IOT Questions and Answers – Cloud – Privacy Protection Solution

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Cloud – Privacy Protection Solution”.

1. Privacy protection solution was proposed with KP-ABE and CP-ABE.
a) True
b) False
View Answer

Answer: a
Explanation: The hybrid privacy protection solution was proposed with KP-ABE and CP-ABE. In this solution, privacy information is encrypted based on user attributes and cloud service type. This novel solution is verified by a case study on a campus cloud environment.

2. _________ consumers investing in general data protection needs in multiple dimensions.
a) Normal
b) Business
c) Office
d) Third Party
View Answer

Answer: b
Explanation: Business consumers investing in general data protection needs in multiple dimensions. First, the type of device they need to support determines one continuum to potential solutions from desktop through to mobile phones. Second, the location of the data determines another axis for consideration, either on the device or stored in the cloud.

3. Software that address the data protection is divided into _________ Segments.
a) 1 segment
b) 2 segments
c) 4 segments
d) 3 segments
View Answer

Answer: d
Explanation: Because of the two factors, it’s possible to divide software that addresses data protection into three segments:
Cloud privacy protection
Endpoint protection
Mobile device management.
advertisement
advertisement

4. _________ segment contributing to protection of data on device.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
View Answer

Answer: a
Explanation: The oldest segment contributing to protection of data on device is End Point Protection. EPP also indicates protection for device integrity, including protection against malware, etc.,

5. _________ segment indicates protection for device integrity.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
View Answer

Answer: a
Explanation: The oldest segment contributing to protection of data on device is End Point Protection. EPP also indicates protection for device integrity, including protection against malware, etc.,
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. EPP approach favours _________ data into the device.
a) UnLocking
b) Locking
c) Blocking
d) Unblocking
View Answer

Answer: b
Explanation: For data protection, End Point Protection approach favour locking data into the device through full disk encryption port control, auditing and restriction of data prior to release from the device and other similar mechanisms.

7. End Point Protection primarily focused around deployment on _________
a) Laptops
b) Desktops
c) Both laptops and desktops
d) Phones
View Answer

Answer: c
Explanation: End Point Protection primarily focused around deployment on desktops and laptops although some endpoint protection exists for mobile devices. In these cases, EPP overlaps with MDD.
advertisement

8. _________ is concerned with management of mobile.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud
View Answer

Answer: c
Explanation: Mobile Device Management is primarily concerned with management of mobile devices. Solution often consists of configuration, network, and services management on mobile devices.

9. Is mobile device management similar to that of end point protection with respect to locking?
a) True
b) False
View Answer

Answer: a
Explanation: For data protection, mobile device management, in similar fashion to end point protection favors locking data on the devices so that it cant be compromised.
advertisement

10. How MDM will achieve locking mechanism?
a) Wrapping
b) Controlling
c) Both wrapping and controlling
d) Encryption
View Answer

Answer: c
Explanation: Mobile device management (MDM) achieves this by wrapping and controlling access by all applications on the device.

11. MDM is focused on _________
a) Laptops
b) Tablets
c) Both phones and tablets
d) Phones
View Answer

Answer: c
Explanation: MDM id focused on mobile devices, including mobile phones and tablets. As the line between less distinct, mobile device management will overlap capabilities with end point protection.

12. _________ complicates _________ and _________
a) MDM, EPP and CPP
b) EPP, CPP and MDM
c) MDM, CPP and EPP
d) CPP, EPP and MDM
View Answer

Answer: d
Explanation: The new cloud privacy protection (CPP) segment complicates end point protection (EPP) and mobile device management (MDM). It embraces the inevitable movement of data off device across all the devices of an enterprise.

13. _________ enables the use of cloud sync and storage.
a) Inevitable movement of data
b) Encryption
c) Wrapping
d) Controlling
View Answer

Answer: a
Explanation: The new cloud privacy protection segment complicates end point protection and mobile device management. It embraces the inevitable movement of data off device across all the devices of an enterprise. This enables the use of cloud sync and storage by desktops and laptops beyond the device boundary where EPP provides protection.

14. It enables _________ use of mobile devices without requiring the lockdown of data.
a) own-device
b) controlling
c) sharing of data
d) bring-your-own-device
View Answer

Answer: d
Explanation: It enables bring-your-own-device use of mobile devices without requiring the lockdown of data through MDM.

15. CPP embraces sharing of data between ____________
a) Devices
b) Users
c) Both devices and users
d) Cloud and Devices
View Answer

Answer: c
Explanation: Cloud privacy protection (CPP) embraces sharing of data between devices and users. This sharing means that data must transmit through intermediaries and be protected while doing so.

Sanfoundry Global Education & Learning Series – IOT.

To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.