100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D337 OBJECTIVE ASSESSMENT (NEW 2024/ 2025) INTERNET OF THINGS (IOT) AND INFRASTRUCTURE QUIZ BANK| QUESTIONS AND VERIFIED ANSWERS| 100% CORRECT| A GRADE

Rating
3.0
(1)
Sold
1
Pages
119
Grade
A+
Uploaded on
15-03-2025
Written in
2024/2025

WGU D337 OBJECTIVE ASSESSMENT (NEW 2024/ 2025) INTERNET OF THINGS (IOT) AND INFRASTRUCTURE QUIZ BANK| QUESTIONS AND VERIFIED ANSWERS| 100% CORRECT| A GRADE QUESTION Which type of malware creates a network of remotely controlled IoT de- vices unknown to the owners? A) Macro B) Cross-site scripting C) Embedded software exploitation D) Botnet Answer: D QUESTION What enables IoT devices to be infected by the Mirai malware? A) Default passwords B) Plaintext communication C) Stolen certificates D) Cloud storage Answer: A QUESTION A company develops a small tracker to be used in parcels to track progress via Global Positioning System (GPS). Testing reveals that the tracker has a Joint Test Action Group (JTAG) port on the circuit board that can be used to overwrite the firmware on the tracker and provide false location data.

Show more Read less
Institution
WGU D337
Course
WGU D337











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D337
Course
WGU D337

Document information

Uploaded on
March 15, 2025
Number of pages
119
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

QUESTION
Which type of malware creates a network of remotely controlled IoT de- vices unknown to the
owners?
A) Macro
B) Cross-site scripting
C) Embedded software exploitation
D) Botnet

Answer:
D



QUESTION
What enables IoT devices to be infected by the Mirai malware?
A) Default passwords
B) Plaintext communication
C) Stolen certificates
D) Cloud storage

Answer:
A



QUESTION
A company develops a small tracker to be used in parcels to track progress via Global
Positioning System (GPS). Testing reveals that the tracker has a Joint Test Action Group (JTAG)
port on the circuit board that can be used to overwrite the firmware on the tracker and provide
false location data.

,Which two Internet of Things Security Foundation (IoTSF) Best Practice Guide- lines (BPGs)
should this company follow in its design process to ensure security from these forms of attack?
Choose 2 answers.
1. Device secure boot
2. Credential management
3. Physical security
4. Application security
A) 1, 3
B) 1, 2
C) 2, 3
D) 3, 4

Answer:
A



QUESTION
A company develops an IoT-based security system. The system uses prox- imity sensors that
communicate with a central gateway using a 433 MHZ radio signal. Testing reveals that the
traffic can be sniffed with a software-defined radio, and an attacker could spoof the proximity
sensor by copying the au- thentication details from the radio traffic.
Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should
this company follow in its design process to ensure the security of the radio data?
A) Device secure boot
B) Physical security
C) Network connections
D) Application security

Answer:
C



QUESTION
A company hosts a database in a public cloud. Multiple IoT devices are compromised and used
to generate a high volume of requests targeting the database to affect its availability.
Which type of attack is this? A) Cross-site scripting
B) Distributed denial of service (DDoS)
C) Spear phishing
D) Structured Query Language (SQL) injection

Answer:

,B




QUESTION
A company developed an IoT smart photo frame that allows users to upload photos to their
device using a web browser. Testing revealed that users can upload files onto the root filesystem.
Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should
this company follow in its design process to ensure filesystem permissions are set correctly?
A) Device secure boot
B) Physical security
C) Secure operating system
D) Application security

Answer:
C



QUESTION
A company uses IoT devices to capture data in the field and transmit it for central processing.
The company plans to follow the Internet of Things Security Foundation's (IoTSF) Best Practice
Guidelines (BPGs) to ensure that personal data is protected.
Which IoTSF guideline should this company use? A) Device secure boot
B) Physical security
C) Securing software updates
D) Application security

Answer:
D



QUESTION
A company is developing a smart speaker. The company wants to review industry standards on
device boot and operating system security to improve security in its devices.
Which two resources should this company evaluate? Choose 2 answers.
1. Code of Practice
2. Best Practice Guidelines
3. Human-in-the-loop
4. Internet of Bodies
A) 1, 2

, B) 1, g3

C) 3, g4
D) 2, g4

Answer:
A



QUESTION
Malware ghas ginfected gseveral gIoT gdevices gin ga gcompany. gThese gdevices gwere gusing gdefault
gconfigurations.

What gshould gthe gcompany gdo gto gprevent gthe gmalware gfrom gbeing ginstalled?
A) Alter gthe gport gthe gdevices guse gto gcommunicate
B) Scan gfor gunusual gpackets gbeing gsent gto gthe gdevices
C) Change gthe gdevices' gusernames gand gpasswords
D) Install ga gfirewall glimiting gcommunication gto gthe gdevices

Answer:
C



QUESTION
What gdoes gblockchain gimplement gto gensure greliable gdata gare greturned gwhen gthere gare gmultiple
gsensors gmeasuring gthe gsame gdata?

A) Mega-merger gmethod
B) Agreed gconsensus gmechanism
C) Shared gstorage gquorum
D) Byzantine gPaxos galgorithm

Answer:
B



QUESTION
Which gblockchain gfeature gin gan gIoT gapplication gensures gthat ga gtransaction gis gtamperproof gonce
it gis gvalidated?
g

A) Decentralization
B) Immutability gC) gAuditability gD) gResilience

Reviews from verified buyers

Showing all reviews
1 month ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MBOFFIN HOWARD COMMUNITY COLLEGE
View profile
Follow You need to be logged in order to follow users or courses
Sold
611
Member since
4 year
Number of followers
221
Documents
5190
Last sold
14 hours ago
2000's STORE

THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TEST BANKS, SOLUTION MANUALS AND QUALITY EXAMS IN MY STORE. ALWAYS LEAVE A REVIEW AFTER PURCHASING ANY DOCX SO AS TO MAKE SURE MY CUSTOMERS ARE 100% SATISFIED....ALL ARE WELCOME.

3.8

109 reviews

5
49
4
20
3
21
2
7
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions