100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MBA 6207 Final Exam || very Flawless. $14.49   Add to cart

Exam (elaborations)

MBA 6207 Final Exam || very Flawless.

 4 views  0 purchase
  • Course
  • MBA 6207
  • Institution
  • MBA 6207

Can hackers who gain access to an organization's IoT cause physical damage? a. no, because physical devices are controlled manually b. no, because IoT devices only send, not receive, data c. yes, by infiltrating the public cloud d. yes, by tampering with critical infrastructure correct answer...

[Show more]

Preview 4 out of 41  pages

  • August 9, 2024
  • 41
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MBA 6207
  • MBA 6207
avatar-seller
FullyFocus
MBA 6207 Final Exam || very Flawless.
Can hackers who gain access to an organization's IoT cause physical damage?

a. no, because physical devices are controlled manually
b. no, because IoT devices only send, not receive, data
c. yes, by infiltrating the public cloud
d. yes, by tampering with critical infrastructure correct answers d. yes, by tampering with critical
infrastructure

Hackers who gain access to an organization's IoT can steal data, transfer money out of accounts,
and shut down Web sites. They can also wreck physical havoc by tampering with critical
infrastructure such as air traffic control systems, health care devices, power grids, and
supervisory control and data acquisition (SCADA) systems.

A single-tenant cloud computing environment is also known as a(n) _____.

a. public cloud
b. private cloud
c. autonomic cloud
d. hybrid cloud correct answers b. private cloud

An enabling technology for cloud computing is autonomic computing, or the ability of IT
systems to manage themselves and adapt to changes in the computing environment, business
policies, and operating objectives.

A positive development for public, private, and hybrid cloud computing environments is the
emerging ability of IT systems to manage themselves and adapt to changes in the computing
environment, business policies, and operating objectives. This ability is known as _____.

a. cloud virtualization
b. multicloud computing
c. 5G networking
d. autonomic computing correct answers autonomic computing

An enabling technology for cloud computing is autonomic computing, or the ability of IT
systems to manage themselves and adapt to changes in the computing environment, business
policies, and operating objectives.

A common reason an organization chooses a private rather than a public cloud environment is
_____.

a. budgeting concerns
b. IT staff reductions
c. lack of adequate hardware
d. concerns about data security correct answers d. concerns about data security

,Organizations that implement a private cloud often do so because they are concerned that their
data will not be secure in a public cloud.

An organization using a public cloud allows the service provider to store their data in a remote
location, possibly on the same storage device as other organizations' data. This results in which
key concern with the public cloud?

a. vendor lock-in
b. complex pricing arrangements
c. frequent software updates
d. inadequate data security correct answers d. inadequate data security

Data security is another key concern when using a public cloud computing service because you
are relying on someone else to safeguard your data, which may even reside on the same storage
device as data from another organization (perhaps even a competitor).

As a result of the analysis of aggregated sensor data, an IoT device may receive _____.

a. self-configuring and self-healing instructions
b. a series of new IP addresses
c. a download of data from other systems
d. updates, alerts, or even automatic adjustments correct answers d. updates, alerts, or even
automatic adjustments

To be truly part of the IoT, networked devices need IP addresses and a connection to the public
Internet, which allows the data to be transmitted to an operational historical database containing
data from many sensors. The operational data can be accessed via the Internet and analyzed by
users with personal computers or mobile devices. Updates, alerts, or even automatic adjustments
may be sent to the devices on the IoT based on this analysis.

Autonomous vehicles will rely on 5G for their _____.

a. sensors
b. human interaction
c. brake function
d. gas mileage correct answers sensors

Self-driving cars will rely on 5G for their sensors, which interact with other cars on the road and
process traffic and mapping information in real time.

Clara has a device that responds to her voice commands by reviewing her calendar appointments,
performing search queries, and playing streaming music. This is an example of a(n) _____.

a. fitness tracker
b. smart speaker

,c. Tesla device
d. infrastructure enhancement correct answers smart speaker

Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and respond to
your voice commands to perform functions such as reviewing calendar appointments, performing
search queries, streaming music, and turning on or off lights connected to smart outlets.

Claudette is shocked to discover that her company's data has been stolen, and their Web site shut
down, by a malicious ex-employee. She had thought their security was airtight! Two recent
changes they made were migrating their database to a private, on-premises cloud and installing
IoT devices that communicate with the database continually. What most likely occurred?

a. The ex-employee hacked Claudette's company's IoT to gain access.
b. The ex-employee hacked into their private cloud through another tenant's account.
c. The ex-employee broke into their office without leaving a physical trace.
d. The ex-employee gained access through their IaaS provider. correct answers a. The ex-
employee hacked Claudette's company's IoT to gain access.

There is a key decision that organizations must make when considering implementation of an
IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed company
information accessible through the Internet and exposing internal systems to hacking, viruses,
and destructive malware? Hackers who gain access to an organization's IoT can steal data,
transfer money out of accounts, and shut down Web sites.

Eleanor realizes that the data coming from two of her firm's IoT devices is incomplete and
includes inconsistent values. What is the most likely cause of this problem?

a. faulty sensors
b. long-term network outage
c. vendor lock-in
d. DoS attack correct answers a. faulty sensors

Sometimes a faulty sensor or bad network connection results in missing data or sensor data that
lacks a time stamp indicating when the reading occurred. As a result, sensor data can be
incomplete or contain inconsistent values, indicating a potential sensor failure or a drop in a
network.

Don's company has contracted with a service provider to receive a computing platform for all
employees, complete with an operating system, database services, and a Web server. Don
develops applications using tools delivered by the service provider. What type of service has
Don's company signed up for?

a. IaaS
b. hybrid cloud
c. PaaS
d. SaaS correct answers c. PaaS

, Platform as a service (PaaS) is an information systems model in which users are provided with a
computing platform, typically including operating system, programming language execution
environment, database services, and a Web server. The user can create an application or service
using tools and/or libraries from the provider.

Examples of the application of the IoT to improve customer service and experience include
_____.

a. mobile card readers and smart trackers
b. sensors embedded in helmets and wristbands
c. video and social media surveillance
d. sensors attached to conveyor lines correct answers mobile card readers and smart trackers

Mobile card readers that can connect to smartphones to process transactions and smart trackers
that enable consumers to keep track of their shipped products can improve customer experience
and overall satisfaction.

Harold's city government uses data from sensors combined with artificial intelligence to improve
the local infrastructure and efficiently manage traffic lights, water supplies, and energy usage.
Harold _____.

a. lives in a 5G community
b. lives in a smart city
c. must wear an IoT device
d. has inadequate data security correct answers b. lives in a smart city

The IoT is also influencing city planning. A smart city uses data from sensors combined with
artificial intelligence to improve its infrastructure and efficiently manage traffic lights, power
plants, water supplies, networks, energy usage, and other resources.

How does 5G technology compare with 4G technology?

a. 4G requires more antennas in a given area.
b. 5G uses millimeter wave.
c. 5G signals travel farther.
d. 4G uses a higher frequency band of the wireless spectrum. correct answers b. 5G uses
millimeter wave

5G uses millimeter wave, a higher frequency band of the wireless spectrum, which allows data to
be transferred at faster rates than the lower frequency bands used by 4G networks. However,
because millimeter wave signals do not travel as far as 4G signals, carriers must place 5G
antennas closer together than was required for prior generations of wireless networks.

In which common approach to cloud computing does a service provider organization own and
manage the infrastructure for client organizations that access slices of shared resources?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart