Quiz 2 Information Security Fundamentals
Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
Applying security updates promptly
Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?
Bring Your Own Device (BYOD)
With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?
Care of address (COA) < wrong answer Correspondent node (CN) wrong answer
Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?
Collaboration
In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?
Correspondent node (CN)
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data in aggregate?
Deidentification
Which of the following is NOT one of the four fundamental principles outlined by the Internet Society that will drive the success of Internet of Things (IoT) innovation?
Secure
From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet of Things (IoT)?
Security risks will increase.
Which one of the following is an advantage that the Internet of Things (IoT) brings to economic development for countries?
Technical and industry development
Which one of the following is NOT an example of store-and-forward messaging?
Telephone call
Using Mobile IP, users can move between segments on a local area network (LAN) and stay connected without interruption.
True
Which one of the following is NOT an area of critical infrastructure where the Internet of Things (IoT) is likely to spur economic development in less developed countries?
Water supply management E-commerce <<< Agriculture
A bricks-and-mortar strategy includes marketing and selling goods and services on the Internet.
False
Bricks-and-mortar stores are completely obsolete now.
False
Connectivity is one of the five critical challenges that the Internet of Things (IoT) has to overcome.
False
IoT devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.
False
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can benefit from traffic-monitoring applications.
False
Store-and-forward communications should be used when you need to talk to someone immediately.
False
The auto industry has not yet implemented the Internet of Things (IoT).
False
Which compliance obligation includes security requirements that apply specifically to federal government agencies in the United States?
Federal Information Security Management Act (FISMA)
Which one of the following governs the use of Internet of Things (IoT) by healthcare providers, such as physicians and hospitals?
Health Insurance Portability and Accountability Act (HIPAA)
Which one of the following is an example of a business-to-consumer (B2C) application of the Internet of Things (IoT)?
Health monitoring ****** Supply chain management
Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?
Interoperability
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?
Platform as a Service (PaaS) wrong answer
Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?
Payment Card Industry Data Security Standard (PCI DSS)
Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.
True
Cars that have Wi-Fi access and onboard computers require software patches and upgrades from the manufacturer.
True
Devices that combine the capabilities of mobile phones and personal digital assistants (PDAs) are commonly called smartphones.
True
E-commerce systems and applications demand strict confidentiality, integrity, and availability (CIA) security controls.
True
Each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.
True
In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.
True
IoT technology has a significant impact on developing economies, given that it can transform countries into e-commerce-ready nations.
True
Metadata of Internet of Things (IoT) devices can be sold to companies seeking demographic marketing data about users and their spending habits.
True
One of the first industries to adopt and widely use mobile applications was the healthcare industry.
True
Some vending machines are equipped with a cellular phone network antenna for secure credit card transaction processing.
True
Unified messaging allows you to download both voice and email messages to a smartphone or tablet.
True