WGU D337 OBJECTIVE ASSESSMENT INTERNET OF THINGS AND INFRASTRUCTURE NEWEST 2024 EXAM TEST BANK 300 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
1 | P a g e
WGU D337 OBJECTIVE ASSESSMENT INTERNET OF
THINGS AND INFRASTRUCTURE NEWEST 2024 EXAM
TEST BANK 300 QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIED ANSWERS)
|ALREADY GRADED A+
Which component in the Lambda architecture acts as the streaming layer
in a streaming processing system?
A) Real-time engine
B) Batch engine
C) Serving back-end
D) Data storage - ANSWER- A
Which task does an information consumer perform within an IoT
ecosystem?
A) Collects data from their sensors and shares it based on terms and
conditions
B) Builds applications that use data from various sources after obtaining
consent
C) Identifies risks by communicating with the data owner for risk
management
2 | P a g e
D) Maintains backups of the data collected from the sensors for disaster
recovery - ANSWER- B
Which vulnerability do IoT botnets target on IoT devices by applying
data found on the internet?
A) Unencrypted communications
B) Default credentials
C) Cleartext passwords
D) Exposed sensors - ANSWER- B
Which two stakeholder groups contribute to addressing the challenges of
IoT security?
Choose 2 answers.
1. Governments
2. Universities
3. Standards development bodies
4. Law enforcement organizations
A) 2, 3
B) 1, 2
C) 1, 3
D) 1, 4 - ANSWER- C
3 | P a g e
Which two issues can result from global deployment of insecurely
configured IoT devices?
Choose 2 answers.
1. Devices are compromised to provide fake data
2. Device hardware is attacked until destroyed
3. Devices are compromised to form botnets
4. Device software is built into a sandbox environment
A) 2, 3
B) 1, 3
C) 3, 4
D) 2, 4 - ANSWER- B
Which type of malware creates a network of remotely controlled IoT
devices unknown to the owners?
A) Macro
B) Cross-site scripting
C) Embedded software exploitation
D) Botnet - ANSWER- D
What enables IoT devices to be infected by the Mirai malware?
4 | P a g e
A) Default passwords
B) Plaintext communication
C) Stolen certificates
D) Cloud storage - ANSWER- A
A company develops a small tracker to be used in parcels to track
progress via Global Positioning System (GPS). Testing reveals that the
tracker has a Joint Test Action Group (JTAG) port on the circuit board
that can be used to overwrite the firmware on the tracker and provide
false location data.
Which two Internet of Things Security Foundation (IoTSF) Best Practice
Guidelines (BPGs) should this company follow in its design process to
ensure security from these forms of attack?
Choose 2 answers.
1. Device secure boot
2. Credential management
3. Physical security
4. Application security
A) 1, 3
B) 1, 2
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |