliance, security, etc. b) A certification scheme for connected devices c) An international standard for security risk management d) A set of best practice guidelines for IoT security

A

What does the term "edge processing" refer to? a) A process of data aggregation, manipulation, bandwidth reduction, and other logic directly on an IoT sensor or device b) A device that converts an electrical signal into a corresponding physical quantity c) A set of stakeholders that participate in the deployment of IoT technology d) A global network of wired and wireless networks

A

What is the function of soil moisture sensors in a smart agriculture ecosystem? A) Capturing soil moisture metrics B) Processing soil moisture metrics C) Activating sprinklers based on low-soil-moisture metrics D) Transmitting soil moisture metrics to a central network

A

How does the Kappa architecture differ from the Lambda architecture? a) It includes a batch layer b) It does not include a batch layer c) It supports only batch processing d) It supports neither stream nor batch processing

B

A company develops a small tracker to be used in parcels to track progress via Global Positioning System (GPS). Testing reveals that the tracker has a Joint Test Action Group (JTAG) port on the circuit board that can be used to overwrite the firmware on the tracker and provide false location data. Which two Internet of Things Security Foundation (IoTSF) Best Practice Guidelines (BPGs) should this company follow in its design process to ensure security from these forms of attack? Choose 2 answers. 1. Device secure boot 2. Credential management 3. Physical security 4. Application security A) 1, 3 B) 1, 2 C) 2, 3 D) 3, 4

A

What is the main benefit of using vMCM for monitoring physical assets? a) Device-agnostic monitoring and governance b) Improved blockchain processing c) Enhanced mobility management d) Simplified service discovery

A

What is the main function of vMCM in IoT systems? a) To offer digital twin services b) To facilitate blockchain processing c) To manage mobility d) To handle IoT device service discovery

A

Which component in the Lambda architecture acts as the streaming layer in a streaming processing system? A) Real-time engine B) Batch engine C) Serving back-end D) Data storage

A

Which organization has released an IoT Security Assurance Framework of recommended steps for creating secure IoT products and services, principles, and guidelines for best practice guidance for IoT? A) IoT Security Foundation (IoTSF) B) EU Cybersecurity Act C) Standards, governance, and policy (SGP) team D) Industrial Internet Consortium (IIC)

A

Which organization was founded to promote best practices for IoT systems? a) Industrial Internet Consortium (IIC) b) Security Operations Center (SOC) c) Spectrum Streamer d) Lambda Architecture Association

A

Which part of a network is responsible for moving data to and from a sensor or edge device to a backhaul network? a) Access network b) Core network c) Edge network d) Cloud network

A

Which process helps resource-constrained devices that have limited battery, bandwidth, and storage capacity? A) Compression B) Summarization C) Learning and mining D) Dimensionality reduction

A

Which two processor architectures are used by Customer Premises Edge Compute (C-PEC) devices? Choose 2 answers. 1. x86 2. MIPS 3. ARM 4. Itanium A) 1, 3 B) 1, 2 C) 2, 3 D) 3, 4

A

A company hosts a database in a public cloud. Multiple IoT devices are compromised and used to generate a high volume of requests targeting the database to affect its availability. Which type of attack is this? A) Cross-site scripting B) Distributed denial of service (DDoS) C) Spear phishing D) Structured Query Language (SQL) injection

B

Flink is an example of which generation of stream processing systems? a) First-generation b) Second-generation c) Third-generation d) Fourth-generation

B

What is an information consumer? a) An entity that collects data from its own sensor deployments and makes it available to others b) An entity that wants to join the data revolution to build a new application that draws on multiple disparate sources of data c) A type of IoT device that focuses exclusively on data processing d) A computer system or software that can exchange and make use of information

B

What is the essential first step for an information consumer? a) Data aggregation b) Discovery of information c) Building an IoT platform d) Implementing security measures

B

Which solution addresses concerns about confidential data protection when deploying personal devices? A) Security Center B) Mobile device management C) The Software Alliance D) Cyber security

B

Which type of DLT is shared across more than one organization? a) Permissionless DLT b) Federated DLT c) Private DLT d) Public DLT

B

Which vulnerability do IoT botnets target on IoT devices by applying data found on the internet? A) Unencrypted communications B) Default credentials C) Cleartext passwords D) Exposed sensors

B

What is the primary function of Prometheus? a) To enable two-way communication between utilities and customers b) To support a modern laboratory's operations c) To record real-time metrics in a time series database with flexible queries and real-time alerting d) To store and retrieve data in a non-tabular format

C

What is the primary goal of data visualization in stream processing? a) To reduce data storage requirements b) To enhance data security c) To transform data into a visual representation for human consumption d) To increase data transmission speed

C

What is the primary goal of the 2nd wave of IoT development? a) Enhance hardware capabilities b) Improve data collection and processing c) Develop new sensor technologies and deployment protocols d) Improve IoT device security

C

What is the primary mission of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF)? a) Regulating communications across the United States b) Enforcing antitrust law and promoting consumer protection c) Promoting American innovation and industrial competitiveness d) Determining how to treat zero-day computer security vulnerabilities

C

What is the primary purpose of edge computing in the context of the Internet of Things (IoT)? a) To increase the latency in data processing b) To process data remotely in the cloud c) To process data locally on the IoT device or nearby, reducing latency and improving efficiency d) To store and process data exclusively in a centralized data center

C

What is the subset of values called for a particular sensor type that has been retrieved from a particular data entry? A) Journeys B) Datasets C) Metadata D) Sensor data

C

A home appliance manufacturing company wants to invest in IoT and the management is deliberating on different ways to transform their products into a software service by thinking of them as IoT objects. How can the company best enable their own IoT capabilities if reduced time to market is a key factor? A) Create their own software and connectivity systems B) Leverage IoT platforms of other companies C) Leverage fundamental IoT building blocks to create their own IoT solutions from scratch D) Leverage ready-to-use IoT applications

D

A power company integrates 5G in its advanced metering infrastructure as a service (AMIaaS) architecture. The company needs a virtual network function that provides digital ledger functionality. What should this company use? A) Virtual mobility management entity (vMME) B) Virtual authentication, authorization, and accounting (vAAA) C) Virtual machine cloud machine (vMCM) D) Virtual blockchain processing (vBCP)

D

Cloud providers have integrated security into their IoT platform. Which AWS service allows you to audit and monitor IoT configuration of your devices? A) AWS Web Application Firewall (WAF) B) Security Center C) AWS GuardDuty D) AWS IoT Device Defender

D

From the sensors and actuators that are embedded in physical objects, to the wired and wireless networks that are used to connect these devices to the internet, a number of different stakeholders play one or more roles in the IoT ecosystem. Which of the stakeholders in the IoT ecosystem owns the sensor deployments? A) End users B) Platform providers C) Application developers D) Information providers

D

How IoT devices communicate with each other and how they connect to the internet will impact global IoT adoption. Which network allows IoT devices to connect to one another and transfer data over a short distance? A) Wireless metropolitan area network (WMAN) B) Wireless local area network (WLAN) C) Campus area network (CAN) D) Wireless personal area network (WPAN)

D

How can sustainability in cybersecurity be achieved? A) Use the cloud to store data B) Install antivirus software C) Secure the data center D) Use NIST Cybersecurity Framework

D

In 2010, which country was the first nation to recognize IoT as key technology? A) France B) United States C) The Netherlands D) China

D

In the Bt Datahub project, which information class was a collection of sensor-based data aggregation? A) Journeys B) Sensor data C) Geographical features D) Situations

D

What is a node in blockchain? A) Bitcoin B) A type of cryptocurrency C) An exchange D) A computer on a blockchain network

D

What is the main consideration when choosing IoT connectivity for a specific deployment? a) Data rate b) Power availability c) Range d) All of the above

D

What is the purpose of the Industrial Internet Consortium (IIC)? a) To explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT b) To introduce an EU-wide cybersecurity certification framework for ICT products, services, and processes c) To provide a collaborative, nonprofit, international response to the complex challenges posed by cybersecurity in the expansive hyper-connected IoT world d) To promote open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments

D

Which of the following is NOT a main class of information in BT Datahub? a) Sensor data b) Journeys c) Geographical features d) Protocol adapters

D

Which type of IoT detection sensor built into electric bulbs minimizes energy usage? A) Humidity B) Light C) Vibration D) Motion

D

Which type of malware creates a network of remotely controlled IoT devices unknown to the owners? A) Macro B) Cross-site scripting C) Embedded software exploitation D) Botnet

D

How does the processing of IoT data in the cloud change when transitioning from the Lambda architecture to Kappa architecture? A) The batch layer is removed. B) The streaming layer is removed. C) The batch layer replaces the serving layer. D) The streaming layer replaces the serving layer.

A

How does vBCP interact with blockchain infrastructures without requiring mining operations on behalf of compliant devices? a) Through vAAA for blockchain-based identity validation b) Using OAUTH2.0 service c) Leveraging vMME for device registration d) Employing vSON for multihop connectivity

A

How is IoT data generated, managed, and processed in the cloud? a) IoT devices send data to the cloud, where it is stored, managed, and processed by various applications and services for analytics, decision-making, and automation b) IoT data is never sent to the cloud and is only processed locally on the device c) IoT data is generated in the cloud, but processed and managed exclusively on-premises d) IoT data is never generated, managed, or processed, either in the cloud or on-premises

A

How is cybercrime different from cyberwar, espionage, and terrorism? a) Cybercrime generally involves illegal activities for financial gain, while cyberwar, espionage, and terrorism have political, military, or ideological motivations b) Cybercrime is the only type of activity that occurs within cyberspace, while the other activities occur exclusively on the internet c) Cybercrime is a subset of cyberwar, espionage, and terrorism d) Cybercrime, cyberwar, espionage, and terrorism are all synonymous terms and can be used interchangeably

A

In the IoT ecosystem, who are the owners of sensor deployments? a) Information providers b) Platform providers c) Application developers d) End users

A

In the context of IoT, what is the purpose of discovery? a) To identify which aggregators contain information of interest and find specific data sets b) To control access to data provided by information providers c) To enable data communication between IoT devices and platforms d) To reduce the technical barriers faced by both providers and consumers of information

A

In the context of stream data processing, what does "learning" refer to? a) Methods that automate model building from recorded data b) Techniques for reducing the number of dimensions under consideration c) Processes that transform data for human consumption d) Methods for data compression

A

Sensors with computer vision intelligence are embedded in a city's access road surfaces and in CCTV systems to enable drivers to find available parking spaces. Which objective of the World Bank's Sustainable Mobility for All (SuM4All) initiative is being addressed? A) Efficiency B) Green mobility C) Safety D) Universal access

A

Ultra-narrow Band (UNB) systems are particularly suitable for transmitting what kind of data? a) Small amounts of data b) Large amounts of data c) Audio and video data d) Encrypted data

A

What are Sigfox and LoRa primarily designed for? a) Delivering long-range, energy-efficient, low data rates as low-power wide-area networks (LP-WANs) b) Connecting devices within a limited space like a home or office c) Forming a network for interconnecting devices centered around an individual person's workspace d) Connecting colocated computers or other devices based on radio transmissions

A

What are real-time notifications in the context of IoT data processing? a) Detected transmissions that can be used to update spectrum occupancy databases or directly notify other devices that a transmission is happening in a certain channel b) Custom applications developed to subscribe to the output of the spectrum streamer for report generation c) An open-source library used to ingest time, frequency, and energy values of data in real time d) A report delivered by computational statistics of the detected events, primarily targeting human users for report generation

A

What are real-time notifications in the context of spectrum occupancy? a) Updates to databases regarding transmission activity b) Human-readable reports on detected events c) Custom applications for report generation d) Alerts for cybersecurity incidents

A

What are some alternative terms that governments and practitioners might use instead of "cyber"? a) Information systems, digital, or information security b) Cybercrime, cyberwar, and cyberterrorism c) Cyberspace and the internet d) Espionage, terrorism, and sabotage

A

What are some ethical issues posed by IoT? a) Privacy concerns, data ownership, surveillance, and potential misuse of personal information b) Data interoperability and standardization c) The use of common data models and APIs d) The implementation of strong authentication and encryption methods

A

What are some of the major challenges associated with the adoption and implementation of IoT? a) Security, privacy, governance, and standardization b) Decreased connectivity and reduced functionality c) Limited adoption by individuals, businesses, and governments d) The absence of any potential value propositions

A

What are some ways in which IoT devices may connect with the internet? a) Using communication technologies such as Wi-Fi, Bluetooth, cellular networks, and LP-WANs b) Relying exclusively on wired connections c) Utilizing smart environment application architectures d) Implementing hybrid data architecture networks

A

What are supervisory control and data acquisition (SCADA) systems, and what risks do they pose? a) SCADA systems are industrial control systems used to monitor and control critical infrastructure, and they pose risks due to potential cyberattacks that could disrupt essential services b) SCADA systems are consumer-focused IoT devices that pose no risks c) SCADA systems are focused on data interoperability and standardization d) SCADA systems are related to IoT security concepts and terminology

A

What are the four main classes of information in BT Datahub? a) Sensor data, journeys, geographical features, and situations b) Discovery, access control, usage, and data access c) Management, security, storage, and usage d) Protocol adaptation, data transformation, metadata, and dataset

A

What are the functions of the smart environment application architecture? a) To enable IoT systems to monitor, control, and automate processes in various environments, such as homes, offices, and industrial settings b) To reduce the use of digital communication technologies c) To rely exclusively on wired connections for device communication d) To focus on eliminating the need for physical devices

A

What are the key building blocks of IoT? a) Sensors, actuators, connectivity, data processing, and applications b) The exclusive use of wired connections c) The reliance on smart environment application architectures d) The requirements of hybrid data architecture networks

A

What do Standards Development Organizations (SDOs) primarily focus on? a) Formulating health and safety standards b) Developing best practice guidelines for IoT security c) Creating a single EU digital marketplace d) Addressing cybersecurity challenges in the IoT world

A

What do situations in BT Datahub include? a) An aggregation of sensor-based data and other data, as well as interpretation b) Geospatial features with arbitrary associated properties described in metadata c) A key-value pair of data that is relational to the initial query of data from a sensor d) A set of data that describes and presents information about other data

A

What does Customer Premises Edge Compute (C-PEC) refer to? a) A strategy related to computing devices installed on customers' premises or their assets, adjacent to sensors, local area networks (LAN), and IoT objects b) A computing strategy that relies solely on cloud-based resources c) A data storage strategy that focuses exclusively on centralized data centers d) The practice of housing privately-owned servers and networking equipment in a third-party data center

A

What does DCAT stand for, and what is its purpose? a) Data Catalog Vocabulary, a W3C recommendation aimed at facilitating interoperability between data catalogues b) Data Control and Access Technology, a system for managing access control for IoT platforms c) Data Catalog Visualizer, a tool for representing and exposing IoT platform catalogues over Web technologies d) Data Compression and Transformation, a method for reducing technical barriers faced by both providers and consumers of information

A

What does HyperCat facilitate in the IoT ecosystem? a) Representing and exposing IoT platform catalogues over Web technologies b) Facilitating interoperability between data catalogues c) Managing access control for IoT platforms d) Reducing technical barriers faced by both providers and consumers of information

A

What does OECD stand for? a) Organization for Economic Cooperation and Development b) Organization for Efficient Communication and Development c) Office for Economic Collaboration and Development d) Office for Efficient Communication and Development

A

What does Return on Investment (ROI) measure? a) The efficiency or profitability of an investment b) The security posture of an organization c) The performance of stream analytics systems d) The effectiveness of data compression techniques

A

What does an advanced metering infrastructure (AMI) enable? a) Two-way communication between utilities and customers b) Electrical generation and storage by small devices c) Constant replenishment of natural energy sources d) Management of distributed energy resources

A

What enables IoT devices to be infected by the Mirai malware? A) Default passwords B) Plaintext communication C) Stolen certificates D) Cloud storage

A

What is NodeJS primarily used for? a) Javascript for servers b) Flow-based development tool for IoT c) Transforming incoming sensor data or outgoing actuator commands to a common format d) Providing a collection of tools for secure IoT environments

A

What is a botnet? a) A network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker b) A form of malware designed to encrypt files on a device, rendering them unusable c) The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information d) A malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target

A

What is a dataset in the context of IoT data? a) A key-value pair of data that is relational to the initial query of data from a sensor b) A measurement or query of data from a sensor, which is the initial value required for metadata to be gathered c) A set of data that describes and presents information about other data d) An aggregation of sensor-based data and other data, as well as interpretation

A

What is a dataset in the context of IoT data? a) A key-value pair of data that is relational to the initial query of data from a sensor b) A spatiotemporal series of data representing the physical object that data values are being collected from c) A set of data that describes and presents information about other data d) The initial value required for metadata to be gathered

A

What is a distributed denial-of-service (DDoS) attack? a) A malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target b) A strategy to maximize the return on investment in a business venture c) A method of ensuring data protection and privacy within the European Union d) The administration of mobile devices within an organization

A

What is a short-range network technology that supports meshing? A) Zigbee B) Bluetooth C) Sigfox D) Weightless

A

What is an actuator in IoT? a) A device that converts an electrical signal into a corresponding physical quantity b) A sensor that measures temperature c) A component of a network that moves data between sensors and devices d) A platform for managing IoT applications

A

What is batch processing in the context of IoT data processing? a) A process that accumulates new data into disjunctive groups and processes them at a later time, defined by criteria such as batch size or age b) A process that handles each new piece of data immediately, either individually or inside of a rolling window c) A data processing architecture designed to provide both accurate and up-to-date, near-real-time results d) A second-generation stream processing system that utilizes automated scaling

A

What is batch processing? a) A process that accumulates new data into disjunctive groups (i.e., batches) and processes them at a later time, which is defined by criteria such as batch size or age b) A process that handles each new piece of data at the time the data is being created, either individually or inside of a rolling window c) A process that only handles geospatial data d) A process that deals with metadata

A

What is metadata in the context of IoT data? a) A set of data that describes and presents information about other data b) The initial value required for data to be gathered from a sensor c) A key-value pair of data that is relational to the initial query of data from a sensor d) A geospatial feature with arbitrary associated properties described in metadata

A

What is metadata in the context of IoT? a) A set of data that describes and presents information about other data b) A key-value pair of data that is relational to the initial query of data from a sensor c) The primary aim of the data access platform d) The initial value required for metadata to be gathered

A

What is one area where connected devices are being explored for further applications? a) Implanting devices to monitor the human body and collect physiological, biometric, or behavioral data b) Reducing the connectivity and functionality of devices c) Limiting the adoption of IoT by businesses and governments d) Ignoring the need for security, privacy, governance, and standardization

A

What is one challenge that remains in the field of cybersecurity? a) To further clarify the scope and meaning of cyberspace and ensure consistent use of terminology b) To eliminate the use of alternative terms for cybersecurity, such as information security c) To restrict the discussion of cybersecurity to only the United States d) To completely disregard the importance of cyberspace and focus solely on the internet

A

What is one of the main challenges associated with blockchain technology? a) Scalability b) Trust c) Adaptability d) Complete decentralization

A

What is the IIRA? a) A standards-based architectural template and methodology that enables Industrial Internet of Things b) A nonprofit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments c) An initiative by the European Commission to enhance innovation and economic development in the Internet of Things in Europe d) A network of hijacked computers and devices for remote control by a hacker

A

What is the function of the customer edge device in the four-node edge computing model? A) Provides limited local storage and processing capabilities B) Performs data aggregation and reduces transmission costs C) Performs measurements and provides telemetry D) Provides powerful storage and processing capabilities

A

What is the goal of the Internet of Things Security Foundation (IoTSF)? a) To collaborate in addressing complex cybersecurity challenges in the hyper-connected IoT world b) To promote open standards and interoperability for technologies used in industrial and machine-to-machine environments c) To manage the use of personal devices for work purposes d) To evaluate the efficiency or profitability of investments

A

What is the main characteristic of NoSQL databases? a) They are designed for storage and retrieval of data modeled in means other than tabular relations b) They are focused on tabular relations and relational databases c) They are exclusively used for laboratory information systems d) They require the use of the Go programming language

A

What is the main concept behind the Internet of Bodies? a) Connected devices that monitor the human body, collect physiological, biometric, or behavioral data, and exchange information over a wireless or hybrid network b) A network of interconnected industrial machines and computers c) An information space consisting of public resources linked together and accessible via the internet d) The practice of protecting information systems, networks, data, and programs from digital attacks

A

What is the main concept of the IoT ecosystem? a) A set of stakeholders that participate in the deployment of IoT technology and the relationships between them b) A process of data aggregation, manipulation, and other logic directly on an IoT sensor or device c) A device that converts an electrical signal into a corresponding physical quantity d) An information space consisting of public resources linked together and accessible via the internet

A

What is the main difference between permissionless and federated DLTs? a) Permissionless DLTs allow any actor to become a node, while federated DLTs are permissioned and shared across multiple organizations b) Permissionless DLTs are always based on blockchain technology, while federated DLTs are not c) Permissionless DLTs are more secure than federated DLTs d) Federated DLTs allow any actor to become a node, while permissionless DLTs are shared across multiple organizations

A

What is the main difference between the internet and the web? a) The internet is a global network of wired and wireless networks, while the web is an information space consisting of public resources linked together and accessible via the internet b) The internet is a digital currency platform, while the web is a global network of wired and wireless networks c) The internet is an information space consisting of public resources, while the web is a network of interconnected computers, servers, routers, switches, and fiber-optic cables d) The internet is a network of people who manage data, while the web is a combination of hardware, software, and networks that collect, process, store, and distribute data

A

What is the main feature of a wireless local area network (WLAN)? a) A group of colocated computers or other devices that form a network based on radio transmissions rather than wired connections b) A network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges c) A network for interconnecting devices centered around an individual person's workspace d) A device that converts an electrical signal into a corresponding physical quantity

A

What is the main function of access control in IoT platforms? a) To enable information providers to retain control over access to their data b) To identify which aggregators contain information of interest and find specific data sets c) To enable data communication between IoT devices and platforms d) To reduce the technical barriers faced by both providers and consumers of information

A

What is the main function of vMME in IoT systems? a) To register devices to the network and advertise their presence b) To offer digital twin services c) To facilitate blockchain processing d) To handle IoT device service discovery

A

What is the main goal of the NICE initiative? a) To support the United States' ability to address current and future cybersecurity education and workforce challenges b) To develop IoT systems for cybersecurity c) To create a new international cybersecurity standard d) To fund cybersecurity research projects

A

What is the main purpose of the Archetype Query Language (AQL)? a) To express queries for searching and retrieving data in archetype-based repositories b) To build and share solutions to cybersecurity problems faced by U.S. businesses c) To enhance privacy rights and consumer protection for California residents d) To determine how the U.S. federal government should treat zero-day computer security vulnerabilities

A

What is the main purpose of the Industrial Internet Reference Architecture (IIRA)? a) To provide a standards-based architectural template for the Industrial IoT b) To enhance innovation and economic development in IoT c) To explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT d) To address cybersecurity challenges in the hyper-connected IoT world

A

What is the primary focus of industrial IoT? a) Enabling intelligent industrial operations using advanced data analytics for transformational business outcomes b) Connecting all users' personal and home devices c) Generating, storing, and processing data as fixed numbers d) Monitoring the human body and collecting physiological data

A

What is the primary focus of the PETRAS Internet of Things Research Hub? a) To explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT b) To introduce an EU-wide cybersecurity certification framework for ICT products, services, and processes c) To provide a collaborative, nonprofit, international response to the complex challenges posed by cybersecurity in the expansive hyper-connected IoT world d) To promote open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments

A

What is the primary function of an actuator in an IoT system? a) Convert an electrical signal into a corresponding physical quantity b) Aggregate and manipulate data on an IoT sensor or device c) Transmit data between a sensor or edge device and a backhaul network d) Secure IoT data and communications

A

What measures can mitigate security breaches among enterprises and consumers in the IoT context? a) Implementing strong authentication and encryption, regular software updates, and following security best practices b) Ignoring security updates and relying on outdated software c) Focusing solely on proprietary communication protocols d) Discouraging the use of strong authentication and encryption methods

A

What organization does the Cybersecurity Act give a permanent mandate, a strengthened role, and greater operational resources to? a) The European Union Agency for Network and Information Security (ENISA) b) The Internet of Things Security Foundation (IoTSF) c) The PETRAS Internet of Things Research Hub d) The Alliance for Internet of Things Innovation

A

What was the main focus of the first wave of IoT? a) Connecting everyday objects to a network b) Developing new types of sensors c) Data collection and security d) Building IoT ecosystems

A

What will you learn in this unit about cyberspace? a) The basics of cyberspace, how cyberspace is different from the internet, major policy issues affecting cyberspace today, and how cybercrime is different from cyberwar, espionage, and terrorism b) How to implement cybersecurity measures in personal and industrial devices c) The requirements of hybrid data architecture networks d) The functions of the smart environment application architecture

A

Which IoT connectivity technology is suitable for short and mid-range communications and supports mesh networking? a) Zigbee b) LPWAN c) UNB d) Spread spectrum

A

Which IoT connectivity technology is suitable for short and mid-range distances and can form mesh networks? a) Zigbee b) LPWAN c) UNB d) Spread spectrum

A

Which IoT connectivity technology is well-suited for short and mid-range communication and can form a mesh network? a) Zigbee b) LPWAN c) UNB d) Spread spectrum

A

Which country practices cyber sovereignty? A) China B) United States C) The Netherlands D) France

A

Which country was the first to set up a social credit score system that monitors economic and personal behavior, rewards high-scoring individuals and entities, and restricts activities of low-scoring individuals and entities? A) China B) United States C) Brazil D) France

A

Which edge computing node focuses on data aggregation, compression, and transformation? A) Mobile edge computing (MEC) B) Centralized IoT platform C) IoT devices D) Customer edge device

A

Which ethical issue do customers encounter when using social media platforms from their wearable IoT devices to update people about activities? A) Utilizing freedom of expression at the expense of their privacy B) Determining who can purchase their demographic information C) Ensuring personally identifiable information being stored is secure D) Making sure information is not saved locally in plain text

A

Which function is useful for dynamic spectrum scenarios and network management scenarios where information on the current state of the spectrum is exchanged? A) Real-time notifications B) Custom applications C) Spectrum streamer D) Statistical reporting

A

Which language can be used to search data inside openEHR (open electronic health record) repositories? A) Archetype Query Language (AQL) B) Not only SQL (NoSQL) C) Extensible Markup Language (XML) D) Structured Query Language (SQL)

A

Which of the following is a business opportunity presented by the Internet of Things (IoT)? a) Creation of new products and services based on connected devices and data analytics b) Elimination of the need for physical devices c) Reduction in the use of digital communication technologies d) Complete reliance on wired connections for device communication

A

Which of the following is an example of consumer IoT? a) A smart thermostat in a home b) A machine used in a manufacturing plant c) A cybersecurity software application d) A public resource accessible via the internet

A

Which two reductions will occur when autonomous vehicle (AV) usage is widespread? Choose 2 answers. 1. Car prices 2. Congestion 3. Car ownership 4. Emissions A) 2, 4 B) 1, 2 C) 2, 3 D) 3, 4

A

Which two technology areas affect the networking requirements within the customer IoT landscape? Choose 2 answers. 1. Smart roads 2. Smart home 3. Sonography 4. Wearables A) 2, 4 B) 1, 2 C) 2, 3 D) 1, 3

A

Which type of IoT connectivity technology is designed for short and mid-range communication and can create mesh networks? a) Zigbee b) LPWAN c) UNB d) Spread spectrum

A

A company is developing a self-driving car with IoT technology that will generate up to 6 GB of data per second. Which component will analyze the data? A) Centralized server B) Edge computing C) Peer-to-peer network D) Meshed network

B

A university is deploying a smart energy solution to its student dormitories and needs to collect power usage data for billing purposes. Which device should this university use? A) Power measurement and control (PMC) B) Smart meter (SM) C) Intelligent energy device (IED) D) Phasor measurement unit (PMU)

B

An IoT device-manufacturing company recently hired you as a subject matter expert to help their security specialists understand the debates about cyber terminologies. The company felt that a good understanding of these terminologies provides important context as well as the ability to identify and thoughtfully engage with other practitioners, engineers, and policymakers. Which terminology refers to technologies that generate, store, and process data as binary digits or bits in the form of zeroes and ones? A) Internet B) Digital C) Web D) Cyber

B

Beyond the Internet of Things, which transformed the way people live and work by connecting everyday objects to the internet, there is a wide range of connected devices emerging that could be implanted, swallowed, or simply worn to collect a person's physical data. Which term best describes these implanted devices? A) Internet of Things (IoT) B) Internet of Bodies (IoB) C) Internet of Devices (IoD) D) Internet of Everything (IoE)

B

How are IoT devices used by the Chinese government to measure its citizens' social credit score? A) By identifying the brand of products purchased at the market and online B) By tracking compliance with prescribed social and economic obligations C) By calculating the personal time taken off from work activities D) By verifying the number of family members living in a residence

B

How are geographical features represented in the context of IoT data? a) As values (generally numeric) with a time and an optional location b) As geospatial features (e.g., point, line, or polygon) with arbitrary associated properties described in metadata c) As a key-value pair of data that is relational to the initial query of data from a sensor d) As an aggregation of sensor-based data and other data, as well as interpretation

B

How does edge processing benefit IoT devices? a) By enabling the direct conversion of electrical signals into physical quantities b) By reducing data transmission latency and conserving bandwidth through local processing c) By fostering relationships between IoT stakeholders d) By connecting all users' personal and home devices

B

In the context of IoT, what is the primary role of platform providers? a) Producing applications for end users b) Supporting stakeholders by providing a set of functionalities for all to use c) Deploying IoT technology d) Managing IoT ecosystems

B

In the context of IoT, why should facilities be provided by an IoT platform to allow information providers to retain control over access? a) Because information providers always know all potential consumers of their data b) Because information providers generally do not know all potential consumers of their data c) Because information providers want to limit the interoperability of their data d) Because information providers want to increase the technical barriers faced by consumers

B

In the last decade, the focus of IoT has shifted from developing sensors and communication technologies and protocols to data collection, processing, analytics, and management, as well as security, privacy, and trust. Which wave of the IoT is concerned with data collection, processing, and security? A) The first wave of the IoT B) The third wave of the IoT C) The fourth wave of the IoT D) The second wave of the IoT

B

In which of the following scenarios would LP-WANs like Sigfox and LoRa be most suitable? a) Devices that require short-range and high-power consumption b) Devices that need long-range and low-power consumption, especially in dense deployments in cities or buildings c) Devices that focus on high data rates and short-range communication d) Devices that exclusively use wired connections

B

On average, how many days does a data breach generally go undetected? A) 50 days B) 200 days C) 1,000 days D) 5 days

B

There is a wide range of IoT functions, devices, and applications that have the potential to transform so many aspects of our lives, businesses, and government for the better. Which type of IoT is used in smart homes, personal assistants, and wearables? A) Infrastructure IoT B) Consumer IoT C) Commercial IoT D) Industrial IoT

B

What are journeys in the context of IoT data? a) A key-value pair of data that is relational to the initial query of data from a sensor b) A spatiotemporal series of data representing the physical object that data values are being collected from c) A set of data that describes and presents information about other data d) The initial value required for metadata to be gathered

B

What can custom applications be developed for in the context of IoT data processing? a) To update spectrum occupancy databases b) To subscribe to the output of the spectrum streamer for report generation c) To ingest time, frequency, and energy values of data in real time d) To deliver reports based on computational statistics of detected events

B

What does API stand for and what is its purpose? a) Automated Programming Interface; a set of tools to automate software development b) Application Programming Interface; a set of definitions and protocols for building and integrating application software c) Application Processing Interface; a platform for processing and managing software applications d) Automated Processing Interface; a set of tools for managing automated processes in software applications

B

What does BYOD stand for and what does it refer to? a) Business Yearly Operational Data - the annual report of an organization's operational data b) Bring Your Own Device - the trend of employees using personal devices to connect to their organizational networks and access work-related systems and potentially sensitive or confidential data c) Broadband Yearly Output Device - a measure of the total broadband output from devices in a year d) Business Yield Optimization Deployment - a strategy to optimize business returns through the deployment of new technologies

B

What does blockchain implement to ensure reliable data are returned when there are multiple sensors measuring the same data? A) Mega-merger method B) Agreed consensus mechanism C) Shared storage quorum D) Byzantine Paxos algorithm

B

What does the Federal Communications Commission (FCC) regulate? a) Pharmaceuticals and medical devices b) Communications by radio, television, wire, satellite, and cable across the United States c) Federal environmental laws and regulations d) Consumer privacy and protection in the United States

B

What does the Vulnerabilities Equities Process (VEP) determine? a) Privacy rights and consumer protection for California residents b) How the U.S. federal government should treat zero-day computer security vulnerabilities on a case-by-case basis c) Cybersecurity standards for businesses d) The sharing of electronic health records across different healthcare settings

B

What does the term "cyberspace" refer to? a) A global network of satellites b) A network of interconnected computers, servers, routers, switches, and fiber-optic cables c) A secure online storage system for data d) A digital currency platform

B

What does the term "digital" primarily relate to? a) Technologies that use color palettes and visual effects b) Technologies that generate, store, and process data as fixed numbers (binary digits or bits) c) Technologies that focus on audio and video processing d) Technologies that enable wireless communication

B

What is Advanced Metering Infrastructure (AMI) primarily used for? a) Monitoring laboratory operations b) Enabling two-way communication between utilities and customers c) Storing time series data in fields such as IoT sensor data and real-time analytics d) Managing virtual network functions

B

What is Distributed Ledger Technology (DLT)? a) A certification scheme for connected devices b) A decentralized database managed by multiple participants across multiple nodes c) A set of best practice guidelines for IoT security d) A consortium of leading universities for IoT research

B

What is Distributed Ledger Technology (DLT)? a) A technology that distributes copies of a single ledger to multiple locations b) A decentralized database managed by multiple participants across multiple nodes c) A type of database that uses a single central authority to manage all transactions d) A technology that uses blockchain to store encrypted data across a network

B

What is ISO27005? a) A certification scheme for connected devices b) An international standard for security risk management c) A set of best practice guidelines for IoT security d) A symbol indicating levels of trust, compliance, and security

B

What is a key advantage of using Sigfox and LoRa in IoT applications? a) They enable high-speed data transmission for real-time applications b) They facilitate energy-efficient, long-range communication with low data rates c) They provide robust, high-bandwidth connections for data-intensive tasks d) They support direct device-to-device communication without any network infrastructure

B

What is a primary requirement for devices that benefit from Sigfox and LoRa networks? a) Devices need high data rates and short-range communication b) Devices require long-range and low-power consumption c) Devices focus on wired connections and high-speed data transmission d) Devices operate exclusively within an individual's personal workspace

B

What is a use case specific module typically developed for? a) To route the incoming data from other modules based on a set of predefined rules b) To perform a very specific function, such as a video analytics module that processes incoming MP4 or Real-Time Transport Protocol video streams to count vehicles on a road c) To act as an on-board data storage module d) To enable the transformation of incoming sensor data or outgoing actuator commands into a common format

B

What is an Electronic Health Record (EHR)? a) A U.S. government organization that builds and publicly shares solutions to cybersecurity problems b) The electronic, systematized collection of patient and population health information stored in a digital format that can be shared across different healthcare settings c) A declarative query language developed specifically for expressing queries used for searching and retrieving the data found in archetype-based repositories d) A process used by the U.S. federal government to determine how it should treat zero-day computer security vulnerabilities

B

What is an information system? a) A single piece of hardware that processes data b) A combination of hardware, software, and networks that collect, process, store, and distribute data c) A software application that manages data processing d) A group of people who manage data for a company

B

What is blockchain? A) A centralized ledger B) A distributed ledger on a peer-to-peer network C) An exchange D) A type of crypto currency

B

What is stream processing in the context of IoT data processing? a) A process that accumulates new data into disjunctive groups and processes them at a later time, defined by criteria such as batch size or age b) A process that handles each new piece of data immediately, either individually or inside of a rolling window c) A data processing architecture designed to provide both accurate and up-to-date, near-real-time results d) A second-generation stream processing system that utilizes automated scaling

B

What is stream processing? a) A process that accumulates new data into disjunctive groups (i.e., batches) and processes them at a later time, which is defined by criteria such as batch size or age b) A process that handles each new piece of data at the time the data is being created, either individually or inside of a rolling window c) A process that only handles geospatial data d) A process that deals with metadata

B

What is the goal of dimensionality reduction techniques? a) To increase data storage efficiency b) To reduce the number of random variables under consideration c) To improve data transmission speed d) To enhance data visualization

B

What is the initial aspect of interoperability? A) Aggregation B) Discovery C) Data access D) Access control

B

What is the main advantage of using spread spectrum in IoT connectivity? a) Lower power consumption b) Decreased interference and increased security c) Longer range d) Higher data rates

B

What is the main concept behind the Internet of Everything (IoE)? a) Focusing solely on machine-to-machine communications b) Extending IoT to encompass people, processes, and machine-to-machine communications c) Promoting American innovation and industrial competitiveness d) Determining how to treat zero-day computer security vulnerabilities

B

What is the main difference between batch processing and stream processing? a) The size of the data being processed b) The time at which data is processed c) The data's format and structure d) The required bandwidth for data transmission

B

What is the main focus of the PETRAS Internet of Things Research Hub? a) Developing best practice guidelines for IoT security b) Exploring critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT c) Creating a single EU digital marketplace d) Formulating health and safety standards for IoT devices

B

What is the main focus of the second wave of IoT? a) Connecting everyday objects to a network b) Developing new types of sensors and technologies c) Data collection and processing d) Building IoT ecosystems

B

What is the main purpose of Archetype Query Language (AQL)? a) Monitoring people with life-threatening conditions b) Querying and retrieving data from archetype-based repositories c) Providing treatment in specialized hospital wards d) Supporting a modern laboratory's operations

B

What is the main purpose of Spectrum Streamer? a) To improve data storage efficiency b) To ingest time, frequency, and energy values of data in real-time c) To enhance data visualization d) To generate custom applications

B

What is the main purpose of a Smart Meter (SM)? a) To monitor laboratory operations b) To measure energy consumption and communicate the data to utilities c) To store and retrieve time series data in various fields d) To manage virtual network functions

B

What is the primary focus of artificial intelligence (AI)? a) Solving mathematical problems b) Performing tasks that ordinarily require human intelligence c) Managing database systems d) Building electronic devices

B

What is the primary function of an intensive care unit (ICU)? a) Querying and retrieving data from repositories b) Providing treatment and monitoring for people with life-threatening conditions c) Supporting a modern laboratory's operations d) Storing electronic health records

B

What is the primary goal of the National Cybersecurity Center of Excellence (NCCoE)? a) Regulating and enforcing cybersecurity laws in the United States b) Building and publicly sharing solutions to cybersecurity problems faced by U.S. businesses c) Coordinating international cybersecurity efforts and initiatives d) Investigating and prosecuting cybercriminals in the United States

B

What is the primary objective of the Organization for Economic Co-operation and Development (OECD)? a) Advancing military technology b) Stimulating economic progress and world trade c) Managing global health policies d) Promoting renewable energy sources

B

What is the primary purpose of a Laboratory Information System (LIS)? a) To monitor and control renewable energy sources b) To support a modern laboratory's operations through a software-based solution c) To enable two-way communication between utilities and customers d) To store and retrieve time series data in various fields

B

What is the primary role of application developers in the IoT ecosystem? a) Deploying IoT technology b) Producing applications for end users that process available data and provide actionable insights c) Providing a set of functionalities for all stakeholders to use d) Managing IoT ecosystems

B

What is the principal mission of the Federal Trade Commission (FTC)? a) Regulating communications across the United States b) Enforcing civil U.S. antitrust law and promoting consumer protection c) Conducting scientific research in physical sciences d) Enhancing privacy rights and consumer protection for California residents

B

What is the purpose of edge processing in IoT? a) To enhance the security of IoT devices b) To perform data aggregation, manipulation, bandwidth reduction, and other logic directly on an IoT sensor or device c) To connect everyday objects to a network d) To develop new types of sensors and technologies

B

What is the role of a Phasor Measurement Unit (PMU) in the energy sector? a) To support laboratory operations b) To measure electrical waves and provide precise data on grid conditions c) To store and retrieve time series data in various fields d) To manage virtual network functions

B

What is the role of an information broker in an IoT system? a) To route incoming data based on predefined rules b) To store recently received data from sensors or from the cloud or other modules c) To perform a specialist function in the system d) To manage the IoT device's registration and handle security features

B

What is the role of an information consumer in the IoT ecosystem? a) To collect data from their own sensor deployments and make it available to others b) To build a new application that draws on multiple disparate sources of data, identify relevant data, obtain permission to use it, and integrate it into their own development c) To manage access control for IoT platforms d) To perform a specialist function in the system

B

What is the role of data aggregation in the IoT ecosystem? a) It is a core component of interoperability within the ecosystem b) It is the mass collection of information from IoT devices and is a function of the system c) It is a method for discovering information d) It is a primary aim of the data access platform

B

What is the role of the Federal Trade Commission (FTC)? a) Regulating the financial industry and enforcing securities laws in the United States b) Enforcing civil U.S. antitrust law and promoting consumer protection c) Regulating telecommunications and broadcasting industries in the United States d) Protecting the environment and enforcing federal environmental laws in the United States

B

What technology is Node-RED built on? a) Python b) NodeJS c) Java d) C++

B

What type of power does an electric vehicle (EV) use? a) Fossil fuels b) Electricity, either partially or fully c) Nuclear energy d) Water pressure

B

What was the main objective of the Alliance for Internet of Things Innovation, initiated by the European Commission? a) To create a single certification scheme for connected devices b) To enhance innovation and economic development in the IoT in Europe c) To provide a permanent mandate for the European Union Agency for Network and Information Security d) To establish a consortium of leading universities for IoT research

B

Which agency is responsible for regulating communications by radio, television, wire, satellite, and cable across the United States? a) Federal Trade Commission (FTC) b) Federal Communications Commission (FCC) c) National Institute of Standards and Technology (NIST) d) California Consumer Privacy Act (CCPA)

B

Which agency is responsible for regulating pharmaceuticals and medical devices in the United States? a) Federal Communications Commission (FCC) b) Food and Drug Administration (FDA) c) Federal Trade Commission (FTC) d) Environmental Protection Agency (EPA)

B

Which benefit is NOT associated with blockchain technology? a) Trust b) Centralized control c) Security d) Fault tolerance

B

Which blockchain feature in an IoT application ensures that a transaction is tamperproof once it is validated? A) Decentralization B) Immutability C) Auditability D) Resilience

B

Which factors does colocation capitalize on to create the most effective outcome for end users? A) Security, privacy, and reliability B) Distance, latency, and solution complexity C) Reliability, privacy, and latency D) Privacy, data retention, and distance

B

Which frequency band is commonly used for LPWAN technologies in the European Union? a) 2.4 GHz b) 868 MHz c) 915 MHz d) 1 GHz

B

Which group was founded by ATT, Cisco, General Electric, Intel, and IBM in 2014 to bring together organizations and technologies to promote best practices for IoT systems? A) Industrial Internet Reference Architecture (IIRA) B) Industrial Internet Consortium (IIC) C) Standards developments organizations (SDOs) D) Alliance for Internet of Things Innovation (AIOTI)

B

Which module in the edge computing framework is used to store IoT data received from sensors or from the cloud? A) Protocol adapter B) Information broker C) Rules engine D) Case specific

B

Which module within the edge computing framework supports the functionality to route incoming data from other modules based on a predetermined ruleset? A) Use case specific module B) Rules engine C) Information broker D) Protocol adapter

B

Which of the following IoT connectivity technologies operates in the ISM (Industrial, Scientific, and Medicine) band? a) Zigbee b) LPWAN c) UNB d) Spread spectrum

B

Which task does an information consumer perform within an IoT ecosystem? A) Collects data from their sensors and shares it based on terms and conditions B) Builds applications that use data from various sources after obtaining consent C) Identifies risks by communicating with the data owner for risk management D) Maintains backups of the data collected from the sensors for disaster recovery

B

Which term refers to electrical generation and storage performed by small, grid-connected devices? a) Laboratory Information System (LIS) b) Distributed Energy Storage (DES) c) Renewable Energy Source (RES) d) Virtual Network Function (VNF)

B

Which two issues can result from global deployment of insecurely configured IoT devices? Choose 2 answers. 1. Devices are compromised to provide fake data 2. Device hardware is attacked until destroyed 3. Devices are compromised to form botnets 4. Device software is built into a sandbox environment A) 2, 3 B) 1, 3 C) 3, 4 D) 2, 4

B

Which type of network is most suitable for connecting devices within a limited space like a home or office? a) Long-range low-power wide-area network (LP-WAN) b) Wireless local area network (WLAN) c) Wireless personal area network (WPAN) d) IoT ecosystem network

B

Which type of stream data processing system is more suitable for streaming data as it does not enforce a relational view? a) Systems based on existing relational database principles b) Systems that enable the creation of custom operators that consume and transform data streams c) Systems that focus on data compression and dimensionality reduction d) Systems that prioritize data summarization and visualization

B

Why is stream analytics important for sensing the radio frequency electromagnetic spectrum? a) To improve data compression b) To monitor frequency and energy values in real-time c) To enhance data security d) To generate human-readable reports

B

A company plans to adopt IoT into its business operations and then go public. The company is concerned about the financial and reputational impact of increasing the volume of personally identifiable information (PII) that might inadvertently be exposed, which would affect the value of its stock. Which two considerations should be addressed as part of the adoption strategy? Choose 2 answers. 1. Governance 2. Privacy 3. Security 4. Standardization A) 1, 2 B) 1, 3 C) 2, 3 D) 3, 4

C

An electric utility company needs to increase the speed of the collection and improve the accuracy of the information it manually collects from its meters. The meters are located in the back of residential dwellings. Which solution meets both requirements? A) Move meters to the front of every building B) Have another person verify the data from the meters C) Install a sensor on meters that can transmit data to a receiver D) Change the analog meters to a digital display

C

How can geographical features be represented? a) As situations information class b) As sensor data c) As geospatial features (e.g., point, line, or polygon) with arbitrary associated properties described in metadata d) As journeys

C

How can journeys be represented? a) As situations information class b) As sensor data c) As geospatial features (e.g., point, line, or polygon) with arbitrary associated properties described in metadata d) As geographical features

C

In which frequency band does the Weightless IoT connectivity technology operate? a) 868 MHz b) 915 MHz c) 2.4 GHz d) 1 GHz

C

What is compression in the context of data analysis? a) Techniques that reduce the number of random variables under consideration b) Methods that automate model building from recorded data sets c) Operations performed on data to reduce the occupied space for storing and reduce the required bandwidth for transmitting d) Processes of transforming data into a representation that best describes the time series under consideration to human and machine data consumers

C

What is the goal of the National Initiative for Cybersecurity Education (NICE)? a) To promote international collaboration in cybersecurity b) To create new cybersecurity technologies c) To support the United States' ability to address current and future cybersecurity education and workforce challenges through standards and best practices d) To regulate the cybersecurity industry

C

What is the main advantage of the Lambda architecture in data processing? a) It supports only stream processing b) It supports only batch processing c) It supports both stream and batch processing d) It eliminates the need for data storage

C

What is the main function of the National Institute of Standards and Technology (NIST)? a) Regulating communications across the United States b) Enforcing antitrust law and promoting consumer protection c) Conducting scientific research in physical sciences and technology d) Enhancing privacy rights and consumer protection for California residents

C

What is the main goal of the Internet of Things Security Foundation (IoTSF)? a) To provide a standards-based architectural template for the Industrial IoT b) To establish a consortium of leading universities for IoT research c) To address cybersecurity challenges in the hyper-connected IoT world d) To enhance innovation and economic development in the IoT in Europe

C

What is the most challenging task in health informatics? A) Data storage B) Compliance C) Data curation D) Privacy

C

What is the name of the motor vehicle operating technique when drivers avoid unnecessary acceleration and braking, shift gears early to minimize revs, and drive at optimal speeds? A) Heel-and-toe shifting B) Defensive driving C) Eco driving D) Rash driving

C

What is the name of the process in which data is accumulated into disjunctive groups? A) Flink B) Lambda C) Batch processing D) Stream processing

C

What is the primary advantage of Flink as a stream processing system? a) Enhanced data security b) Improved data compression capabilities c) Automated scaling d) Faster data transmission speeds

C

What is the primary aim of the data access platform? a) To focus solely on data aggregation b) To discover information from various sources c) To reduce the technical barriers faced by both providers and consumers of information in which they have a shared interest d) To identify potential consumers of data

C

Which IoT connectivity technology is named after the company that owns it and operates in narrowband? a) Zigbee b) LoRaWAN c) Sigfox d) Weightless

C

Which IoT connectivity technology is particularly suitable for small amounts of data due to its ultra-narrow bandwidth? a) Zigbee b) LPWAN c) UNB d) Spread spectrum

C

Which U.S. government entity has the authority to penalize firms that imply or advertise use of certain cybersecurity practices, but in fact are not following the rules and, thus, violate consumers' privacy rights? A) California Consumer Privacy Act (CCPA) B) National Institute of Standards and Technology (NIST) C) Federal Trade Commission (FTC) D) Federal Communications Commission (FCC)

C

Which agency publishes the Cybersecurity Framework (CSF)? A) Federal Communications Commission (FCC) B) Federal Trade Commission (FTC) C) National Institute of Standards and Technology (NIST) D) American National Standards Institute (ANSI)

C

Which two stakeholder groups contribute to addressing the challenges of IoT security? Choose 2 answers. 1. Governments 2. Universities 3. Standards development bodies 4. Law enforcement organizations A) 2, 3 B) 1, 2 C) 1, 3 D) 1, 4

C

What does statistical reporting refer to in the context of IoT data processing? a) Updating spectrum occupancy databases in real time b) Subscribing to the output of the spectrum streamer for custom application development c) Ingesting time, frequency, and energy values of data using the spectrum streamer d) A report delivered by computational statistics of the detected events, primarily targeting human users for report generation

D

What is Flink in the context of IoT data processing? a) A process that accumulates new data into disjunctive groups and processes them at a later time, defined by criteria such as batch size or age b) A process that handles each new piece of data immediately, either individually or inside of a rolling window c) A data processing architecture designed to provide both accurate and up-to-date, near-real-time results d) A second-generation stream processing system that utilizes automated scaling

D

What is sensor data in the context of IoT data? a) A key-value pair of data that is relational to the initial query of data from a sensor b) A spatiotemporal series of data representing the physical object that data values are being collected from c) A set of data that describes and presents information about other data d) The initial value required for metadata to be gathered

D

What is summarization in the context of data analysis? a) Techniques that reduce the number of random variables under consideration b) Methods that automate model building from recorded data sets c) Operations performed on data to reduce the occupied space for storing and reduce the required bandwidth for transmitting d) Processes of transforming data into a representation that best describes the time series under consideration to human and machine data consumers

D

What is the function of a rules engine? a) To perform a very specific function, such as video analytics b) To act as an on-board data storage module c) To enable the transformation of incoming sensor data or outgoing actuator commands into a common format d) To route the incoming data from other modules based on a set of predefined rules

D

What is the function of an information provider in an IoT ecosystem? A) To identify relevant data, obtain permission to use it, and integrate it into their own development B) To join the data revolution and build a new application that draws on multiple disparate sources of data C) To produce economies of scale for the IoT ecosystem D) To collect data from its network of sensors and to make this information available to others for consumption

D

What is the purpose of a protocol adapter? a) To perform a very specific function, such as video analytics b) To route the incoming data from other modules based on a set of predefined rules c) To act as an on-board data storage module d) To enable the transformation of incoming sensor data or outgoing actuator commands into a common format

D

A city plans for an Intelligent Transport System (ITS) that monitors public transport locations, as well as accidents and congestions, to control traffic lights effectively. Which two items should be used to gather information for the system? Choose 2 answers. 1. GPS devices 2. Smart CCTV cameras 3. Smart meters 4. Intraocular devices A) 1, 2 B) 1, 3 C) 2, 3 D) 3, 4

A

A company implements an IoT 5G smart grid to improve resiliency within its power grid. The company installs the virtual machine cloud machine (vMCM) function. Why is the vMCM function installed? A) To monitor devices and cache information about daily consumption B) To validate device identity to the gateway without mining operations C) To verify the identity of a device with the OAuth2.0 service D) To locate devices that provide a specific utility with OpenId Connect

A

A company is developing a garage door sensor that stores data defining when the owner is home or away and when the garage door is open or closed. The company needs to ensure the data is stored in a secure manner. What should this company be concerned about regarding the storage of user information? A) Mishandling stored user information will lead to privacy issues. B) Securing stored user information will affect the garage door sensor's functionality. C) Connecting the garage door sensor to private networks will affect stored data. D) Caching garage door sensor data at the edge will lead to governance issues.

A

A company is developing a smart speaker. The company wants to review industry standards on device boot and operating system security to improve security in its devices. Which two resources should this company evaluate? Choose 2 answers. 1. Code of Practice 2. Best Practice Guidelines 3. Human-in-the-loop 4. Internet of Bodies A) 1, 2 B) 1, 3 C) 3, 4 D) 2, 4

A

A hospital unit takes care of high-risk patients who require constant monitoring through IoT devices. Which condition identifies an actual emergency? A) True positives B) True negatives C) False positives D) False negatives

A

A hospital uses legacy sensors to collect patients' data in its intensive care unit (ICU). The hospital deploys a network data aggregator in accordance with the principles of the openEHR (electronic health record) model. What is the primary implication of this approach? A) Eliminates the need to tamper with ICU sensors B) Introduces the need to tamper with ICU sensors C) Provides automatic access of patients' data to researchers D) Transitions ownership of patients' data to researchers

A

A range of technology and networking options is used to connect different devices and sensors used in implementing IoT solutions. Which technologies could be leveraged in the IoT solution to deliver a short-range, energy-efficient, and high data rate? A) Bluetooth and ZigBee B) Sigfox and LoRa C) Extended Coverage-GSM (EC-GSM) and Narrow Band (NB-IoT) D) Wi-Fi

A

After the hardware-related breakthrough that connected physical objects to the internet, new communication technologies and protocols were developed to support the ubiquitous deployment of a wide variety of sensors. Which wave of the IoT focused on developing new types of sensors and new technologies and protocols to support their deployment? A) The second wave of the IoT B) The first wave of the IoT C) The fourth wave of the IoT D) The third wave of the IoT

A

Despite the challenges, who is taking advantage of the opportunities offered by IoT? a) Individuals, businesses, and governments b) Only individual users c) Only businesses d) Only governments

A

How are journeys represented in BT Datahub? a) As geospatial features (e.g., point, line, or polygon) with arbitrary associated properties described in metadata b) As a key-value pair of data that is relational to the initial query of data from a sensor c) As a set of data that describes and presents information about other data d) As an aggregation of sensor-based data and other data, as well as interpretation

A

How do IoT platforms support data interoperability? a) By providing standardized protocols, data models, and APIs that allow different devices and systems to communicate and share data b) By restricting the communication between devices from different manufacturers c) By focusing solely on proprietary communication protocols d) By discouraging the use of common data models and APIs

A

How does blockchain enable trust in IoT devices and applications? a) By providing a decentralized, tamper-resistant ledger for secure data storage and transactions between IoT devices b) By centralizing all IoT data on a single server, making it easier to manage c) By discouraging the use of encryption and authentication methods d) By promoting the exclusive use of proprietary communication protocols and data models

A

In the IoT ecosystem, what is the role of an information provider? a) To collect data from their own sensor deployments and make it available to others under appropriate terms and conditions b) To build a new application that draws on multiple disparate sources of data c) To manage access control for IoT platforms d) To perform a specialist function in the system

A

In the context of IoT, what does LPWAN stand for? a) Low Power Wide Area Network b) Large Processing Wireless Access Network c) Limited Power Wideband Area Network d) Local Protocol Wireless Area Network

A

What are the characteristics and requirements of a hybrid (on-premises and cloud) data architecture network? a) It combines on-premises and cloud-based resources, allowing for more flexibility, scalability, and efficient data management b) It relies solely on cloud-based resources for all data storage and processing needs c) It utilizes only on-premises resources for data storage and processing d) It does not allow any data storage or processing, either on-premises or in the cloud

A

What are the foundational IoT security concepts and terminology? a) Confidentiality, integrity, and availability b) Proprietary communication protocols and data models c) On-premises and cloud-based data storage d) Data interoperability and standardization

A

What are the main components of an IoT device's sensing, reasoning, and actuation process? a) Collecting data from the environment, processing and analyzing the data, and taking action based on the analysis b) Connecting with the internet via various communication technologies c) Implementing smart environment application architectures d) Utilizing hybrid data architecture networks

A

What are the requirements of a hybrid data architecture network? a) To support multiple types of data storage, processing, and analytics while integrating various data sources and tools b) To rely solely on wired connections for device communication c) To focus on reducing the functionality of devices d) To eliminate the need for physical devices

A

What are the three main aspects of interoperability in IoT platforms? a) Discovery, access control, and usage b) Sensor data, metadata, and dataset c) Management, security, and storage d) Protocol adaptation, data transformation, and data access

A

What are the three main aspects of interoperability in the context of IoT? a) Discovery, access control, and data access b) Metadata, dataset, and sensor data c) Information provider, information consumer, and information broker d) Management, security, and use case-specific

A

What are the two distinct service modes offered by vAAA? a) Blockchain-based and OAUTH2.0 service b) Blockchain-based and IoT service discovery c) OAUTH2.0 service and IoT service discovery d) Blockchain-based and virtual mobility management

A

What communication technologies are commonly used in IoT? a) Wi-Fi, Bluetooth, cellular networks, and LP-WANs (such as Sigfox and LoRa) b) Exclusive reliance on wired connections c) Hybrid data architecture networks d) Smart environment application architectures

A

What does colocation refer to? a) The practice of housing privately-owned servers and networking equipment in a third-party data center b) A computing strategy that relies solely on cloud-based resources c) The installation of computing devices on customers' premises or their assets, adjacent to sensors, local area networks (LAN), and IoT objects d) A data storage strategy that focuses exclusively on centralized data centers

A

What does compliance with IoT-related regulations, protocols, standards, and laws entail? a) Adhering to relevant industry standards, data protection laws, and best practices to ensure the security, privacy, and ethical use of IoT devices and data b) Ignoring any IoT-related regulations and protocols c) Focusing solely on proprietary communication protocols d) Avoiding the use of common data models and APIs

A

What does mobile device management (MDM) software enable IT administrators to do? a) Control, secure, and enforce policies on smartphones, tablets, and other endpoints b) Monitor events and configure the system c) Evaluate the efficiency or profitability of investments d) Prevent and mitigate distributed denial-of-service attacks

A

What does the EU Cybersecurity Act introduce? a) An EU-wide cybersecurity certification framework for ICT products, services, and processes b) A collaborative, nonprofit, international response to the complex challenges posed by cybersecurity in the expansive hyper-connected IoT world c) A consortium of nine leading UK universities that work together to explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT d) A nonprofit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments

A

What is a characteristic of Ultra-narrow Band (UNB) systems? a) Transmitting signals in a small amount of spectrum, usually less than 1 kHz b) Using a bandwidth much larger than the original frequency c) Connecting everyday objects to a network d) Utilizing mesh networks for connectivity

A

What is a common application of an actuator in IoT devices? a) Controlling the temperature in a smart thermostat b) Transmitting data over a wireless network c) Reducing bandwidth consumption on an IoT sensor d) Facilitating relationships between IoT stakeholders

A

What is dimensionality reduction in the context of data analysis? a) Techniques that reduce the number of random variables under consideration b) Methods that automate model building from recorded data sets c) Operations performed on data to reduce the occupied space for storing and reduce the required bandwidth for transmitting d) Processes of transforming data into a representation that best describes the time series under consideration to human and machine data consumers

A

What is edge computing? a) A model that provides data processing geographically close to assets such as sensors, actuators, IoT objects, and humans b) A computing model that relies solely on centralized data centers for data processing c) A data storage strategy that focuses exclusively on cloud-based resources d) The practice of housing privately-owned servers and networking equipment in a third-party data center

A

What is interoperability? a) The ability of computer systems or software to exchange and make use of information b) An entity that wants to join the data revolution to build a new application that draws on multiple disparate sources of data c) An entity that collects data from its own sensor deployments and makes it available to others under appropriate terms and conditions d) A type of IoT device that focuses exclusively on data processing

A

What is the Internet of Things (IoT)? a) A network of interconnected physical devices that communicate and exchange data with each other, enabling greater connectivity and functionality b) A term used to describe the internet and cyberspace interchangeably c) A network that connects only personal and home devices d) A network that solely focuses on industrial operations

A

What is the meaning of sensor data in the context of IoT? a) A measurement or query of data from a sensor, which is the initial value required for metadata to be gathered b) A set of data that describes and presents information about other data c) A key-value pair of data that is relational to the initial query of data from a sensor d) An aggregation of sensor-based data and other data, as well as interpretation

A

What is the primary advantage of using spread spectrum technology in IoT? a) Decreasing interference and increasing security b) Transmitting signals in a small amount of spectrum c) Connecting everyday objects to a network d) Developing new types of sensors and technologies

A

What is the primary aim of the data access platform in IoT systems? a) To reduce the technical barriers faced by both providers and consumers of information in which they have a shared interest b) To identify which aggregators contain information of interest and find specific data sets c) To control access to data provided by information providers d) To enable data communication between IoT devices and platforms

A

What is the primary aim of the data access platform in IoT? a) To reduce the technical barriers faced by both providers and consumers of information in which they have a shared interest b) To facilitate interoperability between data catalogues c) To manage access control for IoT platforms d) To represent and expose IoT platform catalogues over Web technologies

A

What is the primary characteristic of a long-range low-power wide-area network (LP-WAN)? a) A network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges, often delivered through cellular networks b) A group of colocated computers or other devices that form a network based on wired connections c) A network for interconnecting devices centered around an individual person's workspace d) A network of interconnected industrial machines and computers

A

What is the primary function of an actuator? a) To convert an electrical signal into a corresponding physical quantity such as movement, force, or sound b) To connect personal and home devices in a network c) To monitor the human body and collect physiological data d) To enable intelligent industrial operations using advanced data analytics

A

What is the primary function of mobile device management (MDM)? a) The administration of mobile devices, such as smartphones, tablet computers, and laptops b) To prevent and mitigate distributed denial-of-service attacks c) To evaluate the efficiency or profitability of investments d) To monitor and improve an organization's security posture

A

What is the primary function of ransomware? a) To encrypt files on a device, rendering them unusable b) To send emails purporting to be from reputable companies to induce individuals to reveal personal information c) To disrupt the normal traffic of a targeted server, service, or network by overwhelming the target d) To create a network of hijacked computers and devices for remote control by a hacker

A

What is the primary function of standards development organizations (SDOs)? a) To work on formulating health and safety standards b) To address cybersecurity challenges in the IoT world c) To manage the use of personal devices for work purposes d) To promote open standards and interoperability for technologies used in industrial and machine-to-machine environments

A

What is the primary function of vTSD in IoT systems? a) To handle IoT device service discovery b) To offer digital twin services c) To facilitate blockchain processing d) To manage device mobility

A

What is the primary goal of cyber security? a) The protection of computer systems and networks from information disclosure, theft, or damage to their hardware b) To manage the use of personal devices for work purposes c) To evaluate the efficiency or profitability of investments d) To monitor events and configure the system in one place

A

What is the primary purpose of a Virtual Network Function (VNF) in the context of telecommunication networks? a) To replace physical network appliances with software-based solutions b) To enable two-way communication between utilities and customers c) To store and retrieve time series data in various fields d) To measure energy consumption and communicate the data to utilities

A

What is the primary role of the vBCP in IoT systems? a) To provide a gateway to blockchain infrastructures b) To deliver AAA services c) To register devices to the network d) To enable multihop and multiprotocol connectivity of IoT devices

A

What is the primary target audience for statistical reporting in stream analytics? a) Human users b) Custom applications c) Spectrum Streamer subscribers d) Security operations centers

A

What is the purpose of a security operations center (SOC)? a) To continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents b) To ensure data protection and privacy in the EU and the European Economic Area c) To manage the use of personal devices for work purposes d) To evaluate the efficiency or profitability of an investment

A

What is the purpose of data compression in stream processing? a) To reduce storage space and transmission bandwidth requirements b) To increase the accuracy of data analysis c) To speed up data processing d) To enhance data security

A

What is the purpose of the Industrial Internet Consortium (IIC)? a) To promote open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments b) To provide a standards-based architectural template and methodology for the Industrial Internet of Things c) To enhance innovation and economic development in the Internet of Things in Europe d) To create a network of hijacked computers and devices for remote control by a hacker

A

What is the purpose of the IoT Runtime Environment (IRE)? a) To enable remote management of information flows between multiple IoT applications and external endpoints b) To manage the initial device configuration and on-going management c) To provide a secure environment with tools like identity access management (IAM) and secure boot d) To enable Javascript for servers

A

What is the purpose of vSON in IoT systems? a) To enable multihop and multiprotocol connectivity of IoT devices without direct access to 5G networking b) To manage device mobility c) To discover IoT device services d) To facilitate blockchain processing

A

What is the regulation in European Union (EU) law that addresses data protection and privacy in the European Union? A) General Data Protection Regulation (GDPR) B) Federal Communications Commission (FCC) C) Federal Trade Commission (FTC) D) National Institute of Standards and Technology (NIST)

A

What is the spectrum streamer? a) A streaming architecture and an open-source library used to ingest time, frequency, and energy values of data in real time b) A custom application developed for subscribing to output data c) A real-time notification system for IoT devices d) A statistical reporting method for IoT data

A

What is the standard operating system for Customer Premises Edge Compute (C-PEC) devices that can be deployed on a range of platforms? A) Linux B) Docker Swarm C) Kubernetes D) Windows

A

What is the type of attack when many devices simultaneously send streams of data packets to the same site, overwhelming it and causing it to crash? A) Distributed denial-of-service (DDoS) B) Phishing C) Ransomware D) Botnet

A

What moves data from IoT sensor devices to a central network? A) Gateway B) Actuator C) Application server D) Proxy server

A

Which IoT technology is characterized by higher throughput and lower battery life compared to NB-IoT? a) LTE-M b) Extended coverage c) 5G d) URLLC

A

Which IoT-optimized GSM network deployment can be achieved with a software upgrade? a) Extended coverage b) Narrow band Internet of Things (NB-IoT) c) LTE-M d) 5G

A

Which U.S. government entity is proposing a policy that requires manufacturers to enforce minimum security standards for their IoT devices? A) Federal Trade Commission (FTC) B) National Institute of Standards and Technology (NIST) C) California Consumer Privacy Act (CCPA) D) Federal Communications Commission (FCC)

A

Which act is central to the European Union's approach to IoT security? a) The Cybersecurity Act b) The IoT Security Enhancement Act c) The IoT Privacy and Trust Act d) The European Union IoT Security Act

A

Which company established the trade group known as the Software Alliance or BSA? a) Microsoft b) Apple c) Google d) IBM

A

Which type of network would be most suitable for connecting IoT devices over long distances with low power requirements? a) Long-range low-power wide-area network (LP-WAN) b) Wireless local area network (WLAN) c) Wireless personal area network (WPAN) d) Actuator-based network

A

Who are some of the stakeholders in the Internet of Things (IoT)? a) Device manufacturers, software developers, service providers, end-users, and regulators b) Actuators, sensors, and edge processing devices c) Hybrid data architecture networks d) Smart environment application architectures

A

Who founded the Industrial Internet Consortium (IIC)? a) ATT, Cisco, General Electric, Intel, and IBM b) Google, Amazon, Microsoft, Facebook, and Apple c) Oracle, SAP, Salesforce, Adobe, and Autodesk d) Samsung, LG, Sony, Panasonic, and Toshiba

A

After extensive market and industry research, the home appliance manufacturing company could not find ready-made IoT applications that fit its needs and decided to build its own IoT applications from scratch. Which approach should the company take to achieve this objective? A) Leverage IoT platforms of other companies B) Leverage other companies' hardware, software, connectivity systems, and other fundamental building blocks C) Create their own software and connectivity systems D) Leverage ready-to-use IoT applications unanswered

B

At the present moment, which geographic region has the highest number of IoT devices installed? A) France B) North America C) United Kingdom D) South America

B

How do machine learning (ML) systems learn and adapt? a) By following explicit instructions b) Using algorithms and statistical models to analyze and draw inferences from patterns in data c) Through trial and error methods d) By observing human behavior

B

What are learning and mining in the context of data analysis? a) Techniques that reduce the number of random variables under consideration b) Methods that automate model building from recorded data sets c) Operations performed on data to reduce the occupied space for storing and reduce the required bandwidth for transmitting d) Processes of transforming data into a representation that best describes the time series under consideration to human and machine data consumers

B

What does LPWAN stand for? a) Long Power Wireless Area Network b) Low Power Wireless Area Network c) Large Power Wireless Area Network d) Limited Power Wireless Area Network

B

What does information and communication technology (ICT) emphasize? a) Separating telecommunications and computers b) The role of unified communications and the integration of telecommunications and computers c) The importance of software development only d) The creation of new technology devices

B

What does sensor data consist of? a) Only geospatial features with arbitrary associated properties described in metadata b) Values (generally numeric), each with a time and an optional location c) Only situations information class d) Only journeys

B

What does the California Consumer Privacy Act (CCPA) aim to enhance? a) Cybersecurity standards for businesses b) Privacy rights and consumer protection for California residents c) The sharing of electronic health records d) The treatment of zero-day computer security vulnerabilities

B

What does the abbreviation IED stand for in the context of energy management? a) Internet of Energy Devices b) Intelligent Energy Device c) Integrated Energy Distribution d) InfluxDB Energy Device

B

What does the situations information class typically include? a) Only sensor-based data b) An aggregation of sensor-based data and other data, as well as an interpretation, relevant to a time period and some specified locations c) Only geospatial features with arbitrary associated properties described in metadata d) Only values with a time and an optional location

B

What does the term "consumer IoT" mainly refer to? a) A global network of wired and wireless networks b) Users' networks around their personal and home devices c) Machines and computers used in industrial operations d) Connected devices that monitor the human body

B

What is a time series database (TSDB) that can continuously ingest and transform hundreds of millions of time series per second? A) CosmosDB B) InfluxDB C) Aurora D) DynamoDB

B

What is the Prometheus tool used for? A) Project management B) Event monitoring and alerting C) New feature requests D) Bug tracking

B

What is the main function of a Security Center? a) To evaluate the efficiency or profitability of investments b) To monitor events and configure your system in one place c) To manage the use of personal devices for work purposes d) To prevent and mitigate distributed denial-of-service attacks

B

What is the main function of a Security Operations Center (SOC)? a) To promote open standards and interoperability b) To continuously monitor and improve an organization's security posture c) To develop custom applications for report generation d) To evaluate the efficiency of different investments

B

What is the main goal of cybersecurity? a) To make sure the internet is always accessible b) To protect information systems, networks, data, and programs from digital attacks c) To connect all the computers in the world d) To collect, process, store, and distribute data

B

What is the main purpose of a rules engine in an IoT system? a) To manage the IoT device's registration and handle security features b) To route incoming data from other modules based on predefined rules c) To store recently received data from sensors or from the cloud or other modules d) To perform a specialist function in the system

B

What is the main purpose of distributed energy storage (DES)? a) Facilitating two-way communication between utilities and customers b) Generating and storing electricity using small, grid-connected or distribution system-connected devices c) Ensuring natural energy sources are constantly replenished d) Managing communications networks and data management systems

B

What is the main purpose of edge processing in IoT? a) To improve network security b) To aggregate and manipulate data directly on the IoT device c) To increase the range of IoT devices d) To reduce the cost of IoT deployments

B

What is the main purpose of the Industrial Internet Consortium (IIC)? a) To evaluate the efficiency or profitability of investments b) To promote open standards and interoperability for technologies used in industrial and machine-to-machine environments c) To manage the use of personal devices for work purposes d) To address cybersecurity challenges in the IoT world

B

What is the main purpose of the National Cybersecurity Center of Excellence (NCCoE)? a) To develop the Archetype Query Language (AQL) b) To build and share solutions to cybersecurity problems faced by U.S. businesses c) To determine how the U.S. government should treat zero-day computer security vulnerabilities d) To manage electronic health records in the United States

B

What is the primary function of a protocol adapter in IoT systems? a) To enable remote management of information flows b) To transform incoming sensor data or outgoing actuator commands to a common format c) To manage the initial device configuration and on-going management d) To provide a secure environment for IoT devices

B

What is the primary function of an access network in an IoT system? a) To store data collected by IoT devices b) To move data between a sensor or edge device and a backhaul network c) To process data on the IoT device d) To transmit data wirelessly over long distances

B

What is the purpose of phishing? a) To encrypt files on a device, rendering them unusable b) To send emails purporting to be from reputable companies to induce individuals to reveal personal information c) To disrupt the normal traffic of a targeted server, service, or network by overwhelming the target d) To create a network of hijacked computers and devices for remote control by a hacker

B

What is the purpose of the consensus mechanism enabled through blockchain when collecting the same signals from multiple IoT sensors? A) Ensuring that data from each sensor is treated equally B) Providing a single version of the truth across all sensor data C) Identifying a single sensor with the most accurate data D) Verifying data from sensors by a central authority

B

What is the result of switching from the industrial, scientific, and medical (ISM) frequency above 1 GHz to the ISM frequency below 1 GHz? A) Lower cost B) Longer range C) Higher data rate D) Shorter battery life

B

Which Distributed Ledger Technology (DLT) allows identity verification? A) Federated DLT B) Permissioned DLT C) Self-regulated DLT D) Permissionless DLT

B

Which IoT connectivity technology is based on the LoRa protocol from Semtech and uses spread spectrum? a) Zigbee b) LoRaWAN c) Sigfox d) Weightless

B

Which IoT device can improve emergency responses by monitoring a user's activities at home? A) Camera B) Companion robot C) Air tag D) Compressor

B

Which agency is a national-level intelligence agency of the U.S. Department of Defense under the authority of the director of national intelligence? a) National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) b) National Security Agency (NSA) c) Federal Trade Commission (FTC) d) Federal Communications Commission (FCC)

B

Which of the following is an example of an actuator? a) A device that measures temperature b) A device that converts an electrical signal into movement c) A device that transmits data wirelessly d) A device that stores data for later retrieval

B

Which of the following statements is true about the relationship between cyberspace and the internet? a) Cyberspace and the internet are synonymous and can be used interchangeably in all contexts b) Cyberspace refers to a broader concept that includes the internet, but the terms are not identical c) Cyberspace is a subset of the internet, which includes only secure connections d) The internet is a concept that is only used in the United States, while cyberspace is a globally recognized term

B

Which organization is responsible for international public health? a) United Nations b) World Health Organization (WHO) c) Organization for Economic Co-operation and Development (OECD) d) International Monetary Fund (IMF)

B

A city is evaluating the World Bank's Sustainable Mobility for All (SuM4All) initiative in the development of a road traffic congestion solution. What are two objectives of the SuM4All initiative? Choose 2 answers. 1. Security 2. Safety 3. Efficiency 4. Deployment A) 1, 2 B) 1, 3 C) 2, 3 D) 3, 4

C

A company developed an IoT smart photo frame that allows users to upload photos to their device using a web browser. Testing revealed that users can upload files onto the root filesystem. Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its design process to ensure filesystem permissions are set correctly? A) Device secure boot B) Physical security C) Secure operating system D) Application security

C

A company develops an IoT-based security system. The system uses proximity sensors that communicate with a central gateway using a 433 MHZ radio signal. Testing reveals that the traffic can be sniffed with a software-defined radio, and an attacker could spoof the proximity sensor by copying the authentication details from the radio traffic. Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its design process to ensure the security of the radio data? A) Device secure boot B) Physical security C) Network connections D) Application security

C

A company requires customers to provide personally identifiable information (PII) when registering an IoT device. The company sells the information. A business school has argued that only people should be able to sell their information and not the IoT company. Which principle does this argument support? A) Integrity must remain a high priority. B) Confidentiality of all data is mandatory. C) Privacy is a fundamental human right. D) Availability is essential for data transfer.

C

A hospital plans to send data from intensive care unit (ICU) sensors to a central recording system. The data should be captured in transit for analysis in a database. Which component of the system should be used to capture the data? A) Data agent B) Data handling unit C) Network data aggregator D) Central data store

C

A manufacturer of proprietary IoT technology is trying to pressure a company into using its technology. What is the manufacturer infringing on? A) Fifth Amendment B) Deidentification C) Decisional privacy D) Safe harbor

C

A parking lot management company wants to connect 15,000 parking spaces to the cloud to save drivers valuable time and streamline the entire parking process. The parking spaces will send reports each time a spot becomes available in the parking garage. Which network is most suitable for this requirement if the company will be using a device that does not consume a lot of power but can send data over a long range? A) Extended Coverage-GSM (EC-GSM) and Narrow Band (NB-IoT) B) Bluetooth and ZigBee C) Sigfox and LoRa D) Wi-Fi

C

A university is testing a smart energy solution and requires a system to monitor the following parameters of power used by its buildings: - voltage - phase - apparent power - power factor - frequency Which device should be used to perform these readings? A) Intelligent energy device (IED) B) Smart meter (SM) C) Power measurement and control (PMC) D) Phasor measurement unit (PMU)

C

A utility company is planning to implement an advanced metering infrastructure (AMI) to transform its legacy network into a smart network. What is reduced by making this transformation? A) Capital expenditure B) Customer turnover C) Operational costs D) Power outages

C

How are the blocks in a blockchain linked to the next block? A) Private key B) Public key C) Hash pointer D) Public-private key pair

C

In the IoT ecosystem, which stakeholder is responsible for creating applications that process data within a specific context to produce actionable insights for end users? a) Information providers b) Platform providers c) Application developers d) End users

C

LoRaWAN is based on which protocol? a) Zigbee b) Sigfox c) Semtech's LoRa d) Weightless

C

Malware has infected several IoT devices in a company. These devices were using default configurations. What should the company do to prevent the malware from being installed? A) Alter the port the devices use to communicate B) Scan for unusual packets being sent to the devices C) Change the devices' usernames and passwords D) Install a firewall limiting communication to the devices

C

The concept of incorporating sensors into physical objects and connecting these objects to the internet using wireless networks has evolved over the years and been through different IoT waves. Which wave of the IoT represented a hardware-related breakthrough that aimed to connect everyday objects to a network? A) The fourth wave of the IoT B) The third wave of the IoT C) The first wave of the IoT D) The second wave of the IoT

C

To ensure trust in cyberspace, a new IoT engineer is trying to understand different categories of cyberthreats and the different actors threatening the cyberspace. Which threat actors use cyberspace to disrupt critical infrastructures to elicit widespread panic and loss of public confidence in the ability of the government to function effectively? A) Cybercrime B) Cyberwar C) Cyber terrorists D) Cyber espionage

C

Weightless IoT connectivity technology consists of how many protocols? a) One b) Two c) Three d) Four

C

What are the three core principles that refer to protection of computer systems and the information they store, process, or communicate? A) Confidentiality, elasticity, and authentication B) Confidentiality, authorization, and integrity C) Confidentiality, integrity, and availability D) Confidentiality, scalability, and authentication

C

What are two categories of ethical concern when collecting data through IoT? Choose 2 answers. 1. Accessing and using data 2. Building applications to store data 3. Control and property rights of data 4. Diagnostics of data quality A) 2, 3 B) 1, 4 C) 1, 3 D) 2, 4

C

What characterizes a renewable energy source (RES)? a) An integrated system of smart meters and communication networks b) A variety of small, grid-connected devices for energy storage c) An energy source that comes from constantly replenished natural sources or processes, like solar or wind d) A management system for utilities and customers

C

What characterizes the 3rd wave of IoT development? a) Hardware breakthrough for connecting everyday objects to a network b) Development of new types of sensors and supporting technologies c) Focus on data collection, processing, and security d) Adoption of IoT devices by consumers

C

What differentiates the Internet of Bodies from consumer IoT? a) The Internet of Bodies focuses on connecting personal and home devices, while consumer IoT involves monitoring the human body b) The Internet of Bodies involves industrial machines and computers, while consumer IoT is about personal and home devices c) The Internet of Bodies is about monitoring the human body and collecting physiological, biometric, or behavioral data, while consumer IoT involves users' networks around personal and home devices d) The Internet of Bodies is a global network of wired and wireless networks, while consumer IoT is an information space consisting of public resources

C

What does CCPA stand for and what is its purpose? a) California Consumer Privacy Association; a nonprofit organization promoting privacy rights in California b) California Consumer Protection Act; a state statute focused on consumer protection and fraud prevention in California c) California Consumer Privacy Act; a state statute intended to enhance privacy rights and consumer protection for residents of California in the United States d) California Consumer Privacy Alliance; a coalition of companies working together to protect consumer privacy in California

C

What does Secure Runtime Environment encompass? a) Initial device configuration and on-going management b) Remote management of information flows between multiple IoT applications c) A collection of tools such as identity access management (IAM), secure boot, device attestation, TPMs, and trusted execution environments (TEEs) d) Flow-based development tools for IoT

C

What does a wireless personal area network (WPAN) primarily focus on? a) Interconnecting low-bandwidth, battery-powered devices with low bit rates over long ranges b) Creating a network for colocated computers or other devices based on radio transmissions c) Forming a network for interconnecting devices centered around an individual person's workspace d) Connecting all users' personal and home devices in a network

C

What does data summarization aim to achieve? a) To increase data storage efficiency b) To reduce data transmission bandwidth c) To provide a representation that best describes the time series under consideration d) To enhance data security

C

What is Lambda in the context of IoT data processing? a) A process that accumulates new data into disjunctive groups and processes them at a later time, defined by criteria such as batch size or age b) A process that handles each new piece of data immediately, either individually or inside of a rolling window c) A data processing architecture designed to provide both accurate and up-to-date, near-real-time results d) A second-generation stream processing system that utilizes automated scaling

C

What is a Renewable Energy Source (RES)? a) A type of NoSQL database b) An open-source time series database c) An energy source that comes from natural sources or processes that are constantly replenished d) A software-based solution for laboratory operations

C

What is a primary benefit of having sensors in personal and industrial devices? a) To increase the cost of manufacturing devices b) To enhance the user experience by adding unnecessary features c) To collect data and enable smart decision-making, automation, and monitoring d) To reduce the functionality of devices

C

What is an electronic health record (EHR)? a) A specialized hospital ward for life-threatening conditions b) A software-based solution for laboratory operations c) A digital collection of patient and population health information shareable across healthcare settings d) A declarative query language for searching data repositories

C

What is an information provider? a) An entity that wants to join the data revolution to build a new application that draws on multiple disparate sources of data b) A type of IoT device that focuses exclusively on data processing c) An entity that collects data from its own sensor deployments and makes it available to others under appropriate terms and conditions d) A computer system or software that can exchange and make use of information

C

What is metadata? a) A key-value pair of data that is relational to the initial query of data from a sensor b) A spatiotemporal series of data representing the physical object that data values are being collected from c) A set of data that describes and presents information about other data d) The initial value required for metadata to be gathered

C

What is personally identifiable information (PII)? a) Data that describes general trends and patterns without identifying specific individuals b) Information that is publicly available and can be used to identify a specific individual c) Any data that could potentially identify a specific individual d) Information that is anonymized and cannot be used to identify a specific individual

C

What is the function of an information broker in the IoT context? a) To perform a very specific function, such as video analytics b) To route the incoming data from other modules based on a set of predefined rules c) To act as an on-board data storage module that allows storage of recently received data from sensors or from the cloud d) To enable the transformation of incoming sensor data or outgoing actuator commands into a common format

C

What is the main goal of a DDoS attack? a) To encrypt files on a device, rendering them unusable b) To send emails purporting to be from reputable companies to induce individuals to reveal personal information c) To disrupt the normal traffic of a targeted server, service, or network by overwhelming the target d) To create a network of hijacked computers and devices for remote control by a hacker

C

What is the main goal of the AIOTI? a) To promote open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments b) To provide a standards-based architectural template and methodology for the Industrial Internet of Things c) To enhance innovation and economic development in the Internet of Things in Europe d) To create a network of hijacked computers and devices for remote control by a hacker

C

What is the main goal of the IoTSF? a) To explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT b) To introduce an EU-wide cybersecurity certification framework for ICT products, services, and processes c) To provide a collaborative, nonprofit, international response to the complex challenges posed by cybersecurity in the expansive hyper-connected IoT world d) To promote open standards and interoperability for technologies used in industrial and machine-to-machine (M2M) environments

C

What is the primary role of end users in the IoT ecosystem? a) Deploying IoT technology b) Producing applications for other stakeholders c) Using the information and applications provided by other stakeholders d) Managing IoT ecosystems

C

What is the primary role of platform providers in the IoT ecosystem? a) Deploying IoT technology b) Producing applications for end users c) Providing a set of functionalities for all stakeholders to use d) Managing IoT ecosystems

C

What is the process of automating the model building of recorded data sets? A) Compression B) Dimensionality reduction C) Learning and mining D) Summarization

C

What is the purpose of edge processing in an IoT system? a) Increase the speed of data transmission b) Enhance security and privacy c) Perform data aggregation and manipulation directly on an IoT sensor or device d) Ensure interoperability between IoT devices

C

Which approach can be used in cybersecurity to achieve perimeter defense? A) Wi-Fi B) Router C) Firewalls D) Modems

C

Which body in the U.S. is responsible for leveling penalties against companies whose cybersecurity is below standard? A) Federal Communications Commission (FCC) B) Institute of Electrical and Electronics Engineers (IEEE) C) Federal Trade Commission (FTC) D) Internet Engineering Task Force (IETF)

C

Which building block is used to move collected IoT data to the central IoT platform? A) Edge compute B) Application C) Gateway D) Smart device

C

Which feature of 5G supports a large number of devices in the future? a) eMBB b) URLLC c) mMTC d) LTE-M

C

Which framework prohibits countries from knowingly allowing IoT infrastructure under their control to be used for wrongful acts against other countries? A) EU Network and Information Security Directive B) General Data Protection Regulation (GDPR) C) G7 Declaration on Responsible States Behavior in Cyberspace D) Fair Information Practice Principles (FIPP)

C

Which of the following IoT connectivity technologies uses the spread spectrum technique? a) Zigbee b) LPWAN c) LoRaWAN d) Sigfox

C

Which of the following is NOT one of the main operations performed on streaming data? a) Compression b) Dimensionality reduction c) Encryption d) Visualization

C

Which of the following is a common use case for LP-WAN technologies like Sigfox and LoRa? a) Streaming high-definition video content b) Gaming with low latency requirements c) Monitoring and controlling a large number of IoT devices in a city or building d) Establishing a high-speed wireless local area network (WLAN) in a home or office

C

Which of the following is not a feature of blockchains? a) Decentralization b) Immutability c) Centralized control d) Fault tolerance and resilience

C

Which programming language is InfluxDB written in? a) Python b) Java c) Go d) JavaScript

C

Which statute aims to enhance privacy rights and consumer protection for residents of California in the United States? a) Federal Communications Commission Act (FCCA) b) National Institute of Standards and Technology Act (NISTA) c) California Consumer Privacy Act (CCPA) d) Federal Trade Commission Act (FTCA)

C

Which technique is used to transmit a signal on a bandwidth much larger than the original frequency to reduce interference and improve security in IoT communication? a) Zigbee b) UNB c) Spread spectrum d) Mesh network

C

Which two components provide the connectivity for an IoT architecture? Choose 2 answers. 1. Access network 2. Gateway 3. Sensor 4. Edge device A) 1, 3 B) 2, 3 C) 1, 2 D) 2, 4

C

A company is evaluating how to reduce air pollution in places that lack IoT sensors. Which two technologies can be used? Choose 2 answers. 1. Gateway device 2. Access network 3. Machine learning 4. Artificial intelligence A) 1, 2 B) 2, 3 C) 1, 3 D) 3, 4

D

A company uses IoT devices to capture data in the field and transmit it for central processing. The company plans to follow the Internet of Things Security Foundation's (IoTSF) Best Practice Guidelines (BPGs) to ensure that personal data is protected. Which IoTSF guideline should this company use? A) Device secure boot B) Physical security C) Securing software updates D) Application security

D

What is the main purpose of a laboratory information system (LIS)? a) Monitoring people with life-threatening conditions b) Querying and retrieving data from repositories c) Providing treatment in specialized hospital wards d) Supporting a modern laboratory's operations with software-based solutions

D

What is the main purpose of the General Data Protection Regulation (GDPR)? a) To govern the administration of mobile devices in an organization b) To regulate the use of personal devices in a work setting c) To measure the return on investment of different ventures d) To provide data protection and privacy in the EU and the European Economic Area

D

What is the name of the strategic initiative launched by the World Bank to unify and transform the transport sector worldwide? A) WorkForce B) Agile regulatory framework C) Datafication D) Sustainable Mobility for All (SuM4All)

D

What is the primary purpose of the Vulnerabilities Equities Process (VEP)? a) Focusing on machine-to-machine communications b) Extending IoT to encompass people, processes, and machine-to-machine communications c) Promoting American innovation and industrial competitiveness d) Determining how to treat zero-day computer security vulnerabilities on a case-by-case basis

D

What type of edge computing device is installed by Communications Service Providers? a) Mobile edge computer b) Customer edge device c) Customer Premises Edge Compute (C-PEC) d) Communications Service Provider Premises Edge Compute (CSP-PEC)

D

Which IoT connectivity technology consists of three protocols and operates on 2.4 GHz frequency? a) Zigbee b) LPWAN c) UNB d) Weightless

D

Which IoT connectivity technology is owned by the company with the same name? a) Zigbee b) LPWAN c) LoRaWAN d) Sigfox

D

Which IoT device is used in a smart building to determine when rooms are in use? A) Humidity device B) Thermo device C) Smart speaker D) Smart light

D

Which agency in the United States released a report on IoT cybersecurity standards in 2018? A) National Security Agency (NSA) B) Federal Bureau of Investigation (FBI) C) Central Intelligence Agency (CIA) D) National Institute of Standards and Technology (NIST)

D

Which building block of the IoT architecture is responsible for collecting raw data generated by the monitored entity? A) Actuator B) Gateway C) Processor D) Sensor

D

Which computation method processes data captured at the sensor device before sending it to a backhaul network? A) Data analytics B) Data access C) Cloud computing D) Edge computing

D

Which condition describes a high number of false and clinically irrelevant alarms produced by medical devices, especially physiologic monitors, that can cause medical staff to disregard important alarms? A) Stress B) Exhaustion C) Overload fatigue D) Alarm fatigue

D

Which feature characterizes a wireless local area network (WLAN) in an IoT architecture? A) Limit of battery life of one year B) Limit of data rate of 1 KB C) Support for FireWire protocol D) Support for line-of-sight communication

D

Which framework identifies factors influencing investments? A) National Institute of Standards and Technology (NIST) Privacy Framework B) National Institute of Standards and Technology (NIST) Cybersecurity Framework C) Software Alliance Framework for Security Software (SAFSS) D) Regulators, Facilitators, and Collaborators (RFC) Framework

D

You are a CISO with a top federal contracting company. The CTO will be addressing a joint session of Congress and she asked for your help on the major policy challenges affecting cyberspace today. What are some of the major policy issues affecting cyberspace today? A) Trust, IoT adoption, and the growth of edge devices B) Broadband access, governance, and IoT adoption C) Governance, trust, and IoT adoption D) Broadband access, governance, and trust

D

You are an IoT consultant for a retail store that wants to install sensors to track movements of customers through the store and measure dwell times. The sensors will send data to a central platform where they will be accessed and processed by application and analytics software. Which type of network will you advise the retailer to implement to meet this requirement? A) Wi-Fi B) Bluetooth and ZigBee C) Extended Coverage-GSM (EC-GSM) and Narrow Band (NB-IoT) D) Wired networks

D


संबंधित स्टडी सेट्स

ECON 1022 Final Exam (Chapter 8, 11, 12 and 15)

View Set

UNIT 22 KENTUCKY LIFE AND HEALTH INSURANCE GUARANTY ASSOCIATION 1-4 / CREDIT LIFE AND HEALTH INSURANCE 5-6 / FRATERNAL BENEFIT SOCIETIES 8

View Set

Square Roots 1 - 13 and Perfect Squares 1 - 169

View Set