Which of the following policies allows employees to select devices and plans from role-
based corporate catalogs, where each device is preinstalled with appropriate security
solutions, firewalls, and network configurations?
Bootcamp DTSFGA Modul 12 dan 13 CCT
Quiz
•
Computers
•
Professional Development
•
Medium
Nepeta Lactone
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following policies allows employees to select devices and plans from role-
based corporate catalogs, where each device is preinstalled with appropriate security
solutions, firewalls, and network configurations?
CYOD Policy
BYOD Policy
COPE Policy
COBO Policy
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following IoT system management functions can address data breaches at
an early stage and prevent malicious attacks on an IoT system by performing logging and
analyzing commands sent by control applications to devices?
Device Management
User Management
Security Monitoring
Data Management
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following technologies is referred to as a wireless sensor protocol that
enables communication between sensors and their controllers?
ANT
GPS
USB
Satcom
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Steve, a security professional, was instructed to provide secure access to corporate data
on mobile devices across the organizational networks without compromising on access
speed. In this process, Steve deployed a security solution that involves encrypting
important information and allowing accessing, transmitting, or storing important
information on only authorized apps using strong password protection policies.
Identify the mobile security management solution employed by Steve in the above
scenario.
Vaultize
Metasploit
zANTI
Tor's Hammer
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following guidelines must be followed to protect a mobile device from
malicious attackers?
Do not share information within GPS-enabled apps unless necessary
Never install applications from trusted stores
Always load too many applications and auto-upload photos to social networks
Always connect to two separate networks such as Wi-Fi and Bluetooth,
simultaneously
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following layers in the IoT architecture allows businesses to make a decision
based on the information derived from policies and procedures of IoT computing?
Device layer
Communication layer
Cloud platform layer
Process layer
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following tiers of an IoT-enabled IT environment focuses on data
computation to deliver insights and thereby generate business value?
Cloud Tier
Control Tier
Gateway Tier
Device Tier
15 questions
Introduction to the Internet of Things
Quiz
•
12th Grade - Professi...
10 questions
11142020_A+_Lesson_9_Quiz
Quiz
•
Professional Development
13 questions
Accessories @ Apple
Quiz
•
Professional Development
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
7 questions
Sec+ CH.5 Pre-Assessment
Quiz
•
Professional Development
9 questions
ITF - Quiz 4.3 - Understanding the Problem
Quiz
•
Professional Development
12 questions
ICT 04 - Day 1 Quiz
Quiz
•
Professional Development
10 questions
Google Cloud Digital Leader - Application
Quiz
•
Professional Development
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade