Search Header Logo

Bootcamp DTSFGA Modul 12 dan 13 CCT

Authored by Nepeta Lactone

Computers

Professional Development

10 Questions

Used 2+ times

Bootcamp DTSFGA Modul 12 dan 13 CCT
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following policies allows employees to select devices and plans from role-

based corporate catalogs, where each device is preinstalled with appropriate security

solutions, firewalls, and network configurations?

CYOD Policy

BYOD Policy

COPE Policy

COBO Policy

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following IoT system management functions can address data breaches at

an early stage and prevent malicious attacks on an IoT system by performing logging and

analyzing commands sent by control applications to devices?

Device Management

User Management

Security Monitoring

Data Management

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following technologies is referred to as a wireless sensor protocol that

enables communication between sensors and their controllers?

ANT

GPS

USB

Satcom

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Steve, a security professional, was instructed to provide secure access to corporate data

on mobile devices across the organizational networks without compromising on access

speed. In this process, Steve deployed a security solution that involves encrypting

important information and allowing accessing, transmitting, or storing important

information on only authorized apps using strong password protection policies.

Identify the mobile security management solution employed by Steve in the above

scenario.

Vaultize

Metasploit

zANTI

Tor's Hammer

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following guidelines must be followed to protect a mobile device from

malicious attackers?

Do not share information within GPS-enabled apps unless necessary

Never install applications from trusted stores

Always load too many applications and auto-upload photos to social networks

Always connect to two separate networks such as Wi-Fi and Bluetooth,

simultaneously

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following layers in the IoT architecture allows businesses to make a decision

based on the information derived from policies and procedures of IoT computing?

Device layer

Communication layer

Cloud platform layer

Process layer

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following tiers of an IoT-enabled IT environment focuses on data

computation to deliver insights and thereby generate business value?

Cloud Tier

Control Tier

Gateway Tier

Device Tier

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?