100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MBA 6207 FINAL EXAM WITH CORRECT DETAILED ANSWERS 2024. $15.49   Add to cart

Exam (elaborations)

MBA 6207 FINAL EXAM WITH CORRECT DETAILED ANSWERS 2024.

 8 views  0 purchase
  • Course
  • MBA - ITM C218
  • Institution
  • MBA - ITM C218

MBA 6207 FINAL EXAM WITH CORRECT DETAILED ANSWERS 2024.

Preview 4 out of 44  pages

  • October 11, 2024
  • 44
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MBA - ITM C218
  • MBA - ITM C218
avatar-seller
Divinehub
MBA 6207 FINAL EXAM WITH CORRECT
DETAILED ANSWERS 2024.
Can hackers who gain access to an organization's IoT cause physical damage?

a. no, because physical devices are controlled manually
b. no, because IoT devices only send, not receive, data
c. yes, by infiltrating the public cloud
d. yes, by tampering with critical infrastructure - ANSWER- d. yes, by tampering with
critical infrastructure

Hackers who gain access to an organization's IoT can steal data, transfer money out of
accounts, and shut down Web sites. They can also wreck physical havoc by tampering
with critical infrastructure such as air traffic control systems, health care devices, power
grids, and supervisory control and data acquisition (SCADA) systems.

A single-tenant cloud computing environment is also known as a(n) _____.

a. public cloud
b. private cloud
c. autonomic cloud
d. hybrid cloud - ANSWER- b. private cloud

An enabling technology for cloud computing is autonomic computing, or the ability of IT
systems to manage themselves and adapt to changes in the computing environment,
business policies, and operating objectives.

A positive development for public, private, and hybrid cloud computing environments is
the emerging ability of IT systems to manage themselves and adapt to changes in the
computing environment, business policies, and operating objectives. This ability is
known as _____.

a. cloud virtualization
b. multicloud computing
c. 5G networking
d. autonomic computing - ANSWER- autonomic computing

An enabling technology for cloud computing is autonomic computing, or the ability of IT
systems to manage themselves and adapt to changes in the computing environment,
business policies, and operating objectives.

A common reason an organization chooses a private rather than a public cloud
environment is _____.

,a. budgeting concerns
b. IT staff reductions
c. lack of adequate hardware
d. concerns about data security - ANSWER- d. concerns about data security

Organizations that implement a private cloud often do so because they are concerned
that their data will not be secure in a public cloud.

An organization using a public cloud allows the service provider to store their data in a
remote location, possibly on the same storage device as other organizations' data. This
results in which key concern with the public cloud?

a. vendor lock-in
b. complex pricing arrangements
c. frequent software updates
d. inadequate data security - ANSWER- d. inadequate data security

Data security is another key concern when using a public cloud computing service
because you are relying on someone else to safeguard your data, which may even
reside on the same storage device as data from another organization (perhaps even a
competitor).

As a result of the analysis of aggregated sensor data, an IoT device may receive _____.

a. self-configuring and self-healing instructions
b. a series of new IP addresses
c. a download of data from other systems
d. updates, alerts, or even automatic adjustments - ANSWER- d. updates, alerts, or
even automatic adjustments

To be truly part of the IoT, networked devices need IP addresses and a connection to
the public Internet, which allows the data to be transmitted to an operational historical
database containing data from many sensors. The operational data can be accessed
via the Internet and analyzed by users with personal computers or mobile devices.
Updates, alerts, or even automatic adjustments may be sent to the devices on the IoT
based on this analysis.

Autonomous vehicles will rely on 5G for their _____.

a. sensors
b. human interaction
c. brake function
d. gas mileage - ANSWER- sensors

,Self-driving cars will rely on 5G for their sensors, which interact with other cars on the
road and process traffic and mapping information in real time.

Clara has a device that responds to her voice commands by reviewing her calendar
appointments, performing search queries, and playing streaming music. This is an
example of a(n) _____.

a. fitness tracker
b. smart speaker
c. Tesla device
d. infrastructure enhancement - ANSWER- smart speaker

Smart speakers, such as Google Home and Amazon Alexa, connect to the Internet and
respond to your voice commands to perform functions such as reviewing calendar
appointments, performing search queries, streaming music, and turning on or off lights
connected to smart outlets.

Claudette is shocked to discover that her company's data has been stolen, and their
Web site shut down, by a malicious ex-employee. She had thought their security was
airtight! Two recent changes they made were migrating their database to a private, on-
premises cloud and installing IoT devices that communicate with the database
continually. What most likely occurred?

a. The ex-employee hacked Claudette's company's IoT to gain access.
b. The ex-employee hacked into their private cloud through another tenant's account.
c. The ex-employee broke into their office without leaving a physical trace.
d. The ex-employee gained access through their IaaS provider. - ANSWER- a. The ex-
employee hacked Claudette's company's IoT to gain access.

There is a key decision that organizations must make when considering implementation
of an IoT: Are the benefits of doing so sufficient to overcome the risk of making detailed
company information accessible through the Internet and exposing internal systems to
hacking, viruses, and destructive malware? Hackers who gain access to an
organization's IoT can steal data, transfer money out of accounts, and shut down Web
sites.

Eleanor realizes that the data coming from two of her firm's IoT devices is incomplete
and includes inconsistent values. What is the most likely cause of this problem?

a. faulty sensors
b. long-term network outage
c. vendor lock-in
d. DoS attack - ANSWER- a. faulty sensors

Sometimes a faulty sensor or bad network connection results in missing data or sensor
data that lacks a time stamp indicating when the reading occurred. As a result, sensor

, data can be incomplete or contain inconsistent values, indicating a potential sensor
failure or a drop in a network.

Don's company has contracted with a service provider to receive a computing platform
for all employees, complete with an operating system, database services, and a Web
server. Don develops applications using tools delivered by the service provider. What
type of service has Don's company signed up for?

a. IaaS
b. hybrid cloud
c. PaaS
d. SaaS - ANSWER- c. PaaS

Platform as a service (PaaS) is an information systems model in which users are
provided with a computing platform, typically including operating system, programming
language execution environment, database services, and a Web server. The user can
create an application or service using tools and/or libraries from the provider.

Examples of the application of the IoT to improve customer service and experience
include _____.

a. mobile card readers and smart trackers
b. sensors embedded in helmets and wristbands
c. video and social media surveillance
d. sensors attached to conveyor lines - ANSWER- mobile card readers and smart
trackers

Mobile card readers that can connect to smartphones to process transactions and smart
trackers that enable consumers to keep track of their shipped products can improve
customer experience and overall satisfaction.

Harold's city government uses data from sensors combined with artificial intelligence to
improve the local infrastructure and efficiently manage traffic lights, water supplies, and
energy usage. Harold _____.

a. lives in a 5G community
b. lives in a smart city
c. must wear an IoT device
d. has inadequate data security - ANSWER- b. lives in a smart city

The IoT is also influencing city planning. A smart city uses data from sensors combined
with artificial intelligence to improve its infrastructure and efficiently manage traffic lights,
power plants, water supplies, networks, energy usage, and other resources.

How does 5G technology compare with 4G technology?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Divinehub. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.49
  • (0)
  Add to cart