IOT Multiple Choice Questions on “Cloud – Privacy Protection Solution”.
1. Privacy protection solution was proposed with KP-ABE and CP-ABE.
a) True
b) False
Answer: a
Clarification: The hybrid privacy protection solution was proposed with KP-ABE and CP-ABE. This way chosen different way to encrypt the privacy information based on user attributions according to cloud service business type.
2. _________ consumers investing in general data protection needs in multiple dimensions.
a) Normal
b) Business
c) Office
d) Third Party
Answer: b
Clarification: Business consumers investing in general data protection needs in multiple dimensions. First, the type of device they need to support determines one continuum to potential solutions from desktop through to mobile phones. Second, the location of the data determines another axis for consideration, either on the device or stored in the cloud.
3. Software that address the data protection is divided into _________ Segments.
a) 1 segment
b) 2 segments
c) 4 segments
d) 3 segments
Answer: d
Clarification: Because of the two factors, it’s possible to divide software that addresses data protection into three segments:
Cloud privacy protection
Endpoint protection
Mobile device management.
4. _________ segment contributing to protection of data on device.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
Answer: a
Clarification: The oldest segment contributing to protection of data on device is End Point Protection. EPP also indicates protection for device integrity, including protection against malware, etc.,
5. _________ segment indicates protection for device integrity.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
Answer: a
Clarification: The oldest segment contributing to protection of data on device is End Point Protection. EPP also indicates protection for device integrity, including protection against malware, etc.,
6. EPP approach favours _________ data into the device.
a) UnLocking
b) Locking
c) Blocking
d) Unblocking
Answer: b
Clarification: For data protection, End Point Protection approach favour locking data into the device through full disk encryption port control, auditing and restriction of data prior to release from the device and other similar mechanisms.
7. End Point Protection primarily focused around deployment on _________
a) Laptops
b) Desktops
c) Both laptops and desktops
d) Phones
Answer: c
Clarification: End Point Protection primarily focused around deployment on desktops and laptops although some endpoint protection exists for mobile devices. In these cases, EPP overlaps with MDD.
8. _________ is concerned with management of mobile.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
Answer: c
Clarification: Mobile Device Management is primarily concerned with management of mobile devices. Solution often consists of configuration, network, and services management on mobile devices.
9. Is mobile device management similar to that of end point protection with respect to locking?
a) True
b) False
Answer: a
Clarification: For data protection, mobile device management, in similar fashion to end point protection favors locking data on the devices so that it cant be compromised.
10. How MDM will achieve locking mechanism?
a) Wrapping
b) Controlling
c) Both wrapping and controlling
d) Encryption
Answer: c
Clarification: Mobile device management achieves this by wrapping and controlling access by all applications on the device.
11. MDM is focused on _________
a) Laptops
b) Tablets
c) Both phones and tablets
d) Phones
Answer: c
Clarification: MDM id focused on mobile devices, including mobile phones and tablets. As the line between less distinct, mobile device management will overlap capabilities with end point protection.
12. _________ complicates _________ and _________
a) MDM, EPP and CPP
b) EPP, CPP and MDM
c) MDM, CPP and EPP
d) CPP, EPP and MDM
Answer: d
Clarification: The new cloud privacy protection segment complicates end point protection and mobile device management. It embraces the inevitable movement of data off device across all the devices of an enterprise.
13. _________ enables the use of cloud sync and storage.
a) Inevitable movement of data
b) Encryption
c) Wrapping
d) Controlling
Answer: a
Clarification: The inevitable movement of data off device across all the devices of an enterprise. This enables the use of cloud sync and storage by desktops and laptops beyond the device boundary where EPP provides protection.
14. It enables _________ use of mobile devices without requiring the lockdown of data.
a) own-device
b) controlling
c) sharing of data
d) bring-your-own-device
Answer: d
Clarification: It enables bring-your-own-device use of mobile devices without requiring the lockdown of data through MDM.
15. CPP embraces sharing of data between ____________
a) Devices
b) Users
c) Both devices and users
d) Cloud and Devices
Answer: c
Clarification: Cloud privacy protection embraces sharing of data between devices and users. This sharing means that data must transmit through intermediaries and be protected while doing so.