Quiz On Internet Of Things

10 Questions

Settings
Please wait...
Internet Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?
    • A. 

      Security

    • B. 

      Privacy

    • C. 

      Interoperability

    • D. 

      Compliance

  • 2. 
    • A. 

      Global adoption of non-IP networking

    • B. 

      Smaller and faster computing

    • C. 

      Growth of cloud computing

    • D. 

      Advancement in data analytics

  • 3. 
    Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?
    • A. 

      Platform as a Service (PaaS)

    • B. 

      SaaS (SaaS)

    • C. 

      Communications as a Service (CaaS)

    • D. 

      Infrastructure as a Service (IaaS)

  • 4. 
    Which one of the following is NOT an example of store-and-forward messaging?
    • A. 

      Voicemail

    • B. 

      Unified messaging

    • C. 

      Telephone call

    • D. 

      Email

  • 5. 
    Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?
    • A. 

      Health Insurance Portability and Accountability Act (HIPAA)

    • B. 

      Family Educational Rights and Privacy Act (FERPA)

    • C. 

      Communications Assistance for Law Enforcement Act (CALEA)

    • D. 

      Payment Card Industry Data Security Standard (PCI DSS)

  • 6. 
    Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?
    • A. 

      Privacy

    • B. 

      Bring Your Own Device (BYOD)

    • C. 

      Acceptable use

    • D. 

      Data classification

  • 7. 
    Which scenario presents a unique challenge for developers of mobile applications?
    • A. 

      Selecting multiple items from a list

    • B. 

      Applying encryption to network communications

    • C. 

      Obtaining Internet Protocol (IP) addresses

    • D. 

      Using checkboxes

  • 8. 
    With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?
    • A. 

      Foreign agent

    • B. 

      Care of address

    • C. 

      Home agent

    • D. 

      Correspondent note

  • 9. 
    • A. 

      Turning IoT devices off when not in use

    • B. 

      Removing IoT devices from the network

    • C. 

      Using encryption for communications

    • D. 

      Applying security updates promptly

  • 10. 
    From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet of Things (IoT)?
    • A. 

      Security risks will increase.

    • B. 

      Security risks will decrease.

    • C. 

      Security risks will stay the same.

    • D. 

      Security risks will be eliminated.