Questions with verified answers
2A - Assess Environmental Considerations Performance-based Question Ans✓✓✓
See PBQ image
3A - Discover the Target Performance-based Question Ans✓✓✓ See PBQ Image
A city is evaluating the World Bank's Sustainable Mobility for All (SuM4All)
initiative in the development of a road traffic congestion solution.
What are two objectives of the SuM4All initiative?
Choose 2 answers.
1. Security
2. Safety
3. Efficiency
4. Deployment
A) 1, 2
B) 1, 3
C) 2, 3
D) 3, 4 Ans✓✓✓ C
,A city plans for an Intelligent Transport System (ITS) that monitors public
transport locations, as well as accidents and congestions, to control traffic lights
effectively.
Which two items should be used to gather information for the system?
Choose 2 answers.
1. GPS devices
2. Smart CCTV cameras
3. Smart meters
4. Intraocular devices
A) 1, 2
B) 1, 3
C) 2, 3
D) 3, 4 Ans✓✓✓ A
A company developed an IoT smart photo frame that allows users to upload
photos to their device using a web browser. Testing revealed that users can
upload files onto the root filesystem.
Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline
(BPG) should this company follow in its design process to ensure filesystem
permissions are set correctly?
,A) Device secure boot
B) Physical security
C) Secure operating system
D) Application security Ans✓✓✓ C
A company develops a small tracker to be used in parcels to track progress via
Global Positioning System (GPS). Testing reveals that the tracker has a Joint Test
Action Group (JTAG) port on the circuit board that can be used to overwrite the
firmware on the tracker and provide false location data.
Which two Internet of Things Security Foundation (IoTSF) Best Practice Guidelines
(BPGs) should this company follow in its design process to ensure security from
these forms of attack?
Choose 2 answers.
1. Device secure boot
2. Credential management
3. Physical security
4. Application security
A) 1, 3
B) 1, 2
C) 2, 3
D) 3, 4 Ans✓✓✓ A
, A company develops an IoT-based security system. The system uses proximity
sensors that communicate with a central gateway using a 433 MHZ radio signal.
Testing reveals that the traffic can be sniffed with a software-defined radio, and
an attacker could spoof the proximity sensor by copying the authentication details
from the radio traffic.
Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline
(BPG) should this company follow in its design process to ensure the security of
the radio data?
A) Device secure boot
B) Physical security
C) Network connections
D) Application security Ans✓✓✓ C
A company hosts a database in a public cloud. Multiple IoT devices are
compromised and used to generate a high volume of requests targeting the
database to affect its availability.
Which type of attack is this?
A) Cross-site scripting
B) Distributed denial of service (DDoS)
C) Spear phishing
D) Structured Query Language (SQL) injection Ans✓✓✓ B