questions with verified answers
A city is evaluating the World Bank's Sustainable Mobility for All (SuM4All)
initiative in the development of a road traffic congestion solution. What are two
objectives of the SuM4All initiative? Choose 2 answers. Ans✓✓✓ Safety,
Efficiency
A city plans for an Intelligent Transport System (ITS) that monitors public
transport locations, as well as accidents and congestions, to control traffic lights
effectively. Which two items should be used to gather information for the
system? Choose 2 answers Ans✓✓✓ GPS devices, Smart CCTV cameras
A company developed an IoT smart photo frame that allows users to upload
photos to their device using a web browser. Testing revealed that users can
upload files onto the root filesystem. Which Internet of Things Security
Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its
design process to ensure filesystem permissions are set correctly? Ans✓✓✓
Secure operating system
A company develops a small tracker to be used in parcels to track progress via
Global Positioning System (GPS). Testing reveals that the tracker has a Joint Test
Action Group (JTAG) port on the circuit board that can be used to overwrite the
firmware on the tracker and provide false location data. Which two Internet of
Things Security Foundation (IoTSF) Best Practice Guidelines (BPGs) should this
company follow in its design process to ensure security from these forms of
attack? Choose 2 answers. Ans✓✓✓ Device secure boot, Physical security
A company develops an IoT-based security system. The system uses proximity
sensors that communicate with a central gateway using a 433 MHZ radio signal.
Testing reveals that the traffic can be sniffed with a software-defined radio, and
, an attacker could spoof the proximity sensor by copying the authentication details
from the radio traffic. Which Internet of Things Security Foundation (IoTSF) Best
Practice Guideline (BPG) should this company follow in its design process to
ensure the security of the radio data? Ans✓✓✓ Network connections
A company hosts a database in a public cloud. Multiple IoT devices are
compromised and used to generate a high volume of requests targeting the
database to affect its availability. Which type of attack is this? Ans✓✓✓
Distributed denial of service (DDoS)
A company implements an IoT 5G smart grid to improve resiliency within its
power grid. The company installs the virtual machine cloud machine (vMCM)
function. Why is the vMCM function installed? Ans✓✓✓ To monitor devices and
cache information about daily consumption
A company is developing a garage door sensor that stores data defining when the
owner is home or away and when the garage door is open or closed. The
company needs to ensure the data is stored in a secure manner. What should this
company be concerned about regarding the storage of user information?
Ans✓✓✓ Mishandling stored user information will lead to privacy issues.
A company is developing a self-driving car with IoT technology that will generate
up to 6 GB of data per second. Which component will analyze the data? Ans✓✓✓
Edge computing
A company is developing a smart speaker. The company wants to review industry
standards on device boot and operating system security to improve security in its
devices. Which two resources should this company evaluate? Choose 2 answers.
Ans✓✓✓ Code of Practice, Best Practice Guidelines