-
web.groovymark@gmail.com
- November 30, 2024
Question 41
A company is developing a garage door sensor that stores data defining when the owner is home or away and when the garage door is open or closed. The company needs to ensure the data is stored in a secure manner. What should this company be concerned about regarding the storage of user information?
a) Mishandling stored user information will lead to privacy issues.
b) Securing stored user information will affect the garage door sensor’s functionality.
c) Connecting the garage door sensor to private networks will affect stored data.
d) Caching garage door sensor data at the edge will lead to governance issues
Correct Answer: a) Mishandling stored user information will lead to privacy issues.
Explanation: Ensuring the secure storage of user information is critical to maintaining user privacy and trust.
Question 42
Which ethical issue do customers encounter when using social media platforms from their wearable IoT devices to update people about activities?
a) Utilizing freedom of expression at the expense of their privacy
b) Determining who can purchase their demographic information
c) Ensuring personally identifiable information being stored is secure
d) Making sure information is not saved locally in plain text
Correct Answer: a) Utilizing freedom of expression at the expense of their privacy
Explanation: Users often face dilemmas between sharing personal experiences and protecting their privacy on social media.
Question 43
A company requires customers to provide personally identifiable information (PII) when registering an IoT device. The company sells the information. A business school has argued that only people should be able to sell their information and not the IoT company. Which principle does this argument support?
a) Integrity must remain a high priority.
b) Confidentiality of all data is mandatory.
c) Privacy is a fundamental human right.
d) Availability is essential for data transfer.
Correct Answer: c) Privacy is a fundamental human right.
Explanation: The principle of privacy emphasizes that individuals should retain control over their personal information.
Question 44
A manufacturer of proprietary IoT technology is trying to pressure a company into using its technology. What is the manufacturer infringing on?
a) Fifth Amendment
b) Deidentification
c) Decisional privacy
d) Safe harbor
Correct Answer: c) Decisional privacy
Explanation: The manufacturer's actions may infringe upon the company's right to make independent decisions regarding technology use.
Question 45
Which framework identifies factors influencing investments?
a) National Institute of Standards and Technology (NIST) Privacy Framework
b) National Institute of Standards and Technology (NIST) Cybersecurity Framework
c) Software Alliance Framework for Security Software (SAFSS)
d) Regulators, Facilitators, and Collaborators (RFC) Framework
Correct Answer: d) Regulators, Facilitators, and Collaborators (RFC) Framework
Explanation: The RFC Framework outlines various factors that influence investment decisions in IoT technologies.
Question 46
Which body in the U.S. is responsible for leveling penalties against companies whose cybersecurity is below standard?
a) Federal Communications Commission (FCC)
b) Institute of Electrical and Electronics Engineers (IEEE)
c) Federal Trade Commission (FTC)
d) Internet Engineering Task Force (IETF)
Correct Answer: c) Federal Trade Commission (FTC)
Explanation: The FTC oversees consumer protection and enforces regulations to ensure cybersecurity standards are met.
Question 47
Which agency publishes the Cybersecurity Framework (CSF)?
a) Federal Communications Commission (FCC)
b) Federal Trade Commission (FTC)
c) National Institute of Standards and Technology (NIST)
d) American National Standards Institute (ANSI)
Correct Answer: c) National Institute of Standards and Technology (NIST)
Explanation: NIST develops and publishes the Cybersecurity Framework to guide organizations in improving their cybersecurity posture.
Question 48
Which framework prohibits countries from knowingly allowing IoT infrastructure under their control to be used for wrongful acts against other countries?
a) EU Network and Information Security Directive
b) General Data Protection Regulation (GDPR)
c) G7 Declaration on Responsible States Behavior in Cyberspace
d) Fair Information Practice Principles (FIPP)
Correct Answer: c) G7 Declaration on Responsible States Behavior in Cyberspace
Explanation: This framework encourages responsible use of IoT infrastructure to prevent malicious activities across borders.
Question 49
A company implements an IoT 5G smart grid to improve resiliency within its power grid. The company installs the virtual machine cloud machine (vMCM) function. Why is the vMCM function installed?
a) To monitor devices and cache information about daily consumption
b) To validate device identity to the gateway without mining operations
c) To verify the identity of a device with the OAuth2.0 service
d) To locate devices that provide a specific utility with OpenId Connect
Correct Answer: a) To monitor devices and cache information about daily consumption
Explanation: The vMCM function is essential for managing and optimizing energy consumption data in smart grid systems.
Question 50
A utility company is planning to implement an advanced metering infrastructure (AMI) to transform its legacy network into a smart network. What is reduced by making this transformation?
a) Capital expenditure
b) Customer turnover
c) Operational costs
d) Power outages
Correct Answer: c) Operational costs
Explanation: Transitioning to an AMI typically leads to increased efficiency and reduced operational expenses in managing energy distribution.