Which of the following policies allows employees to select devices and plans from role-
based corporate catalogs, where each device is preinstalled with appropriate security
solutions, firewalls, and network configurations?
Bootcamp DTSFGA Modul 12 dan 13 CCT
Quiz
•
Computers
•
Professional Development
•
Medium
Nepeta Lactone
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following policies allows employees to select devices and plans from role-
based corporate catalogs, where each device is preinstalled with appropriate security
solutions, firewalls, and network configurations?
CYOD Policy
BYOD Policy
COPE Policy
COBO Policy
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following IoT system management functions can address data breaches at
an early stage and prevent malicious attacks on an IoT system by performing logging and
analyzing commands sent by control applications to devices?
Device Management
User Management
Security Monitoring
Data Management
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following technologies is referred to as a wireless sensor protocol that
enables communication between sensors and their controllers?
ANT
GPS
USB
Satcom
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Steve, a security professional, was instructed to provide secure access to corporate data
on mobile devices across the organizational networks without compromising on access
speed. In this process, Steve deployed a security solution that involves encrypting
important information and allowing accessing, transmitting, or storing important
information on only authorized apps using strong password protection policies.
Identify the mobile security management solution employed by Steve in the above
scenario.
Vaultize
Metasploit
zANTI
Tor's Hammer
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following guidelines must be followed to protect a mobile device from
malicious attackers?
Do not share information within GPS-enabled apps unless necessary
Never install applications from trusted stores
Always load too many applications and auto-upload photos to social networks
Always connect to two separate networks such as Wi-Fi and Bluetooth,
simultaneously
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following layers in the IoT architecture allows businesses to make a decision
based on the information derived from policies and procedures of IoT computing?
Device layer
Communication layer
Cloud platform layer
Process layer
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following tiers of an IoT-enabled IT environment focuses on data
computation to deliver insights and thereby generate business value?
Cloud Tier
Control Tier
Gateway Tier
Device Tier
13 questions
1. AI applications
Quiz
•
Professional Development
15 questions
Introduction to the Internet of Things
Quiz
•
12th Grade - Professi...
10 questions
11142020_A+_Lesson_9_Quiz
Quiz
•
Professional Development
13 questions
Accessories @ Apple
Quiz
•
Professional Development
7 questions
Sec+ CH.5 Pre-Assessment
Quiz
•
Professional Development
9 questions
ITF - Quiz 4.3 - Understanding the Problem
Quiz
•
Professional Development
12 questions
ICT 04 - Day 1 Quiz
Quiz
•
Professional Development
10 questions
Network Fundamentals
Quiz
•
Professional Development
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade