Bootcamp DTSFGA Modul 12 dan 13 CCT

Bootcamp DTSFGA Modul 12 dan 13 CCT

Professional Development

10 Qs

quiz-placeholder

Similar activities

IoT Design Methodology

IoT Design Methodology

University - Professional Development

15 Qs

IOT_QUIZ_ATHARVA

IOT_QUIZ_ATHARVA

University - Professional Development

10 Qs

AWS re:Invent 2020 for SMB East

AWS re:Invent 2020 for SMB East

Professional Development

10 Qs

ITF - Information Technology - Quiz 1.1

ITF - Information Technology - Quiz 1.1

Professional Development

10 Qs

Module 1. Passive Reconnaissance

Module 1. Passive Reconnaissance

Professional Development

15 Qs

Buzz Word Trivia - Internet of Things (IoT)

Buzz Word Trivia - Internet of Things (IoT)

Professional Development

10 Qs

QUIZ

QUIZ

Professional Development

15 Qs

Azure Iot Services

Azure Iot Services

Professional Development

10 Qs

Bootcamp DTSFGA Modul 12 dan 13 CCT

Bootcamp DTSFGA Modul 12 dan 13 CCT

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Nepeta Lactone

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following policies allows employees to select devices and plans from role-

based corporate catalogs, where each device is preinstalled with appropriate security

solutions, firewalls, and network configurations?

CYOD Policy

BYOD Policy

COPE Policy

COBO Policy

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following IoT system management functions can address data breaches at

an early stage and prevent malicious attacks on an IoT system by performing logging and

analyzing commands sent by control applications to devices?

Device Management

User Management

Security Monitoring

Data Management

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following technologies is referred to as a wireless sensor protocol that

enables communication between sensors and their controllers?

ANT

GPS

USB

Satcom

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Steve, a security professional, was instructed to provide secure access to corporate data

on mobile devices across the organizational networks without compromising on access

speed. In this process, Steve deployed a security solution that involves encrypting

important information and allowing accessing, transmitting, or storing important

information on only authorized apps using strong password protection policies.

Identify the mobile security management solution employed by Steve in the above

scenario.

Vaultize

Metasploit

zANTI

Tor's Hammer

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following guidelines must be followed to protect a mobile device from

malicious attackers?

Do not share information within GPS-enabled apps unless necessary

Never install applications from trusted stores

Always load too many applications and auto-upload photos to social networks

Always connect to two separate networks such as Wi-Fi and Bluetooth,

simultaneously

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following layers in the IoT architecture allows businesses to make a decision

based on the information derived from policies and procedures of IoT computing?

Device layer

Communication layer

Cloud platform layer

Process layer

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following tiers of an IoT-enabled IT environment focuses on data

computation to deliver insights and thereby generate business value?

Cloud Tier

Control Tier

Gateway Tier

Device Tier

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?